2013-05-30 05:16:33 -05:00
|
|
|
// Copyright 2012-2013 The Rust Project Developers. See the COPYRIGHT
|
2012-12-03 18:48:01 -06:00
|
|
|
// file at the top-level directory of this distribution and at
|
|
|
|
// http://rust-lang.org/COPYRIGHT.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
|
|
|
|
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
|
|
|
|
// option. This file may not be copied, modified, or distributed
|
|
|
|
// except according to those terms.
|
|
|
|
|
2012-09-19 19:29:54 -05:00
|
|
|
/*!
|
|
|
|
|
|
|
|
Task local data management
|
|
|
|
|
2013-07-12 03:38:44 -05:00
|
|
|
Allows storing arbitrary types inside task-local-storage (TLS), to be accessed
|
2013-07-14 03:43:31 -05:00
|
|
|
anywhere within a task, keyed by a global pointer parameterized over the type of
|
|
|
|
the TLS slot. Useful for dynamic variables, singletons, and interfacing with
|
|
|
|
foreign code with bad callback interfaces.
|
2012-09-19 19:29:54 -05:00
|
|
|
|
2013-09-13 01:26:06 -05:00
|
|
|
To declare a new key for storing local data of a particular type, use the
|
2013-12-14 23:26:09 -06:00
|
|
|
`local_data_key!` macro. This macro will expand to a `static` item appropriately
|
2013-09-13 01:26:06 -05:00
|
|
|
named and annotated. This name is then passed to the functions in this module to
|
|
|
|
modify/read the slot specified by the key.
|
2013-07-09 19:25:28 -05:00
|
|
|
|
2013-09-23 19:20:36 -05:00
|
|
|
```rust
|
2013-07-09 19:25:28 -05:00
|
|
|
use std::local_data;
|
|
|
|
|
2013-09-23 23:34:48 -05:00
|
|
|
local_data_key!(key_int: int)
|
|
|
|
local_data_key!(key_vector: ~[int])
|
2013-07-09 19:25:28 -05:00
|
|
|
|
2013-07-12 03:38:44 -05:00
|
|
|
local_data::set(key_int, 3);
|
2013-12-22 15:31:23 -06:00
|
|
|
local_data::get(key_int, |opt| assert_eq!(opt.map(|x| *x), Some(3)));
|
2013-07-09 19:25:28 -05:00
|
|
|
|
2013-07-12 03:38:44 -05:00
|
|
|
local_data::set(key_vector, ~[4]);
|
2013-12-22 15:31:23 -06:00
|
|
|
local_data::get(key_vector, |opt| assert_eq!(*opt.unwrap(), ~[4]));
|
2013-09-23 19:20:36 -05:00
|
|
|
```
|
2012-09-19 19:29:54 -05:00
|
|
|
|
|
|
|
*/
|
|
|
|
|
2013-09-13 01:26:06 -05:00
|
|
|
// Casting 'Arcane Sight' reveals an overwhelming aura of Transmutation
|
|
|
|
// magic.
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
use cast;
|
2014-02-06 18:00:49 -06:00
|
|
|
use option::{None, Option, Some};
|
|
|
|
use vec::{ImmutableVector, MutableVector, OwnedVector};
|
2014-02-02 18:32:52 -06:00
|
|
|
use iter::{Iterator};
|
2013-08-10 22:06:39 -05:00
|
|
|
use rt::task::{Task, LocalStorage};
|
2014-01-31 14:35:36 -06:00
|
|
|
use mem::replace;
|
2012-09-19 19:29:54 -05:00
|
|
|
|
|
|
|
/**
|
2013-07-14 03:43:31 -05:00
|
|
|
* Indexes a task-local data slot. This pointer is used for comparison to
|
|
|
|
* differentiate keys from one another. The actual type `T` is not used anywhere
|
|
|
|
* as a member of this type, except that it is parameterized with it to define
|
|
|
|
* the type of each key's value.
|
2012-09-19 19:29:54 -05:00
|
|
|
*
|
2013-07-14 03:43:31 -05:00
|
|
|
* The value of each Key is of the singleton enum KeyValue. These also have the
|
|
|
|
* same name as `Key` and their purpose is to take up space in the programs data
|
|
|
|
* sections to ensure that each value of the `Key` type points to a unique
|
|
|
|
* location.
|
2012-09-19 19:29:54 -05:00
|
|
|
*/
|
2013-07-14 03:43:31 -05:00
|
|
|
pub type Key<T> = &'static KeyValue<T>;
|
2012-09-19 19:29:54 -05:00
|
|
|
|
2013-10-02 01:26:45 -05:00
|
|
|
#[allow(missing_doc)]
|
2013-07-14 03:43:31 -05:00
|
|
|
pub enum KeyValue<T> { Key }
|
|
|
|
|
2013-12-31 14:40:10 -06:00
|
|
|
#[allow(missing_doc)]
|
2013-08-10 22:06:39 -05:00
|
|
|
trait LocalData {}
|
|
|
|
impl<T: 'static> LocalData for T {}
|
2013-07-21 23:06:29 -05:00
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
// The task-local-map stores all TLS information for the currently running task.
|
|
|
|
// It is stored as an owned pointer into the runtime, and it's only allocated
|
|
|
|
// when TLS is used for the first time. This map must be very carefully
|
|
|
|
// constructed because it has many mutable loans unsoundly handed out on it to
|
|
|
|
// the various invocations of TLS requests.
|
|
|
|
//
|
|
|
|
// One of the most important operations is loaning a value via `get` to a
|
|
|
|
// caller. In doing so, the slot that the TLS entry is occupying cannot be
|
2013-09-23 21:28:33 -05:00
|
|
|
// invalidated because upon returning its loan state must be updated. Currently
|
2013-08-10 22:06:39 -05:00
|
|
|
// the TLS map is a vector, but this is possibly dangerous because the vector
|
|
|
|
// can be reallocated/moved when new values are pushed onto it.
|
|
|
|
//
|
|
|
|
// This problem currently isn't solved in a very elegant way. Inside the `get`
|
|
|
|
// function, it internally "invalidates" all references after the loan is
|
|
|
|
// finished and looks up into the vector again. In theory this will prevent
|
|
|
|
// pointers from being moved under our feet so long as LLVM doesn't go too crazy
|
|
|
|
// with the optimizations.
|
|
|
|
//
|
|
|
|
// n.b. If TLS is used heavily in future, this could be made more efficient with
|
|
|
|
// a proper map.
|
|
|
|
#[doc(hidden)]
|
2013-12-12 15:27:26 -06:00
|
|
|
pub type Map = ~[Option<(*u8, TLSValue, LoanState)>];
|
2013-08-10 22:06:39 -05:00
|
|
|
type TLSValue = ~LocalData;
|
|
|
|
|
|
|
|
// Gets the map from the runtime. Lazily initialises if not done so already.
|
|
|
|
unsafe fn get_local_map() -> &mut Map {
|
|
|
|
use rt::local::Local;
|
|
|
|
|
|
|
|
let task: *mut Task = Local::unsafe_borrow();
|
|
|
|
match &mut (*task).storage {
|
|
|
|
// If the at_exit function is already set, then we just need to take
|
|
|
|
// a loan out on the TLS map stored inside
|
|
|
|
&LocalStorage(Some(ref mut map_ptr)) => {
|
|
|
|
return map_ptr;
|
|
|
|
}
|
|
|
|
// If this is the first time we've accessed TLS, perform similar
|
|
|
|
// actions to the oldsched way of doing things.
|
|
|
|
&LocalStorage(ref mut slot) => {
|
|
|
|
*slot = Some(~[]);
|
|
|
|
match *slot {
|
|
|
|
Some(ref mut map_ptr) => { return map_ptr }
|
|
|
|
None => abort()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-07-16 19:20:43 -05:00
|
|
|
}
|
2013-07-21 23:06:29 -05:00
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
#[deriving(Eq)]
|
|
|
|
enum LoanState {
|
|
|
|
NoLoan, ImmLoan, MutLoan
|
2013-07-11 00:14:40 -05:00
|
|
|
}
|
2013-07-21 23:06:29 -05:00
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
impl LoanState {
|
|
|
|
fn describe(&self) -> &'static str {
|
|
|
|
match *self {
|
|
|
|
NoLoan => "no loan",
|
|
|
|
ImmLoan => "immutable",
|
|
|
|
MutLoan => "mutable"
|
2013-07-02 14:47:32 -05:00
|
|
|
}
|
2013-07-11 00:14:40 -05:00
|
|
|
}
|
|
|
|
}
|
2012-09-19 19:29:54 -05:00
|
|
|
|
2013-12-12 15:27:26 -06:00
|
|
|
fn key_to_key_value<T: 'static>(key: Key<T>) -> *u8 {
|
2013-08-10 22:06:39 -05:00
|
|
|
unsafe { cast::transmute(key) }
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Removes a task-local value from task-local storage. This will return
|
|
|
|
/// Some(value) if the key was present in TLS, otherwise it will return None.
|
|
|
|
///
|
|
|
|
/// A runtime assertion will be triggered it removal of TLS value is attempted
|
|
|
|
/// while the value is still loaned out via `get` or `get_mut`.
|
|
|
|
pub fn pop<T: 'static>(key: Key<T>) -> Option<T> {
|
|
|
|
let map = unsafe { get_local_map() };
|
|
|
|
let key_value = key_to_key_value(key);
|
|
|
|
|
|
|
|
for entry in map.mut_iter() {
|
|
|
|
match *entry {
|
|
|
|
Some((k, _, loan)) if k == key_value => {
|
|
|
|
if loan != NoLoan {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("TLS value cannot be removed because it is currently \
|
2013-09-27 19:02:31 -05:00
|
|
|
borrowed as {}", loan.describe());
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
2014-01-31 14:35:36 -06:00
|
|
|
// Move the data out of the `entry` slot via prelude::replace.
|
2013-08-10 22:06:39 -05:00
|
|
|
// This is guaranteed to succeed because we already matched
|
|
|
|
// on `Some` above.
|
2013-12-12 15:27:26 -06:00
|
|
|
let data = match replace(entry, None) {
|
2013-08-10 22:06:39 -05:00
|
|
|
Some((_, data, _)) => data,
|
|
|
|
None => abort()
|
|
|
|
};
|
|
|
|
|
|
|
|
// Move `data` into transmute to get out the memory that it
|
|
|
|
// owns, we must free it manually later.
|
2013-12-11 19:04:50 -06:00
|
|
|
let (_vtable, alloc): (uint, ~T) = unsafe {
|
2013-08-10 22:06:39 -05:00
|
|
|
cast::transmute(data)
|
|
|
|
};
|
|
|
|
|
2013-12-11 19:04:50 -06:00
|
|
|
// Now that we own `alloc`, we can just move out of it as we
|
|
|
|
// would with any other data.
|
|
|
|
return Some(*alloc);
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
2012-09-19 19:29:54 -05:00
|
|
|
}
|
2013-08-10 22:06:39 -05:00
|
|
|
return None;
|
2012-09-19 19:29:54 -05:00
|
|
|
}
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
/// Retrieves a value from TLS. The closure provided is yielded `Some` of a
|
|
|
|
/// reference to the value located in TLS if one exists, or `None` if the key
|
|
|
|
/// provided is not present in TLS currently.
|
|
|
|
///
|
|
|
|
/// It is considered a runtime error to attempt to get a value which is already
|
|
|
|
/// on loan via the `get_mut` method provided.
|
2013-11-18 23:15:42 -06:00
|
|
|
pub fn get<T: 'static, U>(key: Key<T>, f: |Option<&T>| -> U) -> U {
|
2013-08-10 22:06:39 -05:00
|
|
|
get_with(key, ImmLoan, f)
|
2012-09-19 19:29:54 -05:00
|
|
|
}
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
/// Retrieves a mutable value from TLS. The closure provided is yielded `Some`
|
|
|
|
/// of a reference to the mutable value located in TLS if one exists, or `None`
|
|
|
|
/// if the key provided is not present in TLS currently.
|
|
|
|
///
|
|
|
|
/// It is considered a runtime error to attempt to get a value which is already
|
2014-01-11 18:25:51 -06:00
|
|
|
/// on loan via this or the `get` methods.
|
2013-11-18 23:15:42 -06:00
|
|
|
pub fn get_mut<T: 'static, U>(key: Key<T>, f: |Option<&mut T>| -> U) -> U {
|
2013-11-20 16:17:12 -06:00
|
|
|
get_with(key, MutLoan, |x| {
|
2013-08-10 22:06:39 -05:00
|
|
|
match x {
|
|
|
|
None => f(None),
|
|
|
|
// We're violating a lot of compiler guarantees with this
|
|
|
|
// invocation of `transmute_mut`, but we're doing runtime checks to
|
|
|
|
// ensure that it's always valid (only one at a time).
|
|
|
|
//
|
|
|
|
// there is no need to be upset!
|
|
|
|
Some(x) => { f(Some(unsafe { cast::transmute_mut(x) })) }
|
|
|
|
}
|
2013-11-20 16:17:12 -06:00
|
|
|
})
|
2012-09-19 19:29:54 -05:00
|
|
|
}
|
|
|
|
|
2013-11-18 23:15:42 -06:00
|
|
|
fn get_with<T:'static,
|
|
|
|
U>(
|
|
|
|
key: Key<T>,
|
|
|
|
state: LoanState,
|
|
|
|
f: |Option<&T>| -> U)
|
|
|
|
-> U {
|
2013-08-10 22:06:39 -05:00
|
|
|
// This function must be extremely careful. Because TLS can store owned
|
|
|
|
// values, and we must have some form of `get` function other than `pop`,
|
|
|
|
// this function has to give a `&` reference back to the caller.
|
|
|
|
//
|
|
|
|
// One option is to return the reference, but this cannot be sound because
|
|
|
|
// the actual lifetime of the object is not known. The slot in TLS could not
|
|
|
|
// be modified until the object goes out of scope, but the TLS code cannot
|
|
|
|
// know when this happens.
|
|
|
|
//
|
|
|
|
// For this reason, the reference is yielded to a specified closure. This
|
|
|
|
// way the TLS code knows exactly what the lifetime of the yielded pointer
|
|
|
|
// is, allowing callers to acquire references to owned data. This is also
|
|
|
|
// sound so long as measures are taken to ensure that while a TLS slot is
|
|
|
|
// loaned out to a caller, it's not modified recursively.
|
|
|
|
let map = unsafe { get_local_map() };
|
|
|
|
let key_value = key_to_key_value(key);
|
|
|
|
|
|
|
|
let pos = map.iter().position(|entry| {
|
|
|
|
match *entry {
|
|
|
|
Some((k, _, _)) if k == key_value => true, _ => false
|
2013-07-12 03:38:44 -05:00
|
|
|
}
|
|
|
|
});
|
2013-08-10 22:06:39 -05:00
|
|
|
match pos {
|
|
|
|
None => { return f(None); }
|
|
|
|
Some(i) => {
|
|
|
|
let ret;
|
|
|
|
let mut return_loan = false;
|
|
|
|
match map[i] {
|
|
|
|
Some((_, ref data, ref mut loan)) => {
|
|
|
|
match (state, *loan) {
|
|
|
|
(_, NoLoan) => {
|
|
|
|
*loan = state;
|
|
|
|
return_loan = true;
|
|
|
|
}
|
|
|
|
(ImmLoan, ImmLoan) => {}
|
|
|
|
(want, cur) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("TLS slot cannot be borrowed as {} because \
|
2013-09-27 19:02:31 -05:00
|
|
|
it is already borrowed as {}",
|
2013-08-10 22:06:39 -05:00
|
|
|
want.describe(), cur.describe());
|
|
|
|
}
|
|
|
|
}
|
2013-09-09 03:01:23 -05:00
|
|
|
// data was created with `~T as ~LocalData`, so we extract
|
|
|
|
// pointer part of the trait, (as ~T), and then use
|
2013-08-10 22:06:39 -05:00
|
|
|
// compiler coercions to achieve a '&' pointer.
|
|
|
|
unsafe {
|
2013-09-09 03:01:23 -05:00
|
|
|
match *cast::transmute::<&TLSValue, &(uint, ~T)>(data){
|
2013-12-11 19:04:50 -06:00
|
|
|
(_vtable, ref alloc) => {
|
|
|
|
let value: &T = *alloc;
|
2013-08-10 22:06:39 -05:00
|
|
|
ret = f(Some(value));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => abort()
|
|
|
|
}
|
|
|
|
|
|
|
|
// n.b. 'data' and 'loans' are both invalid pointers at the point
|
|
|
|
// 'f' returned because `f` could have appended more TLS items which
|
|
|
|
// in turn relocated the vector. Hence we do another lookup here to
|
|
|
|
// fixup the loans.
|
|
|
|
if return_loan {
|
|
|
|
match map[i] {
|
|
|
|
Some((_, _, ref mut loan)) => { *loan = NoLoan; }
|
|
|
|
None => abort()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
2013-07-12 03:38:44 -05:00
|
|
|
}
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
2012-09-19 19:29:54 -05:00
|
|
|
}
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
fn abort() -> ! {
|
2014-01-15 03:45:12 -06:00
|
|
|
use std::unstable::intrinsics;
|
|
|
|
unsafe { intrinsics::abort() }
|
2012-09-19 19:29:54 -05:00
|
|
|
}
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
/// Inserts a value into task local storage. If the key is already present in
|
|
|
|
/// TLS, then the previous value is removed and replaced with the provided data.
|
|
|
|
///
|
|
|
|
/// It is considered a runtime error to attempt to set a key which is currently
|
|
|
|
/// on loan via the `get` or `get_mut` methods.
|
|
|
|
pub fn set<T: 'static>(key: Key<T>, data: T) {
|
|
|
|
let map = unsafe { get_local_map() };
|
|
|
|
let keyval = key_to_key_value(key);
|
|
|
|
|
|
|
|
// When the task-local map is destroyed, all the data needs to be cleaned
|
|
|
|
// up. For this reason we can't do some clever tricks to store '~T' as a
|
|
|
|
// '*c_void' or something like that. To solve the problem, we cast
|
|
|
|
// everything to a trait (LocalData) which is then stored inside the map.
|
|
|
|
// Upon destruction of the map, all the objects will be destroyed and the
|
|
|
|
// traits have enough information about them to destroy themselves.
|
2013-09-09 03:01:23 -05:00
|
|
|
let data = ~data as ~LocalData:;
|
2013-08-10 22:06:39 -05:00
|
|
|
|
|
|
|
fn insertion_position(map: &mut Map,
|
2013-12-12 15:27:26 -06:00
|
|
|
key: *u8) -> Option<uint> {
|
2013-08-10 22:06:39 -05:00
|
|
|
// First see if the map contains this key already
|
|
|
|
let curspot = map.iter().position(|entry| {
|
|
|
|
match *entry {
|
|
|
|
Some((ekey, _, loan)) if key == ekey => {
|
|
|
|
if loan != NoLoan {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("TLS value cannot be overwritten because it is
|
2013-09-27 19:02:31 -05:00
|
|
|
already borrowed as {}", loan.describe())
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
|
|
|
true
|
|
|
|
}
|
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
});
|
|
|
|
// If it doesn't contain the key, just find a slot that's None
|
|
|
|
match curspot {
|
|
|
|
Some(i) => Some(i),
|
|
|
|
None => map.iter().position(|entry| entry.is_none())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// The type of the local data map must ascribe to Send, so we do the
|
|
|
|
// transmute here to add the Send bound back on. This doesn't actually
|
|
|
|
// matter because TLS will always own the data (until its moved out) and
|
|
|
|
// we're not actually sending it to other schedulers or anything.
|
|
|
|
let data: ~LocalData = unsafe { cast::transmute(data) };
|
|
|
|
match insertion_position(map, keyval) {
|
|
|
|
Some(i) => { map[i] = Some((keyval, data, NoLoan)); }
|
|
|
|
None => { map.push(Some((keyval, data, NoLoan))); }
|
2012-09-19 19:29:54 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
/// Modifies a task-local value by temporarily removing it from task-local
|
|
|
|
/// storage and then re-inserting if `Some` is returned from the closure.
|
|
|
|
///
|
|
|
|
/// This function will have the same runtime errors as generated from `pop` and
|
|
|
|
/// `set` (the key must not currently be on loan
|
2013-11-18 23:15:42 -06:00
|
|
|
pub fn modify<T: 'static>(key: Key<T>, f: |Option<T>| -> Option<T>) {
|
2013-08-10 22:06:39 -05:00
|
|
|
match f(pop(key)) {
|
|
|
|
Some(next) => { set(key, next); }
|
|
|
|
None => {}
|
2012-09-19 19:29:54 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use prelude::*;
|
|
|
|
use super::*;
|
|
|
|
use task;
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_tls_multitask() {
|
2013-12-21 19:50:54 -06:00
|
|
|
static my_key: Key<~str> = &Key;
|
|
|
|
set(my_key, ~"parent data");
|
2014-01-26 21:42:26 -06:00
|
|
|
task::spawn(proc() {
|
2013-08-10 22:06:39 -05:00
|
|
|
// TLS shouldn't carry over.
|
2013-12-21 19:50:54 -06:00
|
|
|
assert!(get(my_key, |k| k.map(|k| (*k).clone())).is_none());
|
|
|
|
set(my_key, ~"child data");
|
|
|
|
assert!(get(my_key, |k| k.map(|k| (*k).clone())).unwrap() ==
|
2013-08-10 22:06:39 -05:00
|
|
|
~"child data");
|
|
|
|
// should be cleaned up for us
|
2014-01-26 21:42:26 -06:00
|
|
|
});
|
2013-08-10 22:06:39 -05:00
|
|
|
// Must work multiple times
|
2013-12-21 19:50:54 -06:00
|
|
|
assert!(get(my_key, |k| k.map(|k| (*k).clone())).unwrap() == ~"parent data");
|
|
|
|
assert!(get(my_key, |k| k.map(|k| (*k).clone())).unwrap() == ~"parent data");
|
|
|
|
assert!(get(my_key, |k| k.map(|k| (*k).clone())).unwrap() == ~"parent data");
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_tls_overwrite() {
|
2013-12-21 19:50:54 -06:00
|
|
|
static my_key: Key<~str> = &Key;
|
|
|
|
set(my_key, ~"first data");
|
|
|
|
set(my_key, ~"next data"); // Shouldn't leak.
|
|
|
|
assert!(get(my_key, |k| k.map(|k| (*k).clone())).unwrap() == ~"next data");
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_tls_pop() {
|
2013-12-21 19:50:54 -06:00
|
|
|
static my_key: Key<~str> = &Key;
|
|
|
|
set(my_key, ~"weasel");
|
|
|
|
assert!(pop(my_key).unwrap() == ~"weasel");
|
2013-08-10 22:06:39 -05:00
|
|
|
// Pop must remove the data from the map.
|
|
|
|
assert!(pop(my_key).is_none());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_tls_modify() {
|
2013-12-21 19:50:54 -06:00
|
|
|
static my_key: Key<~str> = &Key;
|
2013-08-10 22:06:39 -05:00
|
|
|
modify(my_key, |data| {
|
|
|
|
match data {
|
2013-12-21 19:50:54 -06:00
|
|
|
Some(ref val) => fail!("unwelcome value: {}", *val),
|
|
|
|
None => Some(~"first data")
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
|
|
|
});
|
|
|
|
modify(my_key, |data| {
|
|
|
|
match data {
|
2013-12-21 19:50:54 -06:00
|
|
|
Some(~"first data") => Some(~"next data"),
|
|
|
|
Some(ref val) => fail!("wrong value: {}", *val),
|
2013-10-21 15:08:31 -05:00
|
|
|
None => fail!("missing value")
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
|
|
|
});
|
2013-12-21 19:50:54 -06:00
|
|
|
assert!(pop(my_key).unwrap() == ~"next data");
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_tls_crust_automorestack_memorial_bug() {
|
|
|
|
// This might result in a stack-canary clobber if the runtime fails to
|
|
|
|
// set sp_limit to 0 when calling the cleanup extern - it might
|
|
|
|
// automatically jump over to the rust stack, which causes next_c_sp
|
|
|
|
// to get recorded as something within a rust stack segment. Then a
|
|
|
|
// subsequent upcall (esp. for logging, think vsnprintf) would run on
|
|
|
|
// a stack smaller than 1 MB.
|
2013-12-21 19:50:54 -06:00
|
|
|
static my_key: Key<~str> = &Key;
|
2014-01-26 21:42:26 -06:00
|
|
|
task::spawn(proc() {
|
2013-12-21 19:50:54 -06:00
|
|
|
set(my_key, ~"hax");
|
2014-01-26 21:42:26 -06:00
|
|
|
});
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_tls_multiple_types() {
|
2013-12-21 19:50:54 -06:00
|
|
|
static str_key: Key<~str> = &Key;
|
|
|
|
static box_key: Key<@()> = &Key;
|
|
|
|
static int_key: Key<int> = &Key;
|
2014-01-26 21:42:26 -06:00
|
|
|
task::spawn(proc() {
|
2013-12-21 19:50:54 -06:00
|
|
|
set(str_key, ~"string data");
|
|
|
|
set(box_key, @());
|
|
|
|
set(int_key, 42);
|
2014-01-26 21:42:26 -06:00
|
|
|
});
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2013-12-12 23:38:57 -06:00
|
|
|
#[allow(dead_code)]
|
2013-08-10 22:06:39 -05:00
|
|
|
fn test_tls_overwrite_multiple_types() {
|
2013-12-21 19:50:54 -06:00
|
|
|
static str_key: Key<~str> = &Key;
|
|
|
|
static box_key: Key<@()> = &Key;
|
|
|
|
static int_key: Key<int> = &Key;
|
2014-01-26 21:42:26 -06:00
|
|
|
task::spawn(proc() {
|
2013-12-21 19:50:54 -06:00
|
|
|
set(str_key, ~"string data");
|
|
|
|
set(str_key, ~"string data 2");
|
|
|
|
set(box_key, @());
|
|
|
|
set(box_key, @());
|
|
|
|
set(int_key, 42);
|
2013-08-10 22:06:39 -05:00
|
|
|
// This could cause a segfault if overwriting-destruction is done
|
|
|
|
// with the crazy polymorphic transmute rather than the provided
|
|
|
|
// finaliser.
|
2013-12-21 19:50:54 -06:00
|
|
|
set(int_key, 31337);
|
2014-01-26 21:42:26 -06:00
|
|
|
});
|
2013-08-10 22:06:39 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
#[should_fail]
|
|
|
|
fn test_tls_cleanup_on_failure() {
|
2013-12-21 19:50:54 -06:00
|
|
|
static str_key: Key<~str> = &Key;
|
|
|
|
static box_key: Key<@()> = &Key;
|
|
|
|
static int_key: Key<int> = &Key;
|
|
|
|
set(str_key, ~"parent data");
|
|
|
|
set(box_key, @());
|
2014-01-26 21:42:26 -06:00
|
|
|
task::spawn(proc() {
|
2013-08-10 22:06:39 -05:00
|
|
|
// spawn_linked
|
2013-12-21 19:50:54 -06:00
|
|
|
set(str_key, ~"string data");
|
|
|
|
set(box_key, @());
|
|
|
|
set(int_key, 42);
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!();
|
2014-01-26 21:42:26 -06:00
|
|
|
});
|
2013-08-10 22:06:39 -05:00
|
|
|
// Not quite nondeterministic.
|
2013-12-21 19:50:54 -06:00
|
|
|
set(int_key, 31337);
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!();
|
2012-09-19 19:29:54 -05:00
|
|
|
}
|
2013-05-07 15:53:25 -05:00
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
#[test]
|
|
|
|
fn test_static_pointer() {
|
2013-12-21 19:50:54 -06:00
|
|
|
static key: Key<&'static int> = &Key;
|
2013-08-10 22:06:39 -05:00
|
|
|
static VALUE: int = 0;
|
2013-12-21 19:50:54 -06:00
|
|
|
let v: &'static int = &VALUE;
|
2013-08-10 22:06:39 -05:00
|
|
|
set(key, v);
|
|
|
|
}
|
2013-07-11 02:19:23 -05:00
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
#[test]
|
|
|
|
fn test_owned() {
|
|
|
|
static key: Key<~int> = &Key;
|
|
|
|
set(key, ~1);
|
2013-07-16 19:20:43 -05:00
|
|
|
|
2013-11-21 19:23:21 -06:00
|
|
|
get(key, |v| {
|
|
|
|
get(key, |v| {
|
|
|
|
get(key, |v| {
|
2013-08-10 22:06:39 -05:00
|
|
|
assert_eq!(**v.unwrap(), 1);
|
2013-11-21 19:23:21 -06:00
|
|
|
});
|
2013-07-16 19:20:43 -05:00
|
|
|
assert_eq!(**v.unwrap(), 1);
|
2013-11-21 19:23:21 -06:00
|
|
|
});
|
2013-07-16 19:20:43 -05:00
|
|
|
assert_eq!(**v.unwrap(), 1);
|
2013-11-21 19:23:21 -06:00
|
|
|
});
|
2013-08-10 22:06:39 -05:00
|
|
|
set(key, ~2);
|
2013-11-21 19:23:21 -06:00
|
|
|
get(key, |v| {
|
2013-08-10 22:06:39 -05:00
|
|
|
assert_eq!(**v.unwrap(), 2);
|
2013-11-21 19:23:21 -06:00
|
|
|
})
|
2013-07-16 19:20:43 -05:00
|
|
|
}
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
#[test]
|
|
|
|
fn test_get_mut() {
|
|
|
|
static key: Key<int> = &Key;
|
|
|
|
set(key, 1);
|
2013-07-16 19:20:43 -05:00
|
|
|
|
2013-11-21 19:23:21 -06:00
|
|
|
get_mut(key, |v| {
|
2013-08-10 22:06:39 -05:00
|
|
|
*v.unwrap() = 2;
|
2013-11-21 19:23:21 -06:00
|
|
|
});
|
2013-07-16 19:20:43 -05:00
|
|
|
|
2013-11-21 19:23:21 -06:00
|
|
|
get(key, |v| {
|
2013-08-10 22:06:39 -05:00
|
|
|
assert_eq!(*v.unwrap(), 2);
|
2013-11-21 19:23:21 -06:00
|
|
|
})
|
2013-07-16 19:20:43 -05:00
|
|
|
}
|
2013-07-12 03:38:44 -05:00
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
#[test]
|
|
|
|
fn test_same_key_type() {
|
|
|
|
static key1: Key<int> = &Key;
|
|
|
|
static key2: Key<int> = &Key;
|
|
|
|
static key3: Key<int> = &Key;
|
|
|
|
static key4: Key<int> = &Key;
|
|
|
|
static key5: Key<int> = &Key;
|
|
|
|
set(key1, 1);
|
|
|
|
set(key2, 2);
|
|
|
|
set(key3, 3);
|
|
|
|
set(key4, 4);
|
|
|
|
set(key5, 5);
|
|
|
|
|
|
|
|
get(key1, |x| assert_eq!(*x.unwrap(), 1));
|
|
|
|
get(key2, |x| assert_eq!(*x.unwrap(), 2));
|
|
|
|
get(key3, |x| assert_eq!(*x.unwrap(), 3));
|
|
|
|
get(key4, |x| assert_eq!(*x.unwrap(), 4));
|
|
|
|
get(key5, |x| assert_eq!(*x.unwrap(), 5));
|
|
|
|
}
|
2013-07-16 19:20:43 -05:00
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
#[test]
|
|
|
|
#[should_fail]
|
|
|
|
fn test_nested_get_set1() {
|
|
|
|
static key: Key<int> = &Key;
|
2013-07-16 19:20:43 -05:00
|
|
|
set(key, 4);
|
2013-11-21 19:23:21 -06:00
|
|
|
get(key, |_| {
|
2013-08-10 22:06:39 -05:00
|
|
|
set(key, 4);
|
2013-11-21 19:23:21 -06:00
|
|
|
})
|
2013-07-16 19:20:43 -05:00
|
|
|
}
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
#[test]
|
|
|
|
#[should_fail]
|
|
|
|
fn test_nested_get_mut2() {
|
|
|
|
static key: Key<int> = &Key;
|
|
|
|
set(key, 4);
|
2013-11-21 19:23:21 -06:00
|
|
|
get(key, |_| {
|
2013-08-10 22:06:39 -05:00
|
|
|
get_mut(key, |_| {})
|
2013-11-21 19:23:21 -06:00
|
|
|
})
|
2013-07-16 19:20:43 -05:00
|
|
|
}
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
#[test]
|
|
|
|
#[should_fail]
|
|
|
|
fn test_nested_get_mut3() {
|
|
|
|
static key: Key<int> = &Key;
|
|
|
|
set(key, 4);
|
2013-11-21 19:23:21 -06:00
|
|
|
get_mut(key, |_| {
|
2013-08-10 22:06:39 -05:00
|
|
|
get(key, |_| {})
|
2013-11-21 19:23:21 -06:00
|
|
|
})
|
2013-07-16 19:20:43 -05:00
|
|
|
}
|
|
|
|
|
2013-08-10 22:06:39 -05:00
|
|
|
#[test]
|
|
|
|
#[should_fail]
|
|
|
|
fn test_nested_get_mut4() {
|
|
|
|
static key: Key<int> = &Key;
|
|
|
|
set(key, 4);
|
2013-11-21 19:23:21 -06:00
|
|
|
get_mut(key, |_| {
|
2013-08-10 22:06:39 -05:00
|
|
|
get_mut(key, |_| {})
|
2013-11-21 19:23:21 -06:00
|
|
|
})
|
2013-07-16 19:20:43 -05:00
|
|
|
}
|
|
|
|
}
|