blob: 9c3674980b13f1e22778c0c4608a9e518a561b29 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/thread.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
Ali Tofigh7fa90572022-03-17 15:47:49 +010013#include "absl/strings/string_view.h"
Markus Handell9a21c492022-08-25 11:40:13 +000014#include "api/units/time_delta.h"
15#include "rtc_base/socket_server.h"
Ali Tofigh7fa90572022-03-17 15:47:49 +010016
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#if defined(WEBRTC_WIN)
18#include <comdef.h>
19#elif defined(WEBRTC_POSIX)
20#include <time.h>
Tommi51492422017-12-04 15:18:23 +010021#else
22#error "Either WEBRTC_WIN or WEBRTC_POSIX needs to be defined."
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000023#endif
24
Artem Titov80d02ad2018-05-21 12:20:39 +020025#if defined(WEBRTC_WIN)
26// Disable warning that we don't care about:
27// warning C4722: destructor never returns, potential memory leak
28#pragma warning(disable : 4722)
29#endif
30
Yves Gerey988cc082018-10-23 12:03:01 +020031#include <stdio.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020032
Yves Gerey988cc082018-10-23 12:03:01 +020033#include <utility>
Yves Gerey2e00abc2018-10-05 15:39:24 +020034
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +010035#include "absl/algorithm/container.h"
Danil Chapovalov4bcf8092022-07-06 19:42:34 +020036#include "absl/cleanup/cleanup.h"
Artem Titovd15a5752021-02-10 14:31:24 +010037#include "api/sequence_checker.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020038#include "rtc_base/checks.h"
Markus Handell3cb525b2020-07-16 16:16:09 +020039#include "rtc_base/deprecated/recursive_critical_section.h"
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +020040#include "rtc_base/event.h"
Mirko Bonadeie5f4c6b2021-01-15 10:41:01 +010041#include "rtc_base/internal/default_socket_server.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020042#include "rtc_base/logging.h"
Steve Anton10542f22019-01-11 09:11:00 -080043#include "rtc_base/null_socket_server.h"
44#include "rtc_base/time_utils.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020045#include "rtc_base/trace_event.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000046
Kári Tristan Helgason62b13452018-10-12 12:57:49 +020047#if defined(WEBRTC_MAC)
48#include "rtc_base/system/cocoa_threading.h"
Yves Gerey988cc082018-10-23 12:03:01 +020049
Kári Tristan Helgason62b13452018-10-12 12:57:49 +020050/*
51 * These are forward-declarations for methods that are part of the
52 * ObjC runtime. They are declared in the private header objc-internal.h.
53 * These calls are what clang inserts when using @autoreleasepool in ObjC,
54 * but here they are used directly in order to keep this file C++.
55 * https://clang.llvm.org/docs/AutomaticReferenceCounting.html#runtime-support
56 */
57extern "C" {
58void* objc_autoreleasePoolPush(void);
59void objc_autoreleasePoolPop(void* pool);
60}
61
62namespace {
63class ScopedAutoReleasePool {
64 public:
65 ScopedAutoReleasePool() : pool_(objc_autoreleasePoolPush()) {}
66 ~ScopedAutoReleasePool() { objc_autoreleasePoolPop(pool_); }
67
68 private:
69 void* const pool_;
70};
71} // namespace
72#endif
73
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000074namespace rtc {
Steve Antonbcc1a762019-12-11 11:21:53 -080075namespace {
76
Danil Chapovalov0bd16652022-08-24 18:35:45 +020077using ::webrtc::TimeDelta;
78
Danil Chapovalov4bcf8092022-07-06 19:42:34 +020079struct AnyInvocableMessage final : public MessageData {
80 explicit AnyInvocableMessage(absl::AnyInvocable<void() &&> task)
81 : task(std::move(task)) {}
82 absl::AnyInvocable<void() &&> task;
83};
84
85class AnyInvocableMessageHandler final : public MessageHandler {
Steve Antonbcc1a762019-12-11 11:21:53 -080086 public:
Steve Antonbcc1a762019-12-11 11:21:53 -080087 void OnMessage(Message* msg) override {
Danil Chapovalov4bcf8092022-07-06 19:42:34 +020088 std::move(static_cast<AnyInvocableMessage*>(msg->pdata)->task)();
Steve Antonbcc1a762019-12-11 11:21:53 -080089 delete msg->pdata;
90 }
Steve Antonbcc1a762019-12-11 11:21:53 -080091};
92
Danil Chapovalov4bcf8092022-07-06 19:42:34 +020093MessageHandler* GetAnyInvocableMessageHandler() {
94 static MessageHandler* const handler = new AnyInvocableMessageHandler;
95 return handler;
96}
97
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +010098class RTC_SCOPED_LOCKABLE MarkProcessingCritScope {
99 public:
Markus Handell3cb525b2020-07-16 16:16:09 +0200100 MarkProcessingCritScope(const RecursiveCriticalSection* cs,
101 size_t* processing) RTC_EXCLUSIVE_LOCK_FUNCTION(cs)
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100102 : cs_(cs), processing_(processing) {
103 cs_->Enter();
104 *processing_ += 1;
105 }
106
107 ~MarkProcessingCritScope() RTC_UNLOCK_FUNCTION() {
108 *processing_ -= 1;
109 cs_->Leave();
110 }
111
Byoungchan Lee14af7622022-01-12 05:24:58 +0900112 MarkProcessingCritScope(const MarkProcessingCritScope&) = delete;
113 MarkProcessingCritScope& operator=(const MarkProcessingCritScope&) = delete;
114
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100115 private:
Markus Handell3cb525b2020-07-16 16:16:09 +0200116 const RecursiveCriticalSection* const cs_;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100117 size_t* processing_;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100118};
119
Steve Antonbcc1a762019-12-11 11:21:53 -0800120} // namespace
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000121
122ThreadManager* ThreadManager::Instance() {
Niels Möller14682a32018-05-24 08:54:25 +0200123 static ThreadManager* const thread_manager = new ThreadManager();
124 return thread_manager;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000125}
126
nisse7866cfe2017-04-26 01:45:31 -0700127ThreadManager::~ThreadManager() {
128 // By above RTC_DEFINE_STATIC_LOCAL.
Artem Titovd3251962021-11-15 16:57:07 +0100129 RTC_DCHECK_NOTREACHED() << "ThreadManager should never be destructed.";
nisse7866cfe2017-04-26 01:45:31 -0700130}
131
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000132// static
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100133void ThreadManager::Add(Thread* message_queue) {
134 return Instance()->AddInternal(message_queue);
135}
136void ThreadManager::AddInternal(Thread* message_queue) {
137 CritScope cs(&crit_);
138 // Prevent changes while the list of message queues is processed.
139 RTC_DCHECK_EQ(processing_, 0);
140 message_queues_.push_back(message_queue);
141}
142
143// static
144void ThreadManager::Remove(Thread* message_queue) {
145 return Instance()->RemoveInternal(message_queue);
146}
147void ThreadManager::RemoveInternal(Thread* message_queue) {
148 {
149 CritScope cs(&crit_);
150 // Prevent changes while the list of message queues is processed.
151 RTC_DCHECK_EQ(processing_, 0);
152 std::vector<Thread*>::iterator iter;
153 iter = absl::c_find(message_queues_, message_queue);
154 if (iter != message_queues_.end()) {
155 message_queues_.erase(iter);
156 }
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100157#if RTC_DCHECK_IS_ON
158 RemoveFromSendGraph(message_queue);
159#endif
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100160 }
161}
162
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100163#if RTC_DCHECK_IS_ON
164void ThreadManager::RemoveFromSendGraph(Thread* thread) {
165 for (auto it = send_graph_.begin(); it != send_graph_.end();) {
166 if (it->first == thread) {
167 it = send_graph_.erase(it);
168 } else {
169 it->second.erase(thread);
170 ++it;
171 }
172 }
173}
174
175void ThreadManager::RegisterSendAndCheckForCycles(Thread* source,
176 Thread* target) {
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200177 RTC_DCHECK(source);
178 RTC_DCHECK(target);
179
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100180 CritScope cs(&crit_);
181 std::deque<Thread*> all_targets({target});
182 // We check the pre-existing who-sends-to-who graph for any path from target
183 // to source. This loop is guaranteed to terminate because per the send graph
184 // invariant, there are no cycles in the graph.
Jianjun Zhuc33eeab2020-05-26 17:43:17 +0800185 for (size_t i = 0; i < all_targets.size(); i++) {
186 const auto& targets = send_graph_[all_targets[i]];
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100187 all_targets.insert(all_targets.end(), targets.begin(), targets.end());
188 }
189 RTC_CHECK_EQ(absl::c_count(all_targets, source), 0)
190 << " send loop between " << source->name() << " and " << target->name();
191
192 // We may now insert source -> target without creating a cycle, since there
193 // was no path from target to source per the prior CHECK.
194 send_graph_[source].insert(target);
195}
196#endif
197
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100198// static
199void ThreadManager::Clear(MessageHandler* handler) {
200 return Instance()->ClearInternal(handler);
201}
202void ThreadManager::ClearInternal(MessageHandler* handler) {
203 // Deleted objects may cause re-entrant calls to ClearInternal. This is
204 // allowed as the list of message queues does not change while queues are
205 // cleared.
206 MarkProcessingCritScope cs(&crit_, &processing_);
207 for (Thread* queue : message_queues_) {
208 queue->Clear(handler);
209 }
210}
211
212// static
213void ThreadManager::ProcessAllMessageQueuesForTesting() {
214 return Instance()->ProcessAllMessageQueuesInternal();
215}
216
217void ThreadManager::ProcessAllMessageQueuesInternal() {
218 // This works by posting a delayed message at the current time and waiting
219 // for it to be dispatched on all queues, which will ensure that all messages
220 // that came before it were also dispatched.
Niels Möller7a669002022-06-27 09:47:02 +0200221 std::atomic<int> queues_not_done(0);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100222
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100223 {
224 MarkProcessingCritScope cs(&crit_, &processing_);
225 for (Thread* queue : message_queues_) {
226 if (!queue->IsProcessingMessagesForTesting()) {
227 // If the queue is not processing messages, it can
228 // be ignored. If we tried to post a message to it, it would be dropped
229 // or ignored.
230 continue;
231 }
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200232 queues_not_done.fetch_add(1);
233 // Whether the task is processed, or the thread is simply cleared,
234 // queues_not_done gets decremented.
235 absl::Cleanup sub = [&queues_not_done] { queues_not_done.fetch_sub(1); };
236 // Post delayed task instead of regular task to wait for all delayed tasks
237 // that are ready for processing.
238 queue->PostDelayedTask([sub = std::move(sub)] {}, TimeDelta::Zero());
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100239 }
240 }
241
242 rtc::Thread* current = rtc::Thread::Current();
243 // Note: One of the message queues may have been on this thread, which is
244 // why we can't synchronously wait for queues_not_done to go to 0; we need
245 // to process messages as well.
Niels Möller7a669002022-06-27 09:47:02 +0200246 while (queues_not_done.load() > 0) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100247 if (current) {
248 current->ProcessMessages(0);
249 }
250 }
251}
252
253// static
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000254Thread* Thread::Current() {
nisse7866cfe2017-04-26 01:45:31 -0700255 ThreadManager* manager = ThreadManager::Instance();
256 Thread* thread = manager->CurrentThread();
257
nisse7866cfe2017-04-26 01:45:31 -0700258 return thread;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000259}
260
261#if defined(WEBRTC_POSIX)
Niels Möller98d26df2022-02-07 10:35:29 +0100262ThreadManager::ThreadManager() {
Kári Tristan Helgason62b13452018-10-12 12:57:49 +0200263#if defined(WEBRTC_MAC)
264 InitCocoaMultiThreading();
265#endif
deadbeef37f5ecf2017-02-27 14:06:41 -0800266 pthread_key_create(&key_, nullptr);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000267}
268
Yves Gerey665174f2018-06-19 15:03:05 +0200269Thread* ThreadManager::CurrentThread() {
270 return static_cast<Thread*>(pthread_getspecific(key_));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000271}
272
Sebastian Jansson178a6852020-01-14 11:12:26 +0100273void ThreadManager::SetCurrentThreadInternal(Thread* thread) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000274 pthread_setspecific(key_, thread);
275}
276#endif
277
278#if defined(WEBRTC_WIN)
Niels Möller98d26df2022-02-07 10:35:29 +0100279ThreadManager::ThreadManager() : key_(TlsAlloc()) {}
Yves Gerey665174f2018-06-19 15:03:05 +0200280
281Thread* ThreadManager::CurrentThread() {
282 return static_cast<Thread*>(TlsGetValue(key_));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000283}
284
Sebastian Jansson178a6852020-01-14 11:12:26 +0100285void ThreadManager::SetCurrentThreadInternal(Thread* thread) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000286 TlsSetValue(key_, thread);
287}
288#endif
289
Sebastian Jansson178a6852020-01-14 11:12:26 +0100290void ThreadManager::SetCurrentThread(Thread* thread) {
291#if RTC_DLOG_IS_ON
292 if (CurrentThread() && thread) {
293 RTC_DLOG(LS_ERROR) << "SetCurrentThread: Overwriting an existing value?";
294 }
295#endif // RTC_DLOG_IS_ON
Tommi6866dc72020-05-15 10:11:56 +0200296
297 if (thread) {
298 thread->EnsureIsCurrentTaskQueue();
299 } else {
300 Thread* current = CurrentThread();
301 if (current) {
302 // The current thread is being cleared, e.g. as a result of
303 // UnwrapCurrent() being called or when a thread is being stopped
304 // (see PreRun()). This signals that the Thread instance is being detached
305 // from the thread, which also means that TaskQueue::Current() must not
306 // return a pointer to the Thread instance.
307 current->ClearCurrentTaskQueue();
308 }
309 }
310
Sebastian Jansson178a6852020-01-14 11:12:26 +0100311 SetCurrentThreadInternal(thread);
312}
313
314void rtc::ThreadManager::ChangeCurrentThreadForTest(rtc::Thread* thread) {
315 SetCurrentThreadInternal(thread);
316}
317
Yves Gerey665174f2018-06-19 15:03:05 +0200318Thread* ThreadManager::WrapCurrentThread() {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000319 Thread* result = CurrentThread();
deadbeef37f5ecf2017-02-27 14:06:41 -0800320 if (nullptr == result) {
Mirko Bonadeie5f4c6b2021-01-15 10:41:01 +0100321 result = new Thread(CreateDefaultSocketServer());
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000322 result->WrapCurrentWithThreadManager(this, true);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000323 }
324 return result;
325}
326
327void ThreadManager::UnwrapCurrentThread() {
328 Thread* t = CurrentThread();
329 if (t && !(t->IsOwned())) {
330 t->UnwrapCurrent();
331 delete t;
332 }
333}
334
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000335Thread::ScopedDisallowBlockingCalls::ScopedDisallowBlockingCalls()
Yves Gerey665174f2018-06-19 15:03:05 +0200336 : thread_(Thread::Current()),
337 previous_state_(thread_->SetAllowBlockingCalls(false)) {}
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000338
339Thread::ScopedDisallowBlockingCalls::~ScopedDisallowBlockingCalls() {
nisseede5da42017-01-12 05:15:36 -0800340 RTC_DCHECK(thread_->IsCurrent());
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000341 thread_->SetAllowBlockingCalls(previous_state_);
342}
343
Tommife041642021-04-07 10:08:28 +0200344#if RTC_DCHECK_IS_ON
345Thread::ScopedCountBlockingCalls::ScopedCountBlockingCalls(
346 std::function<void(uint32_t, uint32_t)> callback)
347 : thread_(Thread::Current()),
348 base_blocking_call_count_(thread_->GetBlockingCallCount()),
349 base_could_be_blocking_call_count_(
350 thread_->GetCouldBeBlockingCallCount()),
351 result_callback_(std::move(callback)) {}
352
353Thread::ScopedCountBlockingCalls::~ScopedCountBlockingCalls() {
Tomas Gunnarsson89f3dd52021-04-14 12:54:10 +0200354 if (GetTotalBlockedCallCount() >= min_blocking_calls_for_callback_) {
355 result_callback_(GetBlockingCallCount(), GetCouldBeBlockingCallCount());
356 }
Tommife041642021-04-07 10:08:28 +0200357}
358
359uint32_t Thread::ScopedCountBlockingCalls::GetBlockingCallCount() const {
360 return thread_->GetBlockingCallCount() - base_blocking_call_count_;
361}
362
363uint32_t Thread::ScopedCountBlockingCalls::GetCouldBeBlockingCallCount() const {
364 return thread_->GetCouldBeBlockingCallCount() -
365 base_could_be_blocking_call_count_;
366}
367
368uint32_t Thread::ScopedCountBlockingCalls::GetTotalBlockedCallCount() const {
369 return GetBlockingCallCount() + GetCouldBeBlockingCallCount();
370}
371#endif
372
Taylor Brandstetter08672602018-03-02 15:20:33 -0800373Thread::Thread(SocketServer* ss) : Thread(ss, /*do_init=*/true) {}
danilchapbebf54c2016-04-28 01:32:48 -0700374
375Thread::Thread(std::unique_ptr<SocketServer> ss)
Taylor Brandstetter08672602018-03-02 15:20:33 -0800376 : Thread(std::move(ss), /*do_init=*/true) {}
377
378Thread::Thread(SocketServer* ss, bool do_init)
Danil Chapovalov207f8532022-08-24 12:19:46 +0200379 : delayed_next_num_(0),
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100380 fInitialized_(false),
381 fDestroyed_(false),
382 stop_(0),
383 ss_(ss) {
384 RTC_DCHECK(ss);
385 ss_->SetMessageQueue(this);
Taylor Brandstetter08672602018-03-02 15:20:33 -0800386 SetName("Thread", this); // default name
387 if (do_init) {
388 DoInit();
389 }
390}
391
392Thread::Thread(std::unique_ptr<SocketServer> ss, bool do_init)
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100393 : Thread(ss.get(), do_init) {
394 own_ss_ = std::move(ss);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000395}
396
397Thread::~Thread() {
398 Stop();
jbauch25d1f282016-02-05 00:25:02 -0800399 DoDestroy();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000400}
401
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100402void Thread::DoInit() {
403 if (fInitialized_) {
404 return;
405 }
406
407 fInitialized_ = true;
408 ThreadManager::Add(this);
409}
410
411void Thread::DoDestroy() {
412 if (fDestroyed_) {
413 return;
414 }
415
416 fDestroyed_ = true;
417 // The signal is done from here to ensure
418 // that it always gets called when the queue
419 // is going away.
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100420 if (ss_) {
421 ss_->SetMessageQueue(nullptr);
422 }
Niels Möller9bd24572021-04-19 12:18:27 +0200423 ThreadManager::Remove(this);
424 ClearInternal(nullptr, MQID_ANY, nullptr);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100425}
426
427SocketServer* Thread::socketserver() {
428 return ss_;
429}
430
431void Thread::WakeUpSocketServer() {
432 ss_->WakeUp();
433}
434
435void Thread::Quit() {
Niels Möller7a669002022-06-27 09:47:02 +0200436 stop_.store(1, std::memory_order_release);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100437 WakeUpSocketServer();
438}
439
440bool Thread::IsQuitting() {
Niels Möller7a669002022-06-27 09:47:02 +0200441 return stop_.load(std::memory_order_acquire) != 0;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100442}
443
444void Thread::Restart() {
Niels Möller7a669002022-06-27 09:47:02 +0200445 stop_.store(0, std::memory_order_release);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100446}
447
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100448bool Thread::Get(Message* pmsg, int cmsWait, bool process_io) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100449 // Get w/wait + timer scan / dispatch + socket / event multiplexer dispatch
450
451 int64_t cmsTotal = cmsWait;
452 int64_t cmsElapsed = 0;
453 int64_t msStart = TimeMillis();
454 int64_t msCurrent = msStart;
455 while (true) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100456 // Check for posted events
457 int64_t cmsDelayNext = kForever;
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200458 {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100459 // All queue operations need to be locked, but nothing else in this loop
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200460 // can happen inside the crit.
461 CritScope cs(&crit_);
462 // Check for delayed messages that have been triggered and calculate the
463 // next trigger time.
464 while (!delayed_messages_.empty()) {
465 if (msCurrent < delayed_messages_.top().run_time_ms_) {
466 cmsDelayNext =
467 TimeDiff(delayed_messages_.top().run_time_ms_, msCurrent);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100468 break;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100469 }
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200470 messages_.push_back(delayed_messages_.top().msg_);
471 delayed_messages_.pop();
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100472 }
Danil Chapovalov0bd16652022-08-24 18:35:45 +0200473 // Pull a message off the message queue, if available.
474 if (!messages_.empty()) {
475 *pmsg = messages_.front();
476 messages_.pop_front();
477 return true;
478 }
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100479 }
480
481 if (IsQuitting())
482 break;
483
484 // Which is shorter, the delay wait or the asked wait?
485
486 int64_t cmsNext;
487 if (cmsWait == kForever) {
488 cmsNext = cmsDelayNext;
489 } else {
490 cmsNext = std::max<int64_t>(0, cmsTotal - cmsElapsed);
491 if ((cmsDelayNext != kForever) && (cmsDelayNext < cmsNext))
492 cmsNext = cmsDelayNext;
493 }
494
495 {
496 // Wait and multiplex in the meantime
Markus Handell9a21c492022-08-25 11:40:13 +0000497 if (!ss_->Wait(cmsNext == kForever ? SocketServer::kForever
498 : webrtc::TimeDelta::Millis(cmsNext),
499 process_io))
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100500 return false;
501 }
502
503 // If the specified timeout expired, return
504
505 msCurrent = TimeMillis();
506 cmsElapsed = TimeDiff(msCurrent, msStart);
507 if (cmsWait != kForever) {
508 if (cmsElapsed >= cmsWait)
509 return false;
510 }
511 }
512 return false;
513}
514
515void Thread::Post(const Location& posted_from,
516 MessageHandler* phandler,
517 uint32_t id,
518 MessageData* pdata,
519 bool time_sensitive) {
Sebastian Jansson61380c02020-01-17 14:46:08 +0100520 RTC_DCHECK(!time_sensitive);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100521 if (IsQuitting()) {
522 delete pdata;
523 return;
524 }
525
526 // Keep thread safe
527 // Add the message to the end of the queue
528 // Signal for the multiplexer to return
529
530 {
531 CritScope cs(&crit_);
532 Message msg;
533 msg.posted_from = posted_from;
534 msg.phandler = phandler;
535 msg.message_id = id;
536 msg.pdata = pdata;
Sebastian Jansson61380c02020-01-17 14:46:08 +0100537 messages_.push_back(msg);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100538 }
539 WakeUpSocketServer();
540}
541
542void Thread::PostDelayed(const Location& posted_from,
Sebastian Jansson61380c02020-01-17 14:46:08 +0100543 int delay_ms,
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100544 MessageHandler* phandler,
545 uint32_t id,
546 MessageData* pdata) {
Sebastian Jansson61380c02020-01-17 14:46:08 +0100547 return DoDelayPost(posted_from, delay_ms, TimeAfter(delay_ms), phandler, id,
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100548 pdata);
549}
550
551void Thread::PostAt(const Location& posted_from,
Sebastian Jansson61380c02020-01-17 14:46:08 +0100552 int64_t run_at_ms,
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100553 MessageHandler* phandler,
554 uint32_t id,
555 MessageData* pdata) {
Sebastian Jansson61380c02020-01-17 14:46:08 +0100556 return DoDelayPost(posted_from, TimeUntil(run_at_ms), run_at_ms, phandler, id,
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100557 pdata);
558}
559
560void Thread::DoDelayPost(const Location& posted_from,
Sebastian Jansson61380c02020-01-17 14:46:08 +0100561 int64_t delay_ms,
562 int64_t run_at_ms,
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100563 MessageHandler* phandler,
564 uint32_t id,
565 MessageData* pdata) {
566 if (IsQuitting()) {
567 delete pdata;
568 return;
569 }
570
571 // Keep thread safe
572 // Add to the priority queue. Gets sorted soonest first.
573 // Signal for the multiplexer to return.
574
575 {
576 CritScope cs(&crit_);
577 Message msg;
578 msg.posted_from = posted_from;
579 msg.phandler = phandler;
580 msg.message_id = id;
581 msg.pdata = pdata;
Sebastian Jansson61380c02020-01-17 14:46:08 +0100582 DelayedMessage delayed(delay_ms, run_at_ms, delayed_next_num_, msg);
583 delayed_messages_.push(delayed);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100584 // If this message queue processes 1 message every millisecond for 50 days,
585 // we will wrap this number. Even then, only messages with identical times
586 // will be misordered, and then only briefly. This is probably ok.
Sebastian Jansson61380c02020-01-17 14:46:08 +0100587 ++delayed_next_num_;
588 RTC_DCHECK_NE(0, delayed_next_num_);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100589 }
590 WakeUpSocketServer();
591}
592
593int Thread::GetDelay() {
594 CritScope cs(&crit_);
595
Sebastian Jansson61380c02020-01-17 14:46:08 +0100596 if (!messages_.empty())
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100597 return 0;
598
Sebastian Jansson61380c02020-01-17 14:46:08 +0100599 if (!delayed_messages_.empty()) {
600 int delay = TimeUntil(delayed_messages_.top().run_time_ms_);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100601 if (delay < 0)
602 delay = 0;
603 return delay;
604 }
605
606 return kForever;
607}
608
609void Thread::ClearInternal(MessageHandler* phandler,
610 uint32_t id,
611 MessageList* removed) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100612 // Remove from ordered message queue
613
Sebastian Jansson61380c02020-01-17 14:46:08 +0100614 for (auto it = messages_.begin(); it != messages_.end();) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100615 if (it->Match(phandler, id)) {
616 if (removed) {
617 removed->push_back(*it);
618 } else {
619 delete it->pdata;
620 }
Sebastian Jansson61380c02020-01-17 14:46:08 +0100621 it = messages_.erase(it);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100622 } else {
623 ++it;
624 }
625 }
626
627 // Remove from priority queue. Not directly iterable, so use this approach
628
Sebastian Jansson61380c02020-01-17 14:46:08 +0100629 auto new_end = delayed_messages_.container().begin();
630 for (auto it = new_end; it != delayed_messages_.container().end(); ++it) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100631 if (it->msg_.Match(phandler, id)) {
632 if (removed) {
633 removed->push_back(it->msg_);
634 } else {
635 delete it->msg_.pdata;
636 }
637 } else {
638 *new_end++ = *it;
639 }
640 }
Sebastian Jansson61380c02020-01-17 14:46:08 +0100641 delayed_messages_.container().erase(new_end,
642 delayed_messages_.container().end());
643 delayed_messages_.reheap();
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100644}
645
646void Thread::Dispatch(Message* pmsg) {
647 TRACE_EVENT2("webrtc", "Thread::Dispatch", "src_file",
648 pmsg->posted_from.file_name(), "src_func",
649 pmsg->posted_from.function_name());
Harald Alvestrandba694422021-01-27 21:52:14 +0000650 RTC_DCHECK_RUN_ON(this);
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100651 int64_t start_time = TimeMillis();
652 pmsg->phandler->OnMessage(pmsg);
653 int64_t end_time = TimeMillis();
654 int64_t diff = TimeDiff(end_time, start_time);
Harald Alvestrandba694422021-01-27 21:52:14 +0000655 if (diff >= dispatch_warning_ms_) {
656 RTC_LOG(LS_INFO) << "Message to " << name() << " took " << diff
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100657 << "ms to dispatch. Posted from: "
658 << pmsg->posted_from.ToString();
Harald Alvestrandba694422021-01-27 21:52:14 +0000659 // To avoid log spew, move the warning limit to only give warning
660 // for delays that are larger than the one observed.
661 dispatch_warning_ms_ = diff + 1;
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100662 }
663}
664
nisse7866cfe2017-04-26 01:45:31 -0700665bool Thread::IsCurrent() const {
666 return ThreadManager::Instance()->CurrentThread() == this;
667}
668
danilchapbebf54c2016-04-28 01:32:48 -0700669std::unique_ptr<Thread> Thread::CreateWithSocketServer() {
Mirko Bonadeie5f4c6b2021-01-15 10:41:01 +0100670 return std::unique_ptr<Thread>(new Thread(CreateDefaultSocketServer()));
danilchapbebf54c2016-04-28 01:32:48 -0700671}
672
673std::unique_ptr<Thread> Thread::Create() {
674 return std::unique_ptr<Thread>(
675 new Thread(std::unique_ptr<SocketServer>(new NullSocketServer())));
676}
677
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000678bool Thread::SleepMs(int milliseconds) {
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000679 AssertBlockingIsAllowedOnCurrentThread();
680
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000681#if defined(WEBRTC_WIN)
682 ::Sleep(milliseconds);
683 return true;
684#else
685 // POSIX has both a usleep() and a nanosleep(), but the former is deprecated,
686 // so we use nanosleep() even though it has greater precision than necessary.
687 struct timespec ts;
688 ts.tv_sec = milliseconds / 1000;
689 ts.tv_nsec = (milliseconds % 1000) * 1000000;
deadbeef37f5ecf2017-02-27 14:06:41 -0800690 int ret = nanosleep(&ts, nullptr);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000691 if (ret != 0) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100692 RTC_LOG_ERR(LS_WARNING) << "nanosleep() returning early";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000693 return false;
694 }
695 return true;
696#endif
697}
698
Ali Tofigh7fa90572022-03-17 15:47:49 +0100699bool Thread::SetName(absl::string_view name, const void* obj) {
Tommi51492422017-12-04 15:18:23 +0100700 RTC_DCHECK(!IsRunning());
701
Ali Tofigh7fa90572022-03-17 15:47:49 +0100702 name_ = std::string(name);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000703 if (obj) {
Niels Mölleraba06332018-10-16 15:14:15 +0200704 // The %p specifier typically produce at most 16 hex digits, possibly with a
705 // 0x prefix. But format is implementation defined, so add some margin.
706 char buf[30];
707 snprintf(buf, sizeof(buf), " 0x%p", obj);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000708 name_ += buf;
709 }
710 return true;
711}
712
Harald Alvestrandba694422021-01-27 21:52:14 +0000713void Thread::SetDispatchWarningMs(int deadline) {
714 if (!IsCurrent()) {
Danil Chapovalov4bcf8092022-07-06 19:42:34 +0200715 PostTask([this, deadline]() { SetDispatchWarningMs(deadline); });
Harald Alvestrandba694422021-01-27 21:52:14 +0000716 return;
717 }
718 RTC_DCHECK_RUN_ON(this);
719 dispatch_warning_ms_ = deadline;
720}
721
Niels Möllerd2e50132019-06-11 09:24:14 +0200722bool Thread::Start() {
Tommi51492422017-12-04 15:18:23 +0100723 RTC_DCHECK(!IsRunning());
724
725 if (IsRunning())
726 return false;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000727
André Susano Pinto02a57972016-07-22 13:30:05 +0200728 Restart(); // reset IsQuitting() if the thread is being restarted
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000729
730 // Make sure that ThreadManager is created on the main thread before
731 // we start a new thread.
732 ThreadManager::Instance();
733
Tommi51492422017-12-04 15:18:23 +0100734 owned_ = true;
735
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000736#if defined(WEBRTC_WIN)
Niels Möllerd2e50132019-06-11 09:24:14 +0200737 thread_ = CreateThread(nullptr, 0, PreRun, this, 0, &thread_id_);
Tommi51492422017-12-04 15:18:23 +0100738 if (!thread_) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000739 return false;
740 }
741#elif defined(WEBRTC_POSIX)
742 pthread_attr_t attr;
743 pthread_attr_init(&attr);
744
Niels Möllerd2e50132019-06-11 09:24:14 +0200745 int error_code = pthread_create(&thread_, &attr, PreRun, this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000746 if (0 != error_code) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100747 RTC_LOG(LS_ERROR) << "Unable to create pthread, error " << error_code;
Tommi51492422017-12-04 15:18:23 +0100748 thread_ = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000749 return false;
750 }
Tommi51492422017-12-04 15:18:23 +0100751 RTC_DCHECK(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000752#endif
753 return true;
754}
755
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000756bool Thread::WrapCurrent() {
757 return WrapCurrentWithThreadManager(ThreadManager::Instance(), true);
758}
759
760void Thread::UnwrapCurrent() {
761 // Clears the platform-specific thread-specific storage.
deadbeef37f5ecf2017-02-27 14:06:41 -0800762 ThreadManager::Instance()->SetCurrentThread(nullptr);
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000763#if defined(WEBRTC_WIN)
deadbeef37f5ecf2017-02-27 14:06:41 -0800764 if (thread_ != nullptr) {
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000765 if (!CloseHandle(thread_)) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100766 RTC_LOG_GLE(LS_ERROR)
767 << "When unwrapping thread, failed to close handle.";
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000768 }
deadbeef37f5ecf2017-02-27 14:06:41 -0800769 thread_ = nullptr;
Tommi51492422017-12-04 15:18:23 +0100770 thread_id_ = 0;
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000771 }
Tommi51492422017-12-04 15:18:23 +0100772#elif defined(WEBRTC_POSIX)
773 thread_ = 0;
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000774#endif
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +0000775}
776
777void Thread::SafeWrapCurrent() {
778 WrapCurrentWithThreadManager(ThreadManager::Instance(), false);
779}
780
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000781void Thread::Join() {
Tommi51492422017-12-04 15:18:23 +0100782 if (!IsRunning())
783 return;
784
785 RTC_DCHECK(!IsCurrent());
786 if (Current() && !Current()->blocking_calls_allowed_) {
787 RTC_LOG(LS_WARNING) << "Waiting for the thread to join, "
Jonas Olssonb2b20312020-01-14 12:11:31 +0100788 "but blocking calls have been disallowed";
Tommi51492422017-12-04 15:18:23 +0100789 }
jiayl@webrtc.org1fd362c2014-09-26 16:57:07 +0000790
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000791#if defined(WEBRTC_WIN)
Tommi51492422017-12-04 15:18:23 +0100792 RTC_DCHECK(thread_ != nullptr);
793 WaitForSingleObject(thread_, INFINITE);
794 CloseHandle(thread_);
795 thread_ = nullptr;
796 thread_id_ = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000797#elif defined(WEBRTC_POSIX)
Tommi51492422017-12-04 15:18:23 +0100798 pthread_join(thread_, nullptr);
799 thread_ = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000800#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000801}
802
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000803bool Thread::SetAllowBlockingCalls(bool allow) {
nisseede5da42017-01-12 05:15:36 -0800804 RTC_DCHECK(IsCurrent());
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000805 bool previous = blocking_calls_allowed_;
806 blocking_calls_allowed_ = allow;
807 return previous;
808}
809
810// static
811void Thread::AssertBlockingIsAllowedOnCurrentThread() {
tfarinaa41ab932015-10-30 16:08:48 -0700812#if !defined(NDEBUG)
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000813 Thread* current = Thread::Current();
nisseede5da42017-01-12 05:15:36 -0800814 RTC_DCHECK(!current || current->blocking_calls_allowed_);
henrike@webrtc.org92a9bac2014-07-14 22:03:57 +0000815#endif
816}
817
deadbeefdc20e262017-01-31 15:10:44 -0800818// static
819#if defined(WEBRTC_WIN)
820DWORD WINAPI Thread::PreRun(LPVOID pv) {
821#else
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000822void* Thread::PreRun(void* pv) {
deadbeefdc20e262017-01-31 15:10:44 -0800823#endif
Niels Möllerd2e50132019-06-11 09:24:14 +0200824 Thread* thread = static_cast<Thread*>(pv);
825 ThreadManager::Instance()->SetCurrentThread(thread);
826 rtc::SetCurrentThreadName(thread->name_.c_str());
Kári Tristan Helgason62b13452018-10-12 12:57:49 +0200827#if defined(WEBRTC_MAC)
828 ScopedAutoReleasePool pool;
829#endif
Niels Möllerd2e50132019-06-11 09:24:14 +0200830 thread->Run();
831
Tommi51492422017-12-04 15:18:23 +0100832 ThreadManager::Instance()->SetCurrentThread(nullptr);
kthelgasonde6adbe2017-02-22 00:42:11 -0800833#ifdef WEBRTC_WIN
834 return 0;
835#else
836 return nullptr;
837#endif
Jonas Olssona4d87372019-07-05 19:08:33 +0200838} // namespace rtc
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000839
840void Thread::Run() {
841 ProcessMessages(kForever);
842}
843
844bool Thread::IsOwned() {
Tommi51492422017-12-04 15:18:23 +0100845 RTC_DCHECK(IsRunning());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000846 return owned_;
847}
848
849void Thread::Stop() {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +0100850 Thread::Quit();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000851 Join();
852}
853
Taylor Brandstetter5d97a9a2016-06-10 14:17:27 -0700854void Thread::Send(const Location& posted_from,
855 MessageHandler* phandler,
856 uint32_t id,
857 MessageData* pdata) {
Sebastian Jansson5d9b9642020-01-17 13:10:54 +0100858 RTC_DCHECK(!IsQuitting());
André Susano Pinto02a57972016-07-22 13:30:05 +0200859 if (IsQuitting())
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000860 return;
861
862 // Sent messages are sent to the MessageHandler directly, in the context
863 // of "thread", like Win32 SendMessage. If in the right context,
864 // call the handler directly.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000865 Message msg;
Taylor Brandstetter5d97a9a2016-06-10 14:17:27 -0700866 msg.posted_from = posted_from;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000867 msg.phandler = phandler;
868 msg.message_id = id;
869 msg.pdata = pdata;
870 if (IsCurrent()) {
Tommife041642021-04-07 10:08:28 +0200871#if RTC_DCHECK_IS_ON
Artem Titov15737162021-05-25 11:17:07 +0200872 RTC_DCHECK(this->IsInvokeToThreadAllowed(this));
Tommife041642021-04-07 10:08:28 +0200873 RTC_DCHECK_RUN_ON(this);
874 could_be_blocking_call_count_++;
875#endif
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100876 msg.phandler->OnMessage(&msg);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000877 return;
878 }
879
jiayl@webrtc.org3987b6d2014-09-24 17:14:05 +0000880 AssertBlockingIsAllowedOnCurrentThread();
881
Yves Gerey665174f2018-06-19 15:03:05 +0200882 Thread* current_thread = Thread::Current();
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200883
Sebastian Janssonda7267a2020-03-03 10:48:05 +0100884#if RTC_DCHECK_IS_ON
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200885 if (current_thread) {
Tommife041642021-04-07 10:08:28 +0200886 RTC_DCHECK_RUN_ON(current_thread);
887 current_thread->blocking_call_count_++;
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200888 RTC_DCHECK(current_thread->IsInvokeToThreadAllowed(this));
889 ThreadManager::Instance()->RegisterSendAndCheckForCycles(current_thread,
890 this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000891 }
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200892#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000893
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200894 // Perhaps down the line we can get rid of this workaround and always require
895 // current_thread to be valid when Send() is called.
896 std::unique_ptr<rtc::Event> done_event;
897 if (!current_thread)
898 done_event.reset(new rtc::Event());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000899
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200900 bool ready = false;
Danil Chapovalov4bcf8092022-07-06 19:42:34 +0200901 absl::Cleanup cleanup = [this, &ready, current_thread,
902 done = done_event.get()] {
903 if (current_thread) {
904 CritScope cs(&crit_);
905 ready = true;
906 current_thread->socketserver()->WakeUp();
907 } else {
908 done->Set();
909 }
910 };
911 PostTask([&msg, cleanup = std::move(cleanup)]() mutable {
912 msg.phandler->OnMessage(&msg);
913 });
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200914 if (current_thread) {
915 bool waited = false;
916 crit_.Enter();
917 while (!ready) {
918 crit_.Leave();
Markus Handell9a21c492022-08-25 11:40:13 +0000919 current_thread->socketserver()->Wait(SocketServer::kForever, false);
Tomas Gunnarsson0fd4c4e2020-09-04 16:33:25 +0200920 waited = true;
921 crit_.Enter();
922 }
923 crit_.Leave();
924
925 // Our Wait loop above may have consumed some WakeUp events for this
926 // Thread, that weren't relevant to this Send. Losing these WakeUps can
927 // cause problems for some SocketServers.
928 //
929 // Concrete example:
930 // Win32SocketServer on thread A calls Send on thread B. While processing
931 // the message, thread B Posts a message to A. We consume the wakeup for
932 // that Post while waiting for the Send to complete, which means that when
933 // we exit this loop, we need to issue another WakeUp, or else the Posted
934 // message won't be processed in a timely manner.
935
936 if (waited) {
937 current_thread->socketserver()->WakeUp();
938 }
939 } else {
940 done_event->Wait(rtc::Event::kForever);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000941 }
942}
943
Danil Chapovalov7c323ad2022-09-08 13:13:53 +0200944void Thread::BlockingCall(rtc::FunctionView<void()> functor) {
945 TRACE_EVENT0("webrtc", "Thread::BlockingCall");
Danil Chapovalov89313452019-11-29 12:56:43 +0100946
947 class FunctorMessageHandler : public MessageHandler {
948 public:
949 explicit FunctorMessageHandler(rtc::FunctionView<void()> functor)
Tomas Gunnarsson77baeee2020-09-24 22:39:21 +0200950 : functor_(functor) {}
Danil Chapovalov89313452019-11-29 12:56:43 +0100951 void OnMessage(Message* msg) override { functor_(); }
952
953 private:
954 rtc::FunctionView<void()> functor_;
955 } handler(functor);
956
Danil Chapovalov7c323ad2022-09-08 13:13:53 +0200957 Send(/*posted_from=*/{}, &handler, /*id=*/0, /*pdata=*/nullptr);
tommi@webrtc.org7c64ed22015-03-17 14:25:37 +0000958}
959
Tommi6866dc72020-05-15 10:11:56 +0200960// Called by the ThreadManager when being set as the current thread.
961void Thread::EnsureIsCurrentTaskQueue() {
962 task_queue_registration_ =
963 std::make_unique<TaskQueueBase::CurrentTaskQueueSetter>(this);
964}
965
966// Called by the ThreadManager when being set as the current thread.
967void Thread::ClearCurrentTaskQueue() {
968 task_queue_registration_.reset();
969}
970
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200971void Thread::AllowInvokesToThread(Thread* thread) {
Mirko Bonadei481e3452021-07-30 13:57:25 +0200972#if (!defined(NDEBUG) || RTC_DCHECK_IS_ON)
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200973 if (!IsCurrent()) {
Danil Chapovalov5286dcf2022-07-18 17:04:56 +0200974 PostTask([thread, this]() { AllowInvokesToThread(thread); });
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200975 return;
976 }
977 RTC_DCHECK_RUN_ON(this);
978 allowed_threads_.push_back(thread);
979 invoke_policy_enabled_ = true;
980#endif
981}
982
983void Thread::DisallowAllInvokes() {
Mirko Bonadei481e3452021-07-30 13:57:25 +0200984#if (!defined(NDEBUG) || RTC_DCHECK_IS_ON)
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200985 if (!IsCurrent()) {
Danil Chapovalov5286dcf2022-07-18 17:04:56 +0200986 PostTask([this]() { DisallowAllInvokes(); });
Artem Titovdfc5f0d2020-07-03 12:09:26 +0200987 return;
988 }
989 RTC_DCHECK_RUN_ON(this);
990 allowed_threads_.clear();
991 invoke_policy_enabled_ = true;
992#endif
993}
994
Tommife041642021-04-07 10:08:28 +0200995#if RTC_DCHECK_IS_ON
996uint32_t Thread::GetBlockingCallCount() const {
997 RTC_DCHECK_RUN_ON(this);
998 return blocking_call_count_;
999}
1000uint32_t Thread::GetCouldBeBlockingCallCount() const {
1001 RTC_DCHECK_RUN_ON(this);
1002 return could_be_blocking_call_count_;
1003}
1004#endif
1005
Artem Titovdfc5f0d2020-07-03 12:09:26 +02001006// Returns true if no policies added or if there is at least one policy
Artem Titov96e3b992021-07-26 16:03:14 +02001007// that permits invocation to `target` thread.
Artem Titovdfc5f0d2020-07-03 12:09:26 +02001008bool Thread::IsInvokeToThreadAllowed(rtc::Thread* target) {
Mirko Bonadei481e3452021-07-30 13:57:25 +02001009#if (!defined(NDEBUG) || RTC_DCHECK_IS_ON)
Artem Titovdfc5f0d2020-07-03 12:09:26 +02001010 RTC_DCHECK_RUN_ON(this);
1011 if (!invoke_policy_enabled_) {
1012 return true;
1013 }
1014 for (const auto* thread : allowed_threads_) {
1015 if (thread == target) {
1016 return true;
1017 }
1018 }
1019 return false;
1020#else
1021 return true;
1022#endif
1023}
1024
Danil Chapovalov912b3b82019-11-22 15:52:40 +01001025void Thread::Delete() {
1026 Stop();
1027 delete this;
1028}
1029
Danil Chapovalov4bcf8092022-07-06 19:42:34 +02001030void Thread::PostTask(absl::AnyInvocable<void() &&> task) {
1031 // Though Post takes MessageData by raw pointer (last parameter), it still
1032 // takes it with ownership.
1033 Post(RTC_FROM_HERE, GetAnyInvocableMessageHandler(),
1034 /*id=*/0, new AnyInvocableMessage(std::move(task)));
1035}
1036
1037void Thread::PostDelayedTask(absl::AnyInvocable<void() &&> task,
1038 webrtc::TimeDelta delay) {
1039 // This implementation does not support low precision yet.
1040 PostDelayedHighPrecisionTask(std::move(task), delay);
1041}
1042
1043void Thread::PostDelayedHighPrecisionTask(absl::AnyInvocable<void() &&> task,
1044 webrtc::TimeDelta delay) {
1045 int delay_ms = delay.RoundUpTo(webrtc::TimeDelta::Millis(1)).ms<int>();
1046 // Though PostDelayed takes MessageData by raw pointer (last parameter),
1047 // it still takes it with ownership.
1048 PostDelayed(RTC_FROM_HERE, delay_ms, GetAnyInvocableMessageHandler(),
1049 /*id=*/0, new AnyInvocableMessage(std::move(task)));
1050}
1051
Niels Möller8909a632018-09-06 08:42:44 +02001052bool Thread::IsProcessingMessagesForTesting() {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +01001053 return (owned_ || IsCurrent()) && !IsQuitting();
Niels Möller8909a632018-09-06 08:42:44 +02001054}
1055
Peter Boström0c4e06b2015-10-07 12:23:21 +02001056void Thread::Clear(MessageHandler* phandler,
1057 uint32_t id,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001058 MessageList* removed) {
1059 CritScope cs(&crit_);
Niels Möller5e007b72018-09-07 12:35:44 +02001060 ClearInternal(phandler, id, removed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001061}
1062
1063bool Thread::ProcessMessages(int cmsLoop) {
deadbeef22e08142017-06-12 14:30:28 -07001064 // Using ProcessMessages with a custom clock for testing and a time greater
1065 // than 0 doesn't work, since it's not guaranteed to advance the custom
1066 // clock's time, and may get stuck in an infinite loop.
1067 RTC_DCHECK(GetClockForTesting() == nullptr || cmsLoop == 0 ||
1068 cmsLoop == kForever);
Honghai Zhang82d78622016-05-06 11:29:15 -07001069 int64_t msEnd = (kForever == cmsLoop) ? 0 : TimeAfter(cmsLoop);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001070 int cmsNext = cmsLoop;
1071
1072 while (true) {
Kári Tristan Helgason62b13452018-10-12 12:57:49 +02001073#if defined(WEBRTC_MAC)
1074 ScopedAutoReleasePool pool;
1075#endif
kthelgasonde6adbe2017-02-22 00:42:11 -08001076 Message msg;
1077 if (!Get(&msg, cmsNext))
1078 return !IsQuitting();
1079 Dispatch(&msg);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001080
kthelgasonde6adbe2017-02-22 00:42:11 -08001081 if (cmsLoop != kForever) {
1082 cmsNext = static_cast<int>(TimeUntil(msEnd));
1083 if (cmsNext < 0)
1084 return true;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001085 }
1086 }
1087}
1088
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +00001089bool Thread::WrapCurrentWithThreadManager(ThreadManager* thread_manager,
1090 bool need_synchronize_access) {
Tommi51492422017-12-04 15:18:23 +01001091 RTC_DCHECK(!IsRunning());
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +00001092
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001093#if defined(WEBRTC_WIN)
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +00001094 if (need_synchronize_access) {
1095 // We explicitly ask for no rights other than synchronization.
1096 // This gives us the best chance of succeeding.
1097 thread_ = OpenThread(SYNCHRONIZE, FALSE, GetCurrentThreadId());
1098 if (!thread_) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001099 RTC_LOG_GLE(LS_ERROR) << "Unable to get handle to thread.";
jiayl@webrtc.orgba737cb2014-09-18 16:45:21 +00001100 return false;
1101 }
1102 thread_id_ = GetCurrentThreadId();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001103 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001104#elif defined(WEBRTC_POSIX)
1105 thread_ = pthread_self();
1106#endif
1107 owned_ = false;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001108 thread_manager->SetCurrentThread(this);
1109 return true;
1110}
1111
Tommi51492422017-12-04 15:18:23 +01001112bool Thread::IsRunning() {
Tommi51492422017-12-04 15:18:23 +01001113#if defined(WEBRTC_WIN)
1114 return thread_ != nullptr;
1115#elif defined(WEBRTC_POSIX)
1116 return thread_ != 0;
1117#endif
1118}
1119
Taylor Brandstetter08672602018-03-02 15:20:33 -08001120AutoThread::AutoThread()
Mirko Bonadeie5f4c6b2021-01-15 10:41:01 +01001121 : Thread(CreateDefaultSocketServer(), /*do_init=*/false) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001122 if (!ThreadManager::Instance()->CurrentThread()) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +01001123 // DoInit registers with ThreadManager. Do that only if we intend to
Niels Möller5a8f8602019-06-12 11:30:59 +02001124 // be rtc::Thread::Current(), otherwise ProcessAllMessageQueuesInternal will
1125 // post a message to a queue that no running thread is serving.
1126 DoInit();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001127 ThreadManager::Instance()->SetCurrentThread(this);
1128 }
1129}
1130
1131AutoThread::~AutoThread() {
1132 Stop();
Steve Anton3b80aac2017-10-19 10:17:12 -07001133 DoDestroy();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001134 if (ThreadManager::Instance()->CurrentThread() == this) {
deadbeef37f5ecf2017-02-27 14:06:41 -08001135 ThreadManager::Instance()->SetCurrentThread(nullptr);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001136 }
1137}
1138
nisse7eaa4ea2017-05-08 05:25:41 -07001139AutoSocketServerThread::AutoSocketServerThread(SocketServer* ss)
Taylor Brandstetter08672602018-03-02 15:20:33 -08001140 : Thread(ss, /*do_init=*/false) {
1141 DoInit();
nisse7eaa4ea2017-05-08 05:25:41 -07001142 old_thread_ = ThreadManager::Instance()->CurrentThread();
Tommi51492422017-12-04 15:18:23 +01001143 // Temporarily set the current thread to nullptr so that we can keep checks
1144 // around that catch unintentional pointer overwrites.
1145 rtc::ThreadManager::Instance()->SetCurrentThread(nullptr);
nisse7eaa4ea2017-05-08 05:25:41 -07001146 rtc::ThreadManager::Instance()->SetCurrentThread(this);
1147 if (old_thread_) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +01001148 ThreadManager::Remove(old_thread_);
nisse7eaa4ea2017-05-08 05:25:41 -07001149 }
1150}
1151
1152AutoSocketServerThread::~AutoSocketServerThread() {
1153 RTC_DCHECK(ThreadManager::Instance()->CurrentThread() == this);
Steve Anton3b80aac2017-10-19 10:17:12 -07001154 // Stop and destroy the thread before clearing it as the current thread.
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +01001155 // Sometimes there are messages left in the Thread that will be
Steve Anton3b80aac2017-10-19 10:17:12 -07001156 // destroyed by DoDestroy, and sometimes the destructors of the message and/or
1157 // its contents rely on this thread still being set as the current thread.
1158 Stop();
1159 DoDestroy();
Tommi51492422017-12-04 15:18:23 +01001160 rtc::ThreadManager::Instance()->SetCurrentThread(nullptr);
nisse7eaa4ea2017-05-08 05:25:41 -07001161 rtc::ThreadManager::Instance()->SetCurrentThread(old_thread_);
1162 if (old_thread_) {
Sebastian Jansson6ea2c6a2020-01-13 14:07:22 +01001163 ThreadManager::Add(old_thread_);
nisse7eaa4ea2017-05-08 05:25:41 -07001164 }
1165}
1166
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001167} // namespace rtc