blob: 18a79bc5188c70fe7c18d0741e36eb69d24bffc3 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/thread.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
Ali Tofigh7fa90572022-03-17 15:47:49 +010013#include "absl/strings/string_view.h"
Markus Handell9a21c492022-08-25 11:40:13 +000014#include "api/units/time_delta.h"
15#include "rtc_base/socket_server.h"
Ali Tofigh7fa90572022-03-17 15:47:49 +010016
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#if defined(WEBRTC_WIN)
18#include <comdef.h>
19#elif defined(WEBRTC_POSIX)
20#include <time.h>
Tommi51492422017-12-04 15:18:23 +010021#else
22#error "Either WEBRTC_WIN or WEBRTC_POSIX needs to be defined."
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000023#endif
24
Artem Titov80d02ad2018-05-21 12:20:39 +020025#if defined(WEBRTC_WIN)
26// Disable warning that we don't care about:
27// warning C4722: destructor never returns, potential memory leak
28#pragma warning(disable : 4722)
29#endif
30
Yves Gerey988cc082018-10-23 12:03:01 +020031#include <stdio.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020032
Yves Gerey988cc082018-10-23 12:03:01 +020033#include <utility>
Yves Gerey2e00abc2018-10-05 15:39:24 +020034
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +010035#include "absl/algorithm/container.h"
Danil Chapovalov4bcf8092022-07-06 19:42:34 +020036#include "absl/cleanup/cleanup.h"
Artem Titovd15a5752021-02-10 14:31:24 +010037#include "api/sequence_checker.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020038#include "rtc_base/checks.h"
Markus Handell3cb525b2020-07-16 16:16:09 +020039#include "rtc_base/deprecated/recursive_critical_section.h"
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +020040#include "rtc_base/event.h"
Mirko Bonadeie5f4c6b2021-01-15 10:41:01 +010041#include "rtc_base/internal/default_socket_server.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020042#include "rtc_base/logging.h"
Steve Anton10542f22019-01-11 09:11:00 -080043#include "rtc_base/null_socket_server.h"
Danil Chapovalov3ab76d92022-09-23 12:39:21 +020044#include "rtc_base/synchronization/mutex.h"
Steve Anton10542f22019-01-11 09:11:00 -080045#include "rtc_base/time_utils.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020046#include "rtc_base/trace_event.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000047
Kári Tristan Helgason62b13452018-10-12 12:57:49 +020048#if defined(WEBRTC_MAC)
49#include "rtc_base/system/cocoa_threading.h"
Yves Gerey988cc082018-10-23 12:03:01 +020050
Kári Tristan Helgason62b13452018-10-12 12:57:49 +020051/*
52 * These are forward-declarations for methods that are part of the
53 * ObjC runtime. They are declared in the private header objc-internal.h.
54 * These calls are what clang inserts when using @autoreleasepool in ObjC,
55 * but here they are used directly in order to keep this file C++.
56 * https://clang.llvm.org/docs/AutomaticReferenceCounting.html#runtime-support
57 */
58extern "C" {
59void* objc_autoreleasePoolPush(void);
60void objc_autoreleasePoolPop(void* pool);
61}
62
63namespace {
64class ScopedAutoReleasePool {
65 public:
66 ScopedAutoReleasePool() : pool_(objc_autoreleasePoolPush()) {}
67 ~ScopedAutoReleasePool() { objc_autoreleasePoolPop(pool_); }
68
69 private:
70 void* const pool_;
71};
72} // namespace
73#endif
74
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000075namespace rtc {
Steve Antonbcc1a762019-12-11 11:21:53 -080076namespace {
77
Danil Chapovalov3ab76d92022-09-23 12:39:21 +020078using ::webrtc::MutexLock;
Danil Chapovalov0bd16652022-08-24 18:35:45 +020079using ::webrtc::TimeDelta;
80
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +010081class RTC_SCOPED_LOCKABLE MarkProcessingCritScope {
82 public:
Markus Handell3cb525b2020-07-16 16:16:09 +020083 MarkProcessingCritScope(const RecursiveCriticalSection* cs,
84 size_t* processing) RTC_EXCLUSIVE_LOCK_FUNCTION(cs)
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +010085 : cs_(cs), processing_(processing) {
86 cs_->Enter();
87 *processing_ += 1;
88 }
89
90 ~MarkProcessingCritScope() RTC_UNLOCK_FUNCTION() {
91 *processing_ -= 1;
92 cs_->Leave();
93 }
94
Byoungchan Lee14af7622022-01-12 05:24:58 +090095 MarkProcessingCritScope(const MarkProcessingCritScope&) = delete;
96 MarkProcessingCritScope& operator=(const MarkProcessingCritScope&) = delete;
97
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +010098 private:
Markus Handell3cb525b2020-07-16 16:16:09 +020099 const RecursiveCriticalSection* const cs_;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100100 size_t* processing_;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100101};
102
Steve Antonbcc1a762019-12-11 11:21:53 -0800103} // namespace
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000104
105ThreadManager* ThreadManager::Instance() {
Niels Möller14682a32018-05-24 08:54:25 +0200106 static ThreadManager* const thread_manager = new ThreadManager();
107 return thread_manager;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000108}
109
nisse7866cfe2017-04-26 01:45:31 -0700110ThreadManager::~ThreadManager() {
111 // By above RTC_DEFINE_STATIC_LOCAL.
Artem Titovd3251962021-11-15 16:57:07 +0100112 RTC_DCHECK_NOTREACHED() << "ThreadManager should never be destructed.";
nisse7866cfe2017-04-26 01:45:31 -0700113}
114
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000115// static
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100116void ThreadManager::Add(Thread* message_queue) {
117 return Instance()->AddInternal(message_queue);
118}
119void ThreadManager::AddInternal(Thread* message_queue) {
120 CritScope cs(&crit_);
121 // Prevent changes while the list of message queues is processed.
122 RTC_DCHECK_EQ(processing_, 0);
123 message_queues_.push_back(message_queue);
124}
125
126// static
127void ThreadManager::Remove(Thread* message_queue) {
128 return Instance()->RemoveInternal(message_queue);
129}
130void ThreadManager::RemoveInternal(Thread* message_queue) {
131 {
132 CritScope cs(&crit_);
133 // Prevent changes while the list of message queues is processed.
134 RTC_DCHECK_EQ(processing_, 0);
135 std::vector<Thread*>::iterator iter;
136 iter = absl::c_find(message_queues_, message_queue);
137 if (iter != message_queues_.end()) {
138 message_queues_.erase(iter);
139 }
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100140#if RTC_DCHECK_IS_ON
141 RemoveFromSendGraph(message_queue);
142#endif
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100143 }
144}
145
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100146#if RTC_DCHECK_IS_ON
147void ThreadManager::RemoveFromSendGraph(Thread* thread) {
148 for (auto it = send_graph_.begin(); it != send_graph_.end();) {
149 if (it->first == thread) {
150 it = send_graph_.erase(it);
151 } else {
152 it->second.erase(thread);
153 ++it;
154 }
155 }
156}
157
158void ThreadManager::RegisterSendAndCheckForCycles(Thread* source,
159 Thread* target) {
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200160 RTC_DCHECK(source);
161 RTC_DCHECK(target);
162
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100163 CritScope cs(&crit_);
164 std::deque<Thread*> all_targets({target});
165 // We check the pre-existing who-sends-to-who graph for any path from target
166 // to source. This loop is guaranteed to terminate because per the send graph
167 // invariant, there are no cycles in the graph.
Jianjun Zhuc33eeab2020-05-26 17:43:17 +0800168 for (size_t i = 0; i < all_targets.size(); i++) {
169 const auto& targets = send_graph_[all_targets[i]];
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100170 all_targets.insert(all_targets.end(), targets.begin(), targets.end());
171 }
172 RTC_CHECK_EQ(absl::c_count(all_targets, source), 0)
173 << " send loop between " << source->name() << " and " << target->name();
174
175 // We may now insert source -> target without creating a cycle, since there
176 // was no path from target to source per the prior CHECK.
177 send_graph_[source].insert(target);
178}
179#endif
180
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100181// static
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100182void ThreadManager::ProcessAllMessageQueuesForTesting() {
183 return Instance()->ProcessAllMessageQueuesInternal();
184}
185
186void ThreadManager::ProcessAllMessageQueuesInternal() {
187 // This works by posting a delayed message at the current time and waiting
188 // for it to be dispatched on all queues, which will ensure that all messages
189 // that came before it were also dispatched.
Niels Möller7a669002022-06-27 09:47:02 +0200190 std::atomic<int> queues_not_done(0);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100191
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100192 {
193 MarkProcessingCritScope cs(&crit_, &processing_);
194 for (Thread* queue : message_queues_) {
195 if (!queue->IsProcessingMessagesForTesting()) {
196 // If the queue is not processing messages, it can
197 // be ignored. If we tried to post a message to it, it would be dropped
198 // or ignored.
199 continue;
200 }
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200201 queues_not_done.fetch_add(1);
202 // Whether the task is processed, or the thread is simply cleared,
203 // queues_not_done gets decremented.
204 absl::Cleanup sub = [&queues_not_done] { queues_not_done.fetch_sub(1); };
205 // Post delayed task instead of regular task to wait for all delayed tasks
206 // that are ready for processing.
207 queue->PostDelayedTask([sub = std::move(sub)] {}, TimeDelta::Zero());
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100208 }
209 }
210
211 rtc::Thread* current = rtc::Thread::Current();
212 // Note: One of the message queues may have been on this thread, which is
213 // why we can't synchronously wait for queues_not_done to go to 0; we need
214 // to process messages as well.
Niels Möller7a669002022-06-27 09:47:02 +0200215 while (queues_not_done.load() > 0) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100216 if (current) {
217 current->ProcessMessages(0);
218 }
219 }
220}
221
222// static
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000223Thread* Thread::Current() {
nisse7866cfe2017-04-26 01:45:31 -0700224 ThreadManager* manager = ThreadManager::Instance();
225 Thread* thread = manager->CurrentThread();
226
nisse7866cfe2017-04-26 01:45:31 -0700227 return thread;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000228}
229
230#if defined(WEBRTC_POSIX)
Niels Möller98d26df2022-02-07 10:35:29 +0100231ThreadManager::ThreadManager() {
Kári Tristan Helgason62b13452018-10-12 12:57:49 +0200232#if defined(WEBRTC_MAC)
233 InitCocoaMultiThreading();
234#endif
deadbeef37f5ecf2017-02-27 14:06:41 -0800235 pthread_key_create(&key_, nullptr);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000236}
237
Yves Gerey665174f2018-06-19 15:03:05 +0200238Thread* ThreadManager::CurrentThread() {
239 return static_cast<Thread*>(pthread_getspecific(key_));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000240}
241
Sebastian Jansson178a6852020-01-14 11:12:26 +0100242void ThreadManager::SetCurrentThreadInternal(Thread* thread) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000243 pthread_setspecific(key_, thread);
244}
245#endif
246
247#if defined(WEBRTC_WIN)
Niels Möller98d26df2022-02-07 10:35:29 +0100248ThreadManager::ThreadManager() : key_(TlsAlloc()) {}
Yves Gerey665174f2018-06-19 15:03:05 +0200249
250Thread* ThreadManager::CurrentThread() {
251 return static_cast<Thread*>(TlsGetValue(key_));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000252}
253
Sebastian Jansson178a6852020-01-14 11:12:26 +0100254void ThreadManager::SetCurrentThreadInternal(Thread* thread) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000255 TlsSetValue(key_, thread);
256}
257#endif
258
Sebastian Jansson178a6852020-01-14 11:12:26 +0100259void ThreadManager::SetCurrentThread(Thread* thread) {
260#if RTC_DLOG_IS_ON
261 if (CurrentThread() && thread) {
262 RTC_DLOG(LS_ERROR) << "SetCurrentThread: Overwriting an existing value?";
263 }
264#endif // RTC_DLOG_IS_ON
Tommi6866dc72020-05-15 10:11:56 +0200265
266 if (thread) {
267 thread->EnsureIsCurrentTaskQueue();
268 } else {
269 Thread* current = CurrentThread();
270 if (current) {
271 // The current thread is being cleared, e.g. as a result of
272 // UnwrapCurrent() being called or when a thread is being stopped
273 // (see PreRun()). This signals that the Thread instance is being detached
274 // from the thread, which also means that TaskQueue::Current() must not
275 // return a pointer to the Thread instance.
276 current->ClearCurrentTaskQueue();
277 }
278 }
279
Sebastian Jansson178a6852020-01-14 11:12:26 +0100280 SetCurrentThreadInternal(thread);
281}
282
283void rtc::ThreadManager::ChangeCurrentThreadForTest(rtc::Thread* thread) {
284 SetCurrentThreadInternal(thread);
285}
286
Yves Gerey665174f2018-06-19 15:03:05 +0200287Thread* ThreadManager::WrapCurrentThread() {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000288 Thread* result = CurrentThread();
deadbeef37f5ecf2017-02-27 14:06:41 -0800289 if (nullptr == result) {
Mirko Bonadeie5f4c6b2021-01-15 10:41:01 +0100290 result = new Thread(CreateDefaultSocketServer());
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000291 result->WrapCurrentWithThreadManager(this, true);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000292 }
293 return result;
294}
295
296void ThreadManager::UnwrapCurrentThread() {
297 Thread* t = CurrentThread();
298 if (t && !(t->IsOwned())) {
299 t->UnwrapCurrent();
300 delete t;
301 }
302}
303
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000304Thread::ScopedDisallowBlockingCalls::ScopedDisallowBlockingCalls()
Yves Gerey665174f2018-06-19 15:03:05 +0200305 : thread_(Thread::Current()),
306 previous_state_(thread_->SetAllowBlockingCalls(false)) {}
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000307
308Thread::ScopedDisallowBlockingCalls::~ScopedDisallowBlockingCalls() {
nisseede5da42017-01-12 05:15:36 -0800309 RTC_DCHECK(thread_->IsCurrent());
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000310 thread_->SetAllowBlockingCalls(previous_state_);
311}
312
Tommife041642021-04-07 10:08:28 +0200313#if RTC_DCHECK_IS_ON
314Thread::ScopedCountBlockingCalls::ScopedCountBlockingCalls(
315 std::function<void(uint32_t, uint32_t)> callback)
316 : thread_(Thread::Current()),
317 base_blocking_call_count_(thread_->GetBlockingCallCount()),
318 base_could_be_blocking_call_count_(
319 thread_->GetCouldBeBlockingCallCount()),
320 result_callback_(std::move(callback)) {}
321
322Thread::ScopedCountBlockingCalls::~ScopedCountBlockingCalls() {
Tomas Gunnarsson89f3dd52021-04-14 12:54:10 +0200323 if (GetTotalBlockedCallCount() >= min_blocking_calls_for_callback_) {
324 result_callback_(GetBlockingCallCount(), GetCouldBeBlockingCallCount());
325 }
Tommife041642021-04-07 10:08:28 +0200326}
327
328uint32_t Thread::ScopedCountBlockingCalls::GetBlockingCallCount() const {
329 return thread_->GetBlockingCallCount() - base_blocking_call_count_;
330}
331
332uint32_t Thread::ScopedCountBlockingCalls::GetCouldBeBlockingCallCount() const {
333 return thread_->GetCouldBeBlockingCallCount() -
334 base_could_be_blocking_call_count_;
335}
336
337uint32_t Thread::ScopedCountBlockingCalls::GetTotalBlockedCallCount() const {
338 return GetBlockingCallCount() + GetCouldBeBlockingCallCount();
339}
340#endif
341
Taylor Brandstetter08672602018-03-02 15:20:33 -0800342Thread::Thread(SocketServer* ss) : Thread(ss, /*do_init=*/true) {}
danilchapbebf54c2016-04-28 01:32:48 -0700343
344Thread::Thread(std::unique_ptr<SocketServer> ss)
Taylor Brandstetter08672602018-03-02 15:20:33 -0800345 : Thread(std::move(ss), /*do_init=*/true) {}
346
347Thread::Thread(SocketServer* ss, bool do_init)
Danil Chapovalov207f8532022-08-24 12:19:46 +0200348 : delayed_next_num_(0),
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100349 fInitialized_(false),
350 fDestroyed_(false),
351 stop_(0),
352 ss_(ss) {
353 RTC_DCHECK(ss);
354 ss_->SetMessageQueue(this);
Taylor Brandstetter08672602018-03-02 15:20:33 -0800355 SetName("Thread", this); // default name
356 if (do_init) {
357 DoInit();
358 }
359}
360
361Thread::Thread(std::unique_ptr<SocketServer> ss, bool do_init)
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100362 : Thread(ss.get(), do_init) {
363 own_ss_ = std::move(ss);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000364}
365
366Thread::~Thread() {
367 Stop();
jbauch25d1f282016-02-05 00:25:02 -0800368 DoDestroy();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000369}
370
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100371void Thread::DoInit() {
372 if (fInitialized_) {
373 return;
374 }
375
376 fInitialized_ = true;
377 ThreadManager::Add(this);
378}
379
380void Thread::DoDestroy() {
381 if (fDestroyed_) {
382 return;
383 }
384
385 fDestroyed_ = true;
386 // The signal is done from here to ensure
387 // that it always gets called when the queue
388 // is going away.
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100389 if (ss_) {
390 ss_->SetMessageQueue(nullptr);
391 }
Niels Möller9bd24572021-04-19 12:18:27 +0200392 ThreadManager::Remove(this);
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200393 // Clear.
394 messages_ = {};
395 delayed_messages_ = {};
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100396}
397
398SocketServer* Thread::socketserver() {
399 return ss_;
400}
401
402void Thread::WakeUpSocketServer() {
403 ss_->WakeUp();
404}
405
406void Thread::Quit() {
Niels Möller7a669002022-06-27 09:47:02 +0200407 stop_.store(1, std::memory_order_release);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100408 WakeUpSocketServer();
409}
410
411bool Thread::IsQuitting() {
Niels Möller7a669002022-06-27 09:47:02 +0200412 return stop_.load(std::memory_order_acquire) != 0;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100413}
414
415void Thread::Restart() {
Niels Möller7a669002022-06-27 09:47:02 +0200416 stop_.store(0, std::memory_order_release);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100417}
418
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200419absl::AnyInvocable<void() &&> Thread::Get(int cmsWait) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100420 // Get w/wait + timer scan / dispatch + socket / event multiplexer dispatch
421
422 int64_t cmsTotal = cmsWait;
423 int64_t cmsElapsed = 0;
424 int64_t msStart = TimeMillis();
425 int64_t msCurrent = msStart;
426 while (true) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100427 // Check for posted events
428 int64_t cmsDelayNext = kForever;
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200429 {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100430 // All queue operations need to be locked, but nothing else in this loop
Danil Chapovalov3ab76d92022-09-23 12:39:21 +0200431 // can happen while holding the `mutex_`.
432 MutexLock lock(&mutex_);
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200433 // Check for delayed messages that have been triggered and calculate the
434 // next trigger time.
435 while (!delayed_messages_.empty()) {
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200436 if (msCurrent < delayed_messages_.top().run_time_ms) {
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200437 cmsDelayNext =
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200438 TimeDiff(delayed_messages_.top().run_time_ms, msCurrent);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100439 break;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100440 }
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200441 messages_.push(std::move(delayed_messages_.top().functor));
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200442 delayed_messages_.pop();
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100443 }
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200444 // Pull a message off the message queue, if available.
445 if (!messages_.empty()) {
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200446 absl::AnyInvocable<void()&&> task = std::move(messages_.front());
447 messages_.pop();
448 return task;
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200449 }
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100450 }
451
452 if (IsQuitting())
453 break;
454
455 // Which is shorter, the delay wait or the asked wait?
456
457 int64_t cmsNext;
458 if (cmsWait == kForever) {
459 cmsNext = cmsDelayNext;
460 } else {
461 cmsNext = std::max<int64_t>(0, cmsTotal - cmsElapsed);
462 if ((cmsDelayNext != kForever) && (cmsDelayNext < cmsNext))
463 cmsNext = cmsDelayNext;
464 }
465
466 {
467 // Wait and multiplex in the meantime
Markus Handell9a21c492022-08-25 11:40:13 +0000468 if (!ss_->Wait(cmsNext == kForever ? SocketServer::kForever
469 : webrtc::TimeDelta::Millis(cmsNext),
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200470 /*process_io=*/true))
471 return nullptr;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100472 }
473
474 // If the specified timeout expired, return
475
476 msCurrent = TimeMillis();
477 cmsElapsed = TimeDiff(msCurrent, msStart);
478 if (cmsWait != kForever) {
479 if (cmsElapsed >= cmsWait)
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200480 return nullptr;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100481 }
482 }
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200483 return nullptr;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100484}
485
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200486void Thread::PostTask(absl::AnyInvocable<void() &&> task) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100487 if (IsQuitting()) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100488 return;
489 }
490
491 // Keep thread safe
492 // Add the message to the end of the queue
493 // Signal for the multiplexer to return
494
495 {
Danil Chapovalov3ab76d92022-09-23 12:39:21 +0200496 MutexLock lock(&mutex_);
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200497 messages_.push(std::move(task));
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100498 }
499 WakeUpSocketServer();
500}
501
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200502void Thread::PostDelayedHighPrecisionTask(absl::AnyInvocable<void() &&> task,
503 webrtc::TimeDelta delay) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100504 if (IsQuitting()) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100505 return;
506 }
507
508 // Keep thread safe
509 // Add to the priority queue. Gets sorted soonest first.
510 // Signal for the multiplexer to return.
511
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200512 int64_t delay_ms = delay.RoundUpTo(webrtc::TimeDelta::Millis(1)).ms<int>();
513 int64_t run_time_ms = TimeAfter(delay_ms);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100514 {
Danil Chapovalov3ab76d92022-09-23 12:39:21 +0200515 MutexLock lock(&mutex_);
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200516 delayed_messages_.push({.delay_ms = delay_ms,
517 .run_time_ms = run_time_ms,
518 .message_number = delayed_next_num_,
519 .functor = std::move(task)});
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100520 // If this message queue processes 1 message every millisecond for 50 days,
521 // we will wrap this number. Even then, only messages with identical times
522 // will be misordered, and then only briefly. This is probably ok.
Sebastian Jansson61380c02020-01-17 14:46:08 +0100523 ++delayed_next_num_;
524 RTC_DCHECK_NE(0, delayed_next_num_);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100525 }
526 WakeUpSocketServer();
527}
528
529int Thread::GetDelay() {
Danil Chapovalov3ab76d92022-09-23 12:39:21 +0200530 MutexLock lock(&mutex_);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100531
Sebastian Jansson61380c02020-01-17 14:46:08 +0100532 if (!messages_.empty())
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100533 return 0;
534
Sebastian Jansson61380c02020-01-17 14:46:08 +0100535 if (!delayed_messages_.empty()) {
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200536 int delay = TimeUntil(delayed_messages_.top().run_time_ms);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100537 if (delay < 0)
538 delay = 0;
539 return delay;
540 }
541
542 return kForever;
543}
544
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200545void Thread::Dispatch(absl::AnyInvocable<void() &&> task) {
546 TRACE_EVENT0("webrtc", "Thread::Dispatch");
Harald Alvestrandba694422021-01-27 21:52:14 +0000547 RTC_DCHECK_RUN_ON(this);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100548 int64_t start_time = TimeMillis();
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200549 std::move(task)();
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100550 int64_t end_time = TimeMillis();
551 int64_t diff = TimeDiff(end_time, start_time);
Harald Alvestrandba694422021-01-27 21:52:14 +0000552 if (diff >= dispatch_warning_ms_) {
553 RTC_LOG(LS_INFO) << "Message to " << name() << " took " << diff
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200554 << "ms to dispatch.";
Harald Alvestrandba694422021-01-27 21:52:14 +0000555 // To avoid log spew, move the warning limit to only give warning
556 // for delays that are larger than the one observed.
557 dispatch_warning_ms_ = diff + 1;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100558 }
559}
560
nisse7866cfe2017-04-26 01:45:31 -0700561bool Thread::IsCurrent() const {
562 return ThreadManager::Instance()->CurrentThread() == this;
563}
564
danilchapbebf54c2016-04-28 01:32:48 -0700565std::unique_ptr<Thread> Thread::CreateWithSocketServer() {
Mirko Bonadeie5f4c6b2021-01-15 10:41:01 +0100566 return std::unique_ptr<Thread>(new Thread(CreateDefaultSocketServer()));
danilchapbebf54c2016-04-28 01:32:48 -0700567}
568
569std::unique_ptr<Thread> Thread::Create() {
570 return std::unique_ptr<Thread>(
571 new Thread(std::unique_ptr<SocketServer>(new NullSocketServer())));
572}
573
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000574bool Thread::SleepMs(int milliseconds) {
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000575 AssertBlockingIsAllowedOnCurrentThread();
576
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000577#if defined(WEBRTC_WIN)
578 ::Sleep(milliseconds);
579 return true;
580#else
581 // POSIX has both a usleep() and a nanosleep(), but the former is deprecated,
582 // so we use nanosleep() even though it has greater precision than necessary.
583 struct timespec ts;
584 ts.tv_sec = milliseconds / 1000;
585 ts.tv_nsec = (milliseconds % 1000) * 1000000;
deadbeef37f5ecf2017-02-27 14:06:41 -0800586 int ret = nanosleep(&ts, nullptr);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000587 if (ret != 0) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100588 RTC_LOG_ERR(LS_WARNING) << "nanosleep() returning early";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000589 return false;
590 }
591 return true;
592#endif
593}
594
Ali Tofigh7fa90572022-03-17 15:47:49 +0100595bool Thread::SetName(absl::string_view name, const void* obj) {
Tommi51492422017-12-04 15:18:23 +0100596 RTC_DCHECK(!IsRunning());
597
Ali Tofigh7fa90572022-03-17 15:47:49 +0100598 name_ = std::string(name);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000599 if (obj) {
Niels Mölleraba06332018-10-16 15:14:15 +0200600 // The %p specifier typically produce at most 16 hex digits, possibly with a
601 // 0x prefix. But format is implementation defined, so add some margin.
602 char buf[30];
603 snprintf(buf, sizeof(buf), " 0x%p", obj);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000604 name_ += buf;
605 }
606 return true;
607}
608
Harald Alvestrandba694422021-01-27 21:52:14 +0000609void Thread::SetDispatchWarningMs(int deadline) {
610 if (!IsCurrent()) {
Danil Chapovalov4bcf8092022-07-06 19:42:34 +0200611 PostTask([this, deadline]() { SetDispatchWarningMs(deadline); });
Harald Alvestrandba694422021-01-27 21:52:14 +0000612 return;
613 }
614 RTC_DCHECK_RUN_ON(this);
615 dispatch_warning_ms_ = deadline;
616}
617
Niels Möllerd2e50132019-06-11 09:24:14 +0200618bool Thread::Start() {
Tommi51492422017-12-04 15:18:23 +0100619 RTC_DCHECK(!IsRunning());
620
621 if (IsRunning())
622 return false;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000623
André Susano Pinto02a57972016-07-22 13:30:05 +0200624 Restart(); // reset IsQuitting() if the thread is being restarted
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000625
626 // Make sure that ThreadManager is created on the main thread before
627 // we start a new thread.
628 ThreadManager::Instance();
629
Tommi51492422017-12-04 15:18:23 +0100630 owned_ = true;
631
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000632#if defined(WEBRTC_WIN)
Niels Möllerd2e50132019-06-11 09:24:14 +0200633 thread_ = CreateThread(nullptr, 0, PreRun, this, 0, &thread_id_);
Tommi51492422017-12-04 15:18:23 +0100634 if (!thread_) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000635 return false;
636 }
637#elif defined(WEBRTC_POSIX)
638 pthread_attr_t attr;
639 pthread_attr_init(&attr);
640
Niels Möllerd2e50132019-06-11 09:24:14 +0200641 int error_code = pthread_create(&thread_, &attr, PreRun, this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000642 if (0 != error_code) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100643 RTC_LOG(LS_ERROR) << "Unable to create pthread, error " << error_code;
Tommi51492422017-12-04 15:18:23 +0100644 thread_ = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000645 return false;
646 }
Tommi51492422017-12-04 15:18:23 +0100647 RTC_DCHECK(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000648#endif
649 return true;
650}
651
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000652bool Thread::WrapCurrent() {
653 return WrapCurrentWithThreadManager(ThreadManager::Instance(), true);
654}
655
656void Thread::UnwrapCurrent() {
657 // Clears the platform-specific thread-specific storage.
deadbeef37f5ecf2017-02-27 14:06:41 -0800658 ThreadManager::Instance()->SetCurrentThread(nullptr);
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000659#if defined(WEBRTC_WIN)
deadbeef37f5ecf2017-02-27 14:06:41 -0800660 if (thread_ != nullptr) {
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000661 if (!CloseHandle(thread_)) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100662 RTC_LOG_GLE(LS_ERROR)
663 << "When unwrapping thread, failed to close handle.";
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000664 }
deadbeef37f5ecf2017-02-27 14:06:41 -0800665 thread_ = nullptr;
Tommi51492422017-12-04 15:18:23 +0100666 thread_id_ = 0;
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000667 }
Tommi51492422017-12-04 15:18:23 +0100668#elif defined(WEBRTC_POSIX)
669 thread_ = 0;
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000670#endif
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000671}
672
673void Thread::SafeWrapCurrent() {
674 WrapCurrentWithThreadManager(ThreadManager::Instance(), false);
675}
676
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000677void Thread::Join() {
Tommi51492422017-12-04 15:18:23 +0100678 if (!IsRunning())
679 return;
680
681 RTC_DCHECK(!IsCurrent());
682 if (Current() && !Current()->blocking_calls_allowed_) {
683 RTC_LOG(LS_WARNING) << "Waiting for the thread to join, "
Jonas Olssonb2b20312020-01-14 12:11:31 +0100684 "but blocking calls have been disallowed";
Tommi51492422017-12-04 15:18:23 +0100685 }
jiayl@webrtc.org1fd362c2014-09-26 16:57:07 +0000686
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000687#if defined(WEBRTC_WIN)
Tommi51492422017-12-04 15:18:23 +0100688 RTC_DCHECK(thread_ != nullptr);
689 WaitForSingleObject(thread_, INFINITE);
690 CloseHandle(thread_);
691 thread_ = nullptr;
692 thread_id_ = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000693#elif defined(WEBRTC_POSIX)
Tommi51492422017-12-04 15:18:23 +0100694 pthread_join(thread_, nullptr);
695 thread_ = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000696#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000697}
698
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000699bool Thread::SetAllowBlockingCalls(bool allow) {
nisseede5da42017-01-12 05:15:36 -0800700 RTC_DCHECK(IsCurrent());
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000701 bool previous = blocking_calls_allowed_;
702 blocking_calls_allowed_ = allow;
703 return previous;
704}
705
706// static
707void Thread::AssertBlockingIsAllowedOnCurrentThread() {
tfarinaa41ab932015-10-30 16:08:48 -0700708#if !defined(NDEBUG)
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000709 Thread* current = Thread::Current();
nisseede5da42017-01-12 05:15:36 -0800710 RTC_DCHECK(!current || current->blocking_calls_allowed_);
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000711#endif
712}
713
deadbeefdc20e262017-01-31 15:10:44 -0800714// static
715#if defined(WEBRTC_WIN)
716DWORD WINAPI Thread::PreRun(LPVOID pv) {
717#else
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000718void* Thread::PreRun(void* pv) {
deadbeefdc20e262017-01-31 15:10:44 -0800719#endif
Niels Möllerd2e50132019-06-11 09:24:14 +0200720 Thread* thread = static_cast<Thread*>(pv);
721 ThreadManager::Instance()->SetCurrentThread(thread);
722 rtc::SetCurrentThreadName(thread->name_.c_str());
Kári Tristan Helgason62b13452018-10-12 12:57:49 +0200723#if defined(WEBRTC_MAC)
724 ScopedAutoReleasePool pool;
725#endif
Niels Möllerd2e50132019-06-11 09:24:14 +0200726 thread->Run();
727
Tommi51492422017-12-04 15:18:23 +0100728 ThreadManager::Instance()->SetCurrentThread(nullptr);
kthelgasonde6adbe2017-02-22 00:42:11 -0800729#ifdef WEBRTC_WIN
730 return 0;
731#else
732 return nullptr;
733#endif
Jonas Olssona4d87372019-07-05 19:08:33 +0200734} // namespace rtc
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000735
736void Thread::Run() {
737 ProcessMessages(kForever);
738}
739
740bool Thread::IsOwned() {
Tommi51492422017-12-04 15:18:23 +0100741 RTC_DCHECK(IsRunning());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000742 return owned_;
743}
744
745void Thread::Stop() {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100746 Thread::Quit();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000747 Join();
748}
749
Danil Chapovalovca1454a2022-09-13 13:12:25 +0200750void Thread::BlockingCall(rtc::FunctionView<void()> functor) {
751 TRACE_EVENT0("webrtc", "Thread::BlockingCall");
752
Sebastian Jansson5d9b9642020-01-17 13:10:54 +0100753 RTC_DCHECK(!IsQuitting());
André Susano Pinto02a57972016-07-22 13:30:05 +0200754 if (IsQuitting())
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000755 return;
756
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000757 if (IsCurrent()) {
Tommife041642021-04-07 10:08:28 +0200758#if RTC_DCHECK_IS_ON
Artem Titov15737162021-05-25 11:17:07 +0200759 RTC_DCHECK(this->IsInvokeToThreadAllowed(this));
Tommife041642021-04-07 10:08:28 +0200760 RTC_DCHECK_RUN_ON(this);
761 could_be_blocking_call_count_++;
762#endif
Danil Chapovalovca1454a2022-09-13 13:12:25 +0200763 functor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000764 return;
765 }
766
jiayl@webrtc.org3987b6d2014-09-24 17:14:05 +0000767 AssertBlockingIsAllowedOnCurrentThread();
768
Yves Gerey665174f2018-06-19 15:03:05 +0200769 Thread* current_thread = Thread::Current();
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200770
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100771#if RTC_DCHECK_IS_ON
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200772 if (current_thread) {
Tommife041642021-04-07 10:08:28 +0200773 RTC_DCHECK_RUN_ON(current_thread);
774 current_thread->blocking_call_count_++;
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200775 RTC_DCHECK(current_thread->IsInvokeToThreadAllowed(this));
776 ThreadManager::Instance()->RegisterSendAndCheckForCycles(current_thread,
777 this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000778 }
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200779#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000780
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200781 // Perhaps down the line we can get rid of this workaround and always require
Danil Chapovalovca1454a2022-09-13 13:12:25 +0200782 // current_thread to be valid when BlockingCall() is called.
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200783 std::unique_ptr<rtc::Event> done_event;
784 if (!current_thread)
785 done_event.reset(new rtc::Event());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000786
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200787 bool ready = false;
Danil Chapovalov4bcf8092022-07-06 19:42:34 +0200788 absl::Cleanup cleanup = [this, &ready, current_thread,
789 done = done_event.get()] {
790 if (current_thread) {
Danil Chapovalov3ab76d92022-09-23 12:39:21 +0200791 {
792 MutexLock lock(&mutex_);
793 ready = true;
794 }
Danil Chapovalov4bcf8092022-07-06 19:42:34 +0200795 current_thread->socketserver()->WakeUp();
796 } else {
797 done->Set();
798 }
799 };
Danil Chapovalovca1454a2022-09-13 13:12:25 +0200800 PostTask([functor, cleanup = std::move(cleanup)] { functor(); });
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200801 if (current_thread) {
802 bool waited = false;
Danil Chapovalov3ab76d92022-09-23 12:39:21 +0200803 mutex_.Lock();
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200804 while (!ready) {
Danil Chapovalov3ab76d92022-09-23 12:39:21 +0200805 mutex_.Unlock();
Markus Handell9a21c492022-08-25 11:40:13 +0000806 current_thread->socketserver()->Wait(SocketServer::kForever, false);
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200807 waited = true;
Danil Chapovalov3ab76d92022-09-23 12:39:21 +0200808 mutex_.Lock();
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200809 }
Danil Chapovalov3ab76d92022-09-23 12:39:21 +0200810 mutex_.Unlock();
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200811
812 // Our Wait loop above may have consumed some WakeUp events for this
813 // Thread, that weren't relevant to this Send. Losing these WakeUps can
814 // cause problems for some SocketServers.
815 //
816 // Concrete example:
817 // Win32SocketServer on thread A calls Send on thread B. While processing
818 // the message, thread B Posts a message to A. We consume the wakeup for
819 // that Post while waiting for the Send to complete, which means that when
820 // we exit this loop, we need to issue another WakeUp, or else the Posted
821 // message won't be processed in a timely manner.
822
823 if (waited) {
824 current_thread->socketserver()->WakeUp();
825 }
826 } else {
827 done_event->Wait(rtc::Event::kForever);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000828 }
829}
830
Tommi6866dc72020-05-15 10:11:56 +0200831// Called by the ThreadManager when being set as the current thread.
832void Thread::EnsureIsCurrentTaskQueue() {
833 task_queue_registration_ =
834 std::make_unique<TaskQueueBase::CurrentTaskQueueSetter>(this);
835}
836
837// Called by the ThreadManager when being set as the current thread.
838void Thread::ClearCurrentTaskQueue() {
839 task_queue_registration_.reset();
840}
841
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200842void Thread::AllowInvokesToThread(Thread* thread) {
Mirko Bonadei481e3452021-07-30 13:57:25 +0200843#if (!defined(NDEBUG) || RTC_DCHECK_IS_ON)
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200844 if (!IsCurrent()) {
Danil Chapovalov5286dcf2022-07-18 17:04:56 +0200845 PostTask([thread, this]() { AllowInvokesToThread(thread); });
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200846 return;
847 }
848 RTC_DCHECK_RUN_ON(this);
849 allowed_threads_.push_back(thread);
850 invoke_policy_enabled_ = true;
851#endif
852}
853
854void Thread::DisallowAllInvokes() {
Mirko Bonadei481e3452021-07-30 13:57:25 +0200855#if (!defined(NDEBUG) || RTC_DCHECK_IS_ON)
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200856 if (!IsCurrent()) {
Danil Chapovalov5286dcf2022-07-18 17:04:56 +0200857 PostTask([this]() { DisallowAllInvokes(); });
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200858 return;
859 }
860 RTC_DCHECK_RUN_ON(this);
861 allowed_threads_.clear();
862 invoke_policy_enabled_ = true;
863#endif
864}
865
Tommife041642021-04-07 10:08:28 +0200866#if RTC_DCHECK_IS_ON
867uint32_t Thread::GetBlockingCallCount() const {
868 RTC_DCHECK_RUN_ON(this);
869 return blocking_call_count_;
870}
871uint32_t Thread::GetCouldBeBlockingCallCount() const {
872 RTC_DCHECK_RUN_ON(this);
873 return could_be_blocking_call_count_;
874}
875#endif
876
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200877// Returns true if no policies added or if there is at least one policy
Artem Titov96e3b992021-07-26 16:03:14 +0200878// that permits invocation to `target` thread.
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200879bool Thread::IsInvokeToThreadAllowed(rtc::Thread* target) {
Mirko Bonadei481e3452021-07-30 13:57:25 +0200880#if (!defined(NDEBUG) || RTC_DCHECK_IS_ON)
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200881 RTC_DCHECK_RUN_ON(this);
882 if (!invoke_policy_enabled_) {
883 return true;
884 }
885 for (const auto* thread : allowed_threads_) {
886 if (thread == target) {
887 return true;
888 }
889 }
890 return false;
891#else
892 return true;
893#endif
894}
895
Danil Chapovalov912b3b82019-11-22 15:52:40 +0100896void Thread::Delete() {
897 Stop();
898 delete this;
899}
900
Danil Chapovalov4bcf8092022-07-06 19:42:34 +0200901void Thread::PostDelayedTask(absl::AnyInvocable<void() &&> task,
902 webrtc::TimeDelta delay) {
903 // This implementation does not support low precision yet.
904 PostDelayedHighPrecisionTask(std::move(task), delay);
905}
906
Niels Möller8909a632018-09-06 08:42:44 +0200907bool Thread::IsProcessingMessagesForTesting() {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100908 return (owned_ || IsCurrent()) && !IsQuitting();
Niels Möller8909a632018-09-06 08:42:44 +0200909}
910
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000911bool Thread::ProcessMessages(int cmsLoop) {
deadbeef22e08142017-06-12 14:30:28 -0700912 // Using ProcessMessages with a custom clock for testing and a time greater
913 // than 0 doesn't work, since it's not guaranteed to advance the custom
914 // clock's time, and may get stuck in an infinite loop.
915 RTC_DCHECK(GetClockForTesting() == nullptr || cmsLoop == 0 ||
916 cmsLoop == kForever);
Honghai Zhang82d78622016-05-06 11:29:15 -0700917 int64_t msEnd = (kForever == cmsLoop) ? 0 : TimeAfter(cmsLoop);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000918 int cmsNext = cmsLoop;
919
920 while (true) {
Kári Tristan Helgason62b13452018-10-12 12:57:49 +0200921#if defined(WEBRTC_MAC)
922 ScopedAutoReleasePool pool;
923#endif
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200924 absl::AnyInvocable<void()&&> task = Get(cmsNext);
925 if (!task)
kthelgasonde6adbe2017-02-22 00:42:11 -0800926 return !IsQuitting();
Danil Chapovalovd44e3412022-09-16 17:26:10 +0200927 Dispatch(std::move(task));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000928
kthelgasonde6adbe2017-02-22 00:42:11 -0800929 if (cmsLoop != kForever) {
930 cmsNext = static_cast<int>(TimeUntil(msEnd));
931 if (cmsNext < 0)
932 return true;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000933 }
934 }
935}
936
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000937bool Thread::WrapCurrentWithThreadManager(ThreadManager* thread_manager,
938 bool need_synchronize_access) {
Tommi51492422017-12-04 15:18:23 +0100939 RTC_DCHECK(!IsRunning());
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000940
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000941#if defined(WEBRTC_WIN)
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000942 if (need_synchronize_access) {
943 // We explicitly ask for no rights other than synchronization.
944 // This gives us the best chance of succeeding.
945 thread_ = OpenThread(SYNCHRONIZE, FALSE, GetCurrentThreadId());
946 if (!thread_) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100947 RTC_LOG_GLE(LS_ERROR) << "Unable to get handle to thread.";
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000948 return false;
949 }
950 thread_id_ = GetCurrentThreadId();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000951 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000952#elif defined(WEBRTC_POSIX)
953 thread_ = pthread_self();
954#endif
955 owned_ = false;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000956 thread_manager->SetCurrentThread(this);
957 return true;
958}
959
Tommi51492422017-12-04 15:18:23 +0100960bool Thread::IsRunning() {
Tommi51492422017-12-04 15:18:23 +0100961#if defined(WEBRTC_WIN)
962 return thread_ != nullptr;
963#elif defined(WEBRTC_POSIX)
964 return thread_ != 0;
965#endif
966}
967
Taylor Brandstetter08672602018-03-02 15:20:33 -0800968AutoThread::AutoThread()
Mirko Bonadeie5f4c6b2021-01-15 10:41:01 +0100969 : Thread(CreateDefaultSocketServer(), /*do_init=*/false) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000970 if (!ThreadManager::Instance()->CurrentThread()) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100971 // DoInit registers with ThreadManager. Do that only if we intend to
Niels Möller5a8f8602019-06-12 11:30:59 +0200972 // be rtc::Thread::Current(), otherwise ProcessAllMessageQueuesInternal will
973 // post a message to a queue that no running thread is serving.
974 DoInit();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000975 ThreadManager::Instance()->SetCurrentThread(this);
976 }
977}
978
979AutoThread::~AutoThread() {
980 Stop();
Steve Anton3b80aac2017-10-19 10:17:12 -0700981 DoDestroy();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000982 if (ThreadManager::Instance()->CurrentThread() == this) {
deadbeef37f5ecf2017-02-27 14:06:41 -0800983 ThreadManager::Instance()->SetCurrentThread(nullptr);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000984 }
985}
986
nisse7eaa4ea2017-05-08 05:25:41 -0700987AutoSocketServerThread::AutoSocketServerThread(SocketServer* ss)
Taylor Brandstetter08672602018-03-02 15:20:33 -0800988 : Thread(ss, /*do_init=*/false) {
989 DoInit();
nisse7eaa4ea2017-05-08 05:25:41 -0700990 old_thread_ = ThreadManager::Instance()->CurrentThread();
Tommi51492422017-12-04 15:18:23 +0100991 // Temporarily set the current thread to nullptr so that we can keep checks
992 // around that catch unintentional pointer overwrites.
993 rtc::ThreadManager::Instance()->SetCurrentThread(nullptr);
nisse7eaa4ea2017-05-08 05:25:41 -0700994 rtc::ThreadManager::Instance()->SetCurrentThread(this);
995 if (old_thread_) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100996 ThreadManager::Remove(old_thread_);
nisse7eaa4ea2017-05-08 05:25:41 -0700997 }
998}
999
1000AutoSocketServerThread::~AutoSocketServerThread() {
1001 RTC_DCHECK(ThreadManager::Instance()->CurrentThread() == this);
Steve Anton3b80aac2017-10-19 10:17:12 -07001002 // Stop and destroy the thread before clearing it as the current thread.
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +01001003 // Sometimes there are messages left in the Thread that will be
Steve Anton3b80aac2017-10-19 10:17:12 -07001004 // destroyed by DoDestroy, and sometimes the destructors of the message and/or
1005 // its contents rely on this thread still being set as the current thread.
1006 Stop();
1007 DoDestroy();
Tommi51492422017-12-04 15:18:23 +01001008 rtc::ThreadManager::Instance()->SetCurrentThread(nullptr);
nisse7eaa4ea2017-05-08 05:25:41 -07001009 rtc::ThreadManager::Instance()->SetCurrentThread(old_thread_);
1010 if (old_thread_) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +01001011 ThreadManager::Add(old_thread_);
nisse7eaa4ea2017-05-08 05:25:41 -07001012 }
1013}
1014
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001015} // namespace rtc