Skip to content

Commit cc255a3

Browse files
authored
Unrolled build for rust-lang#128184
Rollup merge of rust-lang#128184 - joboet:refactor_pthread_sync, r=workingjubilee std: refactor `pthread`-based synchronization The non-trivial code for `pthread_condvar` is duplicated across the thread parking and the `Mutex`/`Condvar` implementations. This PR moves that code into `sys::pal`, which now exposes an `unsafe` wrapper type for `pthread_mutex_t` and `pthread_condvar_t`.
2 parents 8ac313b + 8b2ff49 commit cc255a3

File tree

11 files changed

+465
-438
lines changed

11 files changed

+465
-438
lines changed

library/std/src/sys/pal/teeos/mod.rs

+8
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,14 @@ pub mod thread;
2727
#[path = "../unix/time.rs"]
2828
pub mod time;
2929

30+
#[path = "../unix/sync"]
31+
pub mod sync {
32+
mod condvar;
33+
mod mutex;
34+
pub use condvar::Condvar;
35+
pub use mutex::Mutex;
36+
}
37+
3038
use crate::io::ErrorKind;
3139

3240
pub fn abort_internal() -> ! {

library/std/src/sys/pal/unix/mod.rs

+1
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ pub mod pipe;
2727
pub mod process;
2828
pub mod stack_overflow;
2929
pub mod stdio;
30+
pub mod sync;
3031
pub mod thread;
3132
pub mod thread_parking;
3233
pub mod time;
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,172 @@
1+
use super::Mutex;
2+
use crate::cell::UnsafeCell;
3+
use crate::pin::Pin;
4+
#[cfg(not(target_os = "nto"))]
5+
use crate::sys::pal::time::TIMESPEC_MAX;
6+
#[cfg(target_os = "nto")]
7+
use crate::sys::pal::time::TIMESPEC_MAX_CAPPED;
8+
use crate::sys::pal::time::Timespec;
9+
use crate::time::Duration;
10+
11+
pub struct Condvar {
12+
inner: UnsafeCell<libc::pthread_cond_t>,
13+
}
14+
15+
impl Condvar {
16+
pub fn new() -> Condvar {
17+
Condvar { inner: UnsafeCell::new(libc::PTHREAD_COND_INITIALIZER) }
18+
}
19+
20+
#[inline]
21+
fn raw(&self) -> *mut libc::pthread_cond_t {
22+
self.inner.get()
23+
}
24+
25+
/// # Safety
26+
/// `init` must have been called on this instance.
27+
#[inline]
28+
pub unsafe fn notify_one(self: Pin<&Self>) {
29+
let r = unsafe { libc::pthread_cond_signal(self.raw()) };
30+
debug_assert_eq!(r, 0);
31+
}
32+
33+
/// # Safety
34+
/// `init` must have been called on this instance.
35+
#[inline]
36+
pub unsafe fn notify_all(self: Pin<&Self>) {
37+
let r = unsafe { libc::pthread_cond_broadcast(self.raw()) };
38+
debug_assert_eq!(r, 0);
39+
}
40+
41+
/// # Safety
42+
/// * `init` must have been called on this instance.
43+
/// * `mutex` must be locked by the current thread.
44+
/// * This condition variable may only be used with the same mutex.
45+
#[inline]
46+
pub unsafe fn wait(self: Pin<&Self>, mutex: Pin<&Mutex>) {
47+
let r = unsafe { libc::pthread_cond_wait(self.raw(), mutex.raw()) };
48+
debug_assert_eq!(r, 0);
49+
}
50+
51+
/// # Safety
52+
/// * `init` must have been called on this instance.
53+
/// * `mutex` must be locked by the current thread.
54+
/// * This condition variable may only be used with the same mutex.
55+
pub unsafe fn wait_timeout(&self, mutex: Pin<&Mutex>, dur: Duration) -> bool {
56+
let mutex = mutex.raw();
57+
58+
// OSX implementation of `pthread_cond_timedwait` is buggy
59+
// with super long durations. When duration is greater than
60+
// 0x100_0000_0000_0000 seconds, `pthread_cond_timedwait`
61+
// in macOS Sierra returns error 316.
62+
//
63+
// This program demonstrates the issue:
64+
// https://gist.github.com/stepancheg/198db4623a20aad2ad7cddb8fda4a63c
65+
//
66+
// To work around this issue, the timeout is clamped to 1000 years.
67+
#[cfg(target_vendor = "apple")]
68+
let dur = Duration::min(dur, Duration::from_secs(1000 * 365 * 86400));
69+
70+
let timeout = Timespec::now(Self::CLOCK).checked_add_duration(&dur);
71+
72+
#[cfg(not(target_os = "nto"))]
73+
let timeout = timeout.and_then(|t| t.to_timespec()).unwrap_or(TIMESPEC_MAX);
74+
75+
#[cfg(target_os = "nto")]
76+
let timeout = timeout.and_then(|t| t.to_timespec_capped()).unwrap_or(TIMESPEC_MAX_CAPPED);
77+
78+
let r = unsafe { libc::pthread_cond_timedwait(self.raw(), mutex, &timeout) };
79+
assert!(r == libc::ETIMEDOUT || r == 0);
80+
r == 0
81+
}
82+
}
83+
84+
#[cfg(not(any(
85+
target_os = "android",
86+
target_vendor = "apple",
87+
target_os = "espidf",
88+
target_os = "horizon",
89+
target_os = "l4re",
90+
target_os = "redox",
91+
target_os = "teeos",
92+
)))]
93+
impl Condvar {
94+
pub const PRECISE_TIMEOUT: bool = true;
95+
const CLOCK: libc::clockid_t = libc::CLOCK_MONOTONIC;
96+
97+
/// # Safety
98+
/// May only be called once per instance of `Self`.
99+
pub unsafe fn init(self: Pin<&mut Self>) {
100+
use crate::mem::MaybeUninit;
101+
102+
struct AttrGuard<'a>(pub &'a mut MaybeUninit<libc::pthread_condattr_t>);
103+
impl Drop for AttrGuard<'_> {
104+
fn drop(&mut self) {
105+
unsafe {
106+
let result = libc::pthread_condattr_destroy(self.0.as_mut_ptr());
107+
assert_eq!(result, 0);
108+
}
109+
}
110+
}
111+
112+
unsafe {
113+
let mut attr = MaybeUninit::<libc::pthread_condattr_t>::uninit();
114+
let r = libc::pthread_condattr_init(attr.as_mut_ptr());
115+
assert_eq!(r, 0);
116+
let attr = AttrGuard(&mut attr);
117+
let r = libc::pthread_condattr_setclock(attr.0.as_mut_ptr(), Self::CLOCK);
118+
assert_eq!(r, 0);
119+
let r = libc::pthread_cond_init(self.raw(), attr.0.as_ptr());
120+
assert_eq!(r, 0);
121+
}
122+
}
123+
}
124+
125+
// `pthread_condattr_setclock` is unfortunately not supported on these platforms.
126+
#[cfg(any(
127+
target_os = "android",
128+
target_vendor = "apple",
129+
target_os = "espidf",
130+
target_os = "horizon",
131+
target_os = "l4re",
132+
target_os = "redox",
133+
target_os = "teeos",
134+
))]
135+
impl Condvar {
136+
pub const PRECISE_TIMEOUT: bool = false;
137+
const CLOCK: libc::clockid_t = libc::CLOCK_REALTIME;
138+
139+
/// # Safety
140+
/// May only be called once per instance of `Self`.
141+
pub unsafe fn init(self: Pin<&mut Self>) {
142+
if cfg!(any(target_os = "espidf", target_os = "horizon", target_os = "teeos")) {
143+
// NOTE: ESP-IDF's PTHREAD_COND_INITIALIZER support is not released yet
144+
// So on that platform, init() should always be called.
145+
//
146+
// Similar story for the 3DS (horizon) and for TEEOS.
147+
let r = unsafe { libc::pthread_cond_init(self.raw(), crate::ptr::null()) };
148+
assert_eq!(r, 0);
149+
}
150+
}
151+
}
152+
153+
impl !Unpin for Condvar {}
154+
155+
unsafe impl Sync for Condvar {}
156+
unsafe impl Send for Condvar {}
157+
158+
impl Drop for Condvar {
159+
#[inline]
160+
fn drop(&mut self) {
161+
let r = unsafe { libc::pthread_cond_destroy(self.raw()) };
162+
if cfg!(target_os = "dragonfly") {
163+
// On DragonFly pthread_cond_destroy() returns EINVAL if called on
164+
// a condvar that was just initialized with
165+
// libc::PTHREAD_COND_INITIALIZER. Once it is used or
166+
// pthread_cond_init() is called, this behaviour no longer occurs.
167+
debug_assert!(r == 0 || r == libc::EINVAL);
168+
} else {
169+
debug_assert_eq!(r, 0);
170+
}
171+
}
172+
}
+16
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
#![cfg(not(any(
2+
target_os = "linux",
3+
target_os = "android",
4+
all(target_os = "emscripten", target_feature = "atomics"),
5+
target_os = "freebsd",
6+
target_os = "openbsd",
7+
target_os = "dragonfly",
8+
target_os = "fuchsia",
9+
)))]
10+
#![forbid(unsafe_op_in_unsafe_fn)]
11+
12+
mod condvar;
13+
mod mutex;
14+
15+
pub use condvar::Condvar;
16+
pub use mutex::Mutex;
+135
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,135 @@
1+
use super::super::cvt_nz;
2+
use crate::cell::UnsafeCell;
3+
use crate::io::Error;
4+
use crate::mem::MaybeUninit;
5+
use crate::pin::Pin;
6+
7+
pub struct Mutex {
8+
inner: UnsafeCell<libc::pthread_mutex_t>,
9+
}
10+
11+
impl Mutex {
12+
pub fn new() -> Mutex {
13+
Mutex { inner: UnsafeCell::new(libc::PTHREAD_MUTEX_INITIALIZER) }
14+
}
15+
16+
pub(super) fn raw(&self) -> *mut libc::pthread_mutex_t {
17+
self.inner.get()
18+
}
19+
20+
/// # Safety
21+
/// May only be called once per instance of `Self`.
22+
pub unsafe fn init(self: Pin<&mut Self>) {
23+
// Issue #33770
24+
//
25+
// A pthread mutex initialized with PTHREAD_MUTEX_INITIALIZER will have
26+
// a type of PTHREAD_MUTEX_DEFAULT, which has undefined behavior if you
27+
// try to re-lock it from the same thread when you already hold a lock
28+
// (https://pubs.opengroup.org/onlinepubs/9699919799/functions/pthread_mutex_init.html).
29+
// This is the case even if PTHREAD_MUTEX_DEFAULT == PTHREAD_MUTEX_NORMAL
30+
// (https://github.com/rust-lang/rust/issues/33770#issuecomment-220847521) -- in that
31+
// case, `pthread_mutexattr_settype(PTHREAD_MUTEX_DEFAULT)` will of course be the same
32+
// as setting it to `PTHREAD_MUTEX_NORMAL`, but not setting any mode will result in
33+
// a Mutex where re-locking is UB.
34+
//
35+
// In practice, glibc takes advantage of this undefined behavior to
36+
// implement hardware lock elision, which uses hardware transactional
37+
// memory to avoid acquiring the lock. While a transaction is in
38+
// progress, the lock appears to be unlocked. This isn't a problem for
39+
// other threads since the transactional memory will abort if a conflict
40+
// is detected, however no abort is generated when re-locking from the
41+
// same thread.
42+
//
43+
// Since locking the same mutex twice will result in two aliasing &mut
44+
// references, we instead create the mutex with type
45+
// PTHREAD_MUTEX_NORMAL which is guaranteed to deadlock if we try to
46+
// re-lock it from the same thread, thus avoiding undefined behavior.
47+
unsafe {
48+
let mut attr = MaybeUninit::<libc::pthread_mutexattr_t>::uninit();
49+
cvt_nz(libc::pthread_mutexattr_init(attr.as_mut_ptr())).unwrap();
50+
let attr = AttrGuard(&mut attr);
51+
cvt_nz(libc::pthread_mutexattr_settype(
52+
attr.0.as_mut_ptr(),
53+
libc::PTHREAD_MUTEX_NORMAL,
54+
))
55+
.unwrap();
56+
cvt_nz(libc::pthread_mutex_init(self.raw(), attr.0.as_ptr())).unwrap();
57+
}
58+
}
59+
60+
/// # Safety
61+
/// * If `init` was not called on this instance, reentrant locking causes
62+
/// undefined behaviour.
63+
/// * Destroying a locked mutex causes undefined behaviour.
64+
pub unsafe fn lock(self: Pin<&Self>) {
65+
#[cold]
66+
#[inline(never)]
67+
fn fail(r: i32) -> ! {
68+
let error = Error::from_raw_os_error(r);
69+
panic!("failed to lock mutex: {error}");
70+
}
71+
72+
let r = unsafe { libc::pthread_mutex_lock(self.raw()) };
73+
// As we set the mutex type to `PTHREAD_MUTEX_NORMAL` above, we expect
74+
// the lock call to never fail. Unfortunately however, some platforms
75+
// (Solaris) do not conform to the standard, and instead always provide
76+
// deadlock detection. How kind of them! Unfortunately that means that
77+
// we need to check the error code here. To save us from UB on other
78+
// less well-behaved platforms in the future, we do it even on "good"
79+
// platforms like macOS. See #120147 for more context.
80+
if r != 0 {
81+
fail(r)
82+
}
83+
}
84+
85+
/// # Safety
86+
/// * If `init` was not called on this instance, reentrant locking causes
87+
/// undefined behaviour.
88+
/// * Destroying a locked mutex causes undefined behaviour.
89+
pub unsafe fn try_lock(self: Pin<&Self>) -> bool {
90+
unsafe { libc::pthread_mutex_trylock(self.raw()) == 0 }
91+
}
92+
93+
/// # Safety
94+
/// The mutex must be locked by the current thread.
95+
pub unsafe fn unlock(self: Pin<&Self>) {
96+
let r = unsafe { libc::pthread_mutex_unlock(self.raw()) };
97+
debug_assert_eq!(r, 0);
98+
}
99+
}
100+
101+
impl !Unpin for Mutex {}
102+
103+
unsafe impl Send for Mutex {}
104+
unsafe impl Sync for Mutex {}
105+
106+
impl Drop for Mutex {
107+
fn drop(&mut self) {
108+
// SAFETY:
109+
// If `lock` or `init` was called, the mutex must have been pinned, so
110+
// it is still at the same location. Otherwise, `inner` must contain
111+
// `PTHREAD_MUTEX_INITIALIZER`, which is valid at all locations. Thus,
112+
// this call always destroys a valid mutex.
113+
let r = unsafe { libc::pthread_mutex_destroy(self.raw()) };
114+
if cfg!(target_os = "dragonfly") {
115+
// On DragonFly pthread_mutex_destroy() returns EINVAL if called on a
116+
// mutex that was just initialized with libc::PTHREAD_MUTEX_INITIALIZER.
117+
// Once it is used (locked/unlocked) or pthread_mutex_init() is called,
118+
// this behaviour no longer occurs.
119+
debug_assert!(r == 0 || r == libc::EINVAL);
120+
} else {
121+
debug_assert_eq!(r, 0);
122+
}
123+
}
124+
}
125+
126+
struct AttrGuard<'a>(pub &'a mut MaybeUninit<libc::pthread_mutexattr_t>);
127+
128+
impl Drop for AttrGuard<'_> {
129+
fn drop(&mut self) {
130+
unsafe {
131+
let result = libc::pthread_mutexattr_destroy(self.0.as_mut_ptr());
132+
assert_eq!(result, 0);
133+
}
134+
}
135+
}

0 commit comments

Comments
 (0)