blob: 03ae63a068a448d8e382ab8668fda4828fbe9646 [file] [log] [blame]
Elliott Hughes8daa0922011-09-11 13:46:25 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Brian Carlstromfc0e3212013-07-17 14:40:12 -070017#ifndef ART_RUNTIME_BASE_MUTEX_H_
18#define ART_RUNTIME_BASE_MUTEX_H_
Elliott Hughes8daa0922011-09-11 13:46:25 -070019
20#include <pthread.h>
Brian Carlstromcd74c4b2012-01-23 13:21:00 -080021#include <stdint.h>
Elliott Hughesffb465f2012-03-01 18:46:05 -080022
23#include <iosfwd>
Elliott Hughes8daa0922011-09-11 13:46:25 -070024#include <string>
25
Ian Rogersef7d42f2014-01-06 12:55:46 -080026#include "atomic.h"
Elliott Hughes07ed66b2012-12-12 18:34:25 -080027#include "base/logging.h"
Elliott Hughes76160052012-12-12 16:31:20 -080028#include "base/macros.h"
Ian Rogers00f7d0e2012-07-19 15:28:27 -070029#include "globals.h"
Ian Rogers81d425b2012-09-27 16:03:43 -070030
Ian Rogersab470162012-09-29 23:06:53 -070031#if defined(__APPLE__)
Ian Rogers81d425b2012-09-27 16:03:43 -070032#define ART_USE_FUTEXES 0
Ian Rogersab470162012-09-29 23:06:53 -070033#else
Chris Dearmanc0141782013-11-14 17:29:21 -080034#define ART_USE_FUTEXES 1
Ian Rogersab470162012-09-29 23:06:53 -070035#endif
Elliott Hughes8daa0922011-09-11 13:46:25 -070036
Ian Rogers66aee5c2012-08-15 17:17:47 -070037// Currently Darwin doesn't support locks with timeouts.
38#if !defined(__APPLE__)
39#define HAVE_TIMED_RWLOCK 1
40#else
41#define HAVE_TIMED_RWLOCK 0
42#endif
43
Elliott Hughes8daa0922011-09-11 13:46:25 -070044namespace art {
45
Mathieu Chartier90443472015-07-16 20:32:27 -070046class SHARED_LOCKABLE ReaderWriterMutex;
47class SHARED_LOCKABLE MutatorMutex;
Ian Rogers56edc432013-01-18 16:51:51 -080048class ScopedContentionRecorder;
Ian Rogers50b35e22012-10-04 10:09:15 -070049class Thread;
50
Ian Rogers719d1a32014-03-06 12:13:39 -080051// LockLevel is used to impose a lock hierarchy [1] where acquisition of a Mutex at a higher or
52// equal level to a lock a thread holds is invalid. The lock hierarchy achieves a cycle free
53// partial ordering and thereby cause deadlock situations to fail checks.
54//
55// [1] http://www.drdobbs.com/parallel/use-lock-hierarchies-to-avoid-deadlock/204801163
56enum LockLevel {
57 kLoggingLock = 0,
Raghu Gandham7de77dd2014-06-13 15:16:31 -070058 kSwapMutexesLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080059 kUnexpectedSignalLock,
60 kThreadSuspendCountLock,
61 kAbortLock,
Tao Wud0a160d2016-12-13 18:32:17 -080062 kJdwpAdbStateLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080063 kJdwpSocketLock,
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -080064 kRegionSpaceRegionLock,
Mathieu Chartierf169e272017-03-28 12:59:38 -070065 kMarkSweepMarkStackLock,
Mathieu Chartier29946052015-12-21 13:02:14 -080066 kRosAllocGlobalLock,
67 kRosAllocBracketLock,
68 kRosAllocBulkFreeLock,
Mathieu Chartierf169e272017-03-28 12:59:38 -070069 kTaggingLockLevel,
Andreas Gampebc4d2182016-02-22 10:03:12 -080070 kTransactionLogLock,
Andreas Gampec8089542017-01-16 12:41:12 -080071 kJniFunctionTableLock,
Mathieu Chartier673ed3d2015-08-28 14:56:43 -070072 kJniWeakGlobalsLock,
Andreas Gampe05a364c2016-10-14 13:27:12 -070073 kJniGlobalsLock,
Mathieu Chartiera5a53ef2014-09-12 12:58:05 -070074 kReferenceQueueSoftReferencesLock,
75 kReferenceQueuePhantomReferencesLock,
76 kReferenceQueueFinalizerReferencesLock,
77 kReferenceQueueWeakReferencesLock,
78 kReferenceQueueClearedReferencesLock,
79 kReferenceProcessorLock,
David Srbecky5cc349f2015-12-18 15:04:48 +000080 kJitDebugInterfaceLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080081 kAllocSpaceLock,
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -080082 kBumpPointerSpaceBlockLock,
Mathieu Chartierc7853442015-03-27 14:35:38 -070083 kArenaPoolLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080084 kInternTableLock,
Vladimir Marko3f5838d2014-08-07 18:07:18 +010085 kOatFileSecondaryLookupLock,
Richard Uhlera206c742016-05-24 15:04:22 -070086 kHostDlOpenHandlesLock,
David Brazdilca3c8c32016-09-06 14:04:48 +010087 kVerifierDepsLock,
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -070088 kOatFileManagerLock,
Andreas Gampe7526d782015-06-22 22:53:45 -070089 kTracingUniqueMethodsLock,
90 kTracingStreamingLock,
Mathieu Chartierb8aa1e42016-04-05 14:36:57 -070091 kDeoptimizedMethodsLock,
92 kClassLoaderClassesLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080093 kDefaultMutexLevel,
Mathieu Chartier6c60d842016-09-15 10:24:43 -070094 kDexLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080095 kMarkSweepLargeObjectLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080096 kJdwpObjectRegistryLock,
Chao-ying Fu9e369312014-05-21 11:20:52 -070097 kModifyLdtLock,
98 kAllocatedThreadIdsLock,
Andreas Gampe74240812014-04-17 10:35:09 -070099 kMonitorPoolLock,
Mathieu Chartierb8aa1e42016-04-05 14:36:57 -0700100 kClassLinkerClassesLock, // TODO rename.
Mathieu Chartier65975772016-08-05 10:46:36 -0700101 kJitCodeCacheLock,
Mingyao Yang063fc772016-08-02 11:02:54 -0700102 kCHALock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800103 kBreakpointLock,
104 kMonitorLock,
Mathieu Chartier440e4ce2014-03-31 16:36:35 -0700105 kMonitorListLock,
Ian Rogers68d8b422014-07-17 11:09:10 -0700106 kJniLoadLibraryLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800107 kThreadListLock,
Brian Carlstrom306db812014-09-05 13:01:41 -0700108 kAllocTrackerLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800109 kDeoptimizationLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800110 kProfilerLock,
Sebastien Hertz4e5b2082015-03-24 19:03:40 +0100111 kJdwpShutdownLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800112 kJdwpEventListLock,
113 kJdwpAttachLock,
114 kJdwpStartLock,
115 kRuntimeShutdownLock,
Jeff Hao69dbec62014-09-15 18:03:41 -0700116 kTraceLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800117 kHeapBitmapLock,
118 kMutatorLock,
Mathieu Chartier9ef78b52014-09-25 17:03:12 -0700119 kInstrumentEntrypointsLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800120 kZygoteCreationLock,
121
122 kLockLevelCount // Must come last.
123};
124std::ostream& operator<<(std::ostream& os, const LockLevel& rhs);
125
Brian Carlstrom2e250c82013-08-14 18:08:52 -0700126const bool kDebugLocking = kIsDebugBuild;
Ian Rogers25fd14b2012-09-05 10:56:38 -0700127
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700128// Record Log contention information, dumpable via SIGQUIT.
129#ifdef ART_USE_FUTEXES
Jeff Hao08f2e7b2013-09-09 16:44:02 -0700130// To enable lock contention logging, set this to true.
131const bool kLogLockContentions = false;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700132#else
133// Keep this false as lock contention logging is supported only with
134// futex.
135const bool kLogLockContentions = false;
136#endif
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700137const size_t kContentionLogSize = 4;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700138const size_t kContentionLogDataSize = kLogLockContentions ? 1 : 0;
139const size_t kAllMutexDataSize = kLogLockContentions ? 1 : 0;
140
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700141// Base class for all Mutex implementations
142class BaseMutex {
143 public:
Ian Rogersbab74962013-04-19 10:04:10 -0700144 const char* GetName() const {
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700145 return name_;
146 }
147
148 virtual bool IsMutex() const { return false; }
149 virtual bool IsReaderWriterMutex() const { return false; }
Yu Lieac44242015-06-29 10:50:03 +0800150 virtual bool IsMutatorMutex() const { return false; }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700151
Ian Rogers56edc432013-01-18 16:51:51 -0800152 virtual void Dump(std::ostream& os) const = 0;
153
154 static void DumpAll(std::ostream& os);
155
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800156 bool ShouldRespondToEmptyCheckpointRequest() const {
157 return should_respond_to_empty_checkpoint_request_;
158 }
159
160 void SetShouldRespondToEmptyCheckpointRequest(bool value) {
161 should_respond_to_empty_checkpoint_request_ = value;
162 }
163
164 virtual void WakeupToRespondToEmptyCheckpoint() = 0;
165
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700166 protected:
167 friend class ConditionVariable;
168
Ian Rogers81d425b2012-09-27 16:03:43 -0700169 BaseMutex(const char* name, LockLevel level);
Ian Rogers56edc432013-01-18 16:51:51 -0800170 virtual ~BaseMutex();
Ian Rogers81d425b2012-09-27 16:03:43 -0700171 void RegisterAsLocked(Thread* self);
172 void RegisterAsUnlocked(Thread* self);
173 void CheckSafeToWait(Thread* self);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700174
Ian Rogers56edc432013-01-18 16:51:51 -0800175 friend class ScopedContentionRecorder;
176
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700177 void RecordContention(uint64_t blocked_tid, uint64_t owner_tid, uint64_t nano_time_blocked);
Ian Rogers56edc432013-01-18 16:51:51 -0800178 void DumpContention(std::ostream& os) const;
179
Ian Rogers81d425b2012-09-27 16:03:43 -0700180 const LockLevel level_; // Support for lock hierarchy.
Ian Rogersbab74962013-04-19 10:04:10 -0700181 const char* const name_;
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800182 bool should_respond_to_empty_checkpoint_request_;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700183
Ian Rogers56edc432013-01-18 16:51:51 -0800184 // A log entry that records contention but makes no guarantee that either tid will be held live.
185 struct ContentionLogEntry {
186 ContentionLogEntry() : blocked_tid(0), owner_tid(0) {}
187 uint64_t blocked_tid;
188 uint64_t owner_tid;
189 AtomicInteger count;
190 };
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700191 struct ContentionLogData {
192 ContentionLogEntry contention_log[kContentionLogSize];
193 // The next entry in the contention log to be updated. Value ranges from 0 to
194 // kContentionLogSize - 1.
195 AtomicInteger cur_content_log_entry;
196 // Number of times the Mutex has been contended.
197 AtomicInteger contention_count;
198 // Sum of time waited by all contenders in ns.
Ian Rogers37f3c962014-07-17 11:25:30 -0700199 Atomic<uint64_t> wait_time;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700200 void AddToWaitTime(uint64_t value);
201 ContentionLogData() : wait_time(0) {}
202 };
Ian Rogers3e5cf302014-05-20 16:40:37 -0700203 ContentionLogData contention_log_data_[kContentionLogDataSize];
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700204
205 public:
206 bool HasEverContended() const {
207 if (kLogLockContentions) {
Ian Rogers3e5cf302014-05-20 16:40:37 -0700208 return contention_log_data_->contention_count.LoadSequentiallyConsistent() > 0;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700209 }
210 return false;
211 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700212};
213
214// A Mutex is used to achieve mutual exclusion between threads. A Mutex can be used to gain
215// exclusive access to what it guards. A Mutex can be in one of two states:
216// - Free - not owned by any thread,
217// - Exclusive - owned by a single thread.
218//
219// The effect of locking and unlocking operations on the state is:
220// State | ExclusiveLock | ExclusiveUnlock
221// -------------------------------------------
222// Free | Exclusive | error
223// Exclusive | Block* | Free
224// * Mutex is not reentrant and so an attempt to ExclusiveLock on the same thread will result in
225// an error. Being non-reentrant simplifies Waiting on ConditionVariables.
Ian Rogers01ae5802012-09-28 16:14:01 -0700226std::ostream& operator<<(std::ostream& os, const Mutex& mu);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700227class LOCKABLE Mutex : public BaseMutex {
228 public:
Ian Rogers81d425b2012-09-27 16:03:43 -0700229 explicit Mutex(const char* name, LockLevel level = kDefaultMutexLevel, bool recursive = false);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700230 ~Mutex();
231
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700232 virtual bool IsMutex() const { return true; }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700233
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700234 // Block until mutex is free then acquire exclusive access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700235 void ExclusiveLock(Thread* self) ACQUIRE();
236 void Lock(Thread* self) ACQUIRE() { ExclusiveLock(self); }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700237
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700238 // Returns true if acquires exclusive access, false otherwise.
Mathieu Chartier90443472015-07-16 20:32:27 -0700239 bool ExclusiveTryLock(Thread* self) TRY_ACQUIRE(true);
240 bool TryLock(Thread* self) TRY_ACQUIRE(true) { return ExclusiveTryLock(self); }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700241
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700242 // Release exclusive access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700243 void ExclusiveUnlock(Thread* self) RELEASE();
244 void Unlock(Thread* self) RELEASE() { ExclusiveUnlock(self); }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700245
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700246 // Is the current thread the exclusive holder of the Mutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700247 bool IsExclusiveHeld(const Thread* self) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700248
249 // Assert that the Mutex is exclusively held by the current thread.
Mathieu Chartier90443472015-07-16 20:32:27 -0700250 void AssertExclusiveHeld(const Thread* self) ASSERT_CAPABILITY(this) {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000251 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers01ae5802012-09-28 16:14:01 -0700252 CHECK(IsExclusiveHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700253 }
254 }
Mathieu Chartier90443472015-07-16 20:32:27 -0700255 void AssertHeld(const Thread* self) ASSERT_CAPABILITY(this) { AssertExclusiveHeld(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700256
257 // Assert that the Mutex is not held by the current thread.
Mathieu Chartier90443472015-07-16 20:32:27 -0700258 void AssertNotHeldExclusive(const Thread* self) ASSERT_CAPABILITY(!*this) {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000259 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers01ae5802012-09-28 16:14:01 -0700260 CHECK(!IsExclusiveHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700261 }
262 }
Mathieu Chartier90443472015-07-16 20:32:27 -0700263 void AssertNotHeld(const Thread* self) ASSERT_CAPABILITY(!*this) {
264 AssertNotHeldExclusive(self);
265 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700266
Ian Rogersc7190692014-07-08 23:50:26 -0700267 // Id associated with exclusive owner. No memory ordering semantics if called from a thread other
268 // than the owner.
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700269 uint64_t GetExclusiveOwnerTid() const;
270
271 // Returns how many times this Mutex has been locked, it is better to use AssertHeld/NotHeld.
272 unsigned int GetDepth() const {
273 return recursion_count_;
274 }
Elliott Hughesaccd83d2011-10-17 14:25:58 -0700275
Ian Rogers56edc432013-01-18 16:51:51 -0800276 virtual void Dump(std::ostream& os) const;
Ian Rogers01ae5802012-09-28 16:14:01 -0700277
Mathieu Chartier90443472015-07-16 20:32:27 -0700278 // For negative capabilities in clang annotations.
279 const Mutex& operator!() const { return *this; }
280
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800281 void WakeupToRespondToEmptyCheckpoint() OVERRIDE;
282
Elliott Hughesaccd83d2011-10-17 14:25:58 -0700283 private:
Ian Rogersc604d732012-10-14 16:09:54 -0700284#if ART_USE_FUTEXES
285 // 0 is unheld, 1 is held.
Ian Rogersc7190692014-07-08 23:50:26 -0700286 AtomicInteger state_;
Ian Rogersc604d732012-10-14 16:09:54 -0700287 // Exclusive owner.
288 volatile uint64_t exclusive_owner_;
289 // Number of waiting contenders.
Ian Rogersb122a4b2013-11-19 18:00:50 -0800290 AtomicInteger num_contenders_;
Ian Rogersc604d732012-10-14 16:09:54 -0700291#else
Elliott Hughes8daa0922011-09-11 13:46:25 -0700292 pthread_mutex_t mutex_;
Ian Rogersc5f17732014-06-05 20:48:42 -0700293 volatile uint64_t exclusive_owner_; // Guarded by mutex_.
Ian Rogersc604d732012-10-14 16:09:54 -0700294#endif
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700295 const bool recursive_; // Can the lock be recursively held?
296 unsigned int recursion_count_;
Elliott Hughesf1498432012-03-28 19:34:27 -0700297 friend class ConditionVariable;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700298 DISALLOW_COPY_AND_ASSIGN(Mutex);
299};
300
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700301// A ReaderWriterMutex is used to achieve mutual exclusion between threads, similar to a Mutex.
302// Unlike a Mutex a ReaderWriterMutex can be used to gain exclusive (writer) or shared (reader)
303// access to what it guards. A flaw in relation to a Mutex is that it cannot be used with a
304// condition variable. A ReaderWriterMutex can be in one of three states:
305// - Free - not owned by any thread,
306// - Exclusive - owned by a single thread,
307// - Shared(n) - shared amongst n threads.
308//
309// The effect of locking and unlocking operations on the state is:
310//
311// State | ExclusiveLock | ExclusiveUnlock | SharedLock | SharedUnlock
312// ----------------------------------------------------------------------------
313// Free | Exclusive | error | SharedLock(1) | error
314// Exclusive | Block | Free | Block | error
315// Shared(n) | Block | error | SharedLock(n+1)* | Shared(n-1) or Free
316// * for large values of n the SharedLock may block.
Ian Rogers01ae5802012-09-28 16:14:01 -0700317std::ostream& operator<<(std::ostream& os, const ReaderWriterMutex& mu);
Mathieu Chartier90443472015-07-16 20:32:27 -0700318class SHARED_LOCKABLE ReaderWriterMutex : public BaseMutex {
Elliott Hughes8daa0922011-09-11 13:46:25 -0700319 public:
Ian Rogers81d425b2012-09-27 16:03:43 -0700320 explicit ReaderWriterMutex(const char* name, LockLevel level = kDefaultMutexLevel);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700321 ~ReaderWriterMutex();
322
323 virtual bool IsReaderWriterMutex() const { return true; }
324
325 // Block until ReaderWriterMutex is free then acquire exclusive access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700326 void ExclusiveLock(Thread* self) ACQUIRE();
327 void WriterLock(Thread* self) ACQUIRE() { ExclusiveLock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700328
329 // Release exclusive access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700330 void ExclusiveUnlock(Thread* self) RELEASE();
331 void WriterUnlock(Thread* self) RELEASE() { ExclusiveUnlock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700332
333 // Block until ReaderWriterMutex is free and acquire exclusive access. Returns true on success
334 // or false if timeout is reached.
Ian Rogers66aee5c2012-08-15 17:17:47 -0700335#if HAVE_TIMED_RWLOCK
Ian Rogersc604d732012-10-14 16:09:54 -0700336 bool ExclusiveLockWithTimeout(Thread* self, int64_t ms, int32_t ns)
Ian Rogers81d425b2012-09-27 16:03:43 -0700337 EXCLUSIVE_TRYLOCK_FUNCTION(true);
Ian Rogers66aee5c2012-08-15 17:17:47 -0700338#endif
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700339
340 // Block until ReaderWriterMutex is shared or free then acquire a share on the access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700341 void SharedLock(Thread* self) ACQUIRE_SHARED() ALWAYS_INLINE;
342 void ReaderLock(Thread* self) ACQUIRE_SHARED() { SharedLock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700343
344 // Try to acquire share of ReaderWriterMutex.
Mathieu Chartier90443472015-07-16 20:32:27 -0700345 bool SharedTryLock(Thread* self) SHARED_TRYLOCK_FUNCTION(true);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700346
347 // Release a share of the access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700348 void SharedUnlock(Thread* self) RELEASE_SHARED() ALWAYS_INLINE;
349 void ReaderUnlock(Thread* self) RELEASE_SHARED() { SharedUnlock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700350
351 // Is the current thread the exclusive holder of the ReaderWriterMutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700352 bool IsExclusiveHeld(const Thread* self) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700353
354 // Assert the current thread has exclusive access to the ReaderWriterMutex.
Mathieu Chartier90ef3db2015-08-04 15:19:41 -0700355 void AssertExclusiveHeld(const Thread* self) ASSERT_CAPABILITY(this) {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000356 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers01ae5802012-09-28 16:14:01 -0700357 CHECK(IsExclusiveHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700358 }
359 }
Mathieu Chartier90ef3db2015-08-04 15:19:41 -0700360 void AssertWriterHeld(const Thread* self) ASSERT_CAPABILITY(this) { AssertExclusiveHeld(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700361
362 // Assert the current thread doesn't have exclusive access to the ReaderWriterMutex.
Mathieu Chartier90ef3db2015-08-04 15:19:41 -0700363 void AssertNotExclusiveHeld(const Thread* self) ASSERT_CAPABILITY(!this) {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000364 if (kDebugLocking && (gAborting == 0)) {
Ian Rogerse3359f72013-06-11 15:14:11 -0700365 CHECK(!IsExclusiveHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700366 }
367 }
Mathieu Chartier90ef3db2015-08-04 15:19:41 -0700368 void AssertNotWriterHeld(const Thread* self) ASSERT_CAPABILITY(!this) {
369 AssertNotExclusiveHeld(self);
370 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700371
372 // Is the current thread a shared holder of the ReaderWriterMutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700373 bool IsSharedHeld(const Thread* self) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700374
375 // Assert the current thread has shared access to the ReaderWriterMutex.
Mathieu Chartier3768ade2017-05-02 14:04:39 -0700376 ALWAYS_INLINE void AssertSharedHeld(const Thread* self) ASSERT_SHARED_CAPABILITY(this) {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000377 if (kDebugLocking && (gAborting == 0)) {
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700378 // TODO: we can only assert this well when self != null.
379 CHECK(IsSharedHeld(self) || self == nullptr) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700380 }
381 }
Mathieu Chartier3768ade2017-05-02 14:04:39 -0700382 ALWAYS_INLINE void AssertReaderHeld(const Thread* self) ASSERT_SHARED_CAPABILITY(this) {
Mathieu Chartier90ef3db2015-08-04 15:19:41 -0700383 AssertSharedHeld(self);
384 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700385
386 // Assert the current thread doesn't hold this ReaderWriterMutex either in shared or exclusive
387 // mode.
Mathieu Chartier3768ade2017-05-02 14:04:39 -0700388 ALWAYS_INLINE void AssertNotHeld(const Thread* self) ASSERT_SHARED_CAPABILITY(!this) {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000389 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers01ae5802012-09-28 16:14:01 -0700390 CHECK(!IsSharedHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700391 }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700392 }
393
Ian Rogersc7190692014-07-08 23:50:26 -0700394 // Id associated with exclusive owner. No memory ordering semantics if called from a thread other
395 // than the owner.
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700396 uint64_t GetExclusiveOwnerTid() const;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700397
Ian Rogers56edc432013-01-18 16:51:51 -0800398 virtual void Dump(std::ostream& os) const;
Ian Rogers01ae5802012-09-28 16:14:01 -0700399
Mathieu Chartier90443472015-07-16 20:32:27 -0700400 // For negative capabilities in clang annotations.
401 const ReaderWriterMutex& operator!() const { return *this; }
402
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800403 void WakeupToRespondToEmptyCheckpoint() OVERRIDE;
404
Ian Rogers81d425b2012-09-27 16:03:43 -0700405 private:
Ian Rogers51d212e2014-10-23 17:48:20 -0700406#if ART_USE_FUTEXES
Ian Rogerscf7f1912014-10-22 22:06:39 -0700407 // Out-of-inline path for handling contention for a SharedLock.
408 void HandleSharedLockContention(Thread* self, int32_t cur_state);
409
Ian Rogers81d425b2012-09-27 16:03:43 -0700410 // -1 implies held exclusive, +ve shared held by state_ many owners.
Ian Rogersc7190692014-07-08 23:50:26 -0700411 AtomicInteger state_;
412 // Exclusive owner. Modification guarded by this mutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700413 volatile uint64_t exclusive_owner_;
Ian Rogersc7190692014-07-08 23:50:26 -0700414 // Number of contenders waiting for a reader share.
415 AtomicInteger num_pending_readers_;
416 // Number of contenders waiting to be the writer.
Ian Rogersb122a4b2013-11-19 18:00:50 -0800417 AtomicInteger num_pending_writers_;
Ian Rogers81d425b2012-09-27 16:03:43 -0700418#else
419 pthread_rwlock_t rwlock_;
Ian Rogersc5f17732014-06-05 20:48:42 -0700420 volatile uint64_t exclusive_owner_; // Guarded by rwlock_.
Ian Rogers81d425b2012-09-27 16:03:43 -0700421#endif
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700422 DISALLOW_COPY_AND_ASSIGN(ReaderWriterMutex);
423};
424
Yu Lieac44242015-06-29 10:50:03 +0800425// MutatorMutex is a special kind of ReaderWriterMutex created specifically for the
426// Locks::mutator_lock_ mutex. The behaviour is identical to the ReaderWriterMutex except that
427// thread state changes also play a part in lock ownership. The mutator_lock_ will not be truly
428// held by any mutator threads. However, a thread in the kRunnable state is considered to have
429// shared ownership of the mutator lock and therefore transitions in and out of the kRunnable
430// state have associated implications on lock ownership. Extra methods to handle the state
431// transitions have been added to the interface but are only accessible to the methods dealing
432// with state transitions. The thread state and flags attributes are used to ensure thread state
433// transitions are consistent with the permitted behaviour of the mutex.
434//
435// *) The most important consequence of this behaviour is that all threads must be in one of the
436// suspended states before exclusive ownership of the mutator mutex is sought.
437//
438std::ostream& operator<<(std::ostream& os, const MutatorMutex& mu);
Mathieu Chartier90443472015-07-16 20:32:27 -0700439class SHARED_LOCKABLE MutatorMutex : public ReaderWriterMutex {
Yu Lieac44242015-06-29 10:50:03 +0800440 public:
441 explicit MutatorMutex(const char* name, LockLevel level = kDefaultMutexLevel)
442 : ReaderWriterMutex(name, level) {}
443 ~MutatorMutex() {}
444
445 virtual bool IsMutatorMutex() const { return true; }
446
Mathieu Chartier90443472015-07-16 20:32:27 -0700447 // For negative capabilities in clang annotations.
448 const MutatorMutex& operator!() const { return *this; }
449
Yu Lieac44242015-06-29 10:50:03 +0800450 private:
451 friend class Thread;
452 void TransitionFromRunnableToSuspended(Thread* self) UNLOCK_FUNCTION() ALWAYS_INLINE;
453 void TransitionFromSuspendedToRunnable(Thread* self) SHARED_LOCK_FUNCTION() ALWAYS_INLINE;
454
455 DISALLOW_COPY_AND_ASSIGN(MutatorMutex);
456};
457
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700458// ConditionVariables allow threads to queue and sleep. Threads may then be resumed individually
459// (Signal) or all at once (Broadcast).
Elliott Hughes5f791332011-09-15 17:45:30 -0700460class ConditionVariable {
461 public:
Roland Levillain3887c462015-08-12 18:15:42 +0100462 ConditionVariable(const char* name, Mutex& mutex);
Elliott Hughes5f791332011-09-15 17:45:30 -0700463 ~ConditionVariable();
464
Ian Rogersc604d732012-10-14 16:09:54 -0700465 void Broadcast(Thread* self);
466 void Signal(Thread* self);
467 // TODO: No thread safety analysis on Wait and TimedWait as they call mutex operations via their
468 // pointer copy, thereby defeating annotalysis.
469 void Wait(Thread* self) NO_THREAD_SAFETY_ANALYSIS;
Ian Rogers7b078e82014-09-10 14:44:24 -0700470 bool TimedWait(Thread* self, int64_t ms, int32_t ns) NO_THREAD_SAFETY_ANALYSIS;
Ian Rogers1d54e732013-05-02 21:10:01 -0700471 // Variant of Wait that should be used with caution. Doesn't validate that no mutexes are held
472 // when waiting.
473 // TODO: remove this.
474 void WaitHoldingLocks(Thread* self) NO_THREAD_SAFETY_ANALYSIS;
Elliott Hughes5f791332011-09-15 17:45:30 -0700475
476 private:
Ian Rogers23055dc2013-04-18 16:29:16 -0700477 const char* const name_;
Ian Rogersc604d732012-10-14 16:09:54 -0700478 // The Mutex being used by waiters. It is an error to mix condition variables between different
479 // Mutexes.
480 Mutex& guard_;
481#if ART_USE_FUTEXES
482 // A counter that is modified by signals and broadcasts. This ensures that when a waiter gives up
Ian Rogersd45f2012012-11-28 11:46:23 -0800483 // their Mutex and another thread takes it and signals, the waiting thread observes that sequence_
484 // changed and doesn't enter the wait. Modified while holding guard_, but is read by futex wait
485 // without guard_ held.
Ian Rogersb122a4b2013-11-19 18:00:50 -0800486 AtomicInteger sequence_;
Ian Rogersc604d732012-10-14 16:09:54 -0700487 // Number of threads that have come into to wait, not the length of the waiters on the futex as
Ian Rogers5bd97c42012-11-27 02:38:26 -0800488 // waiters may have been requeued onto guard_. Guarded by guard_.
Ian Rogersc604d732012-10-14 16:09:54 -0700489 volatile int32_t num_waiters_;
Ian Rogersc604d732012-10-14 16:09:54 -0700490#else
491 pthread_cond_t cond_;
492#endif
Elliott Hughes5f791332011-09-15 17:45:30 -0700493 DISALLOW_COPY_AND_ASSIGN(ConditionVariable);
494};
495
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700496// Scoped locker/unlocker for a regular Mutex that acquires mu upon construction and releases it
497// upon destruction.
Mathieu Chartier90443472015-07-16 20:32:27 -0700498class SCOPED_CAPABILITY MutexLock {
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700499 public:
Roland Levillain3887c462015-08-12 18:15:42 +0100500 MutexLock(Thread* self, Mutex& mu) ACQUIRE(mu) : self_(self), mu_(mu) {
Ian Rogers81d425b2012-09-27 16:03:43 -0700501 mu_.ExclusiveLock(self_);
502 }
503
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700504 ~MutexLock() RELEASE() {
Ian Rogers81d425b2012-09-27 16:03:43 -0700505 mu_.ExclusiveUnlock(self_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700506 }
507
508 private:
Ian Rogers81d425b2012-09-27 16:03:43 -0700509 Thread* const self_;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700510 Mutex& mu_;
511 DISALLOW_COPY_AND_ASSIGN(MutexLock);
512};
513// Catch bug where variable name is omitted. "MutexLock (lock);" instead of "MutexLock mu(lock)".
Andreas Gampe575e78c2014-11-03 23:41:03 -0800514#define MutexLock(x) static_assert(0, "MutexLock declaration missing variable name")
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700515
516// Scoped locker/unlocker for a ReaderWriterMutex that acquires read access to mu upon
517// construction and releases it upon destruction.
Mathieu Chartier90443472015-07-16 20:32:27 -0700518class SCOPED_CAPABILITY ReaderMutexLock {
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700519 public:
Mingyao Yang01b47b02017-02-03 12:09:57 -0800520 ReaderMutexLock(Thread* self, ReaderWriterMutex& mu) ACQUIRE(mu) ALWAYS_INLINE :
Ian Rogers81d425b2012-09-27 16:03:43 -0700521 self_(self), mu_(mu) {
522 mu_.SharedLock(self_);
523 }
524
Mingyao Yang01b47b02017-02-03 12:09:57 -0800525 ~ReaderMutexLock() RELEASE() ALWAYS_INLINE {
Ian Rogers81d425b2012-09-27 16:03:43 -0700526 mu_.SharedUnlock(self_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700527 }
528
529 private:
Ian Rogers81d425b2012-09-27 16:03:43 -0700530 Thread* const self_;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700531 ReaderWriterMutex& mu_;
532 DISALLOW_COPY_AND_ASSIGN(ReaderMutexLock);
533};
534// Catch bug where variable name is omitted. "ReaderMutexLock (lock);" instead of
535// "ReaderMutexLock mu(lock)".
Andreas Gampe575e78c2014-11-03 23:41:03 -0800536#define ReaderMutexLock(x) static_assert(0, "ReaderMutexLock declaration missing variable name")
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700537
538// Scoped locker/unlocker for a ReaderWriterMutex that acquires write access to mu upon
539// construction and releases it upon destruction.
Mathieu Chartier90443472015-07-16 20:32:27 -0700540class SCOPED_CAPABILITY WriterMutexLock {
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700541 public:
Roland Levillain3887c462015-08-12 18:15:42 +0100542 WriterMutexLock(Thread* self, ReaderWriterMutex& mu) EXCLUSIVE_LOCK_FUNCTION(mu) :
Ian Rogers81d425b2012-09-27 16:03:43 -0700543 self_(self), mu_(mu) {
544 mu_.ExclusiveLock(self_);
545 }
546
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700547 ~WriterMutexLock() UNLOCK_FUNCTION() {
Ian Rogers81d425b2012-09-27 16:03:43 -0700548 mu_.ExclusiveUnlock(self_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700549 }
550
551 private:
Ian Rogers50b35e22012-10-04 10:09:15 -0700552 Thread* const self_;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700553 ReaderWriterMutex& mu_;
554 DISALLOW_COPY_AND_ASSIGN(WriterMutexLock);
555};
556// Catch bug where variable name is omitted. "WriterMutexLock (lock);" instead of
557// "WriterMutexLock mu(lock)".
Andreas Gampe575e78c2014-11-03 23:41:03 -0800558#define WriterMutexLock(x) static_assert(0, "WriterMutexLock declaration missing variable name")
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700559
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700560// For StartNoThreadSuspension and EndNoThreadSuspension.
561class CAPABILITY("role") Role {
562 public:
563 void Acquire() ACQUIRE() {}
564 void Release() RELEASE() {}
565 const Role& operator!() const { return *this; }
566};
567
568class Uninterruptible : public Role {
569};
570
Ian Rogers719d1a32014-03-06 12:13:39 -0800571// Global mutexes corresponding to the levels above.
572class Locks {
573 public:
574 static void Init();
Mathieu Chartier91e56692015-03-03 13:51:04 -0800575 static void InitConditions() NO_THREAD_SAFETY_ANALYSIS; // Condition variables.
David Sehrf42eb2c2016-10-19 13:20:45 -0700576
577 // Destroying various lock types can emit errors that vary depending upon
578 // whether the client (art::Runtime) is currently active. Allow the client
579 // to set a callback that is used to check when it is acceptable to call
580 // Abort. The default behavior is that the client *is not* able to call
581 // Abort if no callback is established.
582 using ClientCallback = bool();
583 static void SetClientCallback(ClientCallback* is_safe_to_call_abort_cb) NO_THREAD_SAFETY_ANALYSIS;
584 // Checks for whether it is safe to call Abort() without using locks.
585 static bool IsSafeToCallAbortRacy() NO_THREAD_SAFETY_ANALYSIS;
586
Hiroshi Yamauchi8a433242017-03-07 14:39:22 -0800587 // Add a mutex to expected_mutexes_on_weak_ref_access_.
588 static void AddToExpectedMutexesOnWeakRefAccess(BaseMutex* mutex, bool need_lock = true);
589 // Remove a mutex from expected_mutexes_on_weak_ref_access_.
590 static void RemoveFromExpectedMutexesOnWeakRefAccess(BaseMutex* mutex, bool need_lock = true);
591 // Check if the given mutex is in expected_mutexes_on_weak_ref_access_.
592 static bool IsExpectedOnWeakRefAccess(BaseMutex* mutex);
David Sehrf42eb2c2016-10-19 13:20:45 -0700593
Mathieu Chartier9ef78b52014-09-25 17:03:12 -0700594 // Guards allocation entrypoint instrumenting.
Ian Rogers4ad5cd32014-11-11 23:08:07 -0800595 static Mutex* instrument_entrypoints_lock_;
Mathieu Chartier9ef78b52014-09-25 17:03:12 -0700596
Yu Lieac44242015-06-29 10:50:03 +0800597 // A barrier is used to synchronize the GC/Debugger thread with mutator threads. When GC/Debugger
598 // thread wants to suspend all mutator threads, it needs to wait for all mutator threads to pass
599 // a barrier. Threads that are already suspended will get their barrier passed by the GC/Debugger
600 // thread; threads in the runnable state will pass the barrier when they transit to the suspended
601 // state. GC/Debugger thread will be woken up when all mutator threads are suspended.
Ian Rogers719d1a32014-03-06 12:13:39 -0800602 //
603 // Thread suspension:
Yu Lieac44242015-06-29 10:50:03 +0800604 // mutator thread | GC/Debugger
605 // .. running .. | .. running ..
Ian Rogers719d1a32014-03-06 12:13:39 -0800606 // .. running .. | Request thread suspension by:
607 // .. running .. | - acquiring thread_suspend_count_lock_
608 // .. running .. | - incrementing Thread::suspend_count_ on
609 // .. running .. | all mutator threads
610 // .. running .. | - releasing thread_suspend_count_lock_
Yu Lieac44242015-06-29 10:50:03 +0800611 // .. running .. | Block wait for all threads to pass a barrier
Ian Rogers719d1a32014-03-06 12:13:39 -0800612 // Poll Thread::suspend_count_ and enter full | .. blocked ..
613 // suspend code. | .. blocked ..
Yu Lieac44242015-06-29 10:50:03 +0800614 // Change state to kSuspended (pass the barrier) | Wake up when all threads pass the barrier
615 // x: Acquire thread_suspend_count_lock_ | .. running ..
616 // while Thread::suspend_count_ > 0 | .. running ..
617 // - wait on Thread::resume_cond_ | .. running ..
618 // (releases thread_suspend_count_lock_) | .. running ..
Ian Rogers719d1a32014-03-06 12:13:39 -0800619 // .. waiting .. | Request thread resumption by:
620 // .. waiting .. | - acquiring thread_suspend_count_lock_
621 // .. waiting .. | - decrementing Thread::suspend_count_ on
622 // .. waiting .. | all mutator threads
623 // .. waiting .. | - notifying on Thread::resume_cond_
624 // - re-acquire thread_suspend_count_lock_ | - releasing thread_suspend_count_lock_
625 // Release thread_suspend_count_lock_ | .. running ..
Yu Lieac44242015-06-29 10:50:03 +0800626 // Change to kRunnable | .. running ..
627 // - this uses a CAS operation to ensure the | .. running ..
628 // suspend request flag isn't raised as the | .. running ..
629 // state is changed | .. running ..
630 // - if the CAS operation fails then goto x | .. running ..
Ian Rogers719d1a32014-03-06 12:13:39 -0800631 // .. running .. | .. running ..
Yu Lieac44242015-06-29 10:50:03 +0800632 static MutatorMutex* mutator_lock_ ACQUIRED_AFTER(instrument_entrypoints_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800633
634 // Allow reader-writer mutual exclusion on the mark and live bitmaps of the heap.
635 static ReaderWriterMutex* heap_bitmap_lock_ ACQUIRED_AFTER(mutator_lock_);
636
637 // Guards shutdown of the runtime.
638 static Mutex* runtime_shutdown_lock_ ACQUIRED_AFTER(heap_bitmap_lock_);
639
Chao-ying Fu9e369312014-05-21 11:20:52 -0700640 // Guards background profiler global state.
Hiroshi Yamauchib139b6d2017-02-28 15:01:23 -0800641 static Mutex* profiler_lock_ ACQUIRED_AFTER(runtime_shutdown_lock_);
Chao-ying Fu9e369312014-05-21 11:20:52 -0700642
643 // Guards trace (ie traceview) requests.
644 static Mutex* trace_lock_ ACQUIRED_AFTER(profiler_lock_);
645
Brian Carlstrom306db812014-09-05 13:01:41 -0700646 // Guards debugger recent allocation records.
647 static Mutex* alloc_tracker_lock_ ACQUIRED_AFTER(trace_lock_);
648
649 // Guards updates to instrumentation to ensure mutual exclusion of
650 // events like deoptimization requests.
651 // TODO: improve name, perhaps instrumentation_update_lock_.
652 static Mutex* deoptimization_lock_ ACQUIRED_AFTER(alloc_tracker_lock_);
653
Mingyao Yang063fc772016-08-02 11:02:54 -0700654 // Guards Class Hierarchy Analysis (CHA).
655 static Mutex* cha_lock_ ACQUIRED_AFTER(deoptimization_lock_);
656
Ian Rogers719d1a32014-03-06 12:13:39 -0800657 // The thread_list_lock_ guards ThreadList::list_. It is also commonly held to stop threads
658 // attaching and detaching.
Mingyao Yang063fc772016-08-02 11:02:54 -0700659 static Mutex* thread_list_lock_ ACQUIRED_AFTER(cha_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800660
Mathieu Chartier91e56692015-03-03 13:51:04 -0800661 // Signaled when threads terminate. Used to determine when all non-daemons have terminated.
662 static ConditionVariable* thread_exit_cond_ GUARDED_BY(Locks::thread_list_lock_);
663
Ian Rogers68d8b422014-07-17 11:09:10 -0700664 // Guards maintaining loading library data structures.
665 static Mutex* jni_libraries_lock_ ACQUIRED_AFTER(thread_list_lock_);
666
Ian Rogers719d1a32014-03-06 12:13:39 -0800667 // Guards breakpoints.
Sebastien Hertzed2be172014-08-19 15:33:43 +0200668 static ReaderWriterMutex* breakpoint_lock_ ACQUIRED_AFTER(jni_libraries_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800669
Ian Rogers719d1a32014-03-06 12:13:39 -0800670 // Guards lists of classes within the class linker.
Chao-ying Fu9e369312014-05-21 11:20:52 -0700671 static ReaderWriterMutex* classlinker_classes_lock_ ACQUIRED_AFTER(breakpoint_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800672
673 // When declaring any Mutex add DEFAULT_MUTEX_ACQUIRED_AFTER to use annotalysis to check the code
674 // doesn't try to hold a higher level Mutex.
Mathieu Chartier12d625f2015-03-13 11:33:37 -0700675 #define DEFAULT_MUTEX_ACQUIRED_AFTER ACQUIRED_AFTER(Locks::classlinker_classes_lock_)
Ian Rogers719d1a32014-03-06 12:13:39 -0800676
Andreas Gampe74240812014-04-17 10:35:09 -0700677 static Mutex* allocated_monitor_ids_lock_ ACQUIRED_AFTER(classlinker_classes_lock_);
678
Chao-ying Fu9e369312014-05-21 11:20:52 -0700679 // Guard the allocation/deallocation of thread ids.
Andreas Gampe74240812014-04-17 10:35:09 -0700680 static Mutex* allocated_thread_ids_lock_ ACQUIRED_AFTER(allocated_monitor_ids_lock_);
Chao-ying Fu9e369312014-05-21 11:20:52 -0700681
682 // Guards modification of the LDT on x86.
683 static Mutex* modify_ldt_lock_ ACQUIRED_AFTER(allocated_thread_ids_lock_);
684
Andreas Gampecc1b5352016-12-01 16:58:38 -0800685 static ReaderWriterMutex* dex_lock_ ACQUIRED_AFTER(modify_ldt_lock_);
686
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -0700687 // Guards opened oat files in OatFileManager.
Andreas Gampecc1b5352016-12-01 16:58:38 -0800688 static ReaderWriterMutex* oat_file_manager_lock_ ACQUIRED_AFTER(dex_lock_);
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -0700689
Nicolas Geoffray340dafa2016-11-18 16:03:10 +0000690 // Guards extra string entries for VerifierDeps.
691 static ReaderWriterMutex* verifier_deps_lock_ ACQUIRED_AFTER(oat_file_manager_lock_);
David Brazdilca3c8c32016-09-06 14:04:48 +0100692
Richard Uhlera206c742016-05-24 15:04:22 -0700693 // Guards dlopen_handles_ in DlOpenOatFile.
David Brazdilca3c8c32016-09-06 14:04:48 +0100694 static Mutex* host_dlopen_handles_lock_ ACQUIRED_AFTER(verifier_deps_lock_);
Mathieu Chartiere58991b2015-10-13 07:59:34 -0700695
Ian Rogers719d1a32014-03-06 12:13:39 -0800696 // Guards intern table.
Richard Uhlera206c742016-05-24 15:04:22 -0700697 static Mutex* intern_table_lock_ ACQUIRED_AFTER(host_dlopen_handles_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800698
Mathieu Chartiera5a53ef2014-09-12 12:58:05 -0700699 // Guards reference processor.
700 static Mutex* reference_processor_lock_ ACQUIRED_AFTER(intern_table_lock_);
701
702 // Guards cleared references queue.
703 static Mutex* reference_queue_cleared_references_lock_ ACQUIRED_AFTER(reference_processor_lock_);
704
705 // Guards weak references queue.
706 static Mutex* reference_queue_weak_references_lock_ ACQUIRED_AFTER(reference_queue_cleared_references_lock_);
707
708 // Guards finalizer references queue.
709 static Mutex* reference_queue_finalizer_references_lock_ ACQUIRED_AFTER(reference_queue_weak_references_lock_);
710
711 // Guards phantom references queue.
712 static Mutex* reference_queue_phantom_references_lock_ ACQUIRED_AFTER(reference_queue_finalizer_references_lock_);
713
714 // Guards soft references queue.
715 static Mutex* reference_queue_soft_references_lock_ ACQUIRED_AFTER(reference_queue_phantom_references_lock_);
716
Andreas Gampe05a364c2016-10-14 13:27:12 -0700717 // Guard accesses to the JNI Global Reference table.
718 static ReaderWriterMutex* jni_globals_lock_ ACQUIRED_AFTER(reference_queue_soft_references_lock_);
719
720 // Guard accesses to the JNI Weak Global Reference table.
721 static Mutex* jni_weak_globals_lock_ ACQUIRED_AFTER(jni_globals_lock_);
722
Andreas Gampec8089542017-01-16 12:41:12 -0800723 // Guard accesses to the JNI function table override.
724 static Mutex* jni_function_table_lock_ ACQUIRED_AFTER(jni_weak_globals_lock_);
725
Ian Rogers719d1a32014-03-06 12:13:39 -0800726 // Have an exclusive aborting thread.
Andreas Gampec8089542017-01-16 12:41:12 -0800727 static Mutex* abort_lock_ ACQUIRED_AFTER(jni_function_table_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800728
729 // Allow mutual exclusion when manipulating Thread::suspend_count_.
730 // TODO: Does the trade-off of a per-thread lock make sense?
731 static Mutex* thread_suspend_count_lock_ ACQUIRED_AFTER(abort_lock_);
732
733 // One unexpected signal at a time lock.
734 static Mutex* unexpected_signal_lock_ ACQUIRED_AFTER(thread_suspend_count_lock_);
735
736 // Have an exclusive logging thread.
737 static Mutex* logging_lock_ ACQUIRED_AFTER(unexpected_signal_lock_);
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800738
739 // List of mutexes that we expect a thread may hold when accessing weak refs. This is used to
740 // avoid a deadlock in the empty checkpoint while weak ref access is disabled (b/34964016). If we
741 // encounter an unexpected mutex on accessing weak refs,
742 // Thread::CheckEmptyCheckpointFromWeakRefAccess will detect it.
743 static std::vector<BaseMutex*> expected_mutexes_on_weak_ref_access_;
Hiroshi Yamauchi8a433242017-03-07 14:39:22 -0800744 static Atomic<const BaseMutex*> expected_mutexes_on_weak_ref_access_guard_;
745 class ScopedExpectedMutexesOnWeakRefAccessLock;
Ian Rogers719d1a32014-03-06 12:13:39 -0800746};
747
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700748class Roles {
749 public:
Mathieu Chartier90ef3db2015-08-04 15:19:41 -0700750 // Uninterruptible means that the thread may not become suspended.
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700751 static Uninterruptible uninterruptible_;
752};
753
Elliott Hughes8daa0922011-09-11 13:46:25 -0700754} // namespace art
755
Brian Carlstromfc0e3212013-07-17 14:40:12 -0700756#endif // ART_RUNTIME_BASE_MUTEX_H_