2 * Copyright (c) 2007 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
24 /***********************************************************************
26 * Error-checking locks for debugging.
27 **********************************************************************/
29 #include "objc-private.h"
31 #if !defined(NDEBUG) && !TARGET_OS_WIN32
33 /***********************************************************************
34 * Recording - per-thread list of mutexes and monitors held
35 **********************************************************************/
38 void *l; // the lock itself
39 int k; // the kind of lock it is (MUTEX, MONITOR, etc)
40 int i; // the lock's nest count
49 typedef struct _objc_lock_list {
55 static tls_key_t lock_tls;
58 destroyLocks(void *value)
60 _objc_lock_list *locks = (_objc_lock_list *)value;
61 // fixme complain about any still-held locks?
62 if (locks) _free_internal(locks);
65 static struct _objc_lock_list *
68 _objc_lock_list *locks;
70 // Use a dedicated tls key to prevent differences vs non-debug in
71 // usage of objc's other tls keys (required for some unit tests).
72 INIT_ONCE_PTR(lock_tls, tls_create(&destroyLocks), (void)0);
74 locks = (_objc_lock_list *)tls_get(lock_tls);
79 locks = (_objc_lock_list *)_calloc_internal(1, sizeof(_objc_lock_list) + sizeof(lockcount) * 16);
80 locks->allocated = 16;
82 tls_set(lock_tls, locks);
86 if (locks->allocated == locks->used) {
90 _objc_lock_list *oldlocks = locks;
91 locks = (_objc_lock_list *)_calloc_internal(1, sizeof(_objc_lock_list) + 2 * oldlocks->used * sizeof(lockcount));
92 locks->used = oldlocks->used;
93 locks->allocated = oldlocks->used * 2;
94 memcpy(locks->list, oldlocks->list, locks->used * sizeof(lockcount));
95 tls_set(lock_tls, locks);
96 _free_internal(oldlocks);
104 hasLock(_objc_lock_list *locks, void *lock, int kind)
107 if (!locks) return NO;
109 for (i = 0; i < locks->used; i++) {
110 if (locks->list[i].l == lock && locks->list[i].k == kind) return YES;
117 setLock(_objc_lock_list *locks, void *lock, int kind)
120 for (i = 0; i < locks->used; i++) {
121 if (locks->list[i].l == lock && locks->list[i].k == kind) {
127 locks->list[locks->used].l = lock;
128 locks->list[locks->used].i = 1;
129 locks->list[locks->used].k = kind;
134 clearLock(_objc_lock_list *locks, void *lock, int kind)
137 for (i = 0; i < locks->used; i++) {
138 if (locks->list[i].l == lock && locks->list[i].k == kind) {
139 if (--locks->list[i].i == 0) {
140 locks->list[i].l = NULL;
141 locks->list[i] = locks->list[--locks->used];
147 _objc_fatal("lock not found!");
151 /***********************************************************************
153 **********************************************************************/
156 _mutex_lock_debug(mutex_t *lock, const char *name)
158 _objc_lock_list *locks = getLocks(YES);
160 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
161 if (hasLock(locks, lock, MUTEX)) {
162 _objc_fatal("deadlock: relocking mutex %s\n", name+1);
164 setLock(locks, lock, MUTEX);
167 return _mutex_lock_nodebug(lock);
171 _mutex_try_lock_debug(mutex_t *lock, const char *name)
173 _objc_lock_list *locks = getLocks(YES);
175 // attempting to relock in try_lock is OK
176 int result = _mutex_try_lock_nodebug(lock);
178 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
180 setLock(locks, lock, MUTEX);
187 _mutex_unlock_debug(mutex_t *lock, const char *name)
189 _objc_lock_list *locks = getLocks(NO);
191 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
192 if (!hasLock(locks, lock, MUTEX)) {
193 _objc_fatal("unlocking unowned mutex %s\n", name+1);
195 clearLock(locks, lock, MUTEX);
198 return _mutex_unlock_nodebug(lock);
202 _mutex_assert_locked_debug(mutex_t *lock, const char *name)
204 _objc_lock_list *locks = getLocks(NO);
206 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
207 if (!hasLock(locks, lock, MUTEX)) {
208 _objc_fatal("mutex %s incorrectly not held\n",name+1);
215 _mutex_assert_unlocked_debug(mutex_t *lock, const char *name)
217 _objc_lock_list *locks = getLocks(NO);
219 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
220 if (hasLock(locks, lock, MUTEX)) {
221 _objc_fatal("mutex %s incorrectly held\n", name+1);
227 /***********************************************************************
228 * Recursive mutex checking
229 **********************************************************************/
232 _recursive_mutex_lock_debug(recursive_mutex_t *lock, const char *name)
234 _objc_lock_list *locks = getLocks(YES);
236 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
237 setLock(locks, lock, RECURSIVE);
240 return _recursive_mutex_lock_nodebug(lock);
244 _recursive_mutex_try_lock_debug(recursive_mutex_t *lock, const char *name)
246 _objc_lock_list *locks = getLocks(YES);
248 int result = _recursive_mutex_try_lock_nodebug(lock);
250 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
252 setLock(locks, lock, RECURSIVE);
259 _recursive_mutex_unlock_debug(recursive_mutex_t *lock, const char *name)
261 _objc_lock_list *locks = getLocks(NO);
263 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
264 if (!hasLock(locks, lock, RECURSIVE)) {
265 _objc_fatal("unlocking unowned recursive mutex %s\n", name+1);
267 clearLock(locks, lock, RECURSIVE);
270 return _recursive_mutex_unlock_nodebug(lock);
274 _recursive_mutex_assert_locked_debug(recursive_mutex_t *lock, const char *name)
276 _objc_lock_list *locks = getLocks(NO);
278 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
279 if (!hasLock(locks, lock, RECURSIVE)) {
280 _objc_fatal("recursive mutex %s incorrectly not held\n",name+1);
287 _recursive_mutex_assert_unlocked_debug(recursive_mutex_t *lock, const char *name)
289 _objc_lock_list *locks = getLocks(NO);
291 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
292 if (hasLock(locks, lock, RECURSIVE)) {
293 _objc_fatal("recursive mutex %s incorrectly held\n", name+1);
299 /***********************************************************************
301 **********************************************************************/
304 _monitor_enter_debug(monitor_t *lock, const char *name)
306 _objc_lock_list *locks = getLocks(YES);
308 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
309 if (hasLock(locks, lock, MONITOR)) {
310 _objc_fatal("deadlock: relocking monitor %s\n", name+1);
312 setLock(locks, lock, MONITOR);
315 return _monitor_enter_nodebug(lock);
319 _monitor_exit_debug(monitor_t *lock, const char *name)
321 _objc_lock_list *locks = getLocks(NO);
323 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
324 if (!hasLock(locks, lock, MONITOR)) {
325 _objc_fatal("unlocking unowned monitor%s\n", name+1);
327 clearLock(locks, lock, MONITOR);
330 return _monitor_exit_nodebug(lock);
334 _monitor_wait_debug(monitor_t *lock, const char *name)
336 _objc_lock_list *locks = getLocks(NO);
338 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
339 if (!hasLock(locks, lock, MONITOR)) {
340 _objc_fatal("waiting in unowned monitor%s\n", name+1);
344 return _monitor_wait_nodebug(lock);
348 _monitor_assert_locked_debug(monitor_t *lock, const char *name)
350 _objc_lock_list *locks = getLocks(NO);
352 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
353 if (!hasLock(locks, lock, MONITOR)) {
354 _objc_fatal("monitor %s incorrectly not held\n",name+1);
360 _monitor_assert_unlocked_debug(monitor_t *lock, const char *name)
362 _objc_lock_list *locks = getLocks(NO);
364 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
365 if (hasLock(locks, lock, MONITOR)) {
366 _objc_fatal("monitor %s incorrectly held\n", name+1);
372 /***********************************************************************
374 **********************************************************************/
377 _rwlock_read_debug(rwlock_t *lock, const char *name)
379 _objc_lock_list *locks = getLocks(YES);
381 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
382 if (hasLock(locks, lock, RDLOCK)) {
383 // Recursive rwlock read is bad (may deadlock vs pending writer)
384 _objc_fatal("recursive rwlock read %s\n", name+1);
386 if (hasLock(locks, lock, WRLOCK)) {
387 _objc_fatal("deadlock: read after write for rwlock %s\n", name+1);
389 setLock(locks, lock, RDLOCK);
392 _rwlock_read_nodebug(lock);
396 _rwlock_try_read_debug(rwlock_t *lock, const char *name)
398 _objc_lock_list *locks = getLocks(YES);
400 // try-read when already reading is OK (won't deadlock against writer)
401 // try-read when already writing is OK (will fail)
402 int result = _rwlock_try_read_nodebug(lock);
404 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
406 setLock(locks, lock, RDLOCK);
413 _rwlock_unlock_read_debug(rwlock_t *lock, const char *name)
415 _objc_lock_list *locks = getLocks(NO);
417 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
418 if (!hasLock(locks, lock, RDLOCK)) {
419 _objc_fatal("un-reading unowned rwlock %s\n", name+1);
421 clearLock(locks, lock, RDLOCK);
424 _rwlock_unlock_read_nodebug(lock);
428 _rwlock_write_debug(rwlock_t *lock, const char *name)
430 _objc_lock_list *locks = getLocks(YES);
432 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
433 if (hasLock(locks, lock, RDLOCK)) {
434 // Lock promotion not allowed (may deadlock)
435 _objc_fatal("deadlock: write after read for rwlock %s\n", name+1);
437 if (hasLock(locks, lock, WRLOCK)) {
438 _objc_fatal("recursive rwlock write %s\n", name+1);
440 setLock(locks, lock, WRLOCK);
443 _rwlock_write_nodebug(lock);
448 _rwlock_try_write_debug(rwlock_t *lock, const char *name)
450 _objc_lock_list *locks = getLocks(YES);
452 // try-write when already reading is OK (will fail)
453 // try-write when already writing is OK (will fail)
454 int result = _rwlock_try_write_nodebug(lock);
456 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
458 setLock(locks, lock, WRLOCK);
465 _rwlock_unlock_write_debug(rwlock_t *lock, const char *name)
467 _objc_lock_list *locks = getLocks(NO);
469 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
470 if (!hasLock(locks, lock, WRLOCK)) {
471 _objc_fatal("un-writing unowned rwlock %s\n", name+1);
473 clearLock(locks, lock, WRLOCK);
476 _rwlock_unlock_write_nodebug(lock);
481 _rwlock_assert_reading_debug(rwlock_t *lock, const char *name)
483 _objc_lock_list *locks = getLocks(NO);
485 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
486 if (!hasLock(locks, lock, RDLOCK)) {
487 _objc_fatal("rwlock %s incorrectly not reading\n", name+1);
493 _rwlock_assert_writing_debug(rwlock_t *lock, const char *name)
495 _objc_lock_list *locks = getLocks(NO);
497 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
498 if (!hasLock(locks, lock, WRLOCK)) {
499 _objc_fatal("rwlock %s incorrectly not writing\n", name+1);
505 _rwlock_assert_locked_debug(rwlock_t *lock, const char *name)
507 _objc_lock_list *locks = getLocks(NO);
509 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
510 if (!hasLock(locks, lock, RDLOCK) && !hasLock(locks, lock, WRLOCK)) {
511 _objc_fatal("rwlock %s incorrectly neither reading nor writing\n",
518 _rwlock_assert_unlocked_debug(rwlock_t *lock, const char *name)
520 _objc_lock_list *locks = getLocks(NO);
522 if (! (DebuggerMode && isManagedDuringDebugger(lock))) {
523 if (hasLock(locks, lock, RDLOCK) || hasLock(locks, lock, WRLOCK)) {
524 _objc_fatal("rwlock %s incorrectly not unlocked\n", name+1);