// Copyright 2012-2013 The Rust Project Developers. See the COPYRIGHT // file at the top-level directory of this distribution and at // http://rust-lang.org/COPYRIGHT. // // Licensed under the Apache License, Version 2.0 or the MIT license // , at your // option. This file may not be copied, modified, or distributed // except according to those terms. /*! Task local data management Allows storing arbitrary types inside task-local-storage (TLS), to be accessed anywhere within a task, keyed by a global pointer parameterized over the type of the TLS slot. Useful for dynamic variables, singletons, and interfacing with foreign code with bad callback interfaces. To declare a new key for storing local data of a particular type, use the `local_data_key!` macro. This macro will expand to a `static` item appropriately named and annotated. This name is then passed to the functions in this module to modify/read the slot specified by the key. ```rust use std::local_data; local_data_key!(key_int: int) local_data_key!(key_vector: ~[int]) local_data::set(key_int, 3); local_data::get(key_int, |opt| assert_eq!(opt.map(|x| *x), Some(3))); local_data::set(key_vector, ~[4]); local_data::get(key_vector, |opt| assert_eq!(*opt.unwrap(), ~[4])); ``` */ // Casting 'Arcane Sight' reveals an overwhelming aura of Transmutation // magic. use cast; use option::{None, Option, Some}; use vec::{ImmutableVector, MutableVector, OwnedVector}; use iter::{Iterator}; use rt::task::{Task, LocalStorage}; use util::replace; /** * Indexes a task-local data slot. This pointer is used for comparison to * differentiate keys from one another. The actual type `T` is not used anywhere * as a member of this type, except that it is parameterized with it to define * the type of each key's value. * * The value of each Key is of the singleton enum KeyValue. These also have the * same name as `Key` and their purpose is to take up space in the programs data * sections to ensure that each value of the `Key` type points to a unique * location. */ pub type Key = &'static KeyValue; #[allow(missing_doc)] pub enum KeyValue { Key } #[allow(missing_doc)] trait LocalData {} impl LocalData for T {} // The task-local-map stores all TLS information for the currently running task. // It is stored as an owned pointer into the runtime, and it's only allocated // when TLS is used for the first time. This map must be very carefully // constructed because it has many mutable loans unsoundly handed out on it to // the various invocations of TLS requests. // // One of the most important operations is loaning a value via `get` to a // caller. In doing so, the slot that the TLS entry is occupying cannot be // invalidated because upon returning its loan state must be updated. Currently // the TLS map is a vector, but this is possibly dangerous because the vector // can be reallocated/moved when new values are pushed onto it. // // This problem currently isn't solved in a very elegant way. Inside the `get` // function, it internally "invalidates" all references after the loan is // finished and looks up into the vector again. In theory this will prevent // pointers from being moved under our feet so long as LLVM doesn't go too crazy // with the optimizations. // // n.b. If TLS is used heavily in future, this could be made more efficient with // a proper map. #[doc(hidden)] pub type Map = ~[Option<(*u8, TLSValue, LoanState)>]; type TLSValue = ~LocalData; // Gets the map from the runtime. Lazily initialises if not done so already. unsafe fn get_local_map() -> &mut Map { use rt::local::Local; let task: *mut Task = Local::unsafe_borrow(); match &mut (*task).storage { // If the at_exit function is already set, then we just need to take // a loan out on the TLS map stored inside &LocalStorage(Some(ref mut map_ptr)) => { return map_ptr; } // If this is the first time we've accessed TLS, perform similar // actions to the oldsched way of doing things. &LocalStorage(ref mut slot) => { *slot = Some(~[]); match *slot { Some(ref mut map_ptr) => { return map_ptr } None => abort() } } } } #[deriving(Eq)] enum LoanState { NoLoan, ImmLoan, MutLoan } impl LoanState { fn describe(&self) -> &'static str { match *self { NoLoan => "no loan", ImmLoan => "immutable", MutLoan => "mutable" } } } fn key_to_key_value(key: Key) -> *u8 { unsafe { cast::transmute(key) } } /// Removes a task-local value from task-local storage. This will return /// Some(value) if the key was present in TLS, otherwise it will return None. /// /// A runtime assertion will be triggered it removal of TLS value is attempted /// while the value is still loaned out via `get` or `get_mut`. pub fn pop(key: Key) -> Option { let map = unsafe { get_local_map() }; let key_value = key_to_key_value(key); for entry in map.mut_iter() { match *entry { Some((k, _, loan)) if k == key_value => { if loan != NoLoan { fail!("TLS value cannot be removed because it is currently \ borrowed as {}", loan.describe()); } // Move the data out of the `entry` slot via util::replace. // This is guaranteed to succeed because we already matched // on `Some` above. let data = match replace(entry, None) { Some((_, data, _)) => data, None => abort() }; // Move `data` into transmute to get out the memory that it // owns, we must free it manually later. let (_vtable, alloc): (uint, ~T) = unsafe { cast::transmute(data) }; // Now that we own `alloc`, we can just move out of it as we // would with any other data. return Some(*alloc); } _ => {} } } return None; } /// Retrieves a value from TLS. The closure provided is yielded `Some` of a /// reference to the value located in TLS if one exists, or `None` if the key /// provided is not present in TLS currently. /// /// It is considered a runtime error to attempt to get a value which is already /// on loan via the `get_mut` method provided. pub fn get(key: Key, f: |Option<&T>| -> U) -> U { get_with(key, ImmLoan, f) } /// Retrieves a mutable value from TLS. The closure provided is yielded `Some` /// of a reference to the mutable value located in TLS if one exists, or `None` /// if the key provided is not present in TLS currently. /// /// It is considered a runtime error to attempt to get a value which is already /// on loan via this or the `get` methods. pub fn get_mut(key: Key, f: |Option<&mut T>| -> U) -> U { get_with(key, MutLoan, |x| { match x { None => f(None), // We're violating a lot of compiler guarantees with this // invocation of `transmute_mut`, but we're doing runtime checks to // ensure that it's always valid (only one at a time). // // there is no need to be upset! Some(x) => { f(Some(unsafe { cast::transmute_mut(x) })) } } }) } fn get_with( key: Key, state: LoanState, f: |Option<&T>| -> U) -> U { // This function must be extremely careful. Because TLS can store owned // values, and we must have some form of `get` function other than `pop`, // this function has to give a `&` reference back to the caller. // // One option is to return the reference, but this cannot be sound because // the actual lifetime of the object is not known. The slot in TLS could not // be modified until the object goes out of scope, but the TLS code cannot // know when this happens. // // For this reason, the reference is yielded to a specified closure. This // way the TLS code knows exactly what the lifetime of the yielded pointer // is, allowing callers to acquire references to owned data. This is also // sound so long as measures are taken to ensure that while a TLS slot is // loaned out to a caller, it's not modified recursively. let map = unsafe { get_local_map() }; let key_value = key_to_key_value(key); let pos = map.iter().position(|entry| { match *entry { Some((k, _, _)) if k == key_value => true, _ => false } }); match pos { None => { return f(None); } Some(i) => { let ret; let mut return_loan = false; match map[i] { Some((_, ref data, ref mut loan)) => { match (state, *loan) { (_, NoLoan) => { *loan = state; return_loan = true; } (ImmLoan, ImmLoan) => {} (want, cur) => { fail!("TLS slot cannot be borrowed as {} because \ it is already borrowed as {}", want.describe(), cur.describe()); } } // data was created with `~T as ~LocalData`, so we extract // pointer part of the trait, (as ~T), and then use // compiler coercions to achieve a '&' pointer. unsafe { match *cast::transmute::<&TLSValue, &(uint, ~T)>(data){ (_vtable, ref alloc) => { let value: &T = *alloc; ret = f(Some(value)); } } } } _ => abort() } // n.b. 'data' and 'loans' are both invalid pointers at the point // 'f' returned because `f` could have appended more TLS items which // in turn relocated the vector. Hence we do another lookup here to // fixup the loans. if return_loan { match map[i] { Some((_, _, ref mut loan)) => { *loan = NoLoan; } None => abort() } } return ret; } } } fn abort() -> ! { use std::unstable::intrinsics; unsafe { intrinsics::abort() } } /// Inserts a value into task local storage. If the key is already present in /// TLS, then the previous value is removed and replaced with the provided data. /// /// It is considered a runtime error to attempt to set a key which is currently /// on loan via the `get` or `get_mut` methods. pub fn set(key: Key, data: T) { let map = unsafe { get_local_map() }; let keyval = key_to_key_value(key); // When the task-local map is destroyed, all the data needs to be cleaned // up. For this reason we can't do some clever tricks to store '~T' as a // '*c_void' or something like that. To solve the problem, we cast // everything to a trait (LocalData) which is then stored inside the map. // Upon destruction of the map, all the objects will be destroyed and the // traits have enough information about them to destroy themselves. let data = ~data as ~LocalData:; fn insertion_position(map: &mut Map, key: *u8) -> Option { // First see if the map contains this key already let curspot = map.iter().position(|entry| { match *entry { Some((ekey, _, loan)) if key == ekey => { if loan != NoLoan { fail!("TLS value cannot be overwritten because it is already borrowed as {}", loan.describe()) } true } _ => false, } }); // If it doesn't contain the key, just find a slot that's None match curspot { Some(i) => Some(i), None => map.iter().position(|entry| entry.is_none()) } } // The type of the local data map must ascribe to Send, so we do the // transmute here to add the Send bound back on. This doesn't actually // matter because TLS will always own the data (until its moved out) and // we're not actually sending it to other schedulers or anything. let data: ~LocalData = unsafe { cast::transmute(data) }; match insertion_position(map, keyval) { Some(i) => { map[i] = Some((keyval, data, NoLoan)); } None => { map.push(Some((keyval, data, NoLoan))); } } } /// Modifies a task-local value by temporarily removing it from task-local /// storage and then re-inserting if `Some` is returned from the closure. /// /// This function will have the same runtime errors as generated from `pop` and /// `set` (the key must not currently be on loan pub fn modify(key: Key, f: |Option| -> Option) { match f(pop(key)) { Some(next) => { set(key, next); } None => {} } } #[cfg(test)] mod tests { use prelude::*; use super::*; use task; #[test] fn test_tls_multitask() { static my_key: Key<~str> = &Key; set(my_key, ~"parent data"); task::spawn(proc() { // TLS shouldn't carry over. assert!(get(my_key, |k| k.map(|k| (*k).clone())).is_none()); set(my_key, ~"child data"); assert!(get(my_key, |k| k.map(|k| (*k).clone())).unwrap() == ~"child data"); // should be cleaned up for us }); // Must work multiple times assert!(get(my_key, |k| k.map(|k| (*k).clone())).unwrap() == ~"parent data"); assert!(get(my_key, |k| k.map(|k| (*k).clone())).unwrap() == ~"parent data"); assert!(get(my_key, |k| k.map(|k| (*k).clone())).unwrap() == ~"parent data"); } #[test] fn test_tls_overwrite() { static my_key: Key<~str> = &Key; set(my_key, ~"first data"); set(my_key, ~"next data"); // Shouldn't leak. assert!(get(my_key, |k| k.map(|k| (*k).clone())).unwrap() == ~"next data"); } #[test] fn test_tls_pop() { static my_key: Key<~str> = &Key; set(my_key, ~"weasel"); assert!(pop(my_key).unwrap() == ~"weasel"); // Pop must remove the data from the map. assert!(pop(my_key).is_none()); } #[test] fn test_tls_modify() { static my_key: Key<~str> = &Key; modify(my_key, |data| { match data { Some(ref val) => fail!("unwelcome value: {}", *val), None => Some(~"first data") } }); modify(my_key, |data| { match data { Some(~"first data") => Some(~"next data"), Some(ref val) => fail!("wrong value: {}", *val), None => fail!("missing value") } }); assert!(pop(my_key).unwrap() == ~"next data"); } #[test] fn test_tls_crust_automorestack_memorial_bug() { // This might result in a stack-canary clobber if the runtime fails to // set sp_limit to 0 when calling the cleanup extern - it might // automatically jump over to the rust stack, which causes next_c_sp // to get recorded as something within a rust stack segment. Then a // subsequent upcall (esp. for logging, think vsnprintf) would run on // a stack smaller than 1 MB. static my_key: Key<~str> = &Key; task::spawn(proc() { set(my_key, ~"hax"); }); } #[test] fn test_tls_multiple_types() { static str_key: Key<~str> = &Key; static box_key: Key<@()> = &Key; static int_key: Key = &Key; task::spawn(proc() { set(str_key, ~"string data"); set(box_key, @()); set(int_key, 42); }); } #[test] #[allow(dead_code)] fn test_tls_overwrite_multiple_types() { static str_key: Key<~str> = &Key; static box_key: Key<@()> = &Key; static int_key: Key = &Key; task::spawn(proc() { set(str_key, ~"string data"); set(str_key, ~"string data 2"); set(box_key, @()); set(box_key, @()); set(int_key, 42); // This could cause a segfault if overwriting-destruction is done // with the crazy polymorphic transmute rather than the provided // finaliser. set(int_key, 31337); }); } #[test] #[should_fail] fn test_tls_cleanup_on_failure() { static str_key: Key<~str> = &Key; static box_key: Key<@()> = &Key; static int_key: Key = &Key; set(str_key, ~"parent data"); set(box_key, @()); task::spawn(proc() { // spawn_linked set(str_key, ~"string data"); set(box_key, @()); set(int_key, 42); fail!(); }); // Not quite nondeterministic. set(int_key, 31337); fail!(); } #[test] fn test_static_pointer() { static key: Key<&'static int> = &Key; static VALUE: int = 0; let v: &'static int = &VALUE; set(key, v); } #[test] fn test_owned() { static key: Key<~int> = &Key; set(key, ~1); get(key, |v| { get(key, |v| { get(key, |v| { assert_eq!(**v.unwrap(), 1); }); assert_eq!(**v.unwrap(), 1); }); assert_eq!(**v.unwrap(), 1); }); set(key, ~2); get(key, |v| { assert_eq!(**v.unwrap(), 2); }) } #[test] fn test_get_mut() { static key: Key = &Key; set(key, 1); get_mut(key, |v| { *v.unwrap() = 2; }); get(key, |v| { assert_eq!(*v.unwrap(), 2); }) } #[test] fn test_same_key_type() { static key1: Key = &Key; static key2: Key = &Key; static key3: Key = &Key; static key4: Key = &Key; static key5: Key = &Key; set(key1, 1); set(key2, 2); set(key3, 3); set(key4, 4); set(key5, 5); get(key1, |x| assert_eq!(*x.unwrap(), 1)); get(key2, |x| assert_eq!(*x.unwrap(), 2)); get(key3, |x| assert_eq!(*x.unwrap(), 3)); get(key4, |x| assert_eq!(*x.unwrap(), 4)); get(key5, |x| assert_eq!(*x.unwrap(), 5)); } #[test] #[should_fail] fn test_nested_get_set1() { static key: Key = &Key; set(key, 4); get(key, |_| { set(key, 4); }) } #[test] #[should_fail] fn test_nested_get_mut2() { static key: Key = &Key; set(key, 4); get(key, |_| { get_mut(key, |_| {}) }) } #[test] #[should_fail] fn test_nested_get_mut3() { static key: Key = &Key; set(key, 4); get_mut(key, |_| { get(key, |_| {}) }) } #[test] #[should_fail] fn test_nested_get_mut4() { static key: Key = &Key; set(key, 4); get_mut(key, |_| { get_mut(key, |_| {}) }) } }