Merge pull request #920 from cubbimew/issue899

CP.111 more precise motivation and examples
This commit is contained in:
Andrew Pardoe 2017-05-08 11:05:28 -07:00 committed by GitHub
commit 2e1d9c34d4

View File

@ -13454,7 +13454,7 @@ Example with thread-safe static local variables of C++11.
public: public:
My_class() My_class()
{ {
// ... // do this only once
} }
}; };
@ -13469,42 +13469,48 @@ Example with thread-safe static local variables of C++11.
Double-checked locking is easy to mess up. If you really need to write your own double-checked locking, in spite of the rules [CP.110: Do not write your own double-checked locking for initialization](#Rconc-double) and [CP.100: Don't use lock-free programming unless you absolutely have to](#Rconc-lockfree), then do it in a conventional pattern. Double-checked locking is easy to mess up. If you really need to write your own double-checked locking, in spite of the rules [CP.110: Do not write your own double-checked locking for initialization](#Rconc-double) and [CP.100: Don't use lock-free programming unless you absolutely have to](#Rconc-lockfree), then do it in a conventional pattern.
The uses of double-checked locking pattern that are not in violation of [CP.110: Do not write your own double-checked locking for initialization](#Rconc-double) arise when a non-thread-safe action is both hard and rare, and there exists a fast thread-safe test that can be used to guarantees that the action is not needed, but cannot be used to guarantee the converse.
##### Example, bad ##### Example, bad
Even if the following example works correctly on most hardware platforms, it is not guaranteed to work by the C++ standard. The x_init.load(memory_order_relaxed) call may see a value from outside of the lock guard. The use of volatile does not make the first check thread-safe, see also [CP.200: Use `volatile` only to talk to non-C++ memory](#Rconc-volatile2)
atomic<bool> x_init; mutex action_mutex;
volatile bool action_needed;
if (!x_init.load(memory_order_acquire)) { if (action_needed) {
lock_guard<mutex> lck(x_mutex); std::lock_guard<std::mutex> lock(action_mutex);
if (!x_init.load(memory_order_relaxed)) { if (action_needed) {
// ... initialize x ... take_action();
x_init.store(true, memory_order_release); action_needed = false;
} }
} }
##### Example, good ##### Example, good
One of the conventional patterns is below. mutex action_mutex;
atomic<bool> action_needed;
std::atomic<int> state; if (action_needed) {
std::lock_guard<std::mutex> lock(action_mutex);
// If state == SOME_ACTION_NEEDED maybe an action is needed, maybe not, we need to if (action_needed) {
// check again in a lock. However, if state != SOME_ACTION_NEEDED, then we can be take_action();
// sure that an action is not needed. This is the basic assumption of double-checked action_needed = false;
// locking.
if (state == SOME_ACTION_NEEDED)
{
std::lock_guard<std::mutex> lock(mutex);
if (state == SOME_ACTION_NEEDED)
{
// do something
state = NO_ACTION_NEEDED;
} }
} }
In the example above (state == SOME_ACTION_NEEDED) could be any condition. It doesn't necessarily needs to be equality comparison. For example, it could as well be (size > MIN_SIZE_TO_TAKE_ACTION). Fine-tuned memory order may be beneficial where acquire load is more efficient than sequentially-consistent load
mutex action_mutex;
atomic<bool> action_needed;
if (action_needed.load(memory_order_acquire)) {
lock_guard<std::mutex> lock(action_mutex);
if (action_needed.load(memory_order_relaxed)) {
take_action();
action_needed.store(false, memory_order_release);
}
}
##### Enforcement ##### Enforcement