2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
======================
|
|
|
|
Thread Safety Analysis
|
|
|
|
======================
|
|
|
|
|
|
|
|
Introduction
|
|
|
|
============
|
|
|
|
|
|
|
|
Clang Thread Safety Analysis is a C++ language extension which warns about
|
|
|
|
potential race conditions in code. The analysis is completely static (i.e.
|
|
|
|
compile-time); there is no run-time overhead. The analysis is still
|
|
|
|
under active development, but it is mature enough to be deployed in an
|
2014-11-14 21:48:34 +08:00
|
|
|
industrial setting. It is being developed by Google, in collaboration with
|
|
|
|
CERT/SEI, and is used extensively in Google's internal code base.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
Thread safety analysis works very much like a type system for multi-threaded
|
|
|
|
programs. In addition to declaring the *type* of data (e.g. ``int``, ``float``,
|
|
|
|
etc.), the programmer can (optionally) declare how access to that data is
|
|
|
|
controlled in a multi-threaded environment. For example, if ``foo`` is
|
|
|
|
*guarded by* the mutex ``mu``, then the analysis will issue a warning whenever
|
|
|
|
a piece of code reads or writes to ``foo`` without first locking ``mu``.
|
|
|
|
Similarly, if there are particular routines that should only be called by
|
|
|
|
the GUI thread, then the analysis will warn if other threads call those
|
2014-09-25 06:13:34 +08:00
|
|
|
routines.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
Getting Started
|
|
|
|
----------------
|
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
#include "mutex.h"
|
|
|
|
|
|
|
|
class BankAccount {
|
|
|
|
private:
|
|
|
|
Mutex mu;
|
|
|
|
int balance GUARDED_BY(mu);
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
void depositImpl(int amount) {
|
|
|
|
balance += amount; // WARNING! Cannot write balance without locking mu.
|
|
|
|
}
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
void withdrawImpl(int amount) REQUIRES(mu) {
|
2014-02-19 03:42:01 +08:00
|
|
|
balance -= amount; // OK. Caller must have locked mu.
|
|
|
|
}
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
public:
|
|
|
|
void withdraw(int amount) {
|
|
|
|
mu.Lock();
|
|
|
|
withdrawImpl(amount); // OK. We've locked mu.
|
|
|
|
} // WARNING! Failed to unlock mu.
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
void transferFrom(BankAccount& b, int amount) {
|
|
|
|
mu.Lock();
|
|
|
|
b.withdrawImpl(amount); // WARNING! Calling withdrawImpl() requires locking b.mu.
|
|
|
|
depositImpl(amount); // OK. depositImpl() has no requirements.
|
|
|
|
mu.Unlock();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
This example demonstrates the basic concepts behind the analysis. The
|
|
|
|
``GUARDED_BY`` attribute declares that a thread must lock ``mu`` before it can
|
|
|
|
read or write to ``balance``, thus ensuring that the increment and decrement
|
2014-09-25 06:13:34 +08:00
|
|
|
operations are atomic. Similarly, ``REQUIRES`` declares that
|
2014-02-19 03:42:01 +08:00
|
|
|
the calling thread must lock ``mu`` before calling ``withdrawImpl``.
|
|
|
|
Because the caller is assumed to have locked ``mu``, it is safe to modify
|
|
|
|
``balance`` within the body of the method.
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
The ``depositImpl()`` method does not have ``REQUIRES``, so the
|
2014-02-19 03:42:01 +08:00
|
|
|
analysis issues a warning. Thread safety analysis is not inter-procedural, so
|
|
|
|
caller requirements must be explicitly declared.
|
|
|
|
There is also a warning in ``transferFrom()``, because although the method
|
|
|
|
locks ``this->mu``, it does not lock ``b.mu``. The analysis understands
|
2014-09-25 06:13:34 +08:00
|
|
|
that these are two separate mutexes, in two different objects.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
Finally, there is a warning in the ``withdraw()`` method, because it fails to
|
|
|
|
unlock ``mu``. Every lock must have a corresponding unlock, and the analysis
|
|
|
|
will detect both double locks, and double unlocks. A function is allowed to
|
|
|
|
acquire a lock without releasing it, (or vice versa), but it must be annotated
|
2014-09-25 06:13:34 +08:00
|
|
|
as such (using ``ACQUIRE``/``RELEASE``).
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
Running The Analysis
|
2014-02-20 04:43:58 +08:00
|
|
|
--------------------
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
To run the analysis, simply compile with the ``-Wthread-safety`` flag, e.g.
|
|
|
|
|
|
|
|
.. code-block:: bash
|
|
|
|
|
|
|
|
clang -c -Wthread-safety example.cpp
|
|
|
|
|
|
|
|
Note that this example assumes the presence of a suitably annotated
|
|
|
|
:ref:`mutexheader` that declares which methods perform locking,
|
2014-09-25 06:13:34 +08:00
|
|
|
unlocking, and so on.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
Basic Concepts: Capabilities
|
|
|
|
============================
|
|
|
|
|
|
|
|
Thread safety analysis provides a way of protecting *resources* with
|
|
|
|
*capabilities*. A resource is either a data member, or a function/method
|
|
|
|
that provides access to some underlying resource. The analysis ensures that
|
|
|
|
the calling thread cannot access the *resource* (i.e. call the function, or
|
|
|
|
read/write the data) unless it has the *capability* to do so.
|
|
|
|
|
|
|
|
Capabilities are associated with named C++ objects which declare specific
|
|
|
|
methods to acquire and release the capability. The name of the object serves
|
|
|
|
to identify the capability. The most common example is a mutex. For example,
|
|
|
|
if ``mu`` is a mutex, then calling ``mu.Lock()`` causes the calling thread
|
2014-09-25 06:13:34 +08:00
|
|
|
to acquire the capability to access data that is protected by ``mu``. Similarly,
|
2014-02-19 03:42:01 +08:00
|
|
|
calling ``mu.Unlock()`` releases that capability.
|
|
|
|
|
|
|
|
A thread may hold a capability either *exclusively* or *shared*. An exclusive
|
|
|
|
capability can be held by only one thread at a time, while a shared capability
|
|
|
|
can be held by many threads at the same time. This mechanism enforces a
|
|
|
|
multiple-reader, single-writer pattern. Write operations to protected data
|
2014-09-25 06:13:34 +08:00
|
|
|
require exclusive access, while read operations require only shared access.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
At any given moment during program execution, a thread holds a specific set of
|
|
|
|
capabilities (e.g. the set of mutexes that it has locked.) These act like keys
|
|
|
|
or tokens that allow the thread to access a given resource. Just like physical
|
|
|
|
security keys, a thread cannot make copy of a capability, nor can it destroy
|
|
|
|
one. A thread can only release a capability to another thread, or acquire one
|
|
|
|
from another thread. The annotations are deliberately agnostic about the
|
2014-09-25 06:13:34 +08:00
|
|
|
exact mechanism used to acquire and release capabilities; it assumes that the
|
2014-02-19 03:42:01 +08:00
|
|
|
underlying implementation (e.g. the Mutex implementation) does the handoff in
|
|
|
|
an appropriate manner.
|
|
|
|
|
|
|
|
The set of capabilities that are actually held by a given thread at a given
|
|
|
|
point in program execution is a run-time concept. The static analysis works
|
|
|
|
by calculating an approximation of that set, called the *capability
|
|
|
|
environment*. The capability environment is calculated for every program point,
|
|
|
|
and describes the set of capabilities that are statically known to be held, or
|
|
|
|
not held, at that particular point. This environment is a conservative
|
|
|
|
approximation of the full set of capabilities that will actually held by a
|
|
|
|
thread at run-time.
|
|
|
|
|
|
|
|
|
|
|
|
Reference Guide
|
|
|
|
===============
|
|
|
|
|
|
|
|
The thread safety analysis uses attributes to declare threading constraints.
|
|
|
|
Attributes must be attached to named declarations, such as classes, methods,
|
|
|
|
and data members. Users are *strongly advised* to define macros for the various
|
|
|
|
attributes; example definitions can be found in :ref:`mutexheader`, below.
|
|
|
|
The following documentation assumes the use of macros.
|
|
|
|
|
2020-09-27 04:11:43 +08:00
|
|
|
The attributes only control assumptions made by thread safety analysis and the
|
|
|
|
warnings it issues. They don't affect generated code or behavior at run-time.
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
For historical reasons, prior versions of thread safety used macro names that
|
|
|
|
were very lock-centric. These macros have since been renamed to fit a more
|
|
|
|
general capability model. The prior names are still in use, and will be
|
|
|
|
mentioned under the tag *previously* where appropriate.
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
GUARDED_BY(c) and PT_GUARDED_BY(c)
|
|
|
|
----------------------------------
|
|
|
|
|
|
|
|
``GUARDED_BY`` is an attribute on data members, which declares that the data
|
|
|
|
member is protected by the given capability. Read operations on the data
|
|
|
|
require shared access, while write operations require exclusive access.
|
|
|
|
|
|
|
|
``PT_GUARDED_BY`` is similar, but is intended for use on pointers and smart
|
|
|
|
pointers. There is no constraint on the data member itself, but the *data that
|
2014-09-25 06:13:34 +08:00
|
|
|
it points to* is protected by the given capability.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
Mutex mu;
|
2014-09-25 06:13:34 +08:00
|
|
|
int *p1 GUARDED_BY(mu);
|
|
|
|
int *p2 PT_GUARDED_BY(mu);
|
|
|
|
unique_ptr<int> p3 PT_GUARDED_BY(mu);
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
void test() {
|
|
|
|
p1 = 0; // Warning!
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
*p2 = 42; // Warning!
|
2014-09-25 06:13:34 +08:00
|
|
|
p2 = new int; // OK.
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
*p3 = 42; // Warning!
|
2014-09-25 06:13:34 +08:00
|
|
|
p3.reset(new int); // OK.
|
2014-02-19 03:42:01 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
REQUIRES(...), REQUIRES_SHARED(...)
|
|
|
|
-----------------------------------
|
|
|
|
|
|
|
|
*Previously*: ``EXCLUSIVE_LOCKS_REQUIRED``, ``SHARED_LOCKS_REQUIRED``
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
``REQUIRES`` is an attribute on functions or methods, which
|
2014-02-19 03:42:01 +08:00
|
|
|
declares that the calling thread must have exclusive access to the given
|
|
|
|
capabilities. More than one capability may be specified. The capabilities
|
2014-09-25 06:13:34 +08:00
|
|
|
must be held on entry to the function, *and must still be held on exit*.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
``REQUIRES_SHARED`` is similar, but requires only shared access.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
Mutex mu1, mu2;
|
|
|
|
int a GUARDED_BY(mu1);
|
|
|
|
int b GUARDED_BY(mu2);
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
void foo() REQUIRES(mu1, mu2) {
|
2014-02-19 03:42:01 +08:00
|
|
|
a = 0;
|
|
|
|
b = 0;
|
|
|
|
}
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
void test() {
|
|
|
|
mu1.Lock();
|
|
|
|
foo(); // Warning! Requires mu2.
|
|
|
|
mu1.Unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-09-07 02:34:32 +08:00
|
|
|
ACQUIRE(...), ACQUIRE_SHARED(...), RELEASE(...), RELEASE_SHARED(...), RELEASE_GENERIC(...)
|
|
|
|
------------------------------------------------------------------------------------------
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
*Previously*: ``EXCLUSIVE_LOCK_FUNCTION``, ``SHARED_LOCK_FUNCTION``,
|
|
|
|
``UNLOCK_FUNCTION``
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2020-09-07 02:34:32 +08:00
|
|
|
``ACQUIRE`` and ``ACQUIRE_SHARED`` are attributes on functions or methods
|
|
|
|
declaring that the function acquires a capability, but does not release it.
|
|
|
|
The given capability must not be held on entry, and will be held on exit
|
|
|
|
(exclusively for ``ACQUIRE``, shared for ``ACQUIRE_SHARED``).
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2020-09-07 02:34:32 +08:00
|
|
|
``RELEASE``, ``RELEASE_SHARED``, and ``RELEASE_GENERIC`` declare that the
|
|
|
|
function releases the given capability. The capability must be held on entry
|
|
|
|
(exclusively for ``RELEASE``, shared for ``RELEASE_SHARED``, exclusively or
|
|
|
|
shared for ``RELEASE_GENERIC``), and will no longer be held on exit.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
Mutex mu;
|
|
|
|
MyClass myObject GUARDED_BY(mu);
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
void lockAndInit() ACQUIRE(mu) {
|
2014-02-19 03:42:01 +08:00
|
|
|
mu.Lock();
|
|
|
|
myObject.init();
|
|
|
|
}
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
void cleanupAndUnlock() RELEASE(mu) {
|
2014-02-19 03:42:01 +08:00
|
|
|
myObject.cleanup();
|
2014-09-25 06:13:34 +08:00
|
|
|
} // Warning! Need to unlock mu.
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
void test() {
|
|
|
|
lockAndInit();
|
|
|
|
myObject.doSomething();
|
|
|
|
cleanupAndUnlock();
|
|
|
|
myObject.doSomething(); // Warning, mu is not locked.
|
|
|
|
}
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
If no argument is passed to ``ACQUIRE`` or ``RELEASE``, then the argument is
|
|
|
|
assumed to be ``this``, and the analysis will not check the body of the
|
|
|
|
function. This pattern is intended for use by classes which hide locking
|
|
|
|
details behind an abstract interface. For example:
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
template <class T>
|
2014-09-25 06:13:34 +08:00
|
|
|
class CAPABILITY("mutex") Container {
|
2014-02-19 03:42:01 +08:00
|
|
|
private:
|
|
|
|
Mutex mu;
|
|
|
|
T* data;
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
public:
|
|
|
|
// Hide mu from public interface.
|
2014-09-25 06:13:34 +08:00
|
|
|
void Lock() ACQUIRE() { mu.Lock(); }
|
|
|
|
void Unlock() RELEASE() { mu.Unlock(); }
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
T& getElem(int i) { return data[i]; }
|
|
|
|
};
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
void test() {
|
|
|
|
Container<int> c;
|
|
|
|
c.Lock();
|
|
|
|
int i = c.getElem(0);
|
|
|
|
c.Unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
EXCLUDES(...)
|
|
|
|
-------------
|
|
|
|
|
|
|
|
*Previously*: ``LOCKS_EXCLUDED``
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
``EXCLUDES`` is an attribute on functions or methods, which declares that
|
2014-02-19 03:42:01 +08:00
|
|
|
the caller must *not* hold the given capabilities. This annotation is
|
|
|
|
used to prevent deadlock. Many mutex implementations are not re-entrant, so
|
2014-09-25 06:13:34 +08:00
|
|
|
deadlock can occur if the function acquires the mutex a second time.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
Mutex mu;
|
|
|
|
int a GUARDED_BY(mu);
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
void clear() EXCLUDES(mu) {
|
2014-02-19 03:42:01 +08:00
|
|
|
mu.Lock();
|
|
|
|
a = 0;
|
|
|
|
mu.Unlock();
|
|
|
|
}
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
void reset() {
|
|
|
|
mu.Lock();
|
|
|
|
clear(); // Warning! Caller cannot hold 'mu'.
|
|
|
|
mu.Unlock();
|
|
|
|
}
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
Unlike ``REQUIRES``, ``EXCLUDES`` is optional. The analysis will not issue a
|
|
|
|
warning if the attribute is missing, which can lead to false negatives in some
|
|
|
|
cases. This issue is discussed further in :ref:`negative`.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
NO_THREAD_SAFETY_ANALYSIS
|
|
|
|
-------------------------
|
|
|
|
|
|
|
|
``NO_THREAD_SAFETY_ANALYSIS`` is an attribute on functions or methods, which
|
|
|
|
turns off thread safety checking for that method. It provides an escape hatch
|
|
|
|
for functions which are either (1) deliberately thread-unsafe, or (2) are
|
|
|
|
thread-safe, but too complicated for the analysis to understand. Reasons for
|
|
|
|
(2) will be described in the :ref:`limitations`, below.
|
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
class Counter {
|
|
|
|
Mutex mu;
|
|
|
|
int a GUARDED_BY(mu);
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
void unsafeIncrement() NO_THREAD_SAFETY_ANALYSIS { a++; }
|
|
|
|
};
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
Unlike the other attributes, NO_THREAD_SAFETY_ANALYSIS is not part of the
|
|
|
|
interface of a function, and should thus be placed on the function definition
|
2014-11-14 21:48:34 +08:00
|
|
|
(in the ``.cc`` or ``.cpp`` file) rather than on the function declaration
|
2014-09-25 06:13:34 +08:00
|
|
|
(in the header).
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
RETURN_CAPABILITY(c)
|
|
|
|
--------------------
|
|
|
|
|
|
|
|
*Previously*: ``LOCK_RETURNED``
|
|
|
|
|
|
|
|
``RETURN_CAPABILITY`` is an attribute on functions or methods, which declares
|
|
|
|
that the function returns a reference to the given capability. It is used to
|
2014-02-19 03:42:01 +08:00
|
|
|
annotate getter methods that return mutexes.
|
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
class MyClass {
|
|
|
|
private:
|
|
|
|
Mutex mu;
|
|
|
|
int a GUARDED_BY(mu);
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
public:
|
2014-09-25 06:13:34 +08:00
|
|
|
Mutex* getMu() RETURN_CAPABILITY(mu) { return μ }
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
// analysis knows that getMu() == mu
|
2014-09-25 06:13:34 +08:00
|
|
|
void clear() REQUIRES(getMu()) { a = 0; }
|
2014-02-19 03:42:01 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
ACQUIRED_BEFORE(...), ACQUIRED_AFTER(...)
|
|
|
|
-----------------------------------------
|
|
|
|
|
|
|
|
``ACQUIRED_BEFORE`` and ``ACQUIRED_AFTER`` are attributes on member
|
|
|
|
declarations, specifically declarations of mutexes or other capabilities.
|
|
|
|
These declarations enforce a particular order in which the mutexes must be
|
|
|
|
acquired, in order to prevent deadlock.
|
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
Mutex m1;
|
|
|
|
Mutex m2 ACQUIRED_AFTER(m1);
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
// Alternative declaration
|
|
|
|
// Mutex m2;
|
|
|
|
// Mutex m1 ACQUIRED_BEFORE(m2);
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
void foo() {
|
|
|
|
m2.Lock();
|
|
|
|
m1.Lock(); // Warning! m2 must be acquired after m1.
|
|
|
|
m1.Unlock();
|
|
|
|
m2.Unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
CAPABILITY(<string>)
|
|
|
|
--------------------
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
*Previously*: ``LOCKABLE``
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
``CAPABILITY`` is an attribute on classes, which specifies that objects of the
|
|
|
|
class can be used as a capability. The string argument specifies the kind of
|
|
|
|
capability in error messages, e.g. ``"mutex"``. See the ``Container`` example
|
|
|
|
given above, or the ``Mutex`` class in :ref:`mutexheader`.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
SCOPED_CAPABILITY
|
|
|
|
-----------------
|
|
|
|
|
|
|
|
*Previously*: ``SCOPED_LOCKABLE``
|
|
|
|
|
|
|
|
``SCOPED_CAPABILITY`` is an attribute on classes that implement RAII-style
|
2014-02-19 03:42:01 +08:00
|
|
|
locking, in which a capability is acquired in the constructor, and released in
|
|
|
|
the destructor. Such classes require special handling because the constructor
|
|
|
|
and destructor refer to the capability via different names; see the
|
|
|
|
``MutexLocker`` class in :ref:`mutexheader`, below.
|
|
|
|
|
2020-09-07 02:35:02 +08:00
|
|
|
Scoped capabilities are treated as capabilities that are implicitly acquired
|
|
|
|
on construction and released on destruction. They are associated with
|
|
|
|
the set of (regular) capabilities named in thread safety attributes on the
|
|
|
|
constructor. Acquire-type attributes on other member functions are treated as
|
|
|
|
applying to that set of associated capabilities, while ``RELEASE`` implies that
|
|
|
|
a function releases all associated capabilities in whatever mode they're held.
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
TRY_ACQUIRE(<bool>, ...), TRY_ACQUIRE_SHARED(<bool>, ...)
|
|
|
|
---------------------------------------------------------
|
|
|
|
|
|
|
|
*Previously:* ``EXCLUSIVE_TRYLOCK_FUNCTION``, ``SHARED_TRYLOCK_FUNCTION``
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
These are attributes on a function or method that tries to acquire the given
|
|
|
|
capability, and returns a boolean value indicating success or failure.
|
|
|
|
The first argument must be ``true`` or ``false``, to specify which return value
|
|
|
|
indicates success, and the remaining arguments are interpreted in the same way
|
2014-09-25 06:13:34 +08:00
|
|
|
as ``ACQUIRE``. See :ref:`mutexheader`, below, for example uses.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2020-09-05 20:21:42 +08:00
|
|
|
Because the analysis doesn't support conditional locking, a capability is
|
|
|
|
treated as acquired after the first branch on the return value of a try-acquire
|
|
|
|
function.
|
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
Mutex mu;
|
|
|
|
int a GUARDED_BY(mu);
|
|
|
|
|
|
|
|
void foo() {
|
|
|
|
bool success = mu.TryLock();
|
|
|
|
a = 0; // Warning, mu is not locked.
|
|
|
|
if (success) {
|
|
|
|
a = 0; // Ok.
|
|
|
|
mu.Unlock();
|
|
|
|
} else {
|
|
|
|
a = 0; // Warning, mu is not locked.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
ASSERT_CAPABILITY(...) and ASSERT_SHARED_CAPABILITY(...)
|
|
|
|
--------------------------------------------------------
|
|
|
|
|
|
|
|
*Previously:* ``ASSERT_EXCLUSIVE_LOCK``, ``ASSERT_SHARED_LOCK``
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2020-09-27 04:11:43 +08:00
|
|
|
These are attributes on a function or method which asserts the calling thread
|
|
|
|
already holds the given capability, for example by performing a run-time test
|
|
|
|
and terminating if the capability is not held. Presence of this annotation
|
|
|
|
causes the analysis to assume the capability is held after calls to the
|
|
|
|
annotated function. See :ref:`mutexheader`, below, for example uses.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
GUARDED_VAR and PT_GUARDED_VAR
|
|
|
|
------------------------------
|
|
|
|
|
|
|
|
Use of these attributes has been deprecated.
|
|
|
|
|
|
|
|
|
|
|
|
Warning flags
|
|
|
|
-------------
|
|
|
|
|
2021-12-01 04:06:46 +08:00
|
|
|
* ``-Wthread-safety``: Umbrella flag which turns on the following:
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2021-12-01 04:06:46 +08:00
|
|
|
+ ``-Wthread-safety-attributes``: Semantic checks for thread safety attributes.
|
2014-02-19 03:42:01 +08:00
|
|
|
+ ``-Wthread-safety-analysis``: The core analysis.
|
|
|
|
+ ``-Wthread-safety-precise``: Requires that mutex expressions match precisely.
|
2014-09-25 06:13:34 +08:00
|
|
|
This warning can be disabled for code which has a lot of aliases.
|
|
|
|
+ ``-Wthread-safety-reference``: Checks when guarded members are passed by reference.
|
|
|
|
|
|
|
|
|
|
|
|
:ref:`negative` are an experimental feature, which are enabled with:
|
|
|
|
|
|
|
|
* ``-Wthread-safety-negative``: Negative capabilities. Off by default.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
When new features and checks are added to the analysis, they can often introduce
|
|
|
|
additional warnings. Those warnings are initially released as *beta* warnings
|
2014-09-25 06:13:34 +08:00
|
|
|
for a period of time, after which they are migrated into the standard analysis.
|
|
|
|
|
|
|
|
* ``-Wthread-safety-beta``: New features. Off by default.
|
|
|
|
|
|
|
|
|
|
|
|
.. _negative:
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
Negative Capabilities
|
|
|
|
=====================
|
|
|
|
|
|
|
|
Thread Safety Analysis is designed to prevent both race conditions and
|
|
|
|
deadlock. The GUARDED_BY and REQUIRES attributes prevent race conditions, by
|
|
|
|
ensuring that a capability is held before reading or writing to guarded data,
|
|
|
|
and the EXCLUDES attribute prevents deadlock, by making sure that a mutex is
|
|
|
|
*not* held.
|
|
|
|
|
|
|
|
However, EXCLUDES is an optional attribute, and does not provide the same
|
|
|
|
safety guarantee as REQUIRES. In particular:
|
|
|
|
|
|
|
|
* A function which acquires a capability does not have to exclude it.
|
|
|
|
* A function which calls a function that excludes a capability does not
|
|
|
|
have transitively exclude that capability.
|
|
|
|
|
|
|
|
As a result, EXCLUDES can easily produce false negatives:
|
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
class Foo {
|
|
|
|
Mutex mu;
|
|
|
|
|
|
|
|
void foo() {
|
|
|
|
mu.Lock();
|
|
|
|
bar(); // No warning.
|
|
|
|
baz(); // No warning.
|
|
|
|
mu.Unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
void bar() { // No warning. (Should have EXCLUDES(mu)).
|
|
|
|
mu.Lock();
|
|
|
|
// ...
|
|
|
|
mu.Unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
void baz() {
|
|
|
|
bif(); // No warning. (Should have EXCLUDES(mu)).
|
|
|
|
}
|
|
|
|
|
|
|
|
void bif() EXCLUDES(mu);
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
Negative requirements are an alternative EXCLUDES that provide
|
|
|
|
a stronger safety guarantee. A negative requirement uses the REQUIRES
|
2014-11-14 21:48:34 +08:00
|
|
|
attribute, in conjunction with the ``!`` operator, to indicate that a capability
|
2014-09-25 06:13:34 +08:00
|
|
|
should *not* be held.
|
|
|
|
|
|
|
|
For example, using ``REQUIRES(!mu)`` instead of ``EXCLUDES(mu)`` will produce
|
|
|
|
the appropriate warnings:
|
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
class FooNeg {
|
|
|
|
Mutex mu;
|
|
|
|
|
|
|
|
void foo() REQUIRES(!mu) { // foo() now requires !mu.
|
|
|
|
mu.Lock();
|
|
|
|
bar();
|
|
|
|
baz();
|
|
|
|
mu.Unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
void bar() {
|
|
|
|
mu.Lock(); // WARNING! Missing REQUIRES(!mu).
|
|
|
|
// ...
|
|
|
|
mu.Unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
void baz() {
|
|
|
|
bif(); // WARNING! Missing REQUIRES(!mu).
|
|
|
|
}
|
|
|
|
|
|
|
|
void bif() REQUIRES(!mu);
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
Negative requirements are an experimental feature which is off by default,
|
|
|
|
because it will produce many warnings in existing code. It can be enabled
|
|
|
|
by passing ``-Wthread-safety-negative``.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
.. _faq:
|
|
|
|
|
|
|
|
Frequently Asked Questions
|
|
|
|
==========================
|
|
|
|
|
|
|
|
(Q) Should I put attributes in the header file, or in the .cc/.cpp/.cxx file?
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
(A) Attributes are part of the formal interface of a function, and should
|
|
|
|
always go in the header, where they are visible to anything that includes
|
|
|
|
the header. Attributes in the .cpp file are not visible outside of the
|
|
|
|
immediate translation unit, which leads to false negatives and false positives.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
(Q) "*Mutex is not locked on every path through here?*" What does that mean?
|
|
|
|
|
|
|
|
(A) See :ref:`conditional_locks`, below.
|
|
|
|
|
|
|
|
|
|
|
|
.. _limitations:
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
Known Limitations
|
2014-02-20 04:43:58 +08:00
|
|
|
=================
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
Lexical scope
|
|
|
|
-------------
|
|
|
|
|
|
|
|
Thread safety attributes contain ordinary C++ expressions, and thus follow
|
|
|
|
ordinary C++ scoping rules. In particular, this means that mutexes and other
|
|
|
|
capabilities must be declared before they can be used in an attribute.
|
|
|
|
Use-before-declaration is okay within a single class, because attributes are
|
|
|
|
parsed at the same time as method bodies. (C++ delays parsing of method bodies
|
|
|
|
until the end of the class.) However, use-before-declaration is not allowed
|
2014-09-25 06:13:34 +08:00
|
|
|
between classes, as illustrated below.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
class Foo;
|
|
|
|
|
|
|
|
class Bar {
|
2014-09-25 06:13:34 +08:00
|
|
|
void bar(Foo* f) REQUIRES(f->mu); // Error: mu undeclared.
|
2014-02-19 03:42:01 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
class Foo {
|
|
|
|
Mutex mu;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
Private Mutexes
|
|
|
|
---------------
|
|
|
|
|
|
|
|
Good software engineering practice dictates that mutexes should be private
|
|
|
|
members, because the locking mechanism used by a thread-safe class is part of
|
|
|
|
its internal implementation. However, private mutexes can sometimes leak into
|
|
|
|
the public interface of a class.
|
|
|
|
Thread safety attributes follow normal C++ access restrictions, so if ``mu``
|
|
|
|
is a private member of ``c``, then it is an error to write ``c.mu`` in an
|
|
|
|
attribute.
|
|
|
|
|
2014-11-14 21:48:34 +08:00
|
|
|
One workaround is to (ab)use the ``RETURN_CAPABILITY`` attribute to provide a
|
2014-09-25 06:13:34 +08:00
|
|
|
public *name* for a private mutex, without actually exposing the underlying
|
|
|
|
mutex. For example:
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
class MyClass {
|
|
|
|
private:
|
|
|
|
Mutex mu;
|
|
|
|
|
|
|
|
public:
|
2021-07-23 20:45:56 +08:00
|
|
|
// For thread safety analysis only. Does not need to be defined.
|
|
|
|
Mutex* getMu() RETURN_CAPABILITY(mu);
|
2014-02-19 03:42:01 +08:00
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
void doSomething() REQUIRES(mu);
|
2014-02-19 03:42:01 +08:00
|
|
|
};
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
void doSomethingTwice(MyClass& c) REQUIRES(c.getMu()) {
|
2014-02-19 03:42:01 +08:00
|
|
|
// The analysis thinks that c.getMu() == c.mu
|
|
|
|
c.doSomething();
|
|
|
|
c.doSomething();
|
|
|
|
}
|
|
|
|
|
|
|
|
In the above example, ``doSomethingTwice()`` is an external routine that
|
|
|
|
requires ``c.mu`` to be locked, which cannot be declared directly because ``mu``
|
|
|
|
is private. This pattern is discouraged because it
|
|
|
|
violates encapsulation, but it is sometimes necessary, especially when adding
|
|
|
|
annotations to an existing code base. The workaround is to define ``getMu()``
|
|
|
|
as a fake getter method, which is provided only for the benefit of thread
|
|
|
|
safety analysis.
|
|
|
|
|
|
|
|
|
|
|
|
.. _conditional_locks:
|
|
|
|
|
|
|
|
No conditionally held locks.
|
|
|
|
----------------------------
|
|
|
|
|
|
|
|
The analysis must be able to determine whether a lock is held, or not held, at
|
|
|
|
every program point. Thus, sections of code where a lock *might be held* will
|
|
|
|
generate spurious warnings (false positives). For example:
|
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
void foo() {
|
|
|
|
bool b = needsToLock();
|
|
|
|
if (b) mu.Lock();
|
2014-09-25 06:13:34 +08:00
|
|
|
... // Warning! Mutex 'mu' is not held on every path through here.
|
2014-02-19 03:42:01 +08:00
|
|
|
if (b) mu.Unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
No checking inside constructors and destructors.
|
|
|
|
------------------------------------------------
|
|
|
|
|
|
|
|
The analysis currently does not do any checking inside constructors or
|
|
|
|
destructors. In other words, every constructor and destructor is treated as
|
2014-09-25 06:13:34 +08:00
|
|
|
if it was annotated with ``NO_THREAD_SAFETY_ANALYSIS``.
|
2014-02-19 03:42:01 +08:00
|
|
|
The reason for this is that during initialization, only one thread typically
|
|
|
|
has access to the object which is being initialized, and it is thus safe (and
|
|
|
|
common practice) to initialize guarded members without acquiring any locks.
|
|
|
|
The same is true of destructors.
|
|
|
|
|
|
|
|
Ideally, the analysis would allow initialization of guarded members inside the
|
|
|
|
object being initialized or destroyed, while still enforcing the usual access
|
|
|
|
restrictions on everything else. However, this is difficult to enforce in
|
|
|
|
practice, because in complex pointer-based data structures, it is hard to
|
2014-09-25 06:13:34 +08:00
|
|
|
determine what data is owned by the enclosing object.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
No inlining.
|
|
|
|
------------
|
|
|
|
|
|
|
|
Thread safety analysis is strictly intra-procedural, just like ordinary type
|
|
|
|
checking. It relies only on the declared attributes of a function, and will
|
2014-09-25 06:13:34 +08:00
|
|
|
not attempt to inline any method calls. As a result, code such as the
|
|
|
|
following will not work:
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
template<class T>
|
|
|
|
class AutoCleanup {
|
|
|
|
T* object;
|
|
|
|
void (T::*mp)();
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
public:
|
|
|
|
AutoCleanup(T* obj, void (T::*imp)()) : object(obj), mp(imp) { }
|
|
|
|
~AutoCleanup() { (object->*mp)(); }
|
|
|
|
};
|
|
|
|
|
|
|
|
Mutex mu;
|
|
|
|
void foo() {
|
|
|
|
mu.Lock();
|
2014-09-25 06:13:34 +08:00
|
|
|
AutoCleanup<Mutex>(&mu, &Mutex::Unlock);
|
|
|
|
// ...
|
2014-02-19 03:42:01 +08:00
|
|
|
} // Warning, mu is not unlocked.
|
|
|
|
|
|
|
|
In this case, the destructor of ``Autocleanup`` calls ``mu.Unlock()``, so
|
|
|
|
the warning is bogus. However,
|
|
|
|
thread safety analysis cannot see the unlock, because it does not attempt to
|
|
|
|
inline the destructor. Moreover, there is no way to annotate the destructor,
|
|
|
|
because the destructor is calling a function that is not statically known.
|
2014-09-25 06:13:34 +08:00
|
|
|
This pattern is simply not supported.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
No alias analysis.
|
|
|
|
------------------
|
|
|
|
|
|
|
|
The analysis currently does not track pointer aliases. Thus, there can be
|
2014-09-25 06:13:34 +08:00
|
|
|
false positives if two pointers both point to the same mutex.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
|
|
|
class MutexUnlocker {
|
|
|
|
Mutex* mu;
|
|
|
|
|
|
|
|
public:
|
2014-09-25 06:13:34 +08:00
|
|
|
MutexUnlocker(Mutex* m) RELEASE(m) : mu(m) { mu->Unlock(); }
|
|
|
|
~MutexUnlocker() ACQUIRE(mu) { mu->Lock(); }
|
2014-02-19 03:42:01 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
Mutex mutex;
|
2014-09-25 06:13:34 +08:00
|
|
|
void test() REQUIRES(mutex) {
|
|
|
|
{
|
2014-02-19 03:42:01 +08:00
|
|
|
MutexUnlocker munl(&mutex); // unlocks mutex
|
|
|
|
doSomeIO();
|
|
|
|
} // Warning: locks munl.mu
|
|
|
|
}
|
|
|
|
|
|
|
|
The MutexUnlocker class is intended to be the dual of the MutexLocker class,
|
|
|
|
defined in :ref:`mutexheader`. However, it doesn't work because the analysis
|
2014-09-25 06:13:34 +08:00
|
|
|
doesn't know that munl.mu == mutex. The SCOPED_CAPABILITY attribute handles
|
|
|
|
aliasing for MutexLocker, but does so only for that particular pattern.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
ACQUIRED_BEFORE(...) and ACQUIRED_AFTER(...) are currently unimplemented.
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
To be fixed in a future update.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
.. _mutexheader:
|
|
|
|
|
|
|
|
mutex.h
|
|
|
|
=======
|
|
|
|
|
|
|
|
Thread safety analysis can be used with any threading library, but it does
|
|
|
|
require that the threading API be wrapped in classes and methods which have the
|
|
|
|
appropriate annotations. The following code provides ``mutex.h`` as an example;
|
|
|
|
these methods should be filled in to call the appropriate underlying
|
2014-09-25 06:13:34 +08:00
|
|
|
implementation.
|
2014-02-19 03:42:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
.. code-block:: c++
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
#ifndef THREAD_SAFETY_ANALYSIS_MUTEX_H
|
|
|
|
#define THREAD_SAFETY_ANALYSIS_MUTEX_H
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
// Enable thread safety attributes only with clang.
|
|
|
|
// The attributes can be safely erased when compiling with other compilers.
|
|
|
|
#if defined(__clang__) && (!defined(SWIG))
|
|
|
|
#define THREAD_ANNOTATION_ATTRIBUTE__(x) __attribute__((x))
|
|
|
|
#else
|
|
|
|
#define THREAD_ANNOTATION_ATTRIBUTE__(x) // no-op
|
|
|
|
#endif
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
#define CAPABILITY(x) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(capability(x))
|
|
|
|
|
|
|
|
#define SCOPED_CAPABILITY \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(scoped_lockable)
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
#define GUARDED_BY(x) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(guarded_by(x))
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
#define PT_GUARDED_BY(x) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(pt_guarded_by(x))
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
#define ACQUIRED_BEFORE(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(acquired_before(__VA_ARGS__))
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
#define ACQUIRED_AFTER(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(acquired_after(__VA_ARGS__))
|
|
|
|
|
|
|
|
#define REQUIRES(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(requires_capability(__VA_ARGS__))
|
|
|
|
|
|
|
|
#define REQUIRES_SHARED(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(requires_shared_capability(__VA_ARGS__))
|
|
|
|
|
|
|
|
#define ACQUIRE(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(acquire_capability(__VA_ARGS__))
|
|
|
|
|
|
|
|
#define ACQUIRE_SHARED(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(acquire_shared_capability(__VA_ARGS__))
|
|
|
|
|
|
|
|
#define RELEASE(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(release_capability(__VA_ARGS__))
|
|
|
|
|
|
|
|
#define RELEASE_SHARED(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(release_shared_capability(__VA_ARGS__))
|
|
|
|
|
2020-09-07 02:34:32 +08:00
|
|
|
#define RELEASE_GENERIC(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(release_generic_capability(__VA_ARGS__))
|
|
|
|
|
2014-09-25 06:13:34 +08:00
|
|
|
#define TRY_ACQUIRE(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(try_acquire_capability(__VA_ARGS__))
|
|
|
|
|
|
|
|
#define TRY_ACQUIRE_SHARED(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(try_acquire_shared_capability(__VA_ARGS__))
|
|
|
|
|
|
|
|
#define EXCLUDES(...) \
|
2014-02-19 03:42:01 +08:00
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(locks_excluded(__VA_ARGS__))
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
#define ASSERT_CAPABILITY(x) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(assert_capability(x))
|
|
|
|
|
|
|
|
#define ASSERT_SHARED_CAPABILITY(x) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(assert_shared_capability(x))
|
|
|
|
|
|
|
|
#define RETURN_CAPABILITY(x) \
|
2014-02-19 03:42:01 +08:00
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(lock_returned(x))
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
#define NO_THREAD_SAFETY_ANALYSIS \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(no_thread_safety_analysis)
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
// Defines an annotated interface for mutexes.
|
|
|
|
// These methods can be implemented to use any internal mutex implementation.
|
2014-09-25 06:13:34 +08:00
|
|
|
class CAPABILITY("mutex") Mutex {
|
2014-02-19 03:42:01 +08:00
|
|
|
public:
|
|
|
|
// Acquire/lock this mutex exclusively. Only one thread can have exclusive
|
|
|
|
// access at any one time. Write operations to guarded data require an
|
|
|
|
// exclusive lock.
|
2014-09-25 06:13:34 +08:00
|
|
|
void Lock() ACQUIRE();
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
// Acquire/lock this mutex for read operations, which require only a shared
|
|
|
|
// lock. This assumes a multiple-reader, single writer semantics. Multiple
|
2014-09-25 06:13:34 +08:00
|
|
|
// threads may acquire the mutex simultaneously as readers, but a writer
|
|
|
|
// must wait for all of them to release the mutex before it can acquire it
|
|
|
|
// exclusively.
|
|
|
|
void ReaderLock() ACQUIRE_SHARED();
|
|
|
|
|
|
|
|
// Release/unlock an exclusive mutex.
|
|
|
|
void Unlock() RELEASE();
|
|
|
|
|
|
|
|
// Release/unlock a shared mutex.
|
|
|
|
void ReaderUnlock() RELEASE_SHARED();
|
|
|
|
|
2020-09-07 02:34:32 +08:00
|
|
|
// Generic unlock, can unlock exclusive and shared mutexes.
|
|
|
|
void GenericUnlock() RELEASE_GENERIC();
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
// Try to acquire the mutex. Returns true on success, and false on failure.
|
2014-09-25 06:13:34 +08:00
|
|
|
bool TryLock() TRY_ACQUIRE(true);
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
// Try to acquire the mutex for read operations.
|
2014-09-25 06:13:34 +08:00
|
|
|
bool ReaderTryLock() TRY_ACQUIRE_SHARED(true);
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
// Assert that this mutex is currently held by the calling thread.
|
2014-09-25 06:13:34 +08:00
|
|
|
void AssertHeld() ASSERT_CAPABILITY(this);
|
|
|
|
|
|
|
|
// Assert that is mutex is currently held for read operations.
|
|
|
|
void AssertReaderHeld() ASSERT_SHARED_CAPABILITY(this);
|
2021-11-15 09:17:08 +08:00
|
|
|
|
2015-05-22 21:36:48 +08:00
|
|
|
// For negative capabilities.
|
|
|
|
const Mutex& operator!() const { return *this; }
|
2014-02-19 03:42:01 +08:00
|
|
|
};
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2020-09-07 02:35:02 +08:00
|
|
|
// Tag types for selecting a constructor.
|
|
|
|
struct adopt_lock_t {} inline constexpr adopt_lock = {};
|
|
|
|
struct defer_lock_t {} inline constexpr defer_lock = {};
|
|
|
|
struct shared_lock_t {} inline constexpr shared_lock = {};
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
// MutexLocker is an RAII class that acquires a mutex in its constructor, and
|
2014-09-25 06:13:34 +08:00
|
|
|
// releases it in its destructor.
|
|
|
|
class SCOPED_CAPABILITY MutexLocker {
|
2014-02-19 03:42:01 +08:00
|
|
|
private:
|
|
|
|
Mutex* mut;
|
2020-09-07 02:35:02 +08:00
|
|
|
bool locked;
|
2014-09-25 06:13:34 +08:00
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
public:
|
2020-09-07 02:35:02 +08:00
|
|
|
// Acquire mu, implicitly acquire *this and associate it with mu.
|
|
|
|
MutexLocker(Mutex *mu) ACQUIRE(mu) : mut(mu), locked(true) {
|
2014-02-19 03:42:01 +08:00
|
|
|
mu->Lock();
|
2014-09-25 06:13:34 +08:00
|
|
|
}
|
2020-09-07 02:35:02 +08:00
|
|
|
|
|
|
|
// Assume mu is held, implicitly acquire *this and associate it with mu.
|
|
|
|
MutexLocker(Mutex *mu, adopt_lock_t) REQUIRES(mu) : mut(mu), locked(true) {}
|
|
|
|
|
|
|
|
// Acquire mu in shared mode, implicitly acquire *this and associate it with mu.
|
|
|
|
MutexLocker(Mutex *mu, shared_lock_t) ACQUIRE_SHARED(mu) : mut(mu), locked(true) {
|
|
|
|
mu->ReaderLock();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assume mu is held in shared mode, implicitly acquire *this and associate it with mu.
|
|
|
|
MutexLocker(Mutex *mu, adopt_lock_t, shared_lock_t) REQUIRES_SHARED(mu)
|
|
|
|
: mut(mu), locked(true) {}
|
|
|
|
|
|
|
|
// Assume mu is not held, implicitly acquire *this and associate it with mu.
|
|
|
|
MutexLocker(Mutex *mu, defer_lock_t) EXCLUDES(mu) : mut(mu), locked(false) {}
|
|
|
|
|
|
|
|
// Release *this and all associated mutexes, if they are still held.
|
|
|
|
// There is no warning if the scope was already unlocked before.
|
2014-09-25 06:13:34 +08:00
|
|
|
~MutexLocker() RELEASE() {
|
2020-09-07 02:35:02 +08:00
|
|
|
if (locked)
|
|
|
|
mut->GenericUnlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Acquire all associated mutexes exclusively.
|
|
|
|
void Lock() ACQUIRE() {
|
|
|
|
mut->Lock();
|
|
|
|
locked = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to acquire all associated mutexes exclusively.
|
|
|
|
bool TryLock() TRY_ACQUIRE(true) {
|
|
|
|
return locked = mut->TryLock();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Acquire all associated mutexes in shared mode.
|
|
|
|
void ReaderLock() ACQUIRE_SHARED() {
|
|
|
|
mut->ReaderLock();
|
|
|
|
locked = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to acquire all associated mutexes in shared mode.
|
|
|
|
bool ReaderTryLock() TRY_ACQUIRE_SHARED(true) {
|
|
|
|
return locked = mut->ReaderTryLock();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Release all associated mutexes. Warn on double unlock.
|
|
|
|
void Unlock() RELEASE() {
|
2014-02-19 03:42:01 +08:00
|
|
|
mut->Unlock();
|
2020-09-07 02:35:02 +08:00
|
|
|
locked = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Release all associated mutexes. Warn on double unlock.
|
|
|
|
void ReaderUnlock() RELEASE() {
|
|
|
|
mut->ReaderUnlock();
|
|
|
|
locked = false;
|
2014-02-19 03:42:01 +08:00
|
|
|
}
|
|
|
|
};
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
|
|
|
|
#ifdef USE_LOCK_STYLE_THREAD_SAFETY_ATTRIBUTES
|
|
|
|
// The original version of thread safety analysis the following attribute
|
|
|
|
// definitions. These use a lock-based terminology. They are still in use
|
|
|
|
// by existing thread safety code, and will continue to be supported.
|
|
|
|
|
|
|
|
// Deprecated.
|
|
|
|
#define PT_GUARDED_VAR \
|
2017-05-08 20:39:17 +08:00
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(pt_guarded_var)
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
// Deprecated.
|
|
|
|
#define GUARDED_VAR \
|
2017-05-08 20:39:17 +08:00
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(guarded_var)
|
2014-09-25 06:13:34 +08:00
|
|
|
|
|
|
|
// Replaced by REQUIRES
|
|
|
|
#define EXCLUSIVE_LOCKS_REQUIRED(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(exclusive_locks_required(__VA_ARGS__))
|
|
|
|
|
|
|
|
// Replaced by REQUIRES_SHARED
|
|
|
|
#define SHARED_LOCKS_REQUIRED(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(shared_locks_required(__VA_ARGS__))
|
|
|
|
|
|
|
|
// Replaced by CAPABILITY
|
|
|
|
#define LOCKABLE \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(lockable)
|
|
|
|
|
|
|
|
// Replaced by SCOPED_CAPABILITY
|
|
|
|
#define SCOPED_LOCKABLE \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(scoped_lockable)
|
|
|
|
|
|
|
|
// Replaced by ACQUIRE
|
|
|
|
#define EXCLUSIVE_LOCK_FUNCTION(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(exclusive_lock_function(__VA_ARGS__))
|
|
|
|
|
|
|
|
// Replaced by ACQUIRE_SHARED
|
|
|
|
#define SHARED_LOCK_FUNCTION(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(shared_lock_function(__VA_ARGS__))
|
|
|
|
|
|
|
|
// Replaced by RELEASE and RELEASE_SHARED
|
|
|
|
#define UNLOCK_FUNCTION(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(unlock_function(__VA_ARGS__))
|
|
|
|
|
|
|
|
// Replaced by TRY_ACQUIRE
|
|
|
|
#define EXCLUSIVE_TRYLOCK_FUNCTION(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(exclusive_trylock_function(__VA_ARGS__))
|
|
|
|
|
|
|
|
// Replaced by TRY_ACQUIRE_SHARED
|
|
|
|
#define SHARED_TRYLOCK_FUNCTION(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(shared_trylock_function(__VA_ARGS__))
|
|
|
|
|
|
|
|
// Replaced by ASSERT_CAPABILITY
|
|
|
|
#define ASSERT_EXCLUSIVE_LOCK(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(assert_exclusive_lock(__VA_ARGS__))
|
|
|
|
|
|
|
|
// Replaced by ASSERT_SHARED_CAPABILITY
|
|
|
|
#define ASSERT_SHARED_LOCK(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(assert_shared_lock(__VA_ARGS__))
|
|
|
|
|
|
|
|
// Replaced by EXCLUDE_CAPABILITY.
|
|
|
|
#define LOCKS_EXCLUDED(...) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(locks_excluded(__VA_ARGS__))
|
|
|
|
|
|
|
|
// Replaced by RETURN_CAPABILITY
|
|
|
|
#define LOCK_RETURNED(x) \
|
|
|
|
THREAD_ANNOTATION_ATTRIBUTE__(lock_returned(x))
|
|
|
|
|
|
|
|
#endif // USE_LOCK_STYLE_THREAD_SAFETY_ATTRIBUTES
|
|
|
|
|
2014-02-19 03:42:01 +08:00
|
|
|
#endif // THREAD_SAFETY_ANALYSIS_MUTEX_H
|