rust/src/libstd/sync.rs

1278 lines
42 KiB
Rust
Raw Normal View History

// NB: transitionary, de-mode-ing.
#[forbid(deprecated_mode)];
#[forbid(deprecated_pattern)];
/**
* The concurrency primitives you know and love.
*
* Maybe once we have a "core exports x only to std" mechanism, these can be
* in std.
*/
2012-08-29 16:45:25 -05:00
export Condvar, Semaphore, Mutex, mutex_with_condvars;
export RWlock, rwlock_with_condvars, RWlockReadMode, RWlockWriteMode;
2012-09-04 13:23:53 -05:00
use unsafe::{Exclusive, exclusive};
/****************************************************************************
* Internals
****************************************************************************/
// Each waiting task receives on one of these.
#[doc(hidden)]
2012-08-28 13:11:15 -05:00
type WaitEnd = pipes::PortOne<()>;
#[doc(hidden)]
2012-08-28 13:11:15 -05:00
type SignalEnd = pipes::ChanOne<()>;
// A doubly-ended queue of waiting tasks.
#[doc(hidden)]
2012-08-28 13:11:15 -05:00
struct Waitqueue { head: pipes::Port<SignalEnd>;
tail: pipes::Chan<SignalEnd>; }
2012-08-26 20:14:39 -05:00
fn new_waitqueue() -> Waitqueue {
2012-08-15 13:11:39 -05:00
let (block_tail, block_head) = pipes::stream();
2012-08-26 20:14:39 -05:00
Waitqueue { head: block_head, tail: block_tail }
2012-08-15 13:11:39 -05:00
}
// Signals one live task from the queue.
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
fn signal_waitqueue(q: &Waitqueue) -> bool {
// The peek is mandatory to make sure recv doesn't block.
if q.head.peek() {
// Pop and send a wakeup signal. If the waiter was killed, its port
// will have closed. Keep trying until we get a live task.
if pipes::try_send_one(q.head.recv(), ()) {
true
} else {
signal_waitqueue(q)
}
} else {
false
}
}
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
fn broadcast_waitqueue(q: &Waitqueue) -> uint {
let mut count = 0;
while q.head.peek() {
if pipes::try_send_one(q.head.recv(), ()) {
count += 1;
}
}
count
}
// The building-block used to make semaphores, mutexes, and rwlocks.
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
struct SemInner<Q> {
2012-08-09 21:31:05 -05:00
mut count: int;
2012-08-26 20:14:39 -05:00
waiters: Waitqueue;
// Can be either unit or another waitqueue. Some sems shouldn't come with
// a condition variable attached, others should.
2012-08-09 21:31:05 -05:00
blocked: Q;
}
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
enum Sem<Q: send> = Exclusive<SemInner<Q>>;
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
fn new_sem<Q: send>(count: int, +q: Q) -> Sem<Q> {
Sem(exclusive(SemInner {
2012-08-15 13:11:39 -05:00
mut count: count, waiters: new_waitqueue(), blocked: q }))
}
#[doc(hidden)]
2012-08-15 13:11:39 -05:00
fn new_sem_and_signal(count: int, num_condvars: uint)
2012-08-26 20:14:39 -05:00
-> Sem<~[mut Waitqueue]> {
2012-08-15 13:11:39 -05:00
let mut queues = ~[mut];
for num_condvars.times {
2012-08-15 13:11:39 -05:00
vec::push(queues, new_waitqueue());
}
new_sem(count, queues)
}
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
impl<Q: send> &Sem<Q> {
2012-08-07 17:42:33 -05:00
fn acquire() {
2012-08-20 14:23:37 -05:00
let mut waiter_nobe = None;
unsafe {
do (**self).with |state| {
state.count -= 1;
if state.count < 0 {
// Create waiter nobe.
let (signal_end, wait_end) = pipes::oneshot();
// Tell outer scope we need to block.
2012-08-20 14:23:37 -05:00
waiter_nobe = Some(wait_end);
// Enqueue ourself.
state.waiters.tail.send(signal_end);
}
}
}
2012-08-07 17:42:33 -05:00
// Uncomment if you wish to test for sem races. Not valgrind-friendly.
/* for 1000.times { task::yield(); } */
// Need to wait outside the exclusive.
if waiter_nobe.is_some() {
let _ = pipes::recv_one(option::unwrap(waiter_nobe));
}
}
2012-08-07 17:42:33 -05:00
fn release() {
unsafe {
do (**self).with |state| {
state.count += 1;
if state.count <= 0 {
signal_waitqueue(&state.waiters);
}
}
}
}
}
2012-08-26 20:14:39 -05:00
// FIXME(#3154) move both copies of this into Sem<Q>, and unify the 2 structs
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
impl &Sem<()> {
fn access<U>(blk: fn() -> U) -> U {
2012-08-20 14:23:37 -05:00
let mut release = None;
unsafe {
do task::unkillable {
self.acquire();
2012-08-26 20:14:39 -05:00
release = Some(SemRelease(self));
}
}
blk()
}
}
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
impl &Sem<~[mut Waitqueue]> {
fn access<U>(blk: fn() -> U) -> U {
2012-08-20 14:23:37 -05:00
let mut release = None;
unsafe {
do task::unkillable {
self.acquire();
2012-08-26 20:14:39 -05:00
release = Some(SemAndSignalRelease(self));
}
}
blk()
}
}
// FIXME(#3136) should go inside of access()
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
struct SemRelease {
sem: &Sem<()>;
2012-08-07 17:42:33 -05:00
drop { self.sem.release(); }
}
2012-09-04 19:22:09 -05:00
fn SemRelease(sem: &r/Sem<()>) -> SemRelease/&r {
SemRelease {
sem: sem
}
}
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
struct SemAndSignalRelease {
sem: &Sem<~[mut Waitqueue]>;
drop { self.sem.release(); }
}
2012-09-04 19:22:09 -05:00
fn SemAndSignalRelease(sem: &r/Sem<~[mut Waitqueue]>)
-> SemAndSignalRelease/&r {
SemAndSignalRelease {
sem: sem
}
}
/// A mechanism for atomic-unlock-and-deschedule blocking and signalling.
2012-08-26 20:14:39 -05:00
struct Condvar { priv sem: &Sem<~[mut Waitqueue]>; drop { } }
2012-08-26 20:14:39 -05:00
impl &Condvar {
/**
* Atomically drop the associated lock, and block until a signal is sent.
*
* # Failure
* A task which is killed (i.e., by linked failure with another task)
* while waiting on a condition variable will wake up, fail, and unlock
* the associated lock as it unwinds.
*/
fn wait() { self.wait_on(0) }
/**
* As wait(), but can specify which of multiple condition variables to
* wait on. Only a signal_on() or broadcast_on() with the same condvar_id
* will wake this thread.
*
* The associated lock must have been initialised with an appropriate
* number of condvars. The condvar_id must be between 0 and num_condvars-1
* or else this call will fail.
*
* wait() is equivalent to wait_on(0).
*/
fn wait_on(condvar_id: uint) {
// Create waiter nobe.
let (signal_end, wait_end) = pipes::oneshot();
2012-08-20 14:23:37 -05:00
let mut wait_end = Some(wait_end);
let mut signal_end = Some(signal_end);
let mut reacquire = None;
let mut out_of_bounds = None;
unsafe {
do task::unkillable {
// Release lock, 'atomically' enqueuing ourselves in so doing.
do (**self.sem).with |state| {
if condvar_id < vec::len(state.blocked) {
// Drop the lock.
state.count += 1;
if state.count <= 0 {
signal_waitqueue(&state.waiters);
}
// Enqueue ourself to be woken up by a signaller.
let signal_end = option::swap_unwrap(&mut signal_end);
state.blocked[condvar_id].tail.send(signal_end);
} else {
2012-08-20 14:23:37 -05:00
out_of_bounds = Some(vec::len(state.blocked));
}
}
// If yield checks start getting inserted anywhere, we can be
// killed before or after enqueueing. Deciding whether to
// unkillably reacquire the lock needs to happen atomically
// wrt enqueuing.
if out_of_bounds.is_none() {
2012-08-26 20:14:39 -05:00
reacquire = Some(SemAndSignalReacquire(self.sem));
}
}
}
do check_cvar_bounds(out_of_bounds, condvar_id, "cond.wait_on()") {
// Unconditionally "block". (Might not actually block if a
// signaller already sent -- I mean 'unconditionally' in contrast
// with acquire().)
let _ = pipes::recv_one(option::swap_unwrap(&mut wait_end));
}
2012-08-09 21:07:37 -05:00
// This is needed for a failing condition variable to reacquire the
// mutex during unwinding. As long as the wrapper (mutex, etc) is
// bounded in when it gets released, this shouldn't hang forever.
2012-08-26 20:14:39 -05:00
struct SemAndSignalReacquire {
sem: &Sem<~[mut Waitqueue]>;
2012-08-09 21:07:37 -05:00
drop unsafe {
// Needs to succeed, instead of itself dying.
do task::unkillable {
self.sem.acquire();
}
}
}
2012-09-04 19:22:09 -05:00
fn SemAndSignalReacquire(sem: &r/Sem<~[mut Waitqueue]>)
-> SemAndSignalReacquire/&r {
SemAndSignalReacquire {
sem: sem
}
}
}
/// Wake up a blocked task. Returns false if there was no blocked task.
fn signal() -> bool { self.signal_on(0) }
/// As signal, but with a specified condvar_id. See wait_on.
fn signal_on(condvar_id: uint) -> bool {
2012-08-20 14:23:37 -05:00
let mut out_of_bounds = None;
let mut result = false;
unsafe {
2012-08-09 21:31:05 -05:00
do (**self.sem).with |state| {
if condvar_id < vec::len(state.blocked) {
result = signal_waitqueue(&state.blocked[condvar_id]);
} else {
2012-08-20 14:23:37 -05:00
out_of_bounds = Some(vec::len(state.blocked));
}
}
}
do check_cvar_bounds(out_of_bounds, condvar_id, "cond.signal_on()") {
result
}
}
/// Wake up all blocked tasks. Returns the number of tasks woken.
fn broadcast() -> uint { self.broadcast_on(0) }
/// As broadcast, but with a specified condvar_id. See wait_on.
fn broadcast_on(condvar_id: uint) -> uint {
2012-08-20 14:23:37 -05:00
let mut out_of_bounds = None;
let mut queue = None;
unsafe {
2012-08-09 21:31:05 -05:00
do (**self.sem).with |state| {
if condvar_id < vec::len(state.blocked) {
2012-08-15 13:11:39 -05:00
// To avoid :broadcast_heavy, we make a new waitqueue,
// swap it out with the old one, and broadcast on the
// old one outside of the little-lock.
2012-08-20 14:23:37 -05:00
queue = Some(util::replace(&mut state.blocked[condvar_id],
2012-08-15 13:11:39 -05:00
new_waitqueue()));
} else {
2012-08-20 14:23:37 -05:00
out_of_bounds = Some(vec::len(state.blocked));
}
}
}
do check_cvar_bounds(out_of_bounds, condvar_id, "cond.signal_on()") {
2012-08-15 13:11:39 -05:00
let queue = option::swap_unwrap(&mut queue);
broadcast_waitqueue(&queue)
}
}
}
// Checks whether a condvar ID was out of bounds, and fails if so, or does
// something else next on success.
#[inline(always)]
#[doc(hidden)]
2012-08-20 14:23:37 -05:00
fn check_cvar_bounds<U>(out_of_bounds: Option<uint>, id: uint, act: &str,
blk: fn() -> U) -> U {
match out_of_bounds {
2012-08-20 14:23:37 -05:00
Some(0) =>
fail fmt!("%s with illegal ID %u - this lock has no condvars!",
act, id),
2012-08-20 14:23:37 -05:00
Some(length) =>
fail fmt!("%s with illegal ID %u - ID must be less than %u",
act, id, length),
2012-08-20 14:23:37 -05:00
None => blk()
}
}
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
impl &Sem<~[mut Waitqueue]> {
2012-08-13 14:22:32 -05:00
// The only other place that condvars get built is rwlock_write_mode.
2012-08-26 20:14:39 -05:00
fn access_cond<U>(blk: fn(c: &Condvar) -> U) -> U {
do self.access { blk(&Condvar { sem: self }) }
}
}
/****************************************************************************
* Semaphores
****************************************************************************/
/// A counting, blocking, bounded-waiting semaphore.
2012-08-26 20:14:39 -05:00
struct Semaphore { priv sem: Sem<()>; }
/// Create a new semaphore with the specified count.
2012-08-26 20:14:39 -05:00
fn semaphore(count: int) -> Semaphore {
Semaphore { sem: new_sem(count, ()) }
2012-08-09 21:31:05 -05:00
}
2012-08-26 20:14:39 -05:00
impl &Semaphore {
/// Create a new handle to the semaphore.
2012-08-26 20:14:39 -05:00
fn clone() -> Semaphore { Semaphore { sem: Sem((*self.sem).clone()) } }
/**
* Acquire a resource represented by the semaphore. Blocks if necessary
* until resource(s) become available.
*/
2012-08-09 21:31:05 -05:00
fn acquire() { (&self.sem).acquire() }
/**
* Release a held resource represented by the semaphore. Wakes a blocked
* contending task, if any exist. Won't block the caller.
*/
2012-08-09 21:31:05 -05:00
fn release() { (&self.sem).release() }
/// Run a function with ownership of one of the semaphore's resources.
2012-08-09 21:31:05 -05:00
fn access<U>(blk: fn() -> U) -> U { (&self.sem).access(blk) }
}
/****************************************************************************
* Mutexes
****************************************************************************/
/**
* A blocking, bounded-waiting, mutual exclusion lock with an associated
* FIFO condition variable.
*
* # Failure
* A task which fails while holding a mutex will unlock the mutex as it
* unwinds.
*/
2012-08-26 20:14:39 -05:00
struct Mutex { priv sem: Sem<~[mut Waitqueue]>; }
/// Create a new mutex, with one associated condvar.
2012-08-29 16:45:25 -05:00
fn Mutex() -> Mutex { mutex_with_condvars(1) }
/**
* Create a new mutex, with a specified number of associated condvars. This
* will allow calling wait_on/signal_on/broadcast_on with condvar IDs between
* 0 and num_condvars-1. (If num_condvars is 0, lock_cond will be allowed but
* any operations on the condvar will fail.)
*/
2012-08-26 20:14:39 -05:00
fn mutex_with_condvars(num_condvars: uint) -> Mutex {
Mutex { sem: new_sem_and_signal(1, num_condvars) }
}
2012-08-26 20:14:39 -05:00
impl &Mutex {
/// Create a new handle to the mutex.
2012-08-26 20:14:39 -05:00
fn clone() -> Mutex { Mutex { sem: Sem((*self.sem).clone()) } }
/// Run a function with ownership of the mutex.
2012-08-09 21:31:05 -05:00
fn lock<U>(blk: fn() -> U) -> U { (&self.sem).access(blk) }
/// Run a function with ownership of the mutex and a handle to a condvar.
2012-08-26 20:14:39 -05:00
fn lock_cond<U>(blk: fn(c: &Condvar) -> U) -> U {
2012-08-09 21:31:05 -05:00
(&self.sem).access_cond(blk)
}
}
/****************************************************************************
* Reader-writer locks
****************************************************************************/
// NB: Wikipedia - Readers-writers_problem#The_third_readers-writers_problem
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
struct RWlockInner {
read_mode: bool;
read_count: uint;
}
/**
* A blocking, no-starvation, reader-writer lock with an associated condvar.
*
* # Failure
* A task which fails while holding an rwlock will unlock the rwlock as it
* unwinds.
*/
2012-08-26 20:14:39 -05:00
struct RWlock {
/* priv */ order_lock: Semaphore;
/* priv */ access_lock: Sem<~[mut Waitqueue]>;
/* priv */ state: Exclusive<RWlockInner>;
}
/// Create a new rwlock, with one associated condvar.
2012-08-29 16:45:25 -05:00
fn RWlock() -> RWlock { rwlock_with_condvars(1) }
/**
* Create a new rwlock, with a specified number of associated condvars.
* Similar to mutex_with_condvars.
*/
2012-08-26 20:14:39 -05:00
fn rwlock_with_condvars(num_condvars: uint) -> RWlock {
RWlock { order_lock: semaphore(1),
access_lock: new_sem_and_signal(1, num_condvars),
2012-08-26 20:14:39 -05:00
state: exclusive(RWlockInner { read_mode: false,
read_count: 0 }) }
}
2012-08-26 20:14:39 -05:00
impl &RWlock {
2012-08-09 21:07:37 -05:00
/// Create a new handle to the rwlock.
2012-08-26 20:14:39 -05:00
fn clone() -> RWlock {
RWlock { order_lock: (&(self.order_lock)).clone(),
access_lock: Sem((*self.access_lock).clone()),
state: self.state.clone() }
}
/**
* Run a function with the rwlock in read mode. Calls to 'read' from other
* tasks may run concurrently with this one.
*/
fn read<U>(blk: fn() -> U) -> U {
2012-08-20 14:23:37 -05:00
let mut release = None;
2012-08-09 21:07:37 -05:00
unsafe {
do task::unkillable {
do (&self.order_lock).access {
let mut first_reader = false;
do self.state.with |state| {
first_reader = (state.read_count == 0);
state.read_count += 1;
}
if first_reader {
(&self.access_lock).acquire();
2012-08-13 14:22:32 -05:00
do self.state.with |state| {
// Must happen *after* getting access_lock. If
// this is set while readers are waiting, but
// while a writer holds the lock, the writer will
// be confused if they downgrade-then-unlock.
state.read_mode = true;
}
2012-08-09 21:07:37 -05:00
}
}
2012-08-26 20:14:39 -05:00
release = Some(RWlockReleaseRead(self));
}
}
2012-08-09 21:07:37 -05:00
blk()
}
/**
* Run a function with the rwlock in write mode. No calls to 'read' or
* 'write' from other tasks will run concurrently with this one.
*/
fn write<U>(blk: fn() -> U) -> U {
2012-08-09 21:07:37 -05:00
unsafe {
do task::unkillable {
(&self.order_lock).acquire();
do (&self.access_lock).access {
(&self.order_lock).release();
task::rekillable(blk)
}
2012-08-09 21:07:37 -05:00
}
}
}
/**
* As write(), but also with a handle to a condvar. Waiting on this
* condvar will allow readers and writers alike to take the rwlock before
* the waiting task is signalled. (Note: a writer that waited and then
* was signalled might reacquire the lock before other waiting writers.)
*/
2012-08-26 20:14:39 -05:00
fn write_cond<U>(blk: fn(c: &Condvar) -> U) -> U {
// NB: You might think I should thread the order_lock into the cond
// wait call, so that it gets waited on before access_lock gets
// reacquired upon being woken up. However, (a) this would be not
// pleasant to implement (and would mandate a new 'rw_cond' type) and
// (b) I think violating no-starvation in that case is appropriate.
unsafe {
do task::unkillable {
(&self.order_lock).acquire();
do (&self.access_lock).access_cond |cond| {
(&self.order_lock).release();
do task::rekillable { blk(cond) }
}
}
}
}
2012-08-13 14:22:32 -05:00
/**
* As write(), but with the ability to atomically 'downgrade' the lock;
* i.e., to become a reader without letting other writers get the lock in
* the meantime (such as unlocking and then re-locking as a reader would
* do). The block takes a "write mode token" argument, which can be
* transformed into a "read mode token" by calling downgrade(). Example:
* ~~~
* do lock.write_downgrade |write_mode| {
* do (&write_mode).write_cond |condvar| {
* ... exclusive access ...
2012-08-13 14:22:32 -05:00
* }
* let read_mode = lock.downgrade(write_mode);
* do (&read_mode).read {
* ... shared access ...
* }
* }
* ~~~
2012-08-13 14:22:32 -05:00
*/
2012-08-26 20:14:39 -05:00
fn write_downgrade<U>(blk: fn(+RWlockWriteMode) -> U) -> U {
2012-08-13 14:22:32 -05:00
// Implementation slightly different from the slicker 'write's above.
// The exit path is conditional on whether the caller downgrades.
2012-08-20 14:23:37 -05:00
let mut _release = None;
2012-08-13 14:22:32 -05:00
unsafe {
do task::unkillable {
(&self.order_lock).acquire();
(&self.access_lock).acquire();
(&self.order_lock).release();
}
2012-08-26 20:14:39 -05:00
_release = Some(RWlockReleaseDowngrade(self));
2012-08-13 14:22:32 -05:00
}
2012-08-26 20:14:39 -05:00
blk(RWlockWriteMode { lock: self })
2012-08-13 14:22:32 -05:00
}
/// To be called inside of the write_downgrade block.
2012-08-26 20:14:39 -05:00
fn downgrade(+token: RWlockWriteMode/&a) -> RWlockReadMode/&a {
2012-08-13 14:22:32 -05:00
if !ptr::ref_eq(self, token.lock) {
fail ~"Can't downgrade() with a different rwlock's write_mode!";
}
unsafe {
do task::unkillable {
let mut first_reader = false;
do self.state.with |state| {
assert !state.read_mode;
state.read_mode = true;
first_reader = (state.read_count == 0);
state.read_count += 1;
}
if !first_reader {
// Guaranteed not to let another writer in, because
// another reader was holding the order_lock. Hence they
// must be the one to get the access_lock (because all
// access_locks are acquired with order_lock held).
(&self.access_lock).release();
}
}
}
2012-08-26 20:14:39 -05:00
RWlockReadMode { lock: token.lock }
2012-08-13 14:22:32 -05:00
}
}
// FIXME(#3136) should go inside of read()
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
struct RWlockReleaseRead {
lock: &RWlock;
2012-08-09 21:07:37 -05:00
drop unsafe {
do task::unkillable {
let mut last_reader = false;
do self.lock.state.with |state| {
assert state.read_mode;
2012-08-13 14:22:32 -05:00
assert state.read_count > 0;
2012-08-09 21:07:37 -05:00
state.read_count -= 1;
2012-08-13 14:22:32 -05:00
if state.read_count == 0 {
last_reader = true;
state.read_mode = false;
}
2012-08-09 21:07:37 -05:00
}
if last_reader {
(&self.lock.access_lock).release();
}
}
}
}
2012-09-04 19:22:09 -05:00
fn RWlockReleaseRead(lock: &r/RWlock) -> RWlockReleaseRead/&r {
RWlockReleaseRead {
lock: lock
}
}
2012-08-13 14:22:32 -05:00
// FIXME(#3136) should go inside of downgrade()
#[doc(hidden)]
2012-08-26 20:14:39 -05:00
struct RWlockReleaseDowngrade {
lock: &RWlock;
2012-08-13 14:22:32 -05:00
drop unsafe {
do task::unkillable {
let mut writer_or_last_reader = false;
do self.lock.state.with |state| {
if state.read_mode {
assert state.read_count > 0;
state.read_count -= 1;
if state.read_count == 0 {
// Case 1: Writer downgraded & was the last reader
writer_or_last_reader = true;
state.read_mode = false;
} else {
// Case 2: Writer downgraded & was not the last reader
}
} else {
// Case 3: Writer did not downgrade
writer_or_last_reader = true;
}
}
if writer_or_last_reader {
(&self.lock.access_lock).release();
}
}
}
}
2012-09-04 19:22:09 -05:00
fn RWlockReleaseDowngrade(lock: &r/RWlock) -> RWlockReleaseDowngrade/&r {
RWlockReleaseDowngrade {
lock: lock
}
}
2012-08-13 14:22:32 -05:00
/// The "write permission" token used for rwlock.write_downgrade().
2012-08-26 20:14:39 -05:00
struct RWlockWriteMode { /* priv */ lock: &RWlock; drop { } }
2012-08-13 14:22:32 -05:00
/// The "read permission" token used for rwlock.write_downgrade().
2012-08-26 20:14:39 -05:00
struct RWlockReadMode { priv lock: &RWlock; drop { } }
2012-08-13 14:22:32 -05:00
2012-08-26 20:14:39 -05:00
impl &RWlockWriteMode {
2012-08-13 14:22:32 -05:00
/// Access the pre-downgrade rwlock in write mode.
fn write<U>(blk: fn() -> U) -> U { blk() }
/// Access the pre-downgrade rwlock in write mode with a condvar.
2012-08-26 20:14:39 -05:00
fn write_cond<U>(blk: fn(c: &Condvar) -> U) -> U {
blk(&Condvar { sem: &self.lock.access_lock })
2012-08-13 14:22:32 -05:00
}
}
2012-08-26 20:14:39 -05:00
impl &RWlockReadMode {
2012-08-13 14:22:32 -05:00
/// Access the post-downgrade rwlock in read mode.
fn read<U>(blk: fn() -> U) -> U { blk() }
}
/****************************************************************************
* Tests
****************************************************************************/
#[cfg(test)]
mod tests {
2012-08-09 21:07:37 -05:00
/************************************************************************
* Semaphore tests
************************************************************************/
#[test]
fn test_sem_acquire_release() {
2012-08-09 21:31:05 -05:00
let s = ~semaphore(1);
s.acquire();
s.release();
s.acquire();
}
#[test]
fn test_sem_basic() {
2012-08-09 21:31:05 -05:00
let s = ~semaphore(1);
do s.access { }
}
#[test]
fn test_sem_as_mutex() {
2012-08-09 21:31:05 -05:00
let s = ~semaphore(1);
let s2 = ~s.clone();
do task::spawn {
do s2.access {
for 5.times { task::yield(); }
}
}
do s.access {
for 5.times { task::yield(); }
}
}
#[test]
fn test_sem_as_cvar() {
/* Child waits and parent signals */
let (c,p) = pipes::stream();
2012-08-09 21:31:05 -05:00
let s = ~semaphore(0);
let s2 = ~s.clone();
do task::spawn {
2012-08-07 17:42:33 -05:00
s2.acquire();
c.send(());
}
for 5.times { task::yield(); }
2012-08-07 17:42:33 -05:00
s.release();
let _ = p.recv();
2012-08-07 17:20:02 -05:00
/* Parent waits and child signals */
let (c,p) = pipes::stream();
2012-08-09 21:31:05 -05:00
let s = ~semaphore(0);
let s2 = ~s.clone();
do task::spawn {
for 5.times { task::yield(); }
2012-08-07 17:42:33 -05:00
s2.release();
let _ = p.recv();
}
2012-08-07 17:42:33 -05:00
s.acquire();
c.send(());
}
#[test]
2012-08-07 17:42:33 -05:00
fn test_sem_multi_resource() {
// Parent and child both get in the critical section at the same
// time, and shake hands.
2012-08-09 21:31:05 -05:00
let s = ~semaphore(2);
2012-08-07 17:42:33 -05:00
let s2 = ~s.clone();
let (c1,p1) = pipes::stream();
let (c2,p2) = pipes::stream();
do task::spawn {
do s2.access {
let _ = p2.recv();
c1.send(());
}
}
do s.access {
c2.send(());
let _ = p1.recv();
}
}
#[test]
fn test_sem_runtime_friendly_blocking() {
2012-08-07 17:42:33 -05:00
// Force the runtime to schedule two threads on the same sched_loop.
// When one blocks, it should schedule the other one.
2012-08-15 16:10:46 -05:00
do task::spawn_sched(task::ManualThreads(1)) {
2012-08-09 21:31:05 -05:00
let s = ~semaphore(1);
let s2 = ~s.clone();
let (c,p) = pipes::stream();
2012-08-20 14:23:37 -05:00
let child_data = ~mut Some((s2,c));
do s.access {
let (s2,c) = option::swap_unwrap(child_data);
do task::spawn {
c.send(());
do s2.access { }
c.send(());
}
let _ = p.recv(); // wait for child to come alive
for 5.times { task::yield(); } // let the child contend
}
let _ = p.recv(); // wait for child to be done
}
}
2012-08-09 21:07:37 -05:00
/************************************************************************
* Mutex tests
************************************************************************/
#[test]
fn test_mutex_lock() {
// Unsafely achieve shared state, and do the textbook
// "load tmp <- ptr; inc tmp; store ptr <- tmp" dance.
let (c,p) = pipes::stream();
2012-08-29 16:45:25 -05:00
let m = ~Mutex();
let m2 = ~m.clone();
let sharedstate = ~0;
let ptr = ptr::addr_of(*sharedstate);
do task::spawn {
2012-08-13 14:22:32 -05:00
let sharedstate: &mut int =
2012-08-29 18:00:36 -05:00
unsafe { unsafe::reinterpret_cast(&ptr) };
access_shared(sharedstate, m2, 10);
c.send(());
2012-08-13 14:22:32 -05:00
}
access_shared(sharedstate, m, 10);
let _ = p.recv();
assert *sharedstate == 20;
2012-08-26 20:14:39 -05:00
fn access_shared(sharedstate: &mut int, m: &Mutex, n: uint) {
for n.times {
do m.lock {
let oldval = *sharedstate;
task::yield();
*sharedstate = oldval + 1;
}
}
}
}
#[test]
fn test_mutex_cond_wait() {
2012-08-29 16:45:25 -05:00
let m = ~Mutex();
// Child wakes up parent
do m.lock_cond |cond| {
let m2 = ~m.clone();
do task::spawn {
do m2.lock_cond |cond| {
let woken = cond.signal();
assert woken;
}
}
cond.wait();
}
// Parent wakes up child
let (chan,port) = pipes::stream();
let m3 = ~m.clone();
do task::spawn {
do m3.lock_cond |cond| {
chan.send(());
cond.wait();
chan.send(());
}
}
let _ = port.recv(); // Wait until child gets in the mutex
do m.lock_cond |cond| {
let woken = cond.signal();
assert woken;
}
let _ = port.recv(); // Wait until child wakes up
}
#[cfg(test)]
fn test_mutex_cond_broadcast_helper(num_waiters: uint) {
2012-08-29 16:45:25 -05:00
let m = ~Mutex();
let mut ports = ~[];
for num_waiters.times {
let mi = ~m.clone();
let (chan, port) = pipes::stream();
vec::push(ports, port);
do task::spawn {
do mi.lock_cond |cond| {
chan.send(());
cond.wait();
chan.send(());
}
}
}
// wait until all children get in the mutex
for ports.each |port| { let _ = port.recv(); }
do m.lock_cond |cond| {
let num_woken = cond.broadcast();
assert num_woken == num_waiters;
}
// wait until all children wake up
for ports.each |port| { let _ = port.recv(); }
}
#[test]
fn test_mutex_cond_broadcast() {
test_mutex_cond_broadcast_helper(12);
}
#[test]
fn test_mutex_cond_broadcast_none() {
test_mutex_cond_broadcast_helper(0);
}
#[test]
fn test_mutex_cond_no_waiter() {
2012-08-29 16:45:25 -05:00
let m = ~Mutex();
let m2 = ~m.clone();
do task::try {
do m.lock_cond |_x| { }
};
do m2.lock_cond |cond| {
assert !cond.signal();
}
}
#[test] #[ignore(cfg(windows))]
fn test_mutex_killed_simple() {
// Mutex must get automatically unlocked if failed/killed within.
2012-08-29 16:45:25 -05:00
let m = ~Mutex();
let m2 = ~m.clone();
2012-08-26 18:54:31 -05:00
let result: result::Result<(),()> = do task::try {
do m2.lock {
fail;
}
};
assert result.is_err();
// child task must have finished by the time try returns
do m.lock { }
}
#[test] #[ignore(cfg(windows))]
fn test_mutex_killed_cond() {
// Getting killed during cond wait must not corrupt the mutex while
// unwinding (e.g. double unlock).
2012-08-29 16:45:25 -05:00
let m = ~Mutex();
let m2 = ~m.clone();
2012-08-26 18:54:31 -05:00
let result: result::Result<(),()> = do task::try {
let (c,p) = pipes::stream();
do task::spawn { // linked
let _ = p.recv(); // wait for sibling to get in the mutex
task::yield();
fail;
}
do m2.lock_cond |cond| {
c.send(()); // tell sibling go ahead
cond.wait(); // block forever
}
};
assert result.is_err();
// child task must have finished by the time try returns
do m.lock_cond |cond| {
let woken = cond.signal();
assert !woken;
}
}
#[test] #[ignore(cfg(windows))]
fn test_mutex_killed_broadcast() {
2012-08-29 16:45:25 -05:00
let m = ~Mutex();
let m2 = ~m.clone();
let (c,p) = pipes::stream();
2012-08-26 18:54:31 -05:00
let result: result::Result<(),()> = do task::try {
let mut sibling_convos = ~[];
for 2.times {
let (c,p) = pipes::stream();
2012-08-20 14:23:37 -05:00
let c = ~mut Some(c);
vec::push(sibling_convos, p);
let mi = ~m2.clone();
// spawn sibling task
do task::spawn { // linked
do mi.lock_cond |cond| {
let c = option::swap_unwrap(c);
c.send(()); // tell sibling to go ahead
2012-08-26 20:14:39 -05:00
let _z = SendOnFailure(c);
cond.wait(); // block forever
}
}
}
for vec::each(sibling_convos) |p| {
let _ = p.recv(); // wait for sibling to get in the mutex
}
do m2.lock { }
c.send(sibling_convos); // let parent wait on all children
fail;
};
assert result.is_err();
// child task must have finished by the time try returns
for vec::each(p.recv()) |p| { p.recv(); } // wait on all its siblings
do m.lock_cond |cond| {
let woken = cond.broadcast();
assert woken == 0;
}
2012-08-26 20:14:39 -05:00
struct SendOnFailure {
2012-08-28 13:11:15 -05:00
c: pipes::Chan<()>;
drop { self.c.send(()); }
}
2012-09-04 19:22:09 -05:00
fn SendOnFailure(+c: pipes::Chan<()>) -> SendOnFailure {
SendOnFailure {
c: c
}
}
}
#[test]
fn test_mutex_cond_signal_on_0() {
// Tests that signal_on(0) is equivalent to signal().
2012-08-29 16:45:25 -05:00
let m = ~Mutex();
do m.lock_cond |cond| {
let m2 = ~m.clone();
do task::spawn {
do m2.lock_cond |cond| {
cond.signal_on(0);
}
}
cond.wait();
}
}
#[test] #[ignore(cfg(windows))]
fn test_mutex_different_conds() {
let result = do task::try {
let m = ~mutex_with_condvars(2);
let m2 = ~m.clone();
let (c,p) = pipes::stream();
do task::spawn {
do m2.lock_cond |cond| {
c.send(());
cond.wait_on(1);
}
}
let _ = p.recv();
do m.lock_cond |cond| {
if !cond.signal_on(0) {
fail; // success; punt sibling awake.
}
}
};
assert result.is_err();
}
#[test] #[ignore(cfg(windows))]
fn test_mutex_no_condvars() {
let result = do task::try {
let m = ~mutex_with_condvars(0);
do m.lock_cond |cond| { cond.wait(); }
};
assert result.is_err();
let result = do task::try {
let m = ~mutex_with_condvars(0);
do m.lock_cond |cond| { cond.signal(); }
};
assert result.is_err();
let result = do task::try {
let m = ~mutex_with_condvars(0);
do m.lock_cond |cond| { cond.broadcast(); }
};
assert result.is_err();
}
2012-08-09 21:07:37 -05:00
/************************************************************************
* Reader/writer lock tests
************************************************************************/
#[cfg(test)]
2012-08-26 20:14:39 -05:00
enum RWlockMode { Read, Write, Downgrade, DowngradeRead }
2012-08-13 14:22:32 -05:00
#[cfg(test)]
2012-08-26 20:14:39 -05:00
fn lock_rwlock_in_mode(x: &RWlock, mode: RWlockMode, blk: fn()) {
2012-08-13 14:22:32 -05:00
match mode {
2012-08-26 20:14:39 -05:00
Read => x.read(blk),
Write => x.write(blk),
Downgrade =>
do x.write_downgrade |mode| {
(&mode).write(blk);
},
2012-08-26 20:14:39 -05:00
DowngradeRead =>
do x.write_downgrade |mode| {
let mode = x.downgrade(mode);
(&mode).read(blk);
},
2012-08-13 14:22:32 -05:00
}
2012-08-09 21:07:37 -05:00
}
#[cfg(test)]
2012-08-26 20:14:39 -05:00
fn test_rwlock_exclusion(+x: ~RWlock, mode1: RWlockMode,
mode2: RWlockMode) {
// Test mutual exclusion between readers and writers. Just like the
// mutex mutual exclusion test, a ways above.
let (c,p) = pipes::stream();
2012-08-09 21:07:37 -05:00
let x2 = ~x.clone();
let sharedstate = ~0;
let ptr = ptr::addr_of(*sharedstate);
do task::spawn {
2012-08-13 14:22:32 -05:00
let sharedstate: &mut int =
2012-08-29 18:00:36 -05:00
unsafe { unsafe::reinterpret_cast(&ptr) };
2012-08-13 14:22:32 -05:00
access_shared(sharedstate, x2, mode1, 10);
c.send(());
}
2012-08-13 14:22:32 -05:00
access_shared(sharedstate, x, mode2, 10);
let _ = p.recv();
assert *sharedstate == 20;
2012-08-26 20:14:39 -05:00
fn access_shared(sharedstate: &mut int, x: &RWlock, mode: RWlockMode,
n: uint) {
for n.times {
2012-08-13 14:22:32 -05:00
do lock_rwlock_in_mode(x, mode) {
let oldval = *sharedstate;
task::yield();
*sharedstate = oldval + 1;
}
}
}
}
#[test]
fn test_rwlock_readers_wont_modify_the_data() {
2012-08-29 16:45:25 -05:00
test_rwlock_exclusion(~RWlock(), Read, Write);
test_rwlock_exclusion(~RWlock(), Write, Read);
test_rwlock_exclusion(~RWlock(), Read, Downgrade);
test_rwlock_exclusion(~RWlock(), Downgrade, Read);
}
#[test]
fn test_rwlock_writers_and_writers() {
2012-08-29 16:45:25 -05:00
test_rwlock_exclusion(~RWlock(), Write, Write);
test_rwlock_exclusion(~RWlock(), Write, Downgrade);
test_rwlock_exclusion(~RWlock(), Downgrade, Write);
test_rwlock_exclusion(~RWlock(), Downgrade, Downgrade);
}
2012-08-13 14:22:32 -05:00
#[cfg(test)]
2012-08-26 20:14:39 -05:00
fn test_rwlock_handshake(+x: ~RWlock, mode1: RWlockMode,
mode2: RWlockMode, make_mode2_go_first: bool) {
// Much like sem_multi_resource.
let x2 = ~x.clone();
let (c1,p1) = pipes::stream();
let (c2,p2) = pipes::stream();
do task::spawn {
2012-08-13 14:22:32 -05:00
if !make_mode2_go_first {
let _ = p2.recv(); // parent sends to us once it locks, or ...
}
do lock_rwlock_in_mode(x2, mode2) {
if make_mode2_go_first {
c1.send(()); // ... we send to it once we lock
}
let _ = p2.recv();
c1.send(());
}
}
2012-08-13 14:22:32 -05:00
if make_mode2_go_first {
let _ = p1.recv(); // child sends to us once it locks, or ...
}
do lock_rwlock_in_mode(x, mode1) {
if !make_mode2_go_first {
c2.send(()); // ... we send to it once we lock
}
c2.send(());
let _ = p1.recv();
}
2012-08-09 21:07:37 -05:00
}
#[test]
2012-08-13 14:22:32 -05:00
fn test_rwlock_readers_and_readers() {
2012-08-29 16:45:25 -05:00
test_rwlock_handshake(~RWlock(), Read, Read, false);
2012-08-13 14:22:32 -05:00
// The downgrader needs to get in before the reader gets in, otherwise
// they cannot end up reading at the same time.
2012-08-29 16:45:25 -05:00
test_rwlock_handshake(~RWlock(), DowngradeRead, Read, false);
test_rwlock_handshake(~RWlock(), Read, DowngradeRead, true);
2012-08-13 14:22:32 -05:00
// Two downgrade_reads can never both end up reading at the same time.
}
#[test]
2012-08-13 15:47:35 -05:00
fn test_rwlock_downgrade_unlock() {
// Tests that downgrade can unlock the lock in both modes
2012-08-29 16:45:25 -05:00
let x = ~RWlock();
2012-08-26 20:14:39 -05:00
do lock_rwlock_in_mode(x, Downgrade) { }
test_rwlock_handshake(x, Read, Read, false);
2012-08-29 16:45:25 -05:00
let y = ~RWlock();
2012-08-26 20:14:39 -05:00
do lock_rwlock_in_mode(y, DowngradeRead) { }
test_rwlock_exclusion(y, Write, Write);
2012-08-13 15:47:35 -05:00
}
#[test]
fn test_rwlock_read_recursive() {
2012-08-29 16:45:25 -05:00
let x = ~RWlock();
2012-08-13 15:47:35 -05:00
do x.read { do x.read { } }
}
#[test]
fn test_rwlock_cond_wait() {
// As test_mutex_cond_wait above.
2012-08-29 16:45:25 -05:00
let x = ~RWlock();
// Child wakes up parent
do x.write_cond |cond| {
let x2 = ~x.clone();
do task::spawn {
do x2.write_cond |cond| {
let woken = cond.signal();
assert woken;
}
}
cond.wait();
}
// Parent wakes up child
let (chan,port) = pipes::stream();
let x3 = ~x.clone();
do task::spawn {
do x3.write_cond |cond| {
chan.send(());
cond.wait();
chan.send(());
}
}
let _ = port.recv(); // Wait until child gets in the rwlock
do x.read { } // Must be able to get in as a reader in the meantime
do x.write_cond |cond| { // Or as another writer
let woken = cond.signal();
assert woken;
}
let _ = port.recv(); // Wait until child wakes up
do x.read { } // Just for good measure
}
2012-08-13 15:47:35 -05:00
#[cfg(test)]
fn test_rwlock_cond_broadcast_helper(num_waiters: uint, dg1: bool,
dg2: bool) {
// Much like the mutex broadcast test. Downgrade-enabled.
2012-08-26 20:14:39 -05:00
fn lock_cond(x: &RWlock, downgrade: bool, blk: fn(c: &Condvar)) {
2012-08-13 15:47:35 -05:00
if downgrade {
do x.write_downgrade |mode| {
(&mode).write_cond(blk)
}
2012-08-13 15:47:35 -05:00
} else {
x.write_cond(blk)
}
}
2012-08-29 16:45:25 -05:00
let x = ~RWlock();
2012-08-13 15:47:35 -05:00
let mut ports = ~[];
for num_waiters.times {
let xi = ~x.clone();
let (chan, port) = pipes::stream();
vec::push(ports, port);
do task::spawn {
do lock_cond(xi, dg1) |cond| {
chan.send(());
cond.wait();
chan.send(());
}
}
}
// wait until all children get in the mutex
for ports.each |port| { let _ = port.recv(); }
do lock_cond(x, dg2) |cond| {
let num_woken = cond.broadcast();
assert num_woken == num_waiters;
}
// wait until all children wake up
for ports.each |port| { let _ = port.recv(); }
}
#[test]
fn test_rwlock_cond_broadcast() {
test_rwlock_cond_broadcast_helper(0, true, true);
test_rwlock_cond_broadcast_helper(0, true, false);
test_rwlock_cond_broadcast_helper(0, false, true);
test_rwlock_cond_broadcast_helper(0, false, false);
test_rwlock_cond_broadcast_helper(12, true, true);
test_rwlock_cond_broadcast_helper(12, true, false);
test_rwlock_cond_broadcast_helper(12, false, true);
test_rwlock_cond_broadcast_helper(12, false, false);
}
2012-08-09 21:07:37 -05:00
#[cfg(test)] #[ignore(cfg(windows))]
2012-08-26 20:14:39 -05:00
fn rwlock_kill_helper(mode1: RWlockMode, mode2: RWlockMode) {
2012-08-09 21:07:37 -05:00
// Mutex must get automatically unlocked if failed/killed within.
2012-08-29 16:45:25 -05:00
let x = ~RWlock();
2012-08-09 21:07:37 -05:00
let x2 = ~x.clone();
2012-08-26 18:54:31 -05:00
let result: result::Result<(),()> = do task::try {
2012-08-13 14:22:32 -05:00
do lock_rwlock_in_mode(x2, mode1) {
2012-08-09 21:07:37 -05:00
fail;
}
};
assert result.is_err();
// child task must have finished by the time try returns
2012-08-13 14:22:32 -05:00
do lock_rwlock_in_mode(x, mode2) { }
}
2012-08-09 21:07:37 -05:00
#[test] #[ignore(cfg(windows))]
2012-08-26 20:14:39 -05:00
fn test_rwlock_reader_killed_writer() { rwlock_kill_helper(Read, Write); }
2012-08-09 21:07:37 -05:00
#[test] #[ignore(cfg(windows))]
2012-08-26 20:14:39 -05:00
fn test_rwlock_writer_killed_reader() { rwlock_kill_helper(Write,Read ); }
2012-08-09 21:07:37 -05:00
#[test] #[ignore(cfg(windows))]
2012-08-26 20:14:39 -05:00
fn test_rwlock_reader_killed_reader() { rwlock_kill_helper(Read, Read ); }
2012-08-09 21:07:37 -05:00
#[test] #[ignore(cfg(windows))]
2012-08-26 20:14:39 -05:00
fn test_rwlock_writer_killed_writer() { rwlock_kill_helper(Write,Write); }
2012-08-13 15:47:35 -05:00
#[test] #[ignore(cfg(windows))]
fn test_rwlock_kill_downgrader() {
2012-08-26 20:14:39 -05:00
rwlock_kill_helper(Downgrade, Read);
rwlock_kill_helper(Read, Downgrade);
rwlock_kill_helper(Downgrade, Write);
rwlock_kill_helper(Write, Downgrade);
rwlock_kill_helper(DowngradeRead, Read);
rwlock_kill_helper(Read, DowngradeRead);
rwlock_kill_helper(DowngradeRead, Write);
rwlock_kill_helper(Write, DowngradeRead);
rwlock_kill_helper(DowngradeRead, Downgrade);
rwlock_kill_helper(DowngradeRead, Downgrade);
rwlock_kill_helper(Downgrade, DowngradeRead);
rwlock_kill_helper(Downgrade, DowngradeRead);
2012-08-13 15:47:35 -05:00
}
2012-08-13 14:22:32 -05:00
#[test] #[should_fail] #[ignore(cfg(windows))]
fn test_rwlock_downgrade_cant_swap() {
// Tests that you can't downgrade with a different rwlock's token.
2012-08-29 16:45:25 -05:00
let x = ~RWlock();
let y = ~RWlock();
2012-08-13 14:22:32 -05:00
do x.write_downgrade |xwrite| {
2012-08-20 14:23:37 -05:00
let mut xopt = Some(xwrite);
2012-08-13 14:22:32 -05:00
do y.write_downgrade |_ywrite| {
y.downgrade(option::swap_unwrap(&mut xopt));
error!("oops, y.downgrade(x) should have failed!");
2012-08-13 14:22:32 -05:00
}
}
}
}