forked from OSchip/llvm-project
447 lines
14 KiB
C++
447 lines
14 KiB
C++
//===-- sanitizer_mutex.h ---------------------------------------*- C++ -*-===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of ThreadSanitizer/AddressSanitizer runtime.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#ifndef SANITIZER_MUTEX_H
|
|
#define SANITIZER_MUTEX_H
|
|
|
|
#include "sanitizer_atomic.h"
|
|
#include "sanitizer_internal_defs.h"
|
|
#include "sanitizer_libc.h"
|
|
#include "sanitizer_thread_safety.h"
|
|
|
|
namespace __sanitizer {
|
|
|
|
class SANITIZER_MUTEX StaticSpinMutex {
|
|
public:
|
|
void Init() {
|
|
atomic_store(&state_, 0, memory_order_relaxed);
|
|
}
|
|
|
|
void Lock() SANITIZER_ACQUIRE() {
|
|
if (LIKELY(TryLock()))
|
|
return;
|
|
LockSlow();
|
|
}
|
|
|
|
bool TryLock() SANITIZER_TRY_ACQUIRE(true) {
|
|
return atomic_exchange(&state_, 1, memory_order_acquire) == 0;
|
|
}
|
|
|
|
void Unlock() SANITIZER_RELEASE() {
|
|
atomic_store(&state_, 0, memory_order_release);
|
|
}
|
|
|
|
void CheckLocked() const SANITIZER_CHECK_LOCKED() {
|
|
CHECK_EQ(atomic_load(&state_, memory_order_relaxed), 1);
|
|
}
|
|
|
|
private:
|
|
atomic_uint8_t state_;
|
|
|
|
void LockSlow();
|
|
};
|
|
|
|
class SANITIZER_MUTEX SpinMutex : public StaticSpinMutex {
|
|
public:
|
|
SpinMutex() {
|
|
Init();
|
|
}
|
|
|
|
SpinMutex(const SpinMutex &) = delete;
|
|
void operator=(const SpinMutex &) = delete;
|
|
};
|
|
|
|
// Semaphore provides an OS-dependent way to park/unpark threads.
|
|
// The last thread returned from Wait can destroy the object
|
|
// (destruction-safety).
|
|
class Semaphore {
|
|
public:
|
|
constexpr Semaphore() {}
|
|
Semaphore(const Semaphore &) = delete;
|
|
void operator=(const Semaphore &) = delete;
|
|
|
|
void Wait();
|
|
void Post(u32 count = 1);
|
|
|
|
private:
|
|
atomic_uint32_t state_ = {0};
|
|
};
|
|
|
|
typedef int MutexType;
|
|
|
|
enum {
|
|
// Used as sentinel and to catch unassigned types
|
|
// (should not be used as real Mutex type).
|
|
MutexInvalid = 0,
|
|
MutexThreadRegistry,
|
|
// Each tool own mutexes must start at this number.
|
|
MutexLastCommon,
|
|
// Type for legacy mutexes that are not checked for deadlocks.
|
|
MutexUnchecked = -1,
|
|
// Special marks that can be used in MutexMeta::can_lock table.
|
|
// The leaf mutexes can be locked under any other non-leaf mutex,
|
|
// but no other mutex can be locked while under a leaf mutex.
|
|
MutexLeaf = -1,
|
|
// Multiple mutexes of this type can be locked at the same time.
|
|
MutexMulti = -3,
|
|
};
|
|
|
|
// Go linker does not support THREADLOCAL variables,
|
|
// so we can't use per-thread state.
|
|
// Disable checked locks on Darwin. Although Darwin platforms support
|
|
// THREADLOCAL variables they are not usable early on during process init when
|
|
// `__sanitizer::Mutex` is used.
|
|
#define SANITIZER_CHECK_DEADLOCKS \
|
|
(SANITIZER_DEBUG && !SANITIZER_GO && SANITIZER_SUPPORTS_THREADLOCAL && !SANITIZER_MAC)
|
|
|
|
#if SANITIZER_CHECK_DEADLOCKS
|
|
struct MutexMeta {
|
|
MutexType type;
|
|
const char *name;
|
|
// The table fixes what mutexes can be locked under what mutexes.
|
|
// If the entry for MutexTypeFoo contains MutexTypeBar,
|
|
// then Bar mutex can be locked while under Foo mutex.
|
|
// Can also contain the special MutexLeaf/MutexMulti marks.
|
|
MutexType can_lock[10];
|
|
};
|
|
#endif
|
|
|
|
class CheckedMutex {
|
|
public:
|
|
explicit constexpr CheckedMutex(MutexType type)
|
|
#if SANITIZER_CHECK_DEADLOCKS
|
|
: type_(type)
|
|
#endif
|
|
{
|
|
}
|
|
|
|
ALWAYS_INLINE void Lock() {
|
|
#if SANITIZER_CHECK_DEADLOCKS
|
|
LockImpl(GET_CALLER_PC());
|
|
#endif
|
|
}
|
|
|
|
ALWAYS_INLINE void Unlock() {
|
|
#if SANITIZER_CHECK_DEADLOCKS
|
|
UnlockImpl();
|
|
#endif
|
|
}
|
|
|
|
// Checks that the current thread does not hold any mutexes
|
|
// (e.g. when returning from a runtime function to user code).
|
|
static void CheckNoLocks() {
|
|
#if SANITIZER_CHECK_DEADLOCKS
|
|
CheckNoLocksImpl();
|
|
#endif
|
|
}
|
|
|
|
private:
|
|
#if SANITIZER_CHECK_DEADLOCKS
|
|
const MutexType type_;
|
|
|
|
void LockImpl(uptr pc);
|
|
void UnlockImpl();
|
|
static void CheckNoLocksImpl();
|
|
#endif
|
|
};
|
|
|
|
// Reader-writer mutex.
|
|
// Derive from CheckedMutex for the purposes of EBO.
|
|
// We could make it a field marked with [[no_unique_address]],
|
|
// but this attribute is not supported by some older compilers.
|
|
class SANITIZER_MUTEX Mutex : CheckedMutex {
|
|
public:
|
|
explicit constexpr Mutex(MutexType type = MutexUnchecked)
|
|
: CheckedMutex(type) {}
|
|
|
|
void Lock() SANITIZER_ACQUIRE() {
|
|
CheckedMutex::Lock();
|
|
u64 reset_mask = ~0ull;
|
|
u64 state = atomic_load_relaxed(&state_);
|
|
for (uptr spin_iters = 0;; spin_iters++) {
|
|
u64 new_state;
|
|
bool locked = (state & (kWriterLock | kReaderLockMask)) != 0;
|
|
if (LIKELY(!locked)) {
|
|
// The mutex is not read-/write-locked, try to lock.
|
|
new_state = (state | kWriterLock) & reset_mask;
|
|
} else if (spin_iters > kMaxSpinIters) {
|
|
// We've spun enough, increment waiting writers count and block.
|
|
// The counter will be decremented by whoever wakes us.
|
|
new_state = (state + kWaitingWriterInc) & reset_mask;
|
|
} else if ((state & kWriterSpinWait) == 0) {
|
|
// Active spinning, but denote our presence so that unlocking
|
|
// thread does not wake up other threads.
|
|
new_state = state | kWriterSpinWait;
|
|
} else {
|
|
// Active spinning.
|
|
state = atomic_load(&state_, memory_order_relaxed);
|
|
continue;
|
|
}
|
|
if (UNLIKELY(!atomic_compare_exchange_weak(&state_, &state, new_state,
|
|
memory_order_acquire)))
|
|
continue;
|
|
if (LIKELY(!locked))
|
|
return; // We've locked the mutex.
|
|
if (spin_iters > kMaxSpinIters) {
|
|
// We've incremented waiting writers, so now block.
|
|
writers_.Wait();
|
|
spin_iters = 0;
|
|
} else {
|
|
// We've set kWriterSpinWait, but we are still in active spinning.
|
|
}
|
|
// We either blocked and were unblocked,
|
|
// or we just spun but set kWriterSpinWait.
|
|
// Either way we need to reset kWriterSpinWait
|
|
// next time we take the lock or block again.
|
|
reset_mask = ~kWriterSpinWait;
|
|
state = atomic_load(&state_, memory_order_relaxed);
|
|
DCHECK_NE(state & kWriterSpinWait, 0);
|
|
}
|
|
}
|
|
|
|
bool TryLock() SANITIZER_TRY_ACQUIRE(true) {
|
|
u64 state = atomic_load_relaxed(&state_);
|
|
for (;;) {
|
|
if (UNLIKELY(state & (kWriterLock | kReaderLockMask)))
|
|
return false;
|
|
// The mutex is not read-/write-locked, try to lock.
|
|
if (LIKELY(atomic_compare_exchange_weak(
|
|
&state_, &state, state | kWriterLock, memory_order_acquire))) {
|
|
CheckedMutex::Lock();
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
|
|
void Unlock() SANITIZER_RELEASE() {
|
|
CheckedMutex::Unlock();
|
|
bool wake_writer;
|
|
u64 wake_readers;
|
|
u64 new_state;
|
|
u64 state = atomic_load_relaxed(&state_);
|
|
do {
|
|
DCHECK_NE(state & kWriterLock, 0);
|
|
DCHECK_EQ(state & kReaderLockMask, 0);
|
|
new_state = state & ~kWriterLock;
|
|
wake_writer = (state & (kWriterSpinWait | kReaderSpinWait)) == 0 &&
|
|
(state & kWaitingWriterMask) != 0;
|
|
if (wake_writer)
|
|
new_state = (new_state - kWaitingWriterInc) | kWriterSpinWait;
|
|
wake_readers =
|
|
wake_writer || (state & kWriterSpinWait) != 0
|
|
? 0
|
|
: ((state & kWaitingReaderMask) >> kWaitingReaderShift);
|
|
if (wake_readers)
|
|
new_state = (new_state & ~kWaitingReaderMask) | kReaderSpinWait;
|
|
} while (UNLIKELY(!atomic_compare_exchange_weak(&state_, &state, new_state,
|
|
memory_order_release)));
|
|
if (UNLIKELY(wake_writer))
|
|
writers_.Post();
|
|
else if (UNLIKELY(wake_readers))
|
|
readers_.Post(wake_readers);
|
|
}
|
|
|
|
void ReadLock() SANITIZER_ACQUIRE_SHARED() {
|
|
CheckedMutex::Lock();
|
|
u64 reset_mask = ~0ull;
|
|
u64 state = atomic_load_relaxed(&state_);
|
|
for (uptr spin_iters = 0;; spin_iters++) {
|
|
bool locked = (state & kWriterLock) != 0;
|
|
u64 new_state;
|
|
if (LIKELY(!locked)) {
|
|
new_state = (state + kReaderLockInc) & reset_mask;
|
|
} else if (spin_iters > kMaxSpinIters) {
|
|
new_state = (state + kWaitingReaderInc) & reset_mask;
|
|
} else if ((state & kReaderSpinWait) == 0) {
|
|
// Active spinning, but denote our presence so that unlocking
|
|
// thread does not wake up other threads.
|
|
new_state = state | kReaderSpinWait;
|
|
} else {
|
|
// Active spinning.
|
|
state = atomic_load(&state_, memory_order_relaxed);
|
|
continue;
|
|
}
|
|
if (UNLIKELY(!atomic_compare_exchange_weak(&state_, &state, new_state,
|
|
memory_order_acquire)))
|
|
continue;
|
|
if (LIKELY(!locked))
|
|
return; // We've locked the mutex.
|
|
if (spin_iters > kMaxSpinIters) {
|
|
// We've incremented waiting readers, so now block.
|
|
readers_.Wait();
|
|
spin_iters = 0;
|
|
} else {
|
|
// We've set kReaderSpinWait, but we are still in active spinning.
|
|
}
|
|
reset_mask = ~kReaderSpinWait;
|
|
state = atomic_load(&state_, memory_order_relaxed);
|
|
}
|
|
}
|
|
|
|
void ReadUnlock() SANITIZER_RELEASE_SHARED() {
|
|
CheckedMutex::Unlock();
|
|
bool wake;
|
|
u64 new_state;
|
|
u64 state = atomic_load_relaxed(&state_);
|
|
do {
|
|
DCHECK_NE(state & kReaderLockMask, 0);
|
|
DCHECK_EQ(state & kWriterLock, 0);
|
|
new_state = state - kReaderLockInc;
|
|
wake = (new_state &
|
|
(kReaderLockMask | kWriterSpinWait | kReaderSpinWait)) == 0 &&
|
|
(new_state & kWaitingWriterMask) != 0;
|
|
if (wake)
|
|
new_state = (new_state - kWaitingWriterInc) | kWriterSpinWait;
|
|
} while (UNLIKELY(!atomic_compare_exchange_weak(&state_, &state, new_state,
|
|
memory_order_release)));
|
|
if (UNLIKELY(wake))
|
|
writers_.Post();
|
|
}
|
|
|
|
// This function does not guarantee an explicit check that the calling thread
|
|
// is the thread which owns the mutex. This behavior, while more strictly
|
|
// correct, causes problems in cases like StopTheWorld, where a parent thread
|
|
// owns the mutex but a child checks that it is locked. Rather than
|
|
// maintaining complex state to work around those situations, the check only
|
|
// checks that the mutex is owned.
|
|
void CheckWriteLocked() const SANITIZER_CHECK_LOCKED() {
|
|
CHECK(atomic_load(&state_, memory_order_relaxed) & kWriterLock);
|
|
}
|
|
|
|
void CheckLocked() const SANITIZER_CHECK_LOCKED() { CheckWriteLocked(); }
|
|
|
|
void CheckReadLocked() const SANITIZER_CHECK_LOCKED() {
|
|
CHECK(atomic_load(&state_, memory_order_relaxed) & kReaderLockMask);
|
|
}
|
|
|
|
private:
|
|
atomic_uint64_t state_ = {0};
|
|
Semaphore writers_;
|
|
Semaphore readers_;
|
|
|
|
// The state has 3 counters:
|
|
// - number of readers holding the lock,
|
|
// if non zero, the mutex is read-locked
|
|
// - number of waiting readers,
|
|
// if not zero, the mutex is write-locked
|
|
// - number of waiting writers,
|
|
// if non zero, the mutex is read- or write-locked
|
|
// And 2 flags:
|
|
// - writer lock
|
|
// if set, the mutex is write-locked
|
|
// - a writer is awake and spin-waiting
|
|
// the flag is used to prevent thundering herd problem
|
|
// (new writers are not woken if this flag is set)
|
|
// - a reader is awake and spin-waiting
|
|
//
|
|
// Both writers and readers use active spinning before blocking.
|
|
// But readers are more aggressive and always take the mutex
|
|
// if there are any other readers.
|
|
// After wake up both writers and readers compete to lock the
|
|
// mutex again. This is needed to allow repeated locks even in presence
|
|
// of other blocked threads.
|
|
static constexpr u64 kCounterWidth = 20;
|
|
static constexpr u64 kReaderLockShift = 0;
|
|
static constexpr u64 kReaderLockInc = 1ull << kReaderLockShift;
|
|
static constexpr u64 kReaderLockMask = ((1ull << kCounterWidth) - 1)
|
|
<< kReaderLockShift;
|
|
static constexpr u64 kWaitingReaderShift = kCounterWidth;
|
|
static constexpr u64 kWaitingReaderInc = 1ull << kWaitingReaderShift;
|
|
static constexpr u64 kWaitingReaderMask = ((1ull << kCounterWidth) - 1)
|
|
<< kWaitingReaderShift;
|
|
static constexpr u64 kWaitingWriterShift = 2 * kCounterWidth;
|
|
static constexpr u64 kWaitingWriterInc = 1ull << kWaitingWriterShift;
|
|
static constexpr u64 kWaitingWriterMask = ((1ull << kCounterWidth) - 1)
|
|
<< kWaitingWriterShift;
|
|
static constexpr u64 kWriterLock = 1ull << (3 * kCounterWidth);
|
|
static constexpr u64 kWriterSpinWait = 1ull << (3 * kCounterWidth + 1);
|
|
static constexpr u64 kReaderSpinWait = 1ull << (3 * kCounterWidth + 2);
|
|
|
|
static constexpr uptr kMaxSpinIters = 1500;
|
|
|
|
Mutex(LinkerInitialized) = delete;
|
|
Mutex(const Mutex &) = delete;
|
|
void operator=(const Mutex &) = delete;
|
|
};
|
|
|
|
void FutexWait(atomic_uint32_t *p, u32 cmp);
|
|
void FutexWake(atomic_uint32_t *p, u32 count);
|
|
|
|
template <typename MutexType>
|
|
class SANITIZER_SCOPED_LOCK GenericScopedLock {
|
|
public:
|
|
explicit GenericScopedLock(MutexType *mu) SANITIZER_ACQUIRE(mu) : mu_(mu) {
|
|
mu_->Lock();
|
|
}
|
|
|
|
~GenericScopedLock() SANITIZER_RELEASE() { mu_->Unlock(); }
|
|
|
|
private:
|
|
MutexType *mu_;
|
|
|
|
GenericScopedLock(const GenericScopedLock &) = delete;
|
|
void operator=(const GenericScopedLock &) = delete;
|
|
};
|
|
|
|
template <typename MutexType>
|
|
class SANITIZER_SCOPED_LOCK GenericScopedReadLock {
|
|
public:
|
|
explicit GenericScopedReadLock(MutexType *mu) SANITIZER_ACQUIRE(mu)
|
|
: mu_(mu) {
|
|
mu_->ReadLock();
|
|
}
|
|
|
|
~GenericScopedReadLock() SANITIZER_RELEASE() { mu_->ReadUnlock(); }
|
|
|
|
private:
|
|
MutexType *mu_;
|
|
|
|
GenericScopedReadLock(const GenericScopedReadLock &) = delete;
|
|
void operator=(const GenericScopedReadLock &) = delete;
|
|
};
|
|
|
|
template <typename MutexType>
|
|
class SANITIZER_SCOPED_LOCK GenericScopedRWLock {
|
|
public:
|
|
ALWAYS_INLINE explicit GenericScopedRWLock(MutexType *mu, bool write)
|
|
SANITIZER_ACQUIRE(mu)
|
|
: mu_(mu), write_(write) {
|
|
if (write_)
|
|
mu_->Lock();
|
|
else
|
|
mu_->ReadLock();
|
|
}
|
|
|
|
ALWAYS_INLINE ~GenericScopedRWLock() SANITIZER_RELEASE() {
|
|
if (write_)
|
|
mu_->Unlock();
|
|
else
|
|
mu_->ReadUnlock();
|
|
}
|
|
|
|
private:
|
|
MutexType *mu_;
|
|
bool write_;
|
|
|
|
GenericScopedRWLock(const GenericScopedRWLock &) = delete;
|
|
void operator=(const GenericScopedRWLock &) = delete;
|
|
};
|
|
|
|
typedef GenericScopedLock<StaticSpinMutex> SpinMutexLock;
|
|
typedef GenericScopedLock<Mutex> Lock;
|
|
typedef GenericScopedReadLock<Mutex> ReadLock;
|
|
typedef GenericScopedRWLock<Mutex> RWLock;
|
|
|
|
} // namespace __sanitizer
|
|
|
|
#endif // SANITIZER_MUTEX_H
|