blob: e391a1549b3353328b825ab5fc2826a4d49b02a8 [file] [log] [blame]
Elliott Hughes8daa0922011-09-11 13:46:25 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Brian Carlstromfc0e3212013-07-17 14:40:12 -070017#ifndef ART_RUNTIME_BASE_MUTEX_H_
18#define ART_RUNTIME_BASE_MUTEX_H_
Elliott Hughes8daa0922011-09-11 13:46:25 -070019
20#include <pthread.h>
Brian Carlstromcd74c4b2012-01-23 13:21:00 -080021#include <stdint.h>
Hans Boehm0882af22017-08-31 15:21:57 -070022#include <unistd.h> // for pid_t
Elliott Hughesffb465f2012-03-01 18:46:05 -080023
24#include <iosfwd>
Elliott Hughes8daa0922011-09-11 13:46:25 -070025#include <string>
26
Andreas Gampe57943812017-12-06 21:39:13 -080027#include <android-base/logging.h>
28
Andreas Gampe39b378c2017-12-07 15:44:13 -080029#include "base/aborting.h"
David Sehrc431b9d2018-03-02 12:01:51 -080030#include "base/atomic.h"
31#include "base/globals.h"
Elliott Hughes76160052012-12-12 16:31:20 -080032#include "base/macros.h"
Ian Rogers81d425b2012-09-27 16:03:43 -070033
Daniel Colascioneb4dfca52018-04-15 11:15:14 -070034#if defined(__linux__)
Chris Dearmanc0141782013-11-14 17:29:21 -080035#define ART_USE_FUTEXES 1
Daniel Colascioneb4dfca52018-04-15 11:15:14 -070036#else
37#define ART_USE_FUTEXES 0
Ian Rogersab470162012-09-29 23:06:53 -070038#endif
Elliott Hughes8daa0922011-09-11 13:46:25 -070039
Ian Rogers66aee5c2012-08-15 17:17:47 -070040// Currently Darwin doesn't support locks with timeouts.
41#if !defined(__APPLE__)
42#define HAVE_TIMED_RWLOCK 1
43#else
44#define HAVE_TIMED_RWLOCK 0
45#endif
46
Elliott Hughes8daa0922011-09-11 13:46:25 -070047namespace art {
48
Mathieu Chartier90443472015-07-16 20:32:27 -070049class SHARED_LOCKABLE ReaderWriterMutex;
50class SHARED_LOCKABLE MutatorMutex;
Ian Rogers56edc432013-01-18 16:51:51 -080051class ScopedContentionRecorder;
Ian Rogers50b35e22012-10-04 10:09:15 -070052class Thread;
David Sehrc431b9d2018-03-02 12:01:51 -080053class Mutex;
Ian Rogers50b35e22012-10-04 10:09:15 -070054
Ian Rogers719d1a32014-03-06 12:13:39 -080055// LockLevel is used to impose a lock hierarchy [1] where acquisition of a Mutex at a higher or
56// equal level to a lock a thread holds is invalid. The lock hierarchy achieves a cycle free
57// partial ordering and thereby cause deadlock situations to fail checks.
58//
59// [1] http://www.drdobbs.com/parallel/use-lock-hierarchies-to-avoid-deadlock/204801163
Andreas Gampe5db8b7b2018-05-08 16:10:59 -070060enum LockLevel : uint8_t {
Ian Rogers719d1a32014-03-06 12:13:39 -080061 kLoggingLock = 0,
Raghu Gandham7de77dd2014-06-13 15:16:31 -070062 kSwapMutexesLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080063 kUnexpectedSignalLock,
64 kThreadSuspendCountLock,
65 kAbortLock,
David Srbecky440a9b32018-02-15 17:47:29 +000066 kNativeDebugInterfaceLock,
Alex Lightca97ada2018-02-02 09:25:31 -080067 kSignalHandlingLock,
Alex Light3e36a9c2018-06-19 09:45:05 -070068 // A generic lock level for mutexs that should not allow any additional mutexes to be gained after
69 // acquiring it.
70 kGenericBottomLock,
Charles Mungerc665d632018-11-06 16:20:13 +000071 // Tracks the second acquisition at the same lock level for kThreadWaitLock. This is an exception
72 // to the normal lock ordering, used to implement Monitor::Wait - while holding one kThreadWait
73 // level lock, it is permitted to acquire a second one - with internal safeguards to ensure that
74 // the second lock acquisition does not result in deadlock. This is implemented in the lock
75 // order by treating the second acquisition of a kThreadWaitLock as a kThreadWaitWakeLock
Charles Mungeraf77ad42018-11-20 11:04:05 -080076 // acquisition. Thus, acquiring kThreadWaitWakeLock requires holding kThreadWaitLock. This entry
77 // is here near the bottom of the hierarchy because other locks should not be
78 // acquired while it is held. kThreadWaitLock cannot be moved here because GC
79 // activity acquires locks while holding the wait lock.
Charles Mungerc665d632018-11-06 16:20:13 +000080 kThreadWaitWakeLock,
Tao Wud0a160d2016-12-13 18:32:17 -080081 kJdwpAdbStateLock,
Ian Rogers719d1a32014-03-06 12:13:39 -080082 kJdwpSocketLock,
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -080083 kRegionSpaceRegionLock,
Mathieu Chartierf169e272017-03-28 12:59:38 -070084 kMarkSweepMarkStackLock,
Charles Mungeraf77ad42018-11-20 11:04:05 -080085 // Can be held while GC related work is done, and thus must be above kMarkSweepMarkStackLock
86 kThreadWaitLock,
Alex Light33b7b5d2018-08-07 19:13:51 +000087 kCHALock,
Alex Light3e36a9c2018-06-19 09:45:05 -070088 kJitCodeCacheLock,
Mathieu Chartier29946052015-12-21 13:02:14 -080089 kRosAllocGlobalLock,
90 kRosAllocBracketLock,
91 kRosAllocBulkFreeLock,
Mathieu Chartierf169e272017-03-28 12:59:38 -070092 kTaggingLockLevel,
Andreas Gampebc4d2182016-02-22 10:03:12 -080093 kTransactionLogLock,
Alex Light184f0752018-07-13 11:18:22 -070094 kCustomTlsLock,
Andreas Gampec8089542017-01-16 12:41:12 -080095 kJniFunctionTableLock,
Mathieu Chartier673ed3d2015-08-28 14:56:43 -070096 kJniWeakGlobalsLock,
Andreas Gampe05a364c2016-10-14 13:27:12 -070097 kJniGlobalsLock,
Mathieu Chartiera5a53ef2014-09-12 12:58:05 -070098 kReferenceQueueSoftReferencesLock,
99 kReferenceQueuePhantomReferencesLock,
100 kReferenceQueueFinalizerReferencesLock,
101 kReferenceQueueWeakReferencesLock,
102 kReferenceQueueClearedReferencesLock,
103 kReferenceProcessorLock,
David Srbecky5cc349f2015-12-18 15:04:48 +0000104 kJitDebugInterfaceLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800105 kAllocSpaceLock,
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -0800106 kBumpPointerSpaceBlockLock,
Mathieu Chartierc7853442015-03-27 14:35:38 -0700107 kArenaPoolLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800108 kInternTableLock,
Vladimir Marko3f5838d2014-08-07 18:07:18 +0100109 kOatFileSecondaryLookupLock,
Richard Uhlera206c742016-05-24 15:04:22 -0700110 kHostDlOpenHandlesLock,
David Brazdilca3c8c32016-09-06 14:04:48 +0100111 kVerifierDepsLock,
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -0700112 kOatFileManagerLock,
Andreas Gampe7526d782015-06-22 22:53:45 -0700113 kTracingUniqueMethodsLock,
114 kTracingStreamingLock,
Mathieu Chartierb8aa1e42016-04-05 14:36:57 -0700115 kClassLoaderClassesLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800116 kDefaultMutexLevel,
Mathieu Chartier6c60d842016-09-15 10:24:43 -0700117 kDexLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800118 kMarkSweepLargeObjectLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800119 kJdwpObjectRegistryLock,
Chao-ying Fu9e369312014-05-21 11:20:52 -0700120 kModifyLdtLock,
121 kAllocatedThreadIdsLock,
Andreas Gampe74240812014-04-17 10:35:09 -0700122 kMonitorPoolLock,
Mathieu Chartierb8aa1e42016-04-05 14:36:57 -0700123 kClassLinkerClassesLock, // TODO rename.
Mathieu Chartiera79efdb2018-01-18 16:31:01 -0800124 kDexToDexCompilerLock,
Igor Murashkin495e7832017-10-27 10:56:20 -0700125 kSubtypeCheckLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800126 kBreakpointLock,
127 kMonitorLock,
Mathieu Chartier440e4ce2014-03-31 16:36:35 -0700128 kMonitorListLock,
Ian Rogers68d8b422014-07-17 11:09:10 -0700129 kJniLoadLibraryLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800130 kThreadListLock,
Brian Carlstrom306db812014-09-05 13:01:41 -0700131 kAllocTrackerLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800132 kDeoptimizationLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800133 kProfilerLock,
Sebastien Hertz4e5b2082015-03-24 19:03:40 +0100134 kJdwpShutdownLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800135 kJdwpEventListLock,
136 kJdwpAttachLock,
137 kJdwpStartLock,
138 kRuntimeShutdownLock,
Jeff Hao69dbec62014-09-15 18:03:41 -0700139 kTraceLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800140 kHeapBitmapLock,
141 kMutatorLock,
Alex Light88fd7202017-06-30 08:31:59 -0700142 kUserCodeSuspensionLock,
Mathieu Chartier9ef78b52014-09-25 17:03:12 -0700143 kInstrumentEntrypointsLock,
Ian Rogers719d1a32014-03-06 12:13:39 -0800144 kZygoteCreationLock,
145
Alex Lightb284f8d2017-11-21 00:00:48 +0000146 // The highest valid lock level. Use this if there is code that should only be called with no
147 // other locks held. Since this is the highest lock level we also allow it to be held even if the
148 // runtime or current thread is not fully set-up yet (for example during thread attach). Note that
149 // this lock also has special behavior around the mutator_lock_. Since the mutator_lock_ is not
150 // really a 'real' lock we allow this to be locked when the mutator_lock_ is held exclusive.
151 // Furthermore, the mutator_lock_ may not be acquired in any form when a lock of this level is
152 // held. Since the mutator_lock_ being held strong means that all other threads are suspended this
153 // will prevent deadlocks while still allowing this lock level to function as a "highest" level.
154 kTopLockLevel,
155
Ian Rogers719d1a32014-03-06 12:13:39 -0800156 kLockLevelCount // Must come last.
157};
158std::ostream& operator<<(std::ostream& os, const LockLevel& rhs);
159
Andreas Gampe5db8b7b2018-05-08 16:10:59 -0700160constexpr bool kDebugLocking = kIsDebugBuild;
Ian Rogers25fd14b2012-09-05 10:56:38 -0700161
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700162// Record Log contention information, dumpable via SIGQUIT.
163#ifdef ART_USE_FUTEXES
Jeff Hao08f2e7b2013-09-09 16:44:02 -0700164// To enable lock contention logging, set this to true.
Andreas Gampe5db8b7b2018-05-08 16:10:59 -0700165constexpr bool kLogLockContentions = false;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700166#else
167// Keep this false as lock contention logging is supported only with
168// futex.
Andreas Gampe5db8b7b2018-05-08 16:10:59 -0700169constexpr bool kLogLockContentions = false;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700170#endif
Andreas Gampe5db8b7b2018-05-08 16:10:59 -0700171constexpr size_t kContentionLogSize = 4;
172constexpr size_t kContentionLogDataSize = kLogLockContentions ? 1 : 0;
173constexpr size_t kAllMutexDataSize = kLogLockContentions ? 1 : 0;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700174
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700175// Base class for all Mutex implementations
176class BaseMutex {
177 public:
Ian Rogersbab74962013-04-19 10:04:10 -0700178 const char* GetName() const {
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700179 return name_;
180 }
181
182 virtual bool IsMutex() const { return false; }
183 virtual bool IsReaderWriterMutex() const { return false; }
Yu Lieac44242015-06-29 10:50:03 +0800184 virtual bool IsMutatorMutex() const { return false; }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700185
Ian Rogers56edc432013-01-18 16:51:51 -0800186 virtual void Dump(std::ostream& os) const = 0;
187
188 static void DumpAll(std::ostream& os);
189
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800190 bool ShouldRespondToEmptyCheckpointRequest() const {
191 return should_respond_to_empty_checkpoint_request_;
192 }
193
194 void SetShouldRespondToEmptyCheckpointRequest(bool value) {
195 should_respond_to_empty_checkpoint_request_ = value;
196 }
197
198 virtual void WakeupToRespondToEmptyCheckpoint() = 0;
199
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700200 protected:
201 friend class ConditionVariable;
202
Ian Rogers81d425b2012-09-27 16:03:43 -0700203 BaseMutex(const char* name, LockLevel level);
Ian Rogers56edc432013-01-18 16:51:51 -0800204 virtual ~BaseMutex();
Ian Rogers81d425b2012-09-27 16:03:43 -0700205 void RegisterAsLocked(Thread* self);
206 void RegisterAsUnlocked(Thread* self);
207 void CheckSafeToWait(Thread* self);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700208
Ian Rogers56edc432013-01-18 16:51:51 -0800209 friend class ScopedContentionRecorder;
210
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700211 void RecordContention(uint64_t blocked_tid, uint64_t owner_tid, uint64_t nano_time_blocked);
Ian Rogers56edc432013-01-18 16:51:51 -0800212 void DumpContention(std::ostream& os) const;
213
Ian Rogersbab74962013-04-19 10:04:10 -0700214 const char* const name_;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700215
Ian Rogers56edc432013-01-18 16:51:51 -0800216 // A log entry that records contention but makes no guarantee that either tid will be held live.
217 struct ContentionLogEntry {
218 ContentionLogEntry() : blocked_tid(0), owner_tid(0) {}
219 uint64_t blocked_tid;
220 uint64_t owner_tid;
221 AtomicInteger count;
222 };
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700223 struct ContentionLogData {
224 ContentionLogEntry contention_log[kContentionLogSize];
225 // The next entry in the contention log to be updated. Value ranges from 0 to
226 // kContentionLogSize - 1.
227 AtomicInteger cur_content_log_entry;
228 // Number of times the Mutex has been contended.
229 AtomicInteger contention_count;
230 // Sum of time waited by all contenders in ns.
Ian Rogers37f3c962014-07-17 11:25:30 -0700231 Atomic<uint64_t> wait_time;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700232 void AddToWaitTime(uint64_t value);
233 ContentionLogData() : wait_time(0) {}
234 };
Ian Rogers3e5cf302014-05-20 16:40:37 -0700235 ContentionLogData contention_log_data_[kContentionLogDataSize];
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700236
Andreas Gampe5db8b7b2018-05-08 16:10:59 -0700237 const LockLevel level_; // Support for lock hierarchy.
238 bool should_respond_to_empty_checkpoint_request_;
239
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700240 public:
241 bool HasEverContended() const {
242 if (kLogLockContentions) {
Orion Hodson88591fe2018-03-06 13:35:43 +0000243 return contention_log_data_->contention_count.load(std::memory_order_seq_cst) > 0;
Hiroshi Yamauchi1afde132013-08-06 17:09:30 -0700244 }
245 return false;
246 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700247};
248
249// A Mutex is used to achieve mutual exclusion between threads. A Mutex can be used to gain
250// exclusive access to what it guards. A Mutex can be in one of two states:
251// - Free - not owned by any thread,
252// - Exclusive - owned by a single thread.
253//
254// The effect of locking and unlocking operations on the state is:
255// State | ExclusiveLock | ExclusiveUnlock
256// -------------------------------------------
257// Free | Exclusive | error
258// Exclusive | Block* | Free
259// * Mutex is not reentrant and so an attempt to ExclusiveLock on the same thread will result in
260// an error. Being non-reentrant simplifies Waiting on ConditionVariables.
Ian Rogers01ae5802012-09-28 16:14:01 -0700261std::ostream& operator<<(std::ostream& os, const Mutex& mu);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700262class LOCKABLE Mutex : public BaseMutex {
263 public:
Ian Rogers81d425b2012-09-27 16:03:43 -0700264 explicit Mutex(const char* name, LockLevel level = kDefaultMutexLevel, bool recursive = false);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700265 ~Mutex();
266
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700267 virtual bool IsMutex() const { return true; }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700268
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700269 // Block until mutex is free then acquire exclusive access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700270 void ExclusiveLock(Thread* self) ACQUIRE();
271 void Lock(Thread* self) ACQUIRE() { ExclusiveLock(self); }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700272
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700273 // Returns true if acquires exclusive access, false otherwise.
Mathieu Chartier90443472015-07-16 20:32:27 -0700274 bool ExclusiveTryLock(Thread* self) TRY_ACQUIRE(true);
275 bool TryLock(Thread* self) TRY_ACQUIRE(true) { return ExclusiveTryLock(self); }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700276
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700277 // Release exclusive access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700278 void ExclusiveUnlock(Thread* self) RELEASE();
279 void Unlock(Thread* self) RELEASE() { ExclusiveUnlock(self); }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700280
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700281 // Is the current thread the exclusive holder of the Mutex.
Andreas Gampeb486a982017-06-01 13:45:54 -0700282 ALWAYS_INLINE bool IsExclusiveHeld(const Thread* self) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700283
284 // Assert that the Mutex is exclusively held by the current thread.
Andreas Gampeb486a982017-06-01 13:45:54 -0700285 ALWAYS_INLINE void AssertExclusiveHeld(const Thread* self) const ASSERT_CAPABILITY(this);
286 ALWAYS_INLINE void AssertHeld(const Thread* self) const ASSERT_CAPABILITY(this);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700287
288 // Assert that the Mutex is not held by the current thread.
Mathieu Chartier90443472015-07-16 20:32:27 -0700289 void AssertNotHeldExclusive(const Thread* self) ASSERT_CAPABILITY(!*this) {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000290 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers01ae5802012-09-28 16:14:01 -0700291 CHECK(!IsExclusiveHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700292 }
293 }
Mathieu Chartier90443472015-07-16 20:32:27 -0700294 void AssertNotHeld(const Thread* self) ASSERT_CAPABILITY(!*this) {
295 AssertNotHeldExclusive(self);
296 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700297
Ian Rogersc7190692014-07-08 23:50:26 -0700298 // Id associated with exclusive owner. No memory ordering semantics if called from a thread other
299 // than the owner.
Hans Boehm0882af22017-08-31 15:21:57 -0700300 pid_t GetExclusiveOwnerTid() const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700301
302 // Returns how many times this Mutex has been locked, it is better to use AssertHeld/NotHeld.
303 unsigned int GetDepth() const {
304 return recursion_count_;
305 }
Elliott Hughesaccd83d2011-10-17 14:25:58 -0700306
Ian Rogers56edc432013-01-18 16:51:51 -0800307 virtual void Dump(std::ostream& os) const;
Ian Rogers01ae5802012-09-28 16:14:01 -0700308
Mathieu Chartier90443472015-07-16 20:32:27 -0700309 // For negative capabilities in clang annotations.
310 const Mutex& operator!() const { return *this; }
311
Roland Levillainbbc6e7e2018-08-24 16:58:47 +0100312 void WakeupToRespondToEmptyCheckpoint() override;
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800313
Elliott Hughesaccd83d2011-10-17 14:25:58 -0700314 private:
Ian Rogersc604d732012-10-14 16:09:54 -0700315#if ART_USE_FUTEXES
316 // 0 is unheld, 1 is held.
Ian Rogersc7190692014-07-08 23:50:26 -0700317 AtomicInteger state_;
Ian Rogersc604d732012-10-14 16:09:54 -0700318 // Exclusive owner.
Hans Boehm0882af22017-08-31 15:21:57 -0700319 Atomic<pid_t> exclusive_owner_;
Ian Rogersc604d732012-10-14 16:09:54 -0700320 // Number of waiting contenders.
Ian Rogersb122a4b2013-11-19 18:00:50 -0800321 AtomicInteger num_contenders_;
Ian Rogersc604d732012-10-14 16:09:54 -0700322#else
Elliott Hughes8daa0922011-09-11 13:46:25 -0700323 pthread_mutex_t mutex_;
Hans Boehm0882af22017-08-31 15:21:57 -0700324 Atomic<pid_t> exclusive_owner_; // Guarded by mutex_. Asynchronous reads are OK.
Ian Rogersc604d732012-10-14 16:09:54 -0700325#endif
Andreas Gampe5db8b7b2018-05-08 16:10:59 -0700326
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700327 unsigned int recursion_count_;
Andreas Gampe5db8b7b2018-05-08 16:10:59 -0700328 const bool recursive_; // Can the lock be recursively held?
329
Elliott Hughesf1498432012-03-28 19:34:27 -0700330 friend class ConditionVariable;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700331 DISALLOW_COPY_AND_ASSIGN(Mutex);
332};
333
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700334// A ReaderWriterMutex is used to achieve mutual exclusion between threads, similar to a Mutex.
335// Unlike a Mutex a ReaderWriterMutex can be used to gain exclusive (writer) or shared (reader)
336// access to what it guards. A flaw in relation to a Mutex is that it cannot be used with a
337// condition variable. A ReaderWriterMutex can be in one of three states:
338// - Free - not owned by any thread,
339// - Exclusive - owned by a single thread,
340// - Shared(n) - shared amongst n threads.
341//
342// The effect of locking and unlocking operations on the state is:
343//
344// State | ExclusiveLock | ExclusiveUnlock | SharedLock | SharedUnlock
345// ----------------------------------------------------------------------------
346// Free | Exclusive | error | SharedLock(1) | error
347// Exclusive | Block | Free | Block | error
348// Shared(n) | Block | error | SharedLock(n+1)* | Shared(n-1) or Free
349// * for large values of n the SharedLock may block.
Ian Rogers01ae5802012-09-28 16:14:01 -0700350std::ostream& operator<<(std::ostream& os, const ReaderWriterMutex& mu);
Mathieu Chartier90443472015-07-16 20:32:27 -0700351class SHARED_LOCKABLE ReaderWriterMutex : public BaseMutex {
Elliott Hughes8daa0922011-09-11 13:46:25 -0700352 public:
Ian Rogers81d425b2012-09-27 16:03:43 -0700353 explicit ReaderWriterMutex(const char* name, LockLevel level = kDefaultMutexLevel);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700354 ~ReaderWriterMutex();
355
356 virtual bool IsReaderWriterMutex() const { return true; }
357
358 // Block until ReaderWriterMutex is free then acquire exclusive access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700359 void ExclusiveLock(Thread* self) ACQUIRE();
360 void WriterLock(Thread* self) ACQUIRE() { ExclusiveLock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700361
362 // Release exclusive access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700363 void ExclusiveUnlock(Thread* self) RELEASE();
364 void WriterUnlock(Thread* self) RELEASE() { ExclusiveUnlock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700365
366 // Block until ReaderWriterMutex is free and acquire exclusive access. Returns true on success
367 // or false if timeout is reached.
Ian Rogers66aee5c2012-08-15 17:17:47 -0700368#if HAVE_TIMED_RWLOCK
Ian Rogersc604d732012-10-14 16:09:54 -0700369 bool ExclusiveLockWithTimeout(Thread* self, int64_t ms, int32_t ns)
Ian Rogers81d425b2012-09-27 16:03:43 -0700370 EXCLUSIVE_TRYLOCK_FUNCTION(true);
Ian Rogers66aee5c2012-08-15 17:17:47 -0700371#endif
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700372
373 // Block until ReaderWriterMutex is shared or free then acquire a share on the access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700374 void SharedLock(Thread* self) ACQUIRE_SHARED() ALWAYS_INLINE;
375 void ReaderLock(Thread* self) ACQUIRE_SHARED() { SharedLock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700376
377 // Try to acquire share of ReaderWriterMutex.
Mathieu Chartier90443472015-07-16 20:32:27 -0700378 bool SharedTryLock(Thread* self) SHARED_TRYLOCK_FUNCTION(true);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700379
380 // Release a share of the access.
Mathieu Chartier90443472015-07-16 20:32:27 -0700381 void SharedUnlock(Thread* self) RELEASE_SHARED() ALWAYS_INLINE;
382 void ReaderUnlock(Thread* self) RELEASE_SHARED() { SharedUnlock(self); }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700383
384 // Is the current thread the exclusive holder of the ReaderWriterMutex.
Andreas Gampeb486a982017-06-01 13:45:54 -0700385 ALWAYS_INLINE bool IsExclusiveHeld(const Thread* self) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700386
387 // Assert the current thread has exclusive access to the ReaderWriterMutex.
Andreas Gampeb486a982017-06-01 13:45:54 -0700388 ALWAYS_INLINE void AssertExclusiveHeld(const Thread* self) const ASSERT_CAPABILITY(this);
389 ALWAYS_INLINE void AssertWriterHeld(const Thread* self) const ASSERT_CAPABILITY(this);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700390
391 // Assert the current thread doesn't have exclusive access to the ReaderWriterMutex.
Mathieu Chartier90ef3db2015-08-04 15:19:41 -0700392 void AssertNotExclusiveHeld(const Thread* self) ASSERT_CAPABILITY(!this) {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000393 if (kDebugLocking && (gAborting == 0)) {
Ian Rogerse3359f72013-06-11 15:14:11 -0700394 CHECK(!IsExclusiveHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700395 }
396 }
Mathieu Chartier90ef3db2015-08-04 15:19:41 -0700397 void AssertNotWriterHeld(const Thread* self) ASSERT_CAPABILITY(!this) {
398 AssertNotExclusiveHeld(self);
399 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700400
401 // Is the current thread a shared holder of the ReaderWriterMutex.
Ian Rogers81d425b2012-09-27 16:03:43 -0700402 bool IsSharedHeld(const Thread* self) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700403
404 // Assert the current thread has shared access to the ReaderWriterMutex.
Mathieu Chartier3768ade2017-05-02 14:04:39 -0700405 ALWAYS_INLINE void AssertSharedHeld(const Thread* self) ASSERT_SHARED_CAPABILITY(this) {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000406 if (kDebugLocking && (gAborting == 0)) {
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700407 // TODO: we can only assert this well when self != null.
408 CHECK(IsSharedHeld(self) || self == nullptr) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700409 }
410 }
Mathieu Chartier3768ade2017-05-02 14:04:39 -0700411 ALWAYS_INLINE void AssertReaderHeld(const Thread* self) ASSERT_SHARED_CAPABILITY(this) {
Mathieu Chartier90ef3db2015-08-04 15:19:41 -0700412 AssertSharedHeld(self);
413 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700414
415 // Assert the current thread doesn't hold this ReaderWriterMutex either in shared or exclusive
416 // mode.
Mathieu Chartier3768ade2017-05-02 14:04:39 -0700417 ALWAYS_INLINE void AssertNotHeld(const Thread* self) ASSERT_SHARED_CAPABILITY(!this) {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000418 if (kDebugLocking && (gAborting == 0)) {
Ian Rogers01ae5802012-09-28 16:14:01 -0700419 CHECK(!IsSharedHeld(self)) << *this;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700420 }
Elliott Hughes8daa0922011-09-11 13:46:25 -0700421 }
422
Ian Rogersc7190692014-07-08 23:50:26 -0700423 // Id associated with exclusive owner. No memory ordering semantics if called from a thread other
Hans Boehm0882af22017-08-31 15:21:57 -0700424 // than the owner. Returns 0 if the lock is not held. Returns either 0 or -1 if it is held by
425 // one or more readers.
426 pid_t GetExclusiveOwnerTid() const;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700427
Ian Rogers56edc432013-01-18 16:51:51 -0800428 virtual void Dump(std::ostream& os) const;
Ian Rogers01ae5802012-09-28 16:14:01 -0700429
Mathieu Chartier90443472015-07-16 20:32:27 -0700430 // For negative capabilities in clang annotations.
431 const ReaderWriterMutex& operator!() const { return *this; }
432
Roland Levillainbbc6e7e2018-08-24 16:58:47 +0100433 void WakeupToRespondToEmptyCheckpoint() override;
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800434
Ian Rogers81d425b2012-09-27 16:03:43 -0700435 private:
Ian Rogers51d212e2014-10-23 17:48:20 -0700436#if ART_USE_FUTEXES
Ian Rogerscf7f1912014-10-22 22:06:39 -0700437 // Out-of-inline path for handling contention for a SharedLock.
438 void HandleSharedLockContention(Thread* self, int32_t cur_state);
439
Ian Rogers81d425b2012-09-27 16:03:43 -0700440 // -1 implies held exclusive, +ve shared held by state_ many owners.
Ian Rogersc7190692014-07-08 23:50:26 -0700441 AtomicInteger state_;
442 // Exclusive owner. Modification guarded by this mutex.
Hans Boehm0882af22017-08-31 15:21:57 -0700443 Atomic<pid_t> exclusive_owner_;
Ian Rogersc7190692014-07-08 23:50:26 -0700444 // Number of contenders waiting for a reader share.
445 AtomicInteger num_pending_readers_;
446 // Number of contenders waiting to be the writer.
Ian Rogersb122a4b2013-11-19 18:00:50 -0800447 AtomicInteger num_pending_writers_;
Ian Rogers81d425b2012-09-27 16:03:43 -0700448#else
449 pthread_rwlock_t rwlock_;
Hans Boehm0882af22017-08-31 15:21:57 -0700450 Atomic<pid_t> exclusive_owner_; // Writes guarded by rwlock_. Asynchronous reads are OK.
Ian Rogers81d425b2012-09-27 16:03:43 -0700451#endif
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700452 DISALLOW_COPY_AND_ASSIGN(ReaderWriterMutex);
453};
454
Yu Lieac44242015-06-29 10:50:03 +0800455// MutatorMutex is a special kind of ReaderWriterMutex created specifically for the
456// Locks::mutator_lock_ mutex. The behaviour is identical to the ReaderWriterMutex except that
457// thread state changes also play a part in lock ownership. The mutator_lock_ will not be truly
458// held by any mutator threads. However, a thread in the kRunnable state is considered to have
459// shared ownership of the mutator lock and therefore transitions in and out of the kRunnable
460// state have associated implications on lock ownership. Extra methods to handle the state
461// transitions have been added to the interface but are only accessible to the methods dealing
462// with state transitions. The thread state and flags attributes are used to ensure thread state
463// transitions are consistent with the permitted behaviour of the mutex.
464//
465// *) The most important consequence of this behaviour is that all threads must be in one of the
466// suspended states before exclusive ownership of the mutator mutex is sought.
467//
468std::ostream& operator<<(std::ostream& os, const MutatorMutex& mu);
Mathieu Chartier90443472015-07-16 20:32:27 -0700469class SHARED_LOCKABLE MutatorMutex : public ReaderWriterMutex {
Yu Lieac44242015-06-29 10:50:03 +0800470 public:
471 explicit MutatorMutex(const char* name, LockLevel level = kDefaultMutexLevel)
472 : ReaderWriterMutex(name, level) {}
473 ~MutatorMutex() {}
474
475 virtual bool IsMutatorMutex() const { return true; }
476
Mathieu Chartier90443472015-07-16 20:32:27 -0700477 // For negative capabilities in clang annotations.
478 const MutatorMutex& operator!() const { return *this; }
479
Yu Lieac44242015-06-29 10:50:03 +0800480 private:
481 friend class Thread;
482 void TransitionFromRunnableToSuspended(Thread* self) UNLOCK_FUNCTION() ALWAYS_INLINE;
483 void TransitionFromSuspendedToRunnable(Thread* self) SHARED_LOCK_FUNCTION() ALWAYS_INLINE;
484
485 DISALLOW_COPY_AND_ASSIGN(MutatorMutex);
486};
487
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700488// ConditionVariables allow threads to queue and sleep. Threads may then be resumed individually
489// (Signal) or all at once (Broadcast).
Elliott Hughes5f791332011-09-15 17:45:30 -0700490class ConditionVariable {
491 public:
Roland Levillain3887c462015-08-12 18:15:42 +0100492 ConditionVariable(const char* name, Mutex& mutex);
Elliott Hughes5f791332011-09-15 17:45:30 -0700493 ~ConditionVariable();
494
Charles Mungerbcd16ee2018-10-22 13:03:23 -0700495 // Requires the mutex to be held.
Ian Rogersc604d732012-10-14 16:09:54 -0700496 void Broadcast(Thread* self);
Charles Mungerbcd16ee2018-10-22 13:03:23 -0700497 // Requires the mutex to be held.
Ian Rogersc604d732012-10-14 16:09:54 -0700498 void Signal(Thread* self);
499 // TODO: No thread safety analysis on Wait and TimedWait as they call mutex operations via their
500 // pointer copy, thereby defeating annotalysis.
501 void Wait(Thread* self) NO_THREAD_SAFETY_ANALYSIS;
Ian Rogers7b078e82014-09-10 14:44:24 -0700502 bool TimedWait(Thread* self, int64_t ms, int32_t ns) NO_THREAD_SAFETY_ANALYSIS;
Ian Rogers1d54e732013-05-02 21:10:01 -0700503 // Variant of Wait that should be used with caution. Doesn't validate that no mutexes are held
504 // when waiting.
505 // TODO: remove this.
506 void WaitHoldingLocks(Thread* self) NO_THREAD_SAFETY_ANALYSIS;
Elliott Hughes5f791332011-09-15 17:45:30 -0700507
508 private:
Ian Rogers23055dc2013-04-18 16:29:16 -0700509 const char* const name_;
Ian Rogersc604d732012-10-14 16:09:54 -0700510 // The Mutex being used by waiters. It is an error to mix condition variables between different
511 // Mutexes.
512 Mutex& guard_;
513#if ART_USE_FUTEXES
514 // A counter that is modified by signals and broadcasts. This ensures that when a waiter gives up
Ian Rogersd45f2012012-11-28 11:46:23 -0800515 // their Mutex and another thread takes it and signals, the waiting thread observes that sequence_
516 // changed and doesn't enter the wait. Modified while holding guard_, but is read by futex wait
517 // without guard_ held.
Ian Rogersb122a4b2013-11-19 18:00:50 -0800518 AtomicInteger sequence_;
Ian Rogersc604d732012-10-14 16:09:54 -0700519 // Number of threads that have come into to wait, not the length of the waiters on the futex as
Ian Rogers5bd97c42012-11-27 02:38:26 -0800520 // waiters may have been requeued onto guard_. Guarded by guard_.
Ian Rogersc604d732012-10-14 16:09:54 -0700521 volatile int32_t num_waiters_;
Charles Mungerbcd16ee2018-10-22 13:03:23 -0700522
523 void RequeueWaiters(int32_t count);
Ian Rogersc604d732012-10-14 16:09:54 -0700524#else
525 pthread_cond_t cond_;
526#endif
Elliott Hughes5f791332011-09-15 17:45:30 -0700527 DISALLOW_COPY_AND_ASSIGN(ConditionVariable);
528};
529
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700530// Scoped locker/unlocker for a regular Mutex that acquires mu upon construction and releases it
531// upon destruction.
Mathieu Chartier90443472015-07-16 20:32:27 -0700532class SCOPED_CAPABILITY MutexLock {
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700533 public:
Roland Levillain3887c462015-08-12 18:15:42 +0100534 MutexLock(Thread* self, Mutex& mu) ACQUIRE(mu) : self_(self), mu_(mu) {
Ian Rogers81d425b2012-09-27 16:03:43 -0700535 mu_.ExclusiveLock(self_);
536 }
537
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700538 ~MutexLock() RELEASE() {
Ian Rogers81d425b2012-09-27 16:03:43 -0700539 mu_.ExclusiveUnlock(self_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700540 }
541
542 private:
Ian Rogers81d425b2012-09-27 16:03:43 -0700543 Thread* const self_;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700544 Mutex& mu_;
545 DISALLOW_COPY_AND_ASSIGN(MutexLock);
546};
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700547
548// Scoped locker/unlocker for a ReaderWriterMutex that acquires read access to mu upon
549// construction and releases it upon destruction.
Mathieu Chartier90443472015-07-16 20:32:27 -0700550class SCOPED_CAPABILITY ReaderMutexLock {
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700551 public:
Andreas Gampeb486a982017-06-01 13:45:54 -0700552 ALWAYS_INLINE ReaderMutexLock(Thread* self, ReaderWriterMutex& mu) ACQUIRE(mu);
Ian Rogers81d425b2012-09-27 16:03:43 -0700553
Andreas Gampeb486a982017-06-01 13:45:54 -0700554 ALWAYS_INLINE ~ReaderMutexLock() RELEASE();
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700555
556 private:
Ian Rogers81d425b2012-09-27 16:03:43 -0700557 Thread* const self_;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700558 ReaderWriterMutex& mu_;
559 DISALLOW_COPY_AND_ASSIGN(ReaderMutexLock);
560};
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700561
562// Scoped locker/unlocker for a ReaderWriterMutex that acquires write access to mu upon
563// construction and releases it upon destruction.
Mathieu Chartier90443472015-07-16 20:32:27 -0700564class SCOPED_CAPABILITY WriterMutexLock {
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700565 public:
Roland Levillain3887c462015-08-12 18:15:42 +0100566 WriterMutexLock(Thread* self, ReaderWriterMutex& mu) EXCLUSIVE_LOCK_FUNCTION(mu) :
Ian Rogers81d425b2012-09-27 16:03:43 -0700567 self_(self), mu_(mu) {
568 mu_.ExclusiveLock(self_);
569 }
570
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700571 ~WriterMutexLock() UNLOCK_FUNCTION() {
Ian Rogers81d425b2012-09-27 16:03:43 -0700572 mu_.ExclusiveUnlock(self_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700573 }
574
575 private:
Ian Rogers50b35e22012-10-04 10:09:15 -0700576 Thread* const self_;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700577 ReaderWriterMutex& mu_;
578 DISALLOW_COPY_AND_ASSIGN(WriterMutexLock);
579};
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700580
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700581// For StartNoThreadSuspension and EndNoThreadSuspension.
582class CAPABILITY("role") Role {
583 public:
584 void Acquire() ACQUIRE() {}
585 void Release() RELEASE() {}
586 const Role& operator!() const { return *this; }
587};
588
589class Uninterruptible : public Role {
590};
591
Ian Rogers719d1a32014-03-06 12:13:39 -0800592// Global mutexes corresponding to the levels above.
593class Locks {
594 public:
595 static void Init();
Mathieu Chartier91e56692015-03-03 13:51:04 -0800596 static void InitConditions() NO_THREAD_SAFETY_ANALYSIS; // Condition variables.
David Sehrf42eb2c2016-10-19 13:20:45 -0700597
598 // Destroying various lock types can emit errors that vary depending upon
599 // whether the client (art::Runtime) is currently active. Allow the client
600 // to set a callback that is used to check when it is acceptable to call
601 // Abort. The default behavior is that the client *is not* able to call
602 // Abort if no callback is established.
603 using ClientCallback = bool();
604 static void SetClientCallback(ClientCallback* is_safe_to_call_abort_cb) NO_THREAD_SAFETY_ANALYSIS;
605 // Checks for whether it is safe to call Abort() without using locks.
606 static bool IsSafeToCallAbortRacy() NO_THREAD_SAFETY_ANALYSIS;
607
Hiroshi Yamauchi8a433242017-03-07 14:39:22 -0800608 // Add a mutex to expected_mutexes_on_weak_ref_access_.
609 static void AddToExpectedMutexesOnWeakRefAccess(BaseMutex* mutex, bool need_lock = true);
610 // Remove a mutex from expected_mutexes_on_weak_ref_access_.
611 static void RemoveFromExpectedMutexesOnWeakRefAccess(BaseMutex* mutex, bool need_lock = true);
612 // Check if the given mutex is in expected_mutexes_on_weak_ref_access_.
613 static bool IsExpectedOnWeakRefAccess(BaseMutex* mutex);
David Sehrf42eb2c2016-10-19 13:20:45 -0700614
Mathieu Chartier9ef78b52014-09-25 17:03:12 -0700615 // Guards allocation entrypoint instrumenting.
Ian Rogers4ad5cd32014-11-11 23:08:07 -0800616 static Mutex* instrument_entrypoints_lock_;
Mathieu Chartier9ef78b52014-09-25 17:03:12 -0700617
Alex Light88fd7202017-06-30 08:31:59 -0700618 // Guards code that deals with user-code suspension. This mutex must be held when suspending or
619 // resuming threads with SuspendReason::kForUserCode. It may be held by a suspended thread, but
620 // only if the suspension is not due to SuspendReason::kForUserCode.
621 static Mutex* user_code_suspension_lock_ ACQUIRED_AFTER(instrument_entrypoints_lock_);
622
Yu Lieac44242015-06-29 10:50:03 +0800623 // A barrier is used to synchronize the GC/Debugger thread with mutator threads. When GC/Debugger
624 // thread wants to suspend all mutator threads, it needs to wait for all mutator threads to pass
625 // a barrier. Threads that are already suspended will get their barrier passed by the GC/Debugger
626 // thread; threads in the runnable state will pass the barrier when they transit to the suspended
627 // state. GC/Debugger thread will be woken up when all mutator threads are suspended.
Ian Rogers719d1a32014-03-06 12:13:39 -0800628 //
629 // Thread suspension:
Yu Lieac44242015-06-29 10:50:03 +0800630 // mutator thread | GC/Debugger
631 // .. running .. | .. running ..
Ian Rogers719d1a32014-03-06 12:13:39 -0800632 // .. running .. | Request thread suspension by:
633 // .. running .. | - acquiring thread_suspend_count_lock_
634 // .. running .. | - incrementing Thread::suspend_count_ on
635 // .. running .. | all mutator threads
636 // .. running .. | - releasing thread_suspend_count_lock_
Yu Lieac44242015-06-29 10:50:03 +0800637 // .. running .. | Block wait for all threads to pass a barrier
Ian Rogers719d1a32014-03-06 12:13:39 -0800638 // Poll Thread::suspend_count_ and enter full | .. blocked ..
639 // suspend code. | .. blocked ..
Yu Lieac44242015-06-29 10:50:03 +0800640 // Change state to kSuspended (pass the barrier) | Wake up when all threads pass the barrier
641 // x: Acquire thread_suspend_count_lock_ | .. running ..
642 // while Thread::suspend_count_ > 0 | .. running ..
643 // - wait on Thread::resume_cond_ | .. running ..
644 // (releases thread_suspend_count_lock_) | .. running ..
Ian Rogers719d1a32014-03-06 12:13:39 -0800645 // .. waiting .. | Request thread resumption by:
646 // .. waiting .. | - acquiring thread_suspend_count_lock_
647 // .. waiting .. | - decrementing Thread::suspend_count_ on
648 // .. waiting .. | all mutator threads
649 // .. waiting .. | - notifying on Thread::resume_cond_
650 // - re-acquire thread_suspend_count_lock_ | - releasing thread_suspend_count_lock_
651 // Release thread_suspend_count_lock_ | .. running ..
Yu Lieac44242015-06-29 10:50:03 +0800652 // Change to kRunnable | .. running ..
653 // - this uses a CAS operation to ensure the | .. running ..
654 // suspend request flag isn't raised as the | .. running ..
655 // state is changed | .. running ..
656 // - if the CAS operation fails then goto x | .. running ..
Ian Rogers719d1a32014-03-06 12:13:39 -0800657 // .. running .. | .. running ..
Alex Light88fd7202017-06-30 08:31:59 -0700658 static MutatorMutex* mutator_lock_ ACQUIRED_AFTER(user_code_suspension_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800659
660 // Allow reader-writer mutual exclusion on the mark and live bitmaps of the heap.
661 static ReaderWriterMutex* heap_bitmap_lock_ ACQUIRED_AFTER(mutator_lock_);
662
663 // Guards shutdown of the runtime.
664 static Mutex* runtime_shutdown_lock_ ACQUIRED_AFTER(heap_bitmap_lock_);
665
Chao-ying Fu9e369312014-05-21 11:20:52 -0700666 // Guards background profiler global state.
Hiroshi Yamauchib139b6d2017-02-28 15:01:23 -0800667 static Mutex* profiler_lock_ ACQUIRED_AFTER(runtime_shutdown_lock_);
Chao-ying Fu9e369312014-05-21 11:20:52 -0700668
669 // Guards trace (ie traceview) requests.
670 static Mutex* trace_lock_ ACQUIRED_AFTER(profiler_lock_);
671
Brian Carlstrom306db812014-09-05 13:01:41 -0700672 // Guards debugger recent allocation records.
673 static Mutex* alloc_tracker_lock_ ACQUIRED_AFTER(trace_lock_);
674
675 // Guards updates to instrumentation to ensure mutual exclusion of
676 // events like deoptimization requests.
677 // TODO: improve name, perhaps instrumentation_update_lock_.
678 static Mutex* deoptimization_lock_ ACQUIRED_AFTER(alloc_tracker_lock_);
679
Igor Murashkin495e7832017-10-27 10:56:20 -0700680 // Guard the update of the SubtypeCheck data stores in each Class::status_ field.
681 // This lock is used in SubtypeCheck methods which are the interface for
682 // any SubtypeCheck-mutating methods.
683 // In Class::IsSubClass, the lock is not required since it does not update the SubtypeCheck data.
Alex Light33b7b5d2018-08-07 19:13:51 +0000684 static Mutex* subtype_check_lock_ ACQUIRED_AFTER(deoptimization_lock_);
Igor Murashkin495e7832017-10-27 10:56:20 -0700685
Ian Rogers719d1a32014-03-06 12:13:39 -0800686 // The thread_list_lock_ guards ThreadList::list_. It is also commonly held to stop threads
687 // attaching and detaching.
Igor Murashkin495e7832017-10-27 10:56:20 -0700688 static Mutex* thread_list_lock_ ACQUIRED_AFTER(subtype_check_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800689
Mathieu Chartier91e56692015-03-03 13:51:04 -0800690 // Signaled when threads terminate. Used to determine when all non-daemons have terminated.
691 static ConditionVariable* thread_exit_cond_ GUARDED_BY(Locks::thread_list_lock_);
692
Ian Rogers68d8b422014-07-17 11:09:10 -0700693 // Guards maintaining loading library data structures.
694 static Mutex* jni_libraries_lock_ ACQUIRED_AFTER(thread_list_lock_);
695
Ian Rogers719d1a32014-03-06 12:13:39 -0800696 // Guards breakpoints.
Sebastien Hertzed2be172014-08-19 15:33:43 +0200697 static ReaderWriterMutex* breakpoint_lock_ ACQUIRED_AFTER(jni_libraries_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800698
Ian Rogers719d1a32014-03-06 12:13:39 -0800699 // Guards lists of classes within the class linker.
Chao-ying Fu9e369312014-05-21 11:20:52 -0700700 static ReaderWriterMutex* classlinker_classes_lock_ ACQUIRED_AFTER(breakpoint_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800701
702 // When declaring any Mutex add DEFAULT_MUTEX_ACQUIRED_AFTER to use annotalysis to check the code
703 // doesn't try to hold a higher level Mutex.
Alex Light0fa17862017-10-24 13:43:05 -0700704 #define DEFAULT_MUTEX_ACQUIRED_AFTER ACQUIRED_AFTER(art::Locks::classlinker_classes_lock_)
Ian Rogers719d1a32014-03-06 12:13:39 -0800705
Andreas Gampe74240812014-04-17 10:35:09 -0700706 static Mutex* allocated_monitor_ids_lock_ ACQUIRED_AFTER(classlinker_classes_lock_);
707
Chao-ying Fu9e369312014-05-21 11:20:52 -0700708 // Guard the allocation/deallocation of thread ids.
Andreas Gampe74240812014-04-17 10:35:09 -0700709 static Mutex* allocated_thread_ids_lock_ ACQUIRED_AFTER(allocated_monitor_ids_lock_);
Chao-ying Fu9e369312014-05-21 11:20:52 -0700710
711 // Guards modification of the LDT on x86.
712 static Mutex* modify_ldt_lock_ ACQUIRED_AFTER(allocated_thread_ids_lock_);
713
Andreas Gampecc1b5352016-12-01 16:58:38 -0800714 static ReaderWriterMutex* dex_lock_ ACQUIRED_AFTER(modify_ldt_lock_);
715
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -0700716 // Guards opened oat files in OatFileManager.
Andreas Gampecc1b5352016-12-01 16:58:38 -0800717 static ReaderWriterMutex* oat_file_manager_lock_ ACQUIRED_AFTER(dex_lock_);
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -0700718
Nicolas Geoffray340dafa2016-11-18 16:03:10 +0000719 // Guards extra string entries for VerifierDeps.
720 static ReaderWriterMutex* verifier_deps_lock_ ACQUIRED_AFTER(oat_file_manager_lock_);
David Brazdilca3c8c32016-09-06 14:04:48 +0100721
Richard Uhlera206c742016-05-24 15:04:22 -0700722 // Guards dlopen_handles_ in DlOpenOatFile.
David Brazdilca3c8c32016-09-06 14:04:48 +0100723 static Mutex* host_dlopen_handles_lock_ ACQUIRED_AFTER(verifier_deps_lock_);
Mathieu Chartiere58991b2015-10-13 07:59:34 -0700724
Ian Rogers719d1a32014-03-06 12:13:39 -0800725 // Guards intern table.
Richard Uhlera206c742016-05-24 15:04:22 -0700726 static Mutex* intern_table_lock_ ACQUIRED_AFTER(host_dlopen_handles_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800727
Mathieu Chartiera5a53ef2014-09-12 12:58:05 -0700728 // Guards reference processor.
729 static Mutex* reference_processor_lock_ ACQUIRED_AFTER(intern_table_lock_);
730
731 // Guards cleared references queue.
732 static Mutex* reference_queue_cleared_references_lock_ ACQUIRED_AFTER(reference_processor_lock_);
733
734 // Guards weak references queue.
735 static Mutex* reference_queue_weak_references_lock_ ACQUIRED_AFTER(reference_queue_cleared_references_lock_);
736
737 // Guards finalizer references queue.
738 static Mutex* reference_queue_finalizer_references_lock_ ACQUIRED_AFTER(reference_queue_weak_references_lock_);
739
740 // Guards phantom references queue.
741 static Mutex* reference_queue_phantom_references_lock_ ACQUIRED_AFTER(reference_queue_finalizer_references_lock_);
742
743 // Guards soft references queue.
744 static Mutex* reference_queue_soft_references_lock_ ACQUIRED_AFTER(reference_queue_phantom_references_lock_);
745
Andreas Gampe05a364c2016-10-14 13:27:12 -0700746 // Guard accesses to the JNI Global Reference table.
747 static ReaderWriterMutex* jni_globals_lock_ ACQUIRED_AFTER(reference_queue_soft_references_lock_);
748
749 // Guard accesses to the JNI Weak Global Reference table.
750 static Mutex* jni_weak_globals_lock_ ACQUIRED_AFTER(jni_globals_lock_);
751
Andreas Gampec8089542017-01-16 12:41:12 -0800752 // Guard accesses to the JNI function table override.
753 static Mutex* jni_function_table_lock_ ACQUIRED_AFTER(jni_weak_globals_lock_);
754
Alex Light184f0752018-07-13 11:18:22 -0700755 // Guard accesses to the Thread::custom_tls_. We use this to allow the TLS of other threads to be
756 // read (the reader must hold the ThreadListLock or have some other way of ensuring the thread
757 // will not die in that case though). This is useful for (eg) the implementation of
758 // GetThreadLocalStorage.
759 static Mutex* custom_tls_lock_ ACQUIRED_AFTER(jni_function_table_lock_);
760
Alex Light33b7b5d2018-08-07 19:13:51 +0000761 // Guards Class Hierarchy Analysis (CHA).
762 static Mutex* cha_lock_ ACQUIRED_AFTER(custom_tls_lock_);
763
Alex Light3e36a9c2018-06-19 09:45:05 -0700764 // When declaring any Mutex add BOTTOM_MUTEX_ACQUIRED_AFTER to use annotalysis to check the code
765 // doesn't try to acquire a higher level Mutex. NB Due to the way the annotalysis works this
766 // actually only encodes the mutex being below jni_function_table_lock_ although having
767 // kGenericBottomLock level is lower than this.
Alex Light33b7b5d2018-08-07 19:13:51 +0000768 #define BOTTOM_MUTEX_ACQUIRED_AFTER ACQUIRED_AFTER(art::Locks::cha_lock_)
Alex Light3e36a9c2018-06-19 09:45:05 -0700769
Ian Rogers719d1a32014-03-06 12:13:39 -0800770 // Have an exclusive aborting thread.
Alex Light184f0752018-07-13 11:18:22 -0700771 static Mutex* abort_lock_ ACQUIRED_AFTER(custom_tls_lock_);
Ian Rogers719d1a32014-03-06 12:13:39 -0800772
773 // Allow mutual exclusion when manipulating Thread::suspend_count_.
774 // TODO: Does the trade-off of a per-thread lock make sense?
775 static Mutex* thread_suspend_count_lock_ ACQUIRED_AFTER(abort_lock_);
776
777 // One unexpected signal at a time lock.
778 static Mutex* unexpected_signal_lock_ ACQUIRED_AFTER(thread_suspend_count_lock_);
779
David Srbeckyfb3de3d2018-01-29 16:11:49 +0000780 // Guards the magic global variables used by native tools (e.g. libunwind).
781 static Mutex* native_debug_interface_lock_ ACQUIRED_AFTER(unexpected_signal_lock_);
782
Ian Rogers719d1a32014-03-06 12:13:39 -0800783 // Have an exclusive logging thread.
David Srbeckyfb3de3d2018-01-29 16:11:49 +0000784 static Mutex* logging_lock_ ACQUIRED_AFTER(native_debug_interface_lock_);
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800785
786 // List of mutexes that we expect a thread may hold when accessing weak refs. This is used to
787 // avoid a deadlock in the empty checkpoint while weak ref access is disabled (b/34964016). If we
788 // encounter an unexpected mutex on accessing weak refs,
789 // Thread::CheckEmptyCheckpointFromWeakRefAccess will detect it.
790 static std::vector<BaseMutex*> expected_mutexes_on_weak_ref_access_;
Hiroshi Yamauchi8a433242017-03-07 14:39:22 -0800791 static Atomic<const BaseMutex*> expected_mutexes_on_weak_ref_access_guard_;
792 class ScopedExpectedMutexesOnWeakRefAccessLock;
Ian Rogers719d1a32014-03-06 12:13:39 -0800793};
794
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700795class Roles {
796 public:
Mathieu Chartier90ef3db2015-08-04 15:19:41 -0700797 // Uninterruptible means that the thread may not become suspended.
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700798 static Uninterruptible uninterruptible_;
799};
800
Elliott Hughes8daa0922011-09-11 13:46:25 -0700801} // namespace art
802
Brian Carlstromfc0e3212013-07-17 14:40:12 -0700803#endif // ART_RUNTIME_BASE_MUTEX_H_