blob: 9c93cc624dae157ad6a96b3b2a168367e063f51d [file] [log] [blame]
Elliott Hughes8daa0922011-09-11 13:46:25 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Brian Carlstromfc0e3212013-07-17 14:40:12 -070017#ifndef ART_RUNTIME_BASE_MUTEX_H_
18#define ART_RUNTIME_BASE_MUTEX_H_
Elliott Hughes8daa0922011-09-11 13:46:25 -070019
20#include <pthread.h>
Brian Carlstromcd74c4b2012-01-23 13:21:00 -080021#include <stdint.h>
Elliott Hughesffb465f2012-03-01 18:46:05 -080022
23#include <iosfwd>
Elliott Hughes8daa0922011-09-11 13:46:25 -070024#include <string>
25
Ian Rogersef7d42f2014-01-06 12:55:46 -080026#include "atomic.h"
Elliott Hughes07ed66b2012-12-12 18:34:25 -080027#include "base/logging.h"
Elliott Hughes76160052012-12-12 16:31:20 -080028#include "base/macros.h"
Ian Rogers00f7d0e2012-07-19 15:28:27 -070029#include "globals.h"
Ian Rogers81d425b2012-09-27 16:03:43 -070030
Ian Rogersab470162012-09-29 23:06:53 -070031#if defined(__APPLE__)
Ian Rogers81d425b2012-09-27 16:03:43 -070032#define ART_USE_FUTEXES 0
Ian Rogersab470162012-09-29 23:06:53 -070033#else
Chris Dearmanc0141782013-11-14 17:29:21 -080034#define ART_USE_FUTEXES 1
Ian Rogersab470162012-09-29 23:06:53 -070035#endif
Elliott Hughes8daa0922011-09-11 13:46:25 -070036
Ian Rogers66aee5c2012-08-15 17:17:47 -070037// Currently Darwin doesn't support locks with timeouts.
38#if !defined(__APPLE__)
39#define HAVE_TIMED_RWLOCK 1
40#else
41#define HAVE_TIMED_RWLOCK 0
42#endif
43
Elliott Hughes8daa0922011-09-11 13:46:25 -070044namespace art {
45
Ian Rogers719d1a32014-03-06 12:13:39 -080046class LOCKABLE ReaderWriterMutex;
Ian Rogers56edc432013-01-18 16:51:51 -080047class ScopedContentionRecorder;
Ian Rogers50b35e22012-10-04 10:09:15 -070048class Thread;
49
Ian Rogers719d1a32014-03-06 12:13:39 -080050// LockLevel is used to impose a lock hierarchy [1] where acquisition of a Mutex at a higher or
51// equal level to a lock a thread holds is invalid. The lock hierarchy achieves a cycle free
52// partial ordering and thereby cause deadlock situations to fail checks.
53//
54// [1] http://www.drdobbs.com/parallel/use-lock-hierarchies-to-avoid-deadlock/204801163
55enum LockLevel {
56 kLoggingLock = 0,
Hiroshi Yamauchi3eed93d2014-06-04 11:43:59 -070057 kMemMapsLock,
Raghu Gandham7de77dd2014-06-13 15:16:31 -070058 kSwapMutexesLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080059 kUnexpectedSignalLock,
60 kThreadSuspendCountLock,
61 kAbortLock,
62 kJdwpSocketLock,
Mathieu Chartiera5a53ef2014-09-12 12:58:05 -070063 kReferenceQueueSoftReferencesLock,
64 kReferenceQueuePhantomReferencesLock,
65 kReferenceQueueFinalizerReferencesLock,
66 kReferenceQueueWeakReferencesLock,
67 kReferenceQueueClearedReferencesLock,
68 kReferenceProcessorLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080069 kRosAllocGlobalLock,
70 kRosAllocBracketLock,
71 kRosAllocBulkFreeLock,
72 kAllocSpaceLock,
73 kDexFileMethodInlinerLock,
74 kDexFileToMethodInlinerMapLock,
75 kMarkSweepMarkStackLock,
76 kTransactionLogLock,
77 kInternTableLock,
Vladimir Marko3f5838d2014-08-07 18:07:18 +010078 kOatFileSecondaryLookupLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080079 kDefaultMutexLevel,
80 kMarkSweepLargeObjectLock,
81 kPinTableLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080082 kJdwpObjectRegistryLock,
Chao-ying Fu9e369312014-05-21 11:20:52 -070083 kModifyLdtLock,
84 kAllocatedThreadIdsLock,
Andreas Gampe74240812014-04-17 10:35:09 -070085 kMonitorPoolLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080086 kClassLinkerClassesLock,
87 kBreakpointLock,
88 kMonitorLock,
Mathieu Chartier440e4ce2014-03-31 16:36:35 -070089 kMonitorListLock,
Ian Rogers68d8b422014-07-17 11:09:10 -070090 kJniLoadLibraryLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080091 kThreadListLock,
92 kBreakpointInvokeLock,
Brian Carlstrom306db812014-09-05 13:01:41 -070093 kAllocTrackerLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080094 kDeoptimizationLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080095 kProfilerLock,
96 kJdwpEventListLock,
97 kJdwpAttachLock,
98 kJdwpStartLock,
99 kRuntimeShutdownLock,
Jeff Hao69dbec62014-09-15 18:03:41 -0700100 kTraceLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800101 kHeapBitmapLock,
102 kMutatorLock,
Mathieu Chartier9ef78b52014-09-25 17:03:12 -0700103 kInstrumentEntrypointsLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800104 kZygoteCreationLock,
105
106 kLockLevelCount // Must come last.
107};
108std::ostream& operator<<(std::ostream& os, const LockLevel& rhs);
109
Brian Carlstrom2e250c82013-08-14 18:08:52 -0700110const bool kDebugLocking = kIsDebugBuild;
Ian Rogers25fd14b2012-09-05 10:56:38 -0700111
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700112// Record Log contention information, dumpable via SIGQUIT.
113#ifdef ART_USE_FUTEXES
Jeff Hao08f2e7b2013-09-09 16:44:02 -0700114// To enable lock contention logging, set this to true.
115const bool kLogLockContentions = false;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700116#else
117// Keep this false as lock contention logging is supported only with
118// futex.
119const bool kLogLockContentions = false;
120#endif
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700121const size_t kContentionLogSize = 4;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700122const size_t kContentionLogDataSize = kLogLockContentions ? 1 : 0;
123const size_t kAllMutexDataSize = kLogLockContentions ? 1 : 0;
124
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700125// Base class for all Mutex implementations
126class BaseMutex {
127 public:
Ian Rogersbab74962013-04-19 10:04:10 -0700128 const char* GetName() const {
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700129 return name_;
130 }
131
132 virtual bool IsMutex() const { return false; }
133 virtual bool IsReaderWriterMutex() const { return false; }
134
Ian Rogers56edc432013-01-18 16:51:51 -0800135 virtual void Dump(std::ostream& os) const = 0;
136
137 static void DumpAll(std::ostream& os);
138
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700139 protected:
140 friend class ConditionVariable;
141
Ian Rogers81d425b2012-09-27 16:03:43 -0700142 BaseMutex(const char* name, LockLevel level);
Ian Rogers56edc432013-01-18 16:51:51 -0800143 virtual ~BaseMutex();
Ian Rogers81d425b2012-09-27 16:03:43 -0700144 void RegisterAsLocked(Thread* self);
145 void RegisterAsUnlocked(Thread* self);
146 void CheckSafeToWait(Thread* self);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700147
Ian Rogers56edc432013-01-18 16:51:51 -0800148 friend class ScopedContentionRecorder;
149
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700150 void RecordContention(uint64_t blocked_tid, uint64_t owner_tid, uint64_t nano_time_blocked);
Ian Rogers56edc432013-01-18 16:51:51 -0800151 void DumpContention(std::ostream& os) const;
152
Ian Rogers81d425b2012-09-27 16:03:43 -0700153 const LockLevel level_; // Support for lock hierarchy.
Ian Rogersbab74962013-04-19 10:04:10 -0700154 const char* const name_;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700155
Ian Rogers56edc432013-01-18 16:51:51 -0800156 // A log entry that records contention but makes no guarantee that either tid will be held live.
157 struct ContentionLogEntry {
158 ContentionLogEntry() : blocked_tid(0), owner_tid(0) {}
159 uint64_t blocked_tid;
160 uint64_t owner_tid;
161 AtomicInteger count;
162 };
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700163 struct ContentionLogData {
164 ContentionLogEntry contention_log[kContentionLogSize];
165 // The next entry in the contention log to be updated. Value ranges from 0 to
166 // kContentionLogSize - 1.
167 AtomicInteger cur_content_log_entry;
168 // Number of times the Mutex has been contended.
169 AtomicInteger contention_count;
170 // Sum of time waited by all contenders in ns.
Ian Rogers37f3c962014-07-17 11:25:30 -0700171 Atomic<uint64_t> wait_time;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700172 void AddToWaitTime(uint64_t value);
173 ContentionLogData() : wait_time(0) {}
174 };
Ian Rogers3e5cf302014-05-20 16:40:37 -0700175 ContentionLogData contention_log_data_[kContentionLogDataSize];
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700176
177 public:
178 bool HasEverContended() const {
179 if (kLogLockContentions) {
Ian Rogers3e5cf302014-05-20 16:40:37 -0700180 return contention_log_data_->contention_count.LoadSequentiallyConsistent() > 0;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700181 }
182 return false;
183 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700184};
185
186// A Mutex is used to achieve mutual exclusion between threads. A Mutex can be used to gain
187// exclusive access to what it guards. A Mutex can be in one of two states:
188// - Free - not owned by any thread,
189// - Exclusive - owned by a single thread.
190//
191// The effect of locking and unlocking operations on the state is:
192// State | ExclusiveLock | ExclusiveUnlock
193// -------------------------------------------
194// Free | Exclusive | error
195// Exclusive | Block* | Free
196// * Mutex is not reentrant and so an attempt to ExclusiveLock on the same thread will result in
197// an error. Being non-reentrant simplifies Waiting on ConditionVariables.
Ian Rogers01ae5802012-09-28 16:14:01 -0700198std::ostream& operator<<(std::ostream& os, const Mutex& mu);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700199class LOCKABLE Mutex : public BaseMutex {
200 public:
Ian Rogers81d425b2012-09-27 16:03:43 -0700201 explicit Mutex(const char* name, LockLevel level = kDefaultMutexLevel, bool recursive = false);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700202 ~Mutex();
203
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700204 virtual bool IsMutex() const { return true; }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700205
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700206 // Block until mutex is free then acquire exclusive access.
Ian Rogers81d425b2012-09-27 16:03:43 -0700207 void ExclusiveLock(Thread* self) EXCLUSIVE_LOCK_FUNCTION();
208 void Lock(Thread* self) EXCLUSIVE_LOCK_FUNCTION() { ExclusiveLock(self); }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700209
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700210 // Returns true if acquires exclusive access, false otherwise.
Ian Rogers81d425b2012-09-27 16:03:43 -0700211 bool ExclusiveTryLock(Thread* self) EXCLUSIVE_TRYLOCK_FUNCTION(true);
212 bool TryLock(Thread* self) EXCLUSIVE_TRYLOCK_FUNCTION(true) { return ExclusiveTryLock(self); }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700213
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700214 // Release exclusive access.
Ian Rogers81d425b2012-09-27 16:03:43 -0700215 void ExclusiveUnlock(Thread* self) UNLOCK_FUNCTION();
216 void Unlock(Thread* self) UNLOCK_FUNCTION() { ExclusiveUnlock(self); }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700217
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700218 // Is the current thread the exclusive holder of the Mutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700219 bool IsExclusiveHeld(const Thread* self) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700220
221 // Assert that the Mutex is exclusively held by the current thread.
Ian Rogers81d425b2012-09-27 16:03:43 -0700222 void AssertExclusiveHeld(const Thread* self) {
Anwar Ghuloum3c539ff2013-06-20 08:58:23 -0700223 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers01ae5802012-09-28 16:14:01 -0700224 CHECK(IsExclusiveHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700225 }
226 }
Ian Rogers81d425b2012-09-27 16:03:43 -0700227 void AssertHeld(const Thread* self) { AssertExclusiveHeld(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700228
229 // Assert that the Mutex is not held by the current thread.
Ian Rogers81d425b2012-09-27 16:03:43 -0700230 void AssertNotHeldExclusive(const Thread* self) {
Anwar Ghuloum3c539ff2013-06-20 08:58:23 -0700231 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers01ae5802012-09-28 16:14:01 -0700232 CHECK(!IsExclusiveHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700233 }
234 }
Ian Rogers81d425b2012-09-27 16:03:43 -0700235 void AssertNotHeld(const Thread* self) { AssertNotHeldExclusive(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700236
Ian Rogersc7190692014-07-08 23:50:26 -0700237 // Id associated with exclusive owner. No memory ordering semantics if called from a thread other
238 // than the owner.
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700239 uint64_t GetExclusiveOwnerTid() const;
240
241 // Returns how many times this Mutex has been locked, it is better to use AssertHeld/NotHeld.
242 unsigned int GetDepth() const {
243 return recursion_count_;
244 }
Elliott Hughesaccd83d2011-10-17 14:25:58 -0700245
Ian Rogers56edc432013-01-18 16:51:51 -0800246 virtual void Dump(std::ostream& os) const;
Ian Rogers01ae5802012-09-28 16:14:01 -0700247
Elliott Hughesaccd83d2011-10-17 14:25:58 -0700248 private:
Ian Rogersc604d732012-10-14 16:09:54 -0700249#if ART_USE_FUTEXES
250 // 0 is unheld, 1 is held.
Ian Rogersc7190692014-07-08 23:50:26 -0700251 AtomicInteger state_;
Ian Rogersc604d732012-10-14 16:09:54 -0700252 // Exclusive owner.
253 volatile uint64_t exclusive_owner_;
254 // Number of waiting contenders.
Ian Rogersb122a4b2013-11-19 18:00:50 -0800255 AtomicInteger num_contenders_;
Ian Rogersc604d732012-10-14 16:09:54 -0700256#else
Elliott Hughes8daa0922011-09-11 13:46:25 -0700257 pthread_mutex_t mutex_;
Ian Rogersc5f17732014-06-05 20:48:42 -0700258 volatile uint64_t exclusive_owner_; // Guarded by mutex_.
Ian Rogersc604d732012-10-14 16:09:54 -0700259#endif
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700260 const bool recursive_; // Can the lock be recursively held?
261 unsigned int recursion_count_;
Elliott Hughesf1498432012-03-28 19:34:27 -0700262 friend class ConditionVariable;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700263 DISALLOW_COPY_AND_ASSIGN(Mutex);
264};
265
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700266// A ReaderWriterMutex is used to achieve mutual exclusion between threads, similar to a Mutex.
267// Unlike a Mutex a ReaderWriterMutex can be used to gain exclusive (writer) or shared (reader)
268// access to what it guards. A flaw in relation to a Mutex is that it cannot be used with a
269// condition variable. A ReaderWriterMutex can be in one of three states:
270// - Free - not owned by any thread,
271// - Exclusive - owned by a single thread,
272// - Shared(n) - shared amongst n threads.
273//
274// The effect of locking and unlocking operations on the state is:
275//
276// State | ExclusiveLock | ExclusiveUnlock | SharedLock | SharedUnlock
277// ----------------------------------------------------------------------------
278// Free | Exclusive | error | SharedLock(1) | error
279// Exclusive | Block | Free | Block | error
280// Shared(n) | Block | error | SharedLock(n+1)* | Shared(n-1) or Free
281// * for large values of n the SharedLock may block.
Ian Rogers01ae5802012-09-28 16:14:01 -0700282std::ostream& operator<<(std::ostream& os, const ReaderWriterMutex& mu);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700283class LOCKABLE ReaderWriterMutex : public BaseMutex {
Elliott Hughes8daa0922011-09-11 13:46:25 -0700284 public:
Ian Rogers81d425b2012-09-27 16:03:43 -0700285 explicit ReaderWriterMutex(const char* name, LockLevel level = kDefaultMutexLevel);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700286 ~ReaderWriterMutex();
287
288 virtual bool IsReaderWriterMutex() const { return true; }
289
290 // Block until ReaderWriterMutex is free then acquire exclusive access.
Ian Rogers81d425b2012-09-27 16:03:43 -0700291 void ExclusiveLock(Thread* self) EXCLUSIVE_LOCK_FUNCTION();
292 void WriterLock(Thread* self) EXCLUSIVE_LOCK_FUNCTION() { ExclusiveLock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700293
294 // Release exclusive access.
Ian Rogers81d425b2012-09-27 16:03:43 -0700295 void ExclusiveUnlock(Thread* self) UNLOCK_FUNCTION();
296 void WriterUnlock(Thread* self) UNLOCK_FUNCTION() { ExclusiveUnlock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700297
298 // Block until ReaderWriterMutex is free and acquire exclusive access. Returns true on success
299 // or false if timeout is reached.
Ian Rogers66aee5c2012-08-15 17:17:47 -0700300#if HAVE_TIMED_RWLOCK
Ian Rogersc604d732012-10-14 16:09:54 -0700301 bool ExclusiveLockWithTimeout(Thread* self, int64_t ms, int32_t ns)
Ian Rogers81d425b2012-09-27 16:03:43 -0700302 EXCLUSIVE_TRYLOCK_FUNCTION(true);
Ian Rogers66aee5c2012-08-15 17:17:47 -0700303#endif
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700304
305 // Block until ReaderWriterMutex is shared or free then acquire a share on the access.
Ian Rogers1ffa32f2013-02-05 18:29:08 -0800306 void SharedLock(Thread* self) SHARED_LOCK_FUNCTION() ALWAYS_INLINE;
Ian Rogers81d425b2012-09-27 16:03:43 -0700307 void ReaderLock(Thread* self) SHARED_LOCK_FUNCTION() { SharedLock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700308
309 // Try to acquire share of ReaderWriterMutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700310 bool SharedTryLock(Thread* self) EXCLUSIVE_TRYLOCK_FUNCTION(true);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700311
312 // Release a share of the access.
Ian Rogers1ffa32f2013-02-05 18:29:08 -0800313 void SharedUnlock(Thread* self) UNLOCK_FUNCTION() ALWAYS_INLINE;
Ian Rogers81d425b2012-09-27 16:03:43 -0700314 void ReaderUnlock(Thread* self) UNLOCK_FUNCTION() { SharedUnlock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700315
316 // Is the current thread the exclusive holder of the ReaderWriterMutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700317 bool IsExclusiveHeld(const Thread* self) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700318
319 // Assert the current thread has exclusive access to the ReaderWriterMutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700320 void AssertExclusiveHeld(const Thread* self) {
Sebastien Hertz702a85b2013-08-05 16:37:51 +0200321 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers01ae5802012-09-28 16:14:01 -0700322 CHECK(IsExclusiveHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700323 }
324 }
Ian Rogers81d425b2012-09-27 16:03:43 -0700325 void AssertWriterHeld(const Thread* self) { AssertExclusiveHeld(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700326
327 // Assert the current thread doesn't have exclusive access to the ReaderWriterMutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700328 void AssertNotExclusiveHeld(const Thread* self) {
Sebastien Hertz702a85b2013-08-05 16:37:51 +0200329 if (kDebugLocking && (gAborting == 0)) {
Ian Rogerse3359f72013-06-11 15:14:11 -0700330 CHECK(!IsExclusiveHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700331 }
332 }
Ian Rogers81d425b2012-09-27 16:03:43 -0700333 void AssertNotWriterHeld(const Thread* self) { AssertNotExclusiveHeld(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700334
335 // Is the current thread a shared holder of the ReaderWriterMutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700336 bool IsSharedHeld(const Thread* self) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700337
338 // Assert the current thread has shared access to the ReaderWriterMutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700339 void AssertSharedHeld(const Thread* self) {
Sebastien Hertz702a85b2013-08-05 16:37:51 +0200340 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers23055dc2013-04-18 16:29:16 -0700341 // TODO: we can only assert this well when self != NULL.
342 CHECK(IsSharedHeld(self) || self == NULL) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700343 }
344 }
Ian Rogers81d425b2012-09-27 16:03:43 -0700345 void AssertReaderHeld(const Thread* self) { AssertSharedHeld(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700346
347 // Assert the current thread doesn't hold this ReaderWriterMutex either in shared or exclusive
348 // mode.
Ian Rogers81d425b2012-09-27 16:03:43 -0700349 void AssertNotHeld(const Thread* self) {
Anwar Ghuloum3c539ff2013-06-20 08:58:23 -0700350 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers01ae5802012-09-28 16:14:01 -0700351 CHECK(!IsSharedHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700352 }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700353 }
354
Ian Rogersc7190692014-07-08 23:50:26 -0700355 // Id associated with exclusive owner. No memory ordering semantics if called from a thread other
356 // than the owner.
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700357 uint64_t GetExclusiveOwnerTid() const;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700358
Ian Rogers56edc432013-01-18 16:51:51 -0800359 virtual void Dump(std::ostream& os) const;
Ian Rogers01ae5802012-09-28 16:14:01 -0700360
Ian Rogers81d425b2012-09-27 16:03:43 -0700361 private:
Ian Rogers51d212e2014-10-23 17:48:20 -0700362#if ART_USE_FUTEXES
Ian Rogerscf7f1912014-10-22 22:06:39 -0700363 // Out-of-inline path for handling contention for a SharedLock.
364 void HandleSharedLockContention(Thread* self, int32_t cur_state);
365
Ian Rogers81d425b2012-09-27 16:03:43 -0700366 // -1 implies held exclusive, +ve shared held by state_ many owners.
Ian Rogersc7190692014-07-08 23:50:26 -0700367 AtomicInteger state_;
368 // Exclusive owner. Modification guarded by this mutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700369 volatile uint64_t exclusive_owner_;
Ian Rogersc7190692014-07-08 23:50:26 -0700370 // Number of contenders waiting for a reader share.
371 AtomicInteger num_pending_readers_;
372 // Number of contenders waiting to be the writer.
Ian Rogersb122a4b2013-11-19 18:00:50 -0800373 AtomicInteger num_pending_writers_;
Ian Rogers81d425b2012-09-27 16:03:43 -0700374#else
375 pthread_rwlock_t rwlock_;
Ian Rogersc5f17732014-06-05 20:48:42 -0700376 volatile uint64_t exclusive_owner_; // Guarded by rwlock_.
Ian Rogers81d425b2012-09-27 16:03:43 -0700377#endif
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700378 DISALLOW_COPY_AND_ASSIGN(ReaderWriterMutex);
379};
380
381// ConditionVariables allow threads to queue and sleep. Threads may then be resumed individually
382// (Signal) or all at once (Broadcast).
Elliott Hughes5f791332011-09-15 17:45:30 -0700383class ConditionVariable {
384 public:
Ian Rogers23055dc2013-04-18 16:29:16 -0700385 explicit ConditionVariable(const char* name, Mutex& mutex);
Elliott Hughes5f791332011-09-15 17:45:30 -0700386 ~ConditionVariable();
387
Ian Rogersc604d732012-10-14 16:09:54 -0700388 void Broadcast(Thread* self);
389 void Signal(Thread* self);
390 // TODO: No thread safety analysis on Wait and TimedWait as they call mutex operations via their
391 // pointer copy, thereby defeating annotalysis.
392 void Wait(Thread* self) NO_THREAD_SAFETY_ANALYSIS;
Ian Rogers7b078e82014-09-10 14:44:24 -0700393 bool TimedWait(Thread* self, int64_t ms, int32_t ns) NO_THREAD_SAFETY_ANALYSIS;
Ian Rogers1d54e732013-05-02 21:10:01 -0700394 // Variant of Wait that should be used with caution. Doesn't validate that no mutexes are held
395 // when waiting.
396 // TODO: remove this.
397 void WaitHoldingLocks(Thread* self) NO_THREAD_SAFETY_ANALYSIS;
Elliott Hughes5f791332011-09-15 17:45:30 -0700398
399 private:
Ian Rogers23055dc2013-04-18 16:29:16 -0700400 const char* const name_;
Ian Rogersc604d732012-10-14 16:09:54 -0700401 // The Mutex being used by waiters. It is an error to mix condition variables between different
402 // Mutexes.
403 Mutex& guard_;
404#if ART_USE_FUTEXES
405 // A counter that is modified by signals and broadcasts. This ensures that when a waiter gives up
Ian Rogersd45f2012012-11-28 11:46:23 -0800406 // their Mutex and another thread takes it and signals, the waiting thread observes that sequence_
407 // changed and doesn't enter the wait. Modified while holding guard_, but is read by futex wait
408 // without guard_ held.
Ian Rogersb122a4b2013-11-19 18:00:50 -0800409 AtomicInteger sequence_;
Ian Rogersc604d732012-10-14 16:09:54 -0700410 // Number of threads that have come into to wait, not the length of the waiters on the futex as
Ian Rogers5bd97c42012-11-27 02:38:26 -0800411 // waiters may have been requeued onto guard_. Guarded by guard_.
Ian Rogersc604d732012-10-14 16:09:54 -0700412 volatile int32_t num_waiters_;
Ian Rogersc604d732012-10-14 16:09:54 -0700413#else
414 pthread_cond_t cond_;
415#endif
Elliott Hughes5f791332011-09-15 17:45:30 -0700416 DISALLOW_COPY_AND_ASSIGN(ConditionVariable);
417};
418
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700419// Scoped locker/unlocker for a regular Mutex that acquires mu upon construction and releases it
420// upon destruction.
421class SCOPED_LOCKABLE MutexLock {
422 public:
Ian Rogers81d425b2012-09-27 16:03:43 -0700423 explicit MutexLock(Thread* self, Mutex& mu) EXCLUSIVE_LOCK_FUNCTION(mu) : self_(self), mu_(mu) {
424 mu_.ExclusiveLock(self_);
425 }
426
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700427 ~MutexLock() UNLOCK_FUNCTION() {
Ian Rogers81d425b2012-09-27 16:03:43 -0700428 mu_.ExclusiveUnlock(self_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700429 }
430
431 private:
Ian Rogers81d425b2012-09-27 16:03:43 -0700432 Thread* const self_;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700433 Mutex& mu_;
434 DISALLOW_COPY_AND_ASSIGN(MutexLock);
435};
436// Catch bug where variable name is omitted. "MutexLock (lock);" instead of "MutexLock mu(lock)".
Andreas Gampe575e78c2014-11-03 23:41:03 -0800437#define MutexLock(x) static_assert(0, "MutexLock declaration missing variable name")
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700438
439// Scoped locker/unlocker for a ReaderWriterMutex that acquires read access to mu upon
440// construction and releases it upon destruction.
441class SCOPED_LOCKABLE ReaderMutexLock {
442 public:
Ian Rogers81d425b2012-09-27 16:03:43 -0700443 explicit ReaderMutexLock(Thread* self, ReaderWriterMutex& mu) EXCLUSIVE_LOCK_FUNCTION(mu) :
444 self_(self), mu_(mu) {
445 mu_.SharedLock(self_);
446 }
447
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700448 ~ReaderMutexLock() UNLOCK_FUNCTION() {
Ian Rogers81d425b2012-09-27 16:03:43 -0700449 mu_.SharedUnlock(self_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700450 }
451
452 private:
Ian Rogers81d425b2012-09-27 16:03:43 -0700453 Thread* const self_;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700454 ReaderWriterMutex& mu_;
455 DISALLOW_COPY_AND_ASSIGN(ReaderMutexLock);
456};
457// Catch bug where variable name is omitted. "ReaderMutexLock (lock);" instead of
458// "ReaderMutexLock mu(lock)".
Andreas Gampe575e78c2014-11-03 23:41:03 -0800459#define ReaderMutexLock(x) static_assert(0, "ReaderMutexLock declaration missing variable name")
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700460
461// Scoped locker/unlocker for a ReaderWriterMutex that acquires write access to mu upon
462// construction and releases it upon destruction.
463class SCOPED_LOCKABLE WriterMutexLock {
464 public:
Ian Rogers81d425b2012-09-27 16:03:43 -0700465 explicit WriterMutexLock(Thread* self, ReaderWriterMutex& mu) EXCLUSIVE_LOCK_FUNCTION(mu) :
466 self_(self), mu_(mu) {
467 mu_.ExclusiveLock(self_);
468 }
469
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700470 ~WriterMutexLock() UNLOCK_FUNCTION() {
Ian Rogers81d425b2012-09-27 16:03:43 -0700471 mu_.ExclusiveUnlock(self_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700472 }
473
474 private:
Ian Rogers50b35e22012-10-04 10:09:15 -0700475 Thread* const self_;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700476 ReaderWriterMutex& mu_;
477 DISALLOW_COPY_AND_ASSIGN(WriterMutexLock);
478};
479// Catch bug where variable name is omitted. "WriterMutexLock (lock);" instead of
480// "WriterMutexLock mu(lock)".
Andreas Gampe575e78c2014-11-03 23:41:03 -0800481#define WriterMutexLock(x) static_assert(0, "WriterMutexLock declaration missing variable name")
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700482
Ian Rogers719d1a32014-03-06 12:13:39 -0800483// Global mutexes corresponding to the levels above.
484class Locks {
485 public:
486 static void Init();
487
Mathieu Chartier9ef78b52014-09-25 17:03:12 -0700488 // Guards allocation entrypoint instrumenting.
Ian Rogers4ad5cd32014-11-11 23:08:07 -0800489 static Mutex* instrument_entrypoints_lock_;
Mathieu Chartier9ef78b52014-09-25 17:03:12 -0700490
Ian Rogers719d1a32014-03-06 12:13:39 -0800491 // The mutator_lock_ is used to allow mutators to execute in a shared (reader) mode or to block
492 // mutators by having an exclusive (writer) owner. In normal execution each mutator thread holds
493 // a share on the mutator_lock_. The garbage collector may also execute with shared access but
494 // at times requires exclusive access to the heap (not to be confused with the heap meta-data
495 // guarded by the heap_lock_ below). When the garbage collector requires exclusive access it asks
496 // the mutators to suspend themselves which also involves usage of the thread_suspend_count_lock_
497 // to cover weaknesses in using ReaderWriterMutexes with ConditionVariables. We use a condition
498 // variable to wait upon in the suspension logic as releasing and then re-acquiring a share on
499 // the mutator lock doesn't necessarily allow the exclusive user (e.g the garbage collector)
500 // chance to acquire the lock.
501 //
502 // Thread suspension:
503 // Shared users | Exclusive user
504 // (holding mutator lock and in kRunnable state) | .. running ..
505 // .. running .. | Request thread suspension by:
506 // .. running .. | - acquiring thread_suspend_count_lock_
507 // .. running .. | - incrementing Thread::suspend_count_ on
508 // .. running .. | all mutator threads
509 // .. running .. | - releasing thread_suspend_count_lock_
510 // .. running .. | Block trying to acquire exclusive mutator lock
511 // Poll Thread::suspend_count_ and enter full | .. blocked ..
512 // suspend code. | .. blocked ..
513 // Change state to kSuspended | .. blocked ..
514 // x: Release share on mutator_lock_ | Carry out exclusive access
515 // Acquire thread_suspend_count_lock_ | .. exclusive ..
516 // while Thread::suspend_count_ > 0 | .. exclusive ..
517 // - wait on Thread::resume_cond_ | .. exclusive ..
518 // (releases thread_suspend_count_lock_) | .. exclusive ..
519 // .. waiting .. | Release mutator_lock_
520 // .. waiting .. | Request thread resumption by:
521 // .. waiting .. | - acquiring thread_suspend_count_lock_
522 // .. waiting .. | - decrementing Thread::suspend_count_ on
523 // .. waiting .. | all mutator threads
524 // .. waiting .. | - notifying on Thread::resume_cond_
525 // - re-acquire thread_suspend_count_lock_ | - releasing thread_suspend_count_lock_
526 // Release thread_suspend_count_lock_ | .. running ..
527 // Acquire share on mutator_lock_ | .. running ..
528 // - This could block but the thread still | .. running ..
529 // has a state of kSuspended and so this | .. running ..
530 // isn't an issue. | .. running ..
531 // Acquire thread_suspend_count_lock_ | .. running ..
532 // - we poll here as we're transitioning into | .. running ..
533 // kRunnable and an individual thread suspend | .. running ..
534 // request (e.g for debugging) won't try | .. running ..
535 // to acquire the mutator lock (which would | .. running ..
536 // block as we hold the mutator lock). This | .. running ..
537 // poll ensures that if the suspender thought | .. running ..
538 // we were suspended by incrementing our | .. running ..
539 // Thread::suspend_count_ and then reading | .. running ..
540 // our state we go back to waiting on | .. running ..
541 // Thread::resume_cond_. | .. running ..
542 // can_go_runnable = Thread::suspend_count_ == 0 | .. running ..
543 // Release thread_suspend_count_lock_ | .. running ..
544 // if can_go_runnable | .. running ..
545 // Change state to kRunnable | .. running ..
546 // else | .. running ..
547 // Goto x | .. running ..
548 // .. running .. | .. running ..
Mathieu Chartier9ef78b52014-09-25 17:03:12 -0700549 static ReaderWriterMutex* mutator_lock_ ACQUIRED_AFTER(instrument_entrypoints_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800550
551 // Allow reader-writer mutual exclusion on the mark and live bitmaps of the heap.
552 static ReaderWriterMutex* heap_bitmap_lock_ ACQUIRED_AFTER(mutator_lock_);
553
554 // Guards shutdown of the runtime.
555 static Mutex* runtime_shutdown_lock_ ACQUIRED_AFTER(heap_bitmap_lock_);
556
Chao-ying Fu9e369312014-05-21 11:20:52 -0700557 // Guards background profiler global state.
558 static Mutex* profiler_lock_ ACQUIRED_AFTER(runtime_shutdown_lock_);
559
560 // Guards trace (ie traceview) requests.
561 static Mutex* trace_lock_ ACQUIRED_AFTER(profiler_lock_);
562
Brian Carlstrom306db812014-09-05 13:01:41 -0700563 // Guards debugger recent allocation records.
564 static Mutex* alloc_tracker_lock_ ACQUIRED_AFTER(trace_lock_);
565
566 // Guards updates to instrumentation to ensure mutual exclusion of
567 // events like deoptimization requests.
568 // TODO: improve name, perhaps instrumentation_update_lock_.
569 static Mutex* deoptimization_lock_ ACQUIRED_AFTER(alloc_tracker_lock_);
570
Ian Rogers719d1a32014-03-06 12:13:39 -0800571 // The thread_list_lock_ guards ThreadList::list_. It is also commonly held to stop threads
572 // attaching and detaching.
Brian Carlstrom306db812014-09-05 13:01:41 -0700573 static Mutex* thread_list_lock_ ACQUIRED_AFTER(deoptimization_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800574
Ian Rogers68d8b422014-07-17 11:09:10 -0700575 // Guards maintaining loading library data structures.
576 static Mutex* jni_libraries_lock_ ACQUIRED_AFTER(thread_list_lock_);
577
Ian Rogers719d1a32014-03-06 12:13:39 -0800578 // Guards breakpoints.
Sebastien Hertzed2be172014-08-19 15:33:43 +0200579 static ReaderWriterMutex* breakpoint_lock_ ACQUIRED_AFTER(jni_libraries_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800580
Ian Rogers719d1a32014-03-06 12:13:39 -0800581 // Guards lists of classes within the class linker.
Chao-ying Fu9e369312014-05-21 11:20:52 -0700582 static ReaderWriterMutex* classlinker_classes_lock_ ACQUIRED_AFTER(breakpoint_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800583
584 // When declaring any Mutex add DEFAULT_MUTEX_ACQUIRED_AFTER to use annotalysis to check the code
585 // doesn't try to hold a higher level Mutex.
586 #define DEFAULT_MUTEX_ACQUIRED_AFTER ACQUIRED_AFTER(Locks::classlinker_classes_lock_)
587
Andreas Gampe74240812014-04-17 10:35:09 -0700588 static Mutex* allocated_monitor_ids_lock_ ACQUIRED_AFTER(classlinker_classes_lock_);
589
Chao-ying Fu9e369312014-05-21 11:20:52 -0700590 // Guard the allocation/deallocation of thread ids.
Andreas Gampe74240812014-04-17 10:35:09 -0700591 static Mutex* allocated_thread_ids_lock_ ACQUIRED_AFTER(allocated_monitor_ids_lock_);
Chao-ying Fu9e369312014-05-21 11:20:52 -0700592
593 // Guards modification of the LDT on x86.
594 static Mutex* modify_ldt_lock_ ACQUIRED_AFTER(allocated_thread_ids_lock_);
595
Ian Rogers719d1a32014-03-06 12:13:39 -0800596 // Guards intern table.
Chao-ying Fu9e369312014-05-21 11:20:52 -0700597 static Mutex* intern_table_lock_ ACQUIRED_AFTER(modify_ldt_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800598
Mathieu Chartiera5a53ef2014-09-12 12:58:05 -0700599 // Guards reference processor.
600 static Mutex* reference_processor_lock_ ACQUIRED_AFTER(intern_table_lock_);
601
602 // Guards cleared references queue.
603 static Mutex* reference_queue_cleared_references_lock_ ACQUIRED_AFTER(reference_processor_lock_);
604
605 // Guards weak references queue.
606 static Mutex* reference_queue_weak_references_lock_ ACQUIRED_AFTER(reference_queue_cleared_references_lock_);
607
608 // Guards finalizer references queue.
609 static Mutex* reference_queue_finalizer_references_lock_ ACQUIRED_AFTER(reference_queue_weak_references_lock_);
610
611 // Guards phantom references queue.
612 static Mutex* reference_queue_phantom_references_lock_ ACQUIRED_AFTER(reference_queue_finalizer_references_lock_);
613
614 // Guards soft references queue.
615 static Mutex* reference_queue_soft_references_lock_ ACQUIRED_AFTER(reference_queue_phantom_references_lock_);
616
Ian Rogers719d1a32014-03-06 12:13:39 -0800617 // Have an exclusive aborting thread.
Mathieu Chartiera5a53ef2014-09-12 12:58:05 -0700618 static Mutex* abort_lock_ ACQUIRED_AFTER(reference_queue_soft_references_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800619
620 // Allow mutual exclusion when manipulating Thread::suspend_count_.
621 // TODO: Does the trade-off of a per-thread lock make sense?
622 static Mutex* thread_suspend_count_lock_ ACQUIRED_AFTER(abort_lock_);
623
624 // One unexpected signal at a time lock.
625 static Mutex* unexpected_signal_lock_ ACQUIRED_AFTER(thread_suspend_count_lock_);
626
Hiroshi Yamauchi3eed93d2014-06-04 11:43:59 -0700627 // Guards the maps in mem_map.
628 static Mutex* mem_maps_lock_ ACQUIRED_AFTER(unexpected_signal_lock_);
629
Ian Rogers719d1a32014-03-06 12:13:39 -0800630 // Have an exclusive logging thread.
631 static Mutex* logging_lock_ ACQUIRED_AFTER(unexpected_signal_lock_);
632};
633
Elliott Hughes8daa0922011-09-11 13:46:25 -0700634} // namespace art
635
Brian Carlstromfc0e3212013-07-17 14:40:12 -0700636#endif // ART_RUNTIME_BASE_MUTEX_H_