1 /*
2  * Copyright (C) 2011 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #ifndef ART_RUNTIME_BASE_MUTEX_H_
18 #define ART_RUNTIME_BASE_MUTEX_H_
19 
20 #include <pthread.h>
21 #include <stdint.h>
22 
23 #include <iosfwd>
24 #include <string>
25 
26 #include "atomic.h"
27 #include "base/logging.h"
28 #include "base/macros.h"
29 #include "globals.h"
30 
31 #if defined(__APPLE__)
32 #define ART_USE_FUTEXES 0
33 #else
34 #define ART_USE_FUTEXES 1
35 #endif
36 
37 // Currently Darwin doesn't support locks with timeouts.
38 #if !defined(__APPLE__)
39 #define HAVE_TIMED_RWLOCK 1
40 #else
41 #define HAVE_TIMED_RWLOCK 0
42 #endif
43 
44 namespace art {
45 
46 class LOCKABLE ReaderWriterMutex;
47 class ScopedContentionRecorder;
48 class Thread;
49 
50 // LockLevel is used to impose a lock hierarchy [1] where acquisition of a Mutex at a higher or
51 // equal level to a lock a thread holds is invalid. The lock hierarchy achieves a cycle free
52 // partial ordering and thereby cause deadlock situations to fail checks.
53 //
54 // [1] http://www.drdobbs.com/parallel/use-lock-hierarchies-to-avoid-deadlock/204801163
55 enum LockLevel {
56   kLoggingLock = 0,
57   kMemMapsLock,
58   kSwapMutexesLock,
59   kUnexpectedSignalLock,
60   kThreadSuspendCountLock,
61   kAbortLock,
62   kJdwpSocketLock,
63   kRegionSpaceRegionLock,
64   kTransactionLogLock,
65   kReferenceQueueSoftReferencesLock,
66   kReferenceQueuePhantomReferencesLock,
67   kReferenceQueueFinalizerReferencesLock,
68   kReferenceQueueWeakReferencesLock,
69   kReferenceQueueClearedReferencesLock,
70   kReferenceProcessorLock,
71   kJitCodeCacheLock,
72   kRosAllocGlobalLock,
73   kRosAllocBracketLock,
74   kRosAllocBulkFreeLock,
75   kAllocSpaceLock,
76   kBumpPointerSpaceBlockLock,
77   kArenaPoolLock,
78   kDexFileMethodInlinerLock,
79   kDexFileToMethodInlinerMapLock,
80   kMarkSweepMarkStackLock,
81   kInternTableLock,
82   kOatFileSecondaryLookupLock,
83   kTracingUniqueMethodsLock,
84   kTracingStreamingLock,
85   kDefaultMutexLevel,
86   kMarkSweepLargeObjectLock,
87   kPinTableLock,
88   kJdwpObjectRegistryLock,
89   kModifyLdtLock,
90   kAllocatedThreadIdsLock,
91   kMonitorPoolLock,
92   kMethodVerifiersLock,
93   kClassLinkerClassesLock,
94   kBreakpointLock,
95   kMonitorLock,
96   kMonitorListLock,
97   kJniLoadLibraryLock,
98   kThreadListLock,
99   kAllocTrackerLock,
100   kDeoptimizationLock,
101   kProfilerLock,
102   kJdwpShutdownLock,
103   kJdwpEventListLock,
104   kJdwpAttachLock,
105   kJdwpStartLock,
106   kRuntimeShutdownLock,
107   kTraceLock,
108   kHeapBitmapLock,
109   kMutatorLock,
110   kInstrumentEntrypointsLock,
111   kZygoteCreationLock,
112 
113   kLockLevelCount  // Must come last.
114 };
115 std::ostream& operator<<(std::ostream& os, const LockLevel& rhs);
116 
117 const bool kDebugLocking = kIsDebugBuild;
118 
119 // Record Log contention information, dumpable via SIGQUIT.
120 #ifdef ART_USE_FUTEXES
121 // To enable lock contention logging, set this to true.
122 const bool kLogLockContentions = false;
123 #else
124 // Keep this false as lock contention logging is supported only with
125 // futex.
126 const bool kLogLockContentions = false;
127 #endif
128 const size_t kContentionLogSize = 4;
129 const size_t kContentionLogDataSize = kLogLockContentions ? 1 : 0;
130 const size_t kAllMutexDataSize = kLogLockContentions ? 1 : 0;
131 
132 // Base class for all Mutex implementations
133 class BaseMutex {
134  public:
GetName()135   const char* GetName() const {
136     return name_;
137   }
138 
IsMutex()139   virtual bool IsMutex() const { return false; }
IsReaderWriterMutex()140   virtual bool IsReaderWriterMutex() const { return false; }
141 
142   virtual void Dump(std::ostream& os) const = 0;
143 
144   static void DumpAll(std::ostream& os);
145 
146  protected:
147   friend class ConditionVariable;
148 
149   BaseMutex(const char* name, LockLevel level);
150   virtual ~BaseMutex();
151   void RegisterAsLocked(Thread* self);
152   void RegisterAsUnlocked(Thread* self);
153   void CheckSafeToWait(Thread* self);
154 
155   friend class ScopedContentionRecorder;
156 
157   void RecordContention(uint64_t blocked_tid, uint64_t owner_tid, uint64_t nano_time_blocked);
158   void DumpContention(std::ostream& os) const;
159 
160   const LockLevel level_;  // Support for lock hierarchy.
161   const char* const name_;
162 
163   // A log entry that records contention but makes no guarantee that either tid will be held live.
164   struct ContentionLogEntry {
ContentionLogEntryContentionLogEntry165     ContentionLogEntry() : blocked_tid(0), owner_tid(0) {}
166     uint64_t blocked_tid;
167     uint64_t owner_tid;
168     AtomicInteger count;
169   };
170   struct ContentionLogData {
171     ContentionLogEntry contention_log[kContentionLogSize];
172     // The next entry in the contention log to be updated. Value ranges from 0 to
173     // kContentionLogSize - 1.
174     AtomicInteger cur_content_log_entry;
175     // Number of times the Mutex has been contended.
176     AtomicInteger contention_count;
177     // Sum of time waited by all contenders in ns.
178     Atomic<uint64_t> wait_time;
179     void AddToWaitTime(uint64_t value);
ContentionLogDataContentionLogData180     ContentionLogData() : wait_time(0) {}
181   };
182   ContentionLogData contention_log_data_[kContentionLogDataSize];
183 
184  public:
HasEverContended()185   bool HasEverContended() const {
186     if (kLogLockContentions) {
187       return contention_log_data_->contention_count.LoadSequentiallyConsistent() > 0;
188     }
189     return false;
190   }
191 };
192 
193 // A Mutex is used to achieve mutual exclusion between threads. A Mutex can be used to gain
194 // exclusive access to what it guards. A Mutex can be in one of two states:
195 // - Free - not owned by any thread,
196 // - Exclusive - owned by a single thread.
197 //
198 // The effect of locking and unlocking operations on the state is:
199 // State     | ExclusiveLock | ExclusiveUnlock
200 // -------------------------------------------
201 // Free      | Exclusive     | error
202 // Exclusive | Block*        | Free
203 // * Mutex is not reentrant and so an attempt to ExclusiveLock on the same thread will result in
204 //   an error. Being non-reentrant simplifies Waiting on ConditionVariables.
205 std::ostream& operator<<(std::ostream& os, const Mutex& mu);
206 class LOCKABLE Mutex : public BaseMutex {
207  public:
208   explicit Mutex(const char* name, LockLevel level = kDefaultMutexLevel, bool recursive = false);
209   ~Mutex();
210 
IsMutex()211   virtual bool IsMutex() const { return true; }
212 
213   // Block until mutex is free then acquire exclusive access.
214   void ExclusiveLock(Thread* self) EXCLUSIVE_LOCK_FUNCTION();
Lock(Thread * self)215   void Lock(Thread* self) EXCLUSIVE_LOCK_FUNCTION() {  ExclusiveLock(self); }
216 
217   // Returns true if acquires exclusive access, false otherwise.
218   bool ExclusiveTryLock(Thread* self) EXCLUSIVE_TRYLOCK_FUNCTION(true);
TryLock(Thread * self)219   bool TryLock(Thread* self) EXCLUSIVE_TRYLOCK_FUNCTION(true) { return ExclusiveTryLock(self); }
220 
221   // Release exclusive access.
222   void ExclusiveUnlock(Thread* self) UNLOCK_FUNCTION();
Unlock(Thread * self)223   void Unlock(Thread* self) UNLOCK_FUNCTION() {  ExclusiveUnlock(self); }
224 
225   // Is the current thread the exclusive holder of the Mutex.
226   bool IsExclusiveHeld(const Thread* self) const;
227 
228   // Assert that the Mutex is exclusively held by the current thread.
AssertExclusiveHeld(const Thread * self)229   void AssertExclusiveHeld(const Thread* self) {
230     if (kDebugLocking && (gAborting == 0)) {
231       CHECK(IsExclusiveHeld(self)) << *this;
232     }
233   }
AssertHeld(const Thread * self)234   void AssertHeld(const Thread* self) { AssertExclusiveHeld(self); }
235 
236   // Assert that the Mutex is not held by the current thread.
AssertNotHeldExclusive(const Thread * self)237   void AssertNotHeldExclusive(const Thread* self) {
238     if (kDebugLocking && (gAborting == 0)) {
239       CHECK(!IsExclusiveHeld(self)) << *this;
240     }
241   }
AssertNotHeld(const Thread * self)242   void AssertNotHeld(const Thread* self) { AssertNotHeldExclusive(self); }
243 
244   // Id associated with exclusive owner. No memory ordering semantics if called from a thread other
245   // than the owner.
246   uint64_t GetExclusiveOwnerTid() const;
247 
248   // Returns how many times this Mutex has been locked, it is better to use AssertHeld/NotHeld.
GetDepth()249   unsigned int GetDepth() const {
250     return recursion_count_;
251   }
252 
253   virtual void Dump(std::ostream& os) const;
254 
255  private:
256 #if ART_USE_FUTEXES
257   // 0 is unheld, 1 is held.
258   AtomicInteger state_;
259   // Exclusive owner.
260   volatile uint64_t exclusive_owner_;
261   // Number of waiting contenders.
262   AtomicInteger num_contenders_;
263 #else
264   pthread_mutex_t mutex_;
265   volatile uint64_t exclusive_owner_;  // Guarded by mutex_.
266 #endif
267   const bool recursive_;  // Can the lock be recursively held?
268   unsigned int recursion_count_;
269   friend class ConditionVariable;
270   DISALLOW_COPY_AND_ASSIGN(Mutex);
271 };
272 
273 // A ReaderWriterMutex is used to achieve mutual exclusion between threads, similar to a Mutex.
274 // Unlike a Mutex a ReaderWriterMutex can be used to gain exclusive (writer) or shared (reader)
275 // access to what it guards. A flaw in relation to a Mutex is that it cannot be used with a
276 // condition variable. A ReaderWriterMutex can be in one of three states:
277 // - Free - not owned by any thread,
278 // - Exclusive - owned by a single thread,
279 // - Shared(n) - shared amongst n threads.
280 //
281 // The effect of locking and unlocking operations on the state is:
282 //
283 // State     | ExclusiveLock | ExclusiveUnlock | SharedLock       | SharedUnlock
284 // ----------------------------------------------------------------------------
285 // Free      | Exclusive     | error           | SharedLock(1)    | error
286 // Exclusive | Block         | Free            | Block            | error
287 // Shared(n) | Block         | error           | SharedLock(n+1)* | Shared(n-1) or Free
288 // * for large values of n the SharedLock may block.
289 std::ostream& operator<<(std::ostream& os, const ReaderWriterMutex& mu);
290 class LOCKABLE ReaderWriterMutex : public BaseMutex {
291  public:
292   explicit ReaderWriterMutex(const char* name, LockLevel level = kDefaultMutexLevel);
293   ~ReaderWriterMutex();
294 
IsReaderWriterMutex()295   virtual bool IsReaderWriterMutex() const { return true; }
296 
297   // Block until ReaderWriterMutex is free then acquire exclusive access.
298   void ExclusiveLock(Thread* self) EXCLUSIVE_LOCK_FUNCTION();
WriterLock(Thread * self)299   void WriterLock(Thread* self) EXCLUSIVE_LOCK_FUNCTION() {  ExclusiveLock(self); }
300 
301   // Release exclusive access.
302   void ExclusiveUnlock(Thread* self) UNLOCK_FUNCTION();
WriterUnlock(Thread * self)303   void WriterUnlock(Thread* self) UNLOCK_FUNCTION() {  ExclusiveUnlock(self); }
304 
305   // Block until ReaderWriterMutex is free and acquire exclusive access. Returns true on success
306   // or false if timeout is reached.
307 #if HAVE_TIMED_RWLOCK
308   bool ExclusiveLockWithTimeout(Thread* self, int64_t ms, int32_t ns)
309       EXCLUSIVE_TRYLOCK_FUNCTION(true);
310 #endif
311 
312   // Block until ReaderWriterMutex is shared or free then acquire a share on the access.
313   void SharedLock(Thread* self) SHARED_LOCK_FUNCTION() ALWAYS_INLINE;
ReaderLock(Thread * self)314   void ReaderLock(Thread* self) SHARED_LOCK_FUNCTION() { SharedLock(self); }
315 
316   // Try to acquire share of ReaderWriterMutex.
317   bool SharedTryLock(Thread* self) EXCLUSIVE_TRYLOCK_FUNCTION(true);
318 
319   // Release a share of the access.
320   void SharedUnlock(Thread* self) UNLOCK_FUNCTION() ALWAYS_INLINE;
ReaderUnlock(Thread * self)321   void ReaderUnlock(Thread* self) UNLOCK_FUNCTION() { SharedUnlock(self); }
322 
323   // Is the current thread the exclusive holder of the ReaderWriterMutex.
324   bool IsExclusiveHeld(const Thread* self) const;
325 
326   // Assert the current thread has exclusive access to the ReaderWriterMutex.
AssertExclusiveHeld(const Thread * self)327   void AssertExclusiveHeld(const Thread* self) {
328     if (kDebugLocking && (gAborting == 0)) {
329       CHECK(IsExclusiveHeld(self)) << *this;
330     }
331   }
AssertWriterHeld(const Thread * self)332   void AssertWriterHeld(const Thread* self) { AssertExclusiveHeld(self); }
333 
334   // Assert the current thread doesn't have exclusive access to the ReaderWriterMutex.
AssertNotExclusiveHeld(const Thread * self)335   void AssertNotExclusiveHeld(const Thread* self) {
336     if (kDebugLocking && (gAborting == 0)) {
337       CHECK(!IsExclusiveHeld(self)) << *this;
338     }
339   }
AssertNotWriterHeld(const Thread * self)340   void AssertNotWriterHeld(const Thread* self) { AssertNotExclusiveHeld(self); }
341 
342   // Is the current thread a shared holder of the ReaderWriterMutex.
343   bool IsSharedHeld(const Thread* self) const;
344 
345   // Assert the current thread has shared access to the ReaderWriterMutex.
AssertSharedHeld(const Thread * self)346   void AssertSharedHeld(const Thread* self) {
347     if (kDebugLocking && (gAborting == 0)) {
348       // TODO: we can only assert this well when self != null.
349       CHECK(IsSharedHeld(self) || self == nullptr) << *this;
350     }
351   }
AssertReaderHeld(const Thread * self)352   void AssertReaderHeld(const Thread* self) { AssertSharedHeld(self); }
353 
354   // Assert the current thread doesn't hold this ReaderWriterMutex either in shared or exclusive
355   // mode.
AssertNotHeld(const Thread * self)356   void AssertNotHeld(const Thread* self) {
357     if (kDebugLocking && (gAborting == 0)) {
358       CHECK(!IsSharedHeld(self)) << *this;
359     }
360   }
361 
362   // Id associated with exclusive owner. No memory ordering semantics if called from a thread other
363   // than the owner.
364   uint64_t GetExclusiveOwnerTid() const;
365 
366   virtual void Dump(std::ostream& os) const;
367 
368  private:
369 #if ART_USE_FUTEXES
370   // Out-of-inline path for handling contention for a SharedLock.
371   void HandleSharedLockContention(Thread* self, int32_t cur_state);
372 
373   // -1 implies held exclusive, +ve shared held by state_ many owners.
374   AtomicInteger state_;
375   // Exclusive owner. Modification guarded by this mutex.
376   volatile uint64_t exclusive_owner_;
377   // Number of contenders waiting for a reader share.
378   AtomicInteger num_pending_readers_;
379   // Number of contenders waiting to be the writer.
380   AtomicInteger num_pending_writers_;
381 #else
382   pthread_rwlock_t rwlock_;
383   volatile uint64_t exclusive_owner_;  // Guarded by rwlock_.
384 #endif
385   DISALLOW_COPY_AND_ASSIGN(ReaderWriterMutex);
386 };
387 
388 // ConditionVariables allow threads to queue and sleep. Threads may then be resumed individually
389 // (Signal) or all at once (Broadcast).
390 class ConditionVariable {
391  public:
392   explicit ConditionVariable(const char* name, Mutex& mutex);
393   ~ConditionVariable();
394 
395   void Broadcast(Thread* self);
396   void Signal(Thread* self);
397   // TODO: No thread safety analysis on Wait and TimedWait as they call mutex operations via their
398   //       pointer copy, thereby defeating annotalysis.
399   void Wait(Thread* self) NO_THREAD_SAFETY_ANALYSIS;
400   bool TimedWait(Thread* self, int64_t ms, int32_t ns) NO_THREAD_SAFETY_ANALYSIS;
401   // Variant of Wait that should be used with caution. Doesn't validate that no mutexes are held
402   // when waiting.
403   // TODO: remove this.
404   void WaitHoldingLocks(Thread* self) NO_THREAD_SAFETY_ANALYSIS;
405 
406  private:
407   const char* const name_;
408   // The Mutex being used by waiters. It is an error to mix condition variables between different
409   // Mutexes.
410   Mutex& guard_;
411 #if ART_USE_FUTEXES
412   // A counter that is modified by signals and broadcasts. This ensures that when a waiter gives up
413   // their Mutex and another thread takes it and signals, the waiting thread observes that sequence_
414   // changed and doesn't enter the wait. Modified while holding guard_, but is read by futex wait
415   // without guard_ held.
416   AtomicInteger sequence_;
417   // Number of threads that have come into to wait, not the length of the waiters on the futex as
418   // waiters may have been requeued onto guard_. Guarded by guard_.
419   volatile int32_t num_waiters_;
420 #else
421   pthread_cond_t cond_;
422 #endif
423   DISALLOW_COPY_AND_ASSIGN(ConditionVariable);
424 };
425 
426 // Scoped locker/unlocker for a regular Mutex that acquires mu upon construction and releases it
427 // upon destruction.
428 class SCOPED_LOCKABLE MutexLock {
429  public:
MutexLock(Thread * self,Mutex & mu)430   explicit MutexLock(Thread* self, Mutex& mu) EXCLUSIVE_LOCK_FUNCTION(mu) : self_(self), mu_(mu) {
431     mu_.ExclusiveLock(self_);
432   }
433 
UNLOCK_FUNCTION()434   ~MutexLock() UNLOCK_FUNCTION() {
435     mu_.ExclusiveUnlock(self_);
436   }
437 
438  private:
439   Thread* const self_;
440   Mutex& mu_;
441   DISALLOW_COPY_AND_ASSIGN(MutexLock);
442 };
443 // Catch bug where variable name is omitted. "MutexLock (lock);" instead of "MutexLock mu(lock)".
444 #define MutexLock(x) static_assert(0, "MutexLock declaration missing variable name")
445 
446 // Scoped locker/unlocker for a ReaderWriterMutex that acquires read access to mu upon
447 // construction and releases it upon destruction.
448 class SCOPED_LOCKABLE ReaderMutexLock {
449  public:
ReaderMutexLock(Thread * self,ReaderWriterMutex & mu)450   explicit ReaderMutexLock(Thread* self, ReaderWriterMutex& mu) EXCLUSIVE_LOCK_FUNCTION(mu) :
451       self_(self), mu_(mu) {
452     mu_.SharedLock(self_);
453   }
454 
UNLOCK_FUNCTION()455   ~ReaderMutexLock() UNLOCK_FUNCTION() {
456     mu_.SharedUnlock(self_);
457   }
458 
459  private:
460   Thread* const self_;
461   ReaderWriterMutex& mu_;
462   DISALLOW_COPY_AND_ASSIGN(ReaderMutexLock);
463 };
464 // Catch bug where variable name is omitted. "ReaderMutexLock (lock);" instead of
465 // "ReaderMutexLock mu(lock)".
466 #define ReaderMutexLock(x) static_assert(0, "ReaderMutexLock declaration missing variable name")
467 
468 // Scoped locker/unlocker for a ReaderWriterMutex that acquires write access to mu upon
469 // construction and releases it upon destruction.
470 class SCOPED_LOCKABLE WriterMutexLock {
471  public:
WriterMutexLock(Thread * self,ReaderWriterMutex & mu)472   explicit WriterMutexLock(Thread* self, ReaderWriterMutex& mu) EXCLUSIVE_LOCK_FUNCTION(mu) :
473       self_(self), mu_(mu) {
474     mu_.ExclusiveLock(self_);
475   }
476 
UNLOCK_FUNCTION()477   ~WriterMutexLock() UNLOCK_FUNCTION() {
478     mu_.ExclusiveUnlock(self_);
479   }
480 
481  private:
482   Thread* const self_;
483   ReaderWriterMutex& mu_;
484   DISALLOW_COPY_AND_ASSIGN(WriterMutexLock);
485 };
486 // Catch bug where variable name is omitted. "WriterMutexLock (lock);" instead of
487 // "WriterMutexLock mu(lock)".
488 #define WriterMutexLock(x) static_assert(0, "WriterMutexLock declaration missing variable name")
489 
490 // Global mutexes corresponding to the levels above.
491 class Locks {
492  public:
493   static void Init();
494   static void InitConditions() NO_THREAD_SAFETY_ANALYSIS;  // Condition variables.
495   // Guards allocation entrypoint instrumenting.
496   static Mutex* instrument_entrypoints_lock_;
497 
498   // The mutator_lock_ is used to allow mutators to execute in a shared (reader) mode or to block
499   // mutators by having an exclusive (writer) owner. In normal execution each mutator thread holds
500   // a share on the mutator_lock_. The garbage collector may also execute with shared access but
501   // at times requires exclusive access to the heap (not to be confused with the heap meta-data
502   // guarded by the heap_lock_ below). When the garbage collector requires exclusive access it asks
503   // the mutators to suspend themselves which also involves usage of the thread_suspend_count_lock_
504   // to cover weaknesses in using ReaderWriterMutexes with ConditionVariables. We use a condition
505   // variable to wait upon in the suspension logic as releasing and then re-acquiring a share on
506   // the mutator lock doesn't necessarily allow the exclusive user (e.g the garbage collector)
507   // chance to acquire the lock.
508   //
509   // Thread suspension:
510   // Shared users                                  | Exclusive user
511   // (holding mutator lock and in kRunnable state) |   .. running ..
512   //   .. running ..                               | Request thread suspension by:
513   //   .. running ..                               |   - acquiring thread_suspend_count_lock_
514   //   .. running ..                               |   - incrementing Thread::suspend_count_ on
515   //   .. running ..                               |     all mutator threads
516   //   .. running ..                               |   - releasing thread_suspend_count_lock_
517   //   .. running ..                               | Block trying to acquire exclusive mutator lock
518   // Poll Thread::suspend_count_ and enter full    |   .. blocked ..
519   // suspend code.                                 |   .. blocked ..
520   // Change state to kSuspended                    |   .. blocked ..
521   // x: Release share on mutator_lock_             | Carry out exclusive access
522   // Acquire thread_suspend_count_lock_            |   .. exclusive ..
523   // while Thread::suspend_count_ > 0              |   .. exclusive ..
524   //   - wait on Thread::resume_cond_              |   .. exclusive ..
525   //     (releases thread_suspend_count_lock_)     |   .. exclusive ..
526   //   .. waiting ..                               | Release mutator_lock_
527   //   .. waiting ..                               | Request thread resumption by:
528   //   .. waiting ..                               |   - acquiring thread_suspend_count_lock_
529   //   .. waiting ..                               |   - decrementing Thread::suspend_count_ on
530   //   .. waiting ..                               |     all mutator threads
531   //   .. waiting ..                               |   - notifying on Thread::resume_cond_
532   //    - re-acquire thread_suspend_count_lock_    |   - releasing thread_suspend_count_lock_
533   // Release thread_suspend_count_lock_            |  .. running ..
534   // Acquire share on mutator_lock_                |  .. running ..
535   //  - This could block but the thread still      |  .. running ..
536   //    has a state of kSuspended and so this      |  .. running ..
537   //    isn't an issue.                            |  .. running ..
538   // Acquire thread_suspend_count_lock_            |  .. running ..
539   //  - we poll here as we're transitioning into   |  .. running ..
540   //    kRunnable and an individual thread suspend |  .. running ..
541   //    request (e.g for debugging) won't try      |  .. running ..
542   //    to acquire the mutator lock (which would   |  .. running ..
543   //    block as we hold the mutator lock). This   |  .. running ..
544   //    poll ensures that if the suspender thought |  .. running ..
545   //    we were suspended by incrementing our      |  .. running ..
546   //    Thread::suspend_count_ and then reading    |  .. running ..
547   //    our state we go back to waiting on         |  .. running ..
548   //    Thread::resume_cond_.                      |  .. running ..
549   // can_go_runnable = Thread::suspend_count_ == 0 |  .. running ..
550   // Release thread_suspend_count_lock_            |  .. running ..
551   // if can_go_runnable                            |  .. running ..
552   //   Change state to kRunnable                   |  .. running ..
553   // else                                          |  .. running ..
554   //   Goto x                                      |  .. running ..
555   //  .. running ..                                |  .. running ..
556   static ReaderWriterMutex* mutator_lock_ ACQUIRED_AFTER(instrument_entrypoints_lock_);
557 
558   // Allow reader-writer mutual exclusion on the mark and live bitmaps of the heap.
559   static ReaderWriterMutex* heap_bitmap_lock_ ACQUIRED_AFTER(mutator_lock_);
560 
561   // Guards shutdown of the runtime.
562   static Mutex* runtime_shutdown_lock_ ACQUIRED_AFTER(heap_bitmap_lock_);
563 
564   // Guards background profiler global state.
565   static Mutex* profiler_lock_ ACQUIRED_AFTER(runtime_shutdown_lock_);
566 
567   // Guards trace (ie traceview) requests.
568   static Mutex* trace_lock_ ACQUIRED_AFTER(profiler_lock_);
569 
570   // Guards debugger recent allocation records.
571   static Mutex* alloc_tracker_lock_ ACQUIRED_AFTER(trace_lock_);
572 
573   // Guards updates to instrumentation to ensure mutual exclusion of
574   // events like deoptimization requests.
575   // TODO: improve name, perhaps instrumentation_update_lock_.
576   static Mutex* deoptimization_lock_ ACQUIRED_AFTER(alloc_tracker_lock_);
577 
578   // The thread_list_lock_ guards ThreadList::list_. It is also commonly held to stop threads
579   // attaching and detaching.
580   static Mutex* thread_list_lock_ ACQUIRED_AFTER(deoptimization_lock_);
581 
582   // Signaled when threads terminate. Used to determine when all non-daemons have terminated.
583   static ConditionVariable* thread_exit_cond_ GUARDED_BY(Locks::thread_list_lock_);
584 
585   // Guards maintaining loading library data structures.
586   static Mutex* jni_libraries_lock_ ACQUIRED_AFTER(thread_list_lock_);
587 
588   // Guards breakpoints.
589   static ReaderWriterMutex* breakpoint_lock_ ACQUIRED_AFTER(jni_libraries_lock_);
590 
591   // Guards lists of classes within the class linker.
592   static ReaderWriterMutex* classlinker_classes_lock_ ACQUIRED_AFTER(breakpoint_lock_);
593 
594   // When declaring any Mutex add DEFAULT_MUTEX_ACQUIRED_AFTER to use annotalysis to check the code
595   // doesn't try to hold a higher level Mutex.
596   #define DEFAULT_MUTEX_ACQUIRED_AFTER ACQUIRED_AFTER(Locks::classlinker_classes_lock_)
597 
598   static Mutex* allocated_monitor_ids_lock_ ACQUIRED_AFTER(classlinker_classes_lock_);
599 
600   // Guard the allocation/deallocation of thread ids.
601   static Mutex* allocated_thread_ids_lock_ ACQUIRED_AFTER(allocated_monitor_ids_lock_);
602 
603   // Guards modification of the LDT on x86.
604   static Mutex* modify_ldt_lock_ ACQUIRED_AFTER(allocated_thread_ids_lock_);
605 
606   // Guards intern table.
607   static Mutex* intern_table_lock_ ACQUIRED_AFTER(modify_ldt_lock_);
608 
609   // Guards reference processor.
610   static Mutex* reference_processor_lock_ ACQUIRED_AFTER(intern_table_lock_);
611 
612   // Guards cleared references queue.
613   static Mutex* reference_queue_cleared_references_lock_ ACQUIRED_AFTER(reference_processor_lock_);
614 
615   // Guards weak references queue.
616   static Mutex* reference_queue_weak_references_lock_ ACQUIRED_AFTER(reference_queue_cleared_references_lock_);
617 
618   // Guards finalizer references queue.
619   static Mutex* reference_queue_finalizer_references_lock_ ACQUIRED_AFTER(reference_queue_weak_references_lock_);
620 
621   // Guards phantom references queue.
622   static Mutex* reference_queue_phantom_references_lock_ ACQUIRED_AFTER(reference_queue_finalizer_references_lock_);
623 
624   // Guards soft references queue.
625   static Mutex* reference_queue_soft_references_lock_ ACQUIRED_AFTER(reference_queue_phantom_references_lock_);
626 
627   // Have an exclusive aborting thread.
628   static Mutex* abort_lock_ ACQUIRED_AFTER(reference_queue_soft_references_lock_);
629 
630   // Allow mutual exclusion when manipulating Thread::suspend_count_.
631   // TODO: Does the trade-off of a per-thread lock make sense?
632   static Mutex* thread_suspend_count_lock_ ACQUIRED_AFTER(abort_lock_);
633 
634   // One unexpected signal at a time lock.
635   static Mutex* unexpected_signal_lock_ ACQUIRED_AFTER(thread_suspend_count_lock_);
636 
637   // Guards the maps in mem_map.
638   static Mutex* mem_maps_lock_ ACQUIRED_AFTER(unexpected_signal_lock_);
639 
640   // Have an exclusive logging thread.
641   static Mutex* logging_lock_ ACQUIRED_AFTER(unexpected_signal_lock_);
642 };
643 
644 }  // namespace art
645 
646 #endif  // ART_RUNTIME_BASE_MUTEX_H_
647