- 30 Aug, 2018 1 commit
-
-
Orvid King authored
Summary: MSVC wasn't treating this as an initializer list construction, so make it do so. Reviewed By: yfeldblum Differential Revision: D9565470 fbshipit-source-id: 15465b5c87a427920a7cad3f5204bb661ba230c2
-
- 29 Aug, 2018 13 commits
-
-
Orvid King authored
Summary: Because, rather impressively, it wasn't being included transitively by anything here when compiling on Windows. Reviewed By: yfeldblum Differential Revision: D9565417 fbshipit-source-id: b83fa0b121d83cbeb7ff0bd79dec506b6549385e
-
Orvid King authored
Summary: MSVC defines timeval in a weird place, so include the portability header. Reviewed By: yfeldblum Differential Revision: D9564726 fbshipit-source-id: f9e43225a889bfb0395178ef809aaa81fb9ccc36
-
Orvid King authored
Summary: One of these warnings is informational, the other we will continue to blissfully ignore until either includes become cheap, or the eventual heat death of the universe, whichever comes first. Reviewed By: yfeldblum Differential Revision: D9565514 fbshipit-source-id: e5a8d8c868c122d4b06635b061540c8f329ec93d
-
Orvid King authored
Summary: Because the latter was removed in C++17, and MSVC no longer supports it. Reviewed By: yfeldblum Differential Revision: D9565195 fbshipit-source-id: 7603ac5280ccf540abec296c7c76a43142581eb3
-
Orvid King authored
Summary: Because if you tried to capture them, they wouldn't be usable as template arguments. Reviewed By: yfeldblum Differential Revision: D9565384 fbshipit-source-id: 9c4579848be1c5c48251c17b0f55443aade75eba
-
Orvid King authored
Summary: Because the former is standard and the latter doesn't exist on Windows. Reviewed By: yfeldblum Differential Revision: D9565344 fbshipit-source-id: c29c0623c87a20d4c16a29fec1a7311907c1c1cf
-
Orvid King authored
Summary: Not all platforms have pthread. Reviewed By: yfeldblum Differential Revision: D9565232 fbshipit-source-id: fced220115315f976dbea8c037869cb6aef461fd
-
Orvid King authored
Summary: Because forking is not a thing on Windows. Reviewed By: yfeldblum Differential Revision: D9565259 fbshipit-source-id: 140103d0df3b6d2d70a8e7d4eac96682e3430143
-
Tom Jackson authored
Summary: Without this, `folly::gen`'s other `byLine()` implementations only support a single read pass (usually through the whole input file) without support for different formats through the file. Reviewed By: yfeldblum Differential Revision: D9540396 fbshipit-source-id: 6539851a70aed9a88d3c61986a459f60dfb7be5b
-
Adam Simpkins authored
Summary: Update readFull() and related functions to warn if their return value is ignored. Callers should pretty much always need to examine the return value, as they need this to determine how much valid data was read. Reviewed By: yfeldblum, meyering Differential Revision: D9526760 fbshipit-source-id: c090044256bfe4bf9907a24ec6090eeae04296b3
-
Adam Simpkins authored
Summary: Files opened by `readFile()` should not be propagated to children processes if another thread happens to spawn a subprocess while `readFile()` is running. Reviewed By: yfeldblum, meyering Differential Revision: D9553354 fbshipit-source-id: 2a6028b3a920bb1e76cd0b07f82e6af57d01c2a4
-
Harsh Poddar authored
Summary: A `CustomLogFormatter` can be enabled by setting the `formatter` option to `custom`. This formatter reads an option named `log_format` which specifies the format of the logs. The format string is similar to what `folly::vformat(format,...)` expects. Check out the following example format: {L}{m:02d}{D:02d} {H:02d}:{M:02d}:{S:02d}.{USECS:06d} {THREAD:5d} {FILE}:{LINE}] The format above prints logs in the same format as GLOGs. Another option `colored` takes in one of the following values: `never`, `auto`, and `always`. When enabled, the output will be colored in the following way: {F135233848} The config used for the image above is: FOLLY_INIT_LOGGING_CONFIG(".=DBG; default:formatter=custom,log_format={L} {FILE}::{FUN}():{LINE}],colored=true"); As you can see, we have also included the function name using `{FUN}`. This can be particularly helpful when debugging errors. Reviewed By: simpkins Differential Revision: D8974950 fbshipit-source-id: 87d624f53dd67c0630fb222093c46fe79ff44ee1
-
Xiao Shi authored
Summary: F14NodeMap is a safe drop-in replacement for std::unordered_map. It is smaller than std::unordered_map (32 bytes instead of 56 bytes) and has been shown to be faster in many production use cases. This diff replaces the hash table inside folly::dynamic. The effect is that sizeof(folly::dynamic) will drop from 64 bytes to 40 bytes, and use cases that use folly::dynamic as an object may also get a CPU win. Reviewed By: nbronson Differential Revision: D9518110 fbshipit-source-id: 72daba13577c560bbb88c4d68a457afedf1af38e
-
- 28 Aug, 2018 12 commits
-
-
Lewis Baker authored
Summary: Adds a new InlineTask coroutine type that is executor unaware. *Execution Contexts* The InlineTask's coroutine will start execution on the execution context of the coroutine that awaits it. When the InlineTask coroutine awaits something internally, it will resume execution on whatever execution context the operation it awaited on completes on. The coroutine awaiting the InlineTask will be resumed on whatever execution context the operation completed on. It has been put in the `folly::coro::detail` namespace for now to discourage usage outside of the operators exposed from `folly::coro` as it can be easily misused to accidentally run logic on the wrong execution context. This type is based around the same design as the `std::experimental::task<T>` that was proposed in [P1056R0](http://wg21.link/P1056R0). Reviewed By: andriigrynenko Differential Revision: D9388154 fbshipit-source-id: bc94a9bf07459410ef423b4cfd3b57d13688f744
-
Lewis Baker authored
Summary: Add a generic function for performing a blocking-wait on any awaitable object. This obsoletes the use of the `.wait()` and `.get()` methods on `folly::coro::Future<T>` and so these methods have now been removed. Reviewed By: andriigrynenko Differential Revision: D9384837 fbshipit-source-id: bcff5b348c024a3fc9337c67d996c447e0723fcc
-
Marshall Cline authored
Summary: * Contract for Future::hasValue() had a typo - fixed that. * Contract for Future::hasException() was inconsistent with hasValue() - made it consistent. Differential Revision: D9527398 fbshipit-source-id: 93e1ebd768fa38476949818c0902e06a7dab5209
-
Matthieu Martin authored
Summary: Save python import cost in folly/python get_fiber_manager. In my testing, using call_once here is safe even in multi-threaded and forked environment. Though I wouldn't be surprised if a corner case is found in the future, as I couldn't find a definite answer about the safety of memoization Python C-API import calls. Reviewed By: fried Differential Revision: D9542909 fbshipit-source-id: c62a08ebf67bd4eb82f1bf4b7657c4a3a6daf4db
-
Aaryaman Sagar authored
Summary: The current futex API required a reference to a futex object in order to invoke `futexWake()`, although this is not buggy by itself, it is technically UB and nothing is stopping ASAN from catching this sort of use-after-free and reporting it as an error. Especially when the futex is represented as a pointer, requiring a dereference to reach a member function The bug can come up when you call `futexWake()` on a futex that has been destroyed, for example ``` auto&& futex_ptr = std::atomic<Futex<>*>{nullptr}; auto&& thread = std::thread{[&]() { auto&& futex = Futex<>{0}; futex_ptr.store(&futex); while (futex.load(std::memory_order_relaxed) != 1) { futex.futexWait(0); } }}; while (!futex_ptr.load()) {} futex_ptr.load()->store(1); futex_ptr.load()->futexWake(1); thread.join(); ``` Here immediately after the `store(1)`, our thread could have loaded the value, seen that it had changed, and never went to sleep. Or it could have seen the value as 0, went to sleep and immediately returned when it saw that the value in the futex word was not what was expected. In the scenario described above calling `futexWake()` is done on a "dangling" pointer. To avoid this, we just never dereference the pointer, and pass the pointer to the futex syscall, where it will do the right things A side benefit to the refactor is that adding specializations is very easy. And we don't have to mess with member function specializations anymore, which are inherently hard to work with (eg. cannot partially specialize) The ADL extension points (currently implemented for `Futex<std::atomic>`, `Futex<DeterministicAtomic>` and `Futex<EmulatedFutexAtomic>`) are ``` int futexWakeImpl(FutexType* futex, int count, uint32_t wakeMask); FutexResult futexWaitImpl( FutexType* futex, uint32_t expected, std::chrono::system_clock::time_point const* absSystemTime, std::chrono::steady_clock::time_point const* absSteadyTime, uint32_t waitMask); ``` Reviewed By: yfeldblum Differential Revision: D9376527 fbshipit-source-id: bb2b54e511fdf1da992c630a9bc7dc37f76da641
-
Nick Terrell authored
Summary: Add the BZIP2 stream codec. The `FlushOp::FLUSH` does not guarantee that the decompressor can read all the input processed so far, due to a bug in the bzip2 library. This is likely not important, since `FLUSH` is not a common operation, especially with bzip2. Reviewed By: yfeldblum Differential Revision: D9484325 fbshipit-source-id: 40770b6f301a16d86c4de8c2b0875f931f00cba2
-
Xiao Shi authored
Summary: F14 library relies on the dependent targets to set the neon-related compiler flags consistently. As it turns out, this is difficult for non-aarch64 platforms where neon availability is not guaranteed. Hence, for safety (so that we don't cause SIGILL on older generation Android devices), we restrict the neon version of F14 to aarch64. Reviewed By: Maratyszcza, nbronson Differential Revision: D9519198 fbshipit-source-id: cd0c92b17403bce9156a915ad96020f565ca3d6a
-
Dan Melnic authored
Summary: Initialize `std::atomic<std::thread::id> SingletonHolder::creating_thread_`. Reviewed By: yfeldblum Differential Revision: D9525334 fbshipit-source-id: 93831c40bed21d1f3356bd2181e78ba08b7b116f
-
Lewis Baker authored
Add folly::tryEmplaceWith() helper for safely initialising a Try<T> with result of calling a function Summary: Adds a new folly::tryEmplaceWith() function that is the equivalent of makeTryWith() but for in-place initialisation of an existing Try<T> object. Using `tryEmplaceWith(t, func)` rather than `t = makeTryWith(func)` can potentially be more exception safe since the latter could potentially still throw if `Try<T>::operator=()` throws (ie. if T's move-constructor can throw). Updated FiberManager's internals to make use of this to fix a potential exception-safety issue that could have caused a memory leak if the Try<T> move-constructor of the result of fiber threw an exception. Reviewed By: yfeldblum Differential Revision: D9511067 fbshipit-source-id: 827cc88ea1d4fcd505c8d8a9886b87b26db90544
-
Dan Melnic authored
Summary: Fix folly/io/async/test:async_test - AsyncSSLSocketTest.ConnectTFOFallbackTimeout SIGSEGV Reviewed By: djwatson Differential Revision: D9520104 fbshipit-source-id: c1133bcb0617ca7f8d5f8a9ee46080c7c7f5b105
-
Lewis Baker authored
Summary: Add some methods to `folly::Try<T>` to allow the user to in-place construct a value or exception_wrapper inside the Try object at some point after the Try object was constructed. Previously, you had to construct a new temporary `Try<T>` object from the value and move-assign the value. The difference between `t.emplace(args...)` and `tryEmplace(t, args...)` is that the latter catches any exceptions thrown by the constructor and stores the exception in the Try object whereas the former lets the exception propagate out to the caller and leaves the Try object in an empty state. The `Try<void>` implementation now only conditionally constructs the contained exception_wrapper only if hasValue_ is false. This was needed to be able to have the `.emplaceException()` method correctly in-place construct the `exception_wrapper` object. Reviewed By: yfeldblum Differential Revision: D9352439 fbshipit-source-id: f34a4479acb2f93aed11f9626b3152511386bfea
-
Orvid King authored
-
- 27 Aug, 2018 12 commits
-
-
Dan Melnic authored
Summary: Init the std::atomic since in the default constructor is "no initialization takes place" Reviewed By: yfeldblum, djwatson Differential Revision: D9515004 fbshipit-source-id: cdc73c490f77496335e77732b0c7c43c180a54b6
-
Andrii Grynenko authored
Reviewed By: lewissbaker Differential Revision: D9354535 fbshipit-source-id: 49c228e773f21a2fcfa4701eec4cb4dc76c2f990
-
Marshall Cline authored
Summary: This is part of "the great r-valuification of folly::Future": * This is something we should do for safety in general. * Several of folly::Future's methods are lvalue-qualified even though they act as though they are rvalue-qualified, that is, they provide a postcondition that says, in effect, callers should act as though the method invalidated its `this` object (regardless of whether that invalidation was actual or logical). * This violates the C++ principle to "Express ideas directly in code" (see Core Guidelines), and generally makes it more confusing for callers as well as hiding the actual semantics from tools (linters, compilers, etc.). * This dichotomy and confusion has manifested itself by some failures around D7840699 since lvalue-qualification hides that operation's move-out semantics - leads to some use of future operations that are really not correct, but are not obviously incorrect. * The goal of rvalueification is to make sure methods that are logically rvalue-qualified are actually rvalue-qualified, which forces callsites to acknowledge that rvalueification, e.g., `std::move(f).onTimeout(...)` instead of `f.onTimeout(...)`. This syntactic change in the callsites forces callers to acknowledge the method's rvalue semantics. Reviewed By: LeeHowes Differential Revision: D9441979 fbshipit-source-id: a2f3416bdf481d32d1b94cde1bb713e1afe8ab67
-
Lewis Baker authored
Summary: If the value copy/move constructor threw an exception during copy/move assignment then the Try<T> object would not be left in the empty state. This could lead to double-deletion of resources, or referencing uninitialised memory. Reviewed By: yfeldblum Differential Revision: D9425118 fbshipit-source-id: 6639a0903258ecb031c26264f418fa8794519be3
-
Marshall Cline authored
Summary: This is part of "the great r-valuification of folly::Future": * This is something we should do for safety in general. * Several of folly::Future's methods are lvalue-qualified even though they act as though they are rvalue-qualified, that is, they provide a postcondition that says, in effect, callers should act as though the method invalidated its `this` object (regardless of whether that invalidation was actual or logical). * This violates the C++ principle to "Express ideas directly in code" (see Core Guidelines), and generally makes it more confusing for callers as well as hiding the actual semantics from tools (linters, compilers, etc.). * This dichotomy and confusion has manifested itself by some failures around D7840699 since lvalue-qualification hides that operation's move-out semantics - leads to some use of future operations that are really not correct, but are not obviously incorrect. * The goal of rvalueification is to make sure methods that are logically rvalue-qualified are actually rvalue-qualified, which forces callsites to acknowledge that rvalueification, e.g., `std::move(f).within(...)` instead of `f.within(...)`. This syntactic change in the callsites forces callers to acknowledge the method's rvalue semantics. Reviewed By: LeeHowes Differential Revision: D9442319 fbshipit-source-id: c751a5e295620bff22c8bdaed57d417bcc0973d1
-
Lee Howes authored
Summary: Makes it invalid to call SemiFuture::defer with a lambda that takes no arguments. Fix to callsites in folly tests that checked this behaviour. Reviewed By: yfeldblum Differential Revision: D9511831 fbshipit-source-id: 11e600cea78887c653e3d0d0e1cd2091c4eb191e
-
Marshall Cline authored
Summary: This is part of "the great r-valuification of folly::Future": * This is something we should do for safety in general. * Several of folly::Future's methods are lvalue-qualified even though they act as though they are rvalue-qualified, that is, they provide a postcondition that says, in effect, callers should act as though the method invalidated its `this` object (regardless of whether that invalidation was actual or logical). * This violates the C++ principle to "Express ideas directly in code" (see Core Guidelines), and generally makes it more confusing for callers as well as hiding the actual semantics from tools (linters, compilers, etc.). * This dichotomy and confusion has manifested itself by some failures around D7840699 since lvalue-qualification hides that operation's move-out semantics - leads to some use of future operations that are really not correct, but are not obviously incorrect. * The goal of rvalueification is to make sure methods that are logically rvalue-qualified are actually rvalue-qualified, which forces callsites to acknowledge that rvalueification, e.g., `std::move(f).onError(...)` instead of `f.onError(...)`. This syntactic change in the callsites forces callers to acknowledge the method's rvalue semantics. Reviewed By: yfeldblum Differential Revision: D9441402 fbshipit-source-id: 1c39ca7b33bb406d2fd3a995f487693a2d013747
-
Nathan Bronson authored
Summary: F14 previously had a space optimization that relied on the fact that tuple<A,B,C> was std::is_empty if each of A, B, and C was empty (and non-final), but this is not the case on libc++. This diff removes the use of std::tuple and manually packages the hash table functors to enable the Empty Baseclass Optimization. Reviewed By: yfeldblum Differential Revision: D9507243 fbshipit-source-id: 3ee8aa2aa444d91de56210662c86e555406d8eca
-
Dan Zimmerman authored
Summary: We may want to disable exceptions, so lets make this work Reviewed By: yfeldblum Differential Revision: D9381726 fbshipit-source-id: 6e6d022740728a40a5b710ec32309da99f6d0bd0
-
Dan Zimmerman authored
Summary: This doesn't need to be in Memory.h and is one of the reasons Memory.h fails to compile with -fno-exceptions, so split it out I include EnableSharedFromThis.h because I'm not sure how else to ensure backward compatibility any other way (and I have the macro so we can include Memory.h without including EnableSharedFromThis.h) Reviewed By: yfeldblum Differential Revision: D9385709 fbshipit-source-id: bf2c3a757ae4eefba69e6191309d64b347becf12
-
Marshall Cline authored
Summary: This is part of "the great r-valuification of folly::Future": * This is something we should do for safety in general. * Several of folly::Future's methods are lvalue-qualified even though they act as though they are rvalue-qualified, that is, they provide a postcondition that says, in effect, callers should act as though the method invalidated its `this` object (regardless of whether that invalidation was actual or logical). * This violates the C++ principle to "Express ideas directly in code" (see Core Guidelines), and generally makes it more confusing for callers as well as hiding the actual semantics from tools (linters, compilers, etc.). * This dichotomy and confusion has manifested itself by some failures around D7840699 since lvalue-qualification hides that operation's move-out semantics - leads to some use of future operations that are really not correct, but are not obviously incorrect. * The goal of rvalueification is to make sure methods that are logically rvalue-qualified are actually rvalue-qualified, which forces callsites to acknowledge that rvalueification, e.g., `std::move(f).within(...)` instead of `f.within(...)`. This syntactic change in the callsites forces callers to acknowledge the method's rvalue semantics. Codemod changes: * expr.within(...) ==> std::move(expr).within(...) // if expr is not already an xvalue * expr->within(...) ==> std::move(*expr).within(...) Note: operator precedence of that last step is safe - no need to parenthesize `expr`. Reason: `->` binds more tightly than unary `*`. Reviewed By: yfeldblum Differential Revision: D9511943 fbshipit-source-id: 0cf90e3198453dd997194c2c7f36cc1fa74906f5
-
Yedidya Feldblum authored
Summary: [Folly] `invoke_noreturn_cold`, a helper function for invoking another function with arguments in a `[[noreturn]]` and `[[gnu::cold]]` context. Potentially useful for making the bytecode at the call-site small for icache size or always-inlined fast-path size concerns, when constructing the exception object to be thrown is more complex than passing pre-existing values by reference, such as when computing a message is required. Reviewed By: marshallcline Differential Revision: D9509658 fbshipit-source-id: b8272629876f9e7e81ae0f7a7f06404484d297f2
-
- 26 Aug, 2018 2 commits
-
-
Marshall Cline authored
Summary: This is part of "the great r-valuification of folly::Future": * This is something we should do for safety in general. * Several of folly::Future's methods are lvalue-qualified even though they act as though they are rvalue-qualified, that is, they provide a postcondition that says, in effect, callers should act as though the method invalidated its `this` object (regardless of whether that invalidation was actual or logical). * This violates the C++ principle to "Express ideas directly in code" (see Core Guidelines), and generally makes it more confusing for callers as well as hiding the actual semantics from tools (linters, compilers, etc.). * This dichotomy and confusion has manifested itself by some failures around D7840699 since lvalue-qualification hides that operation's move-out semantics - leads to some use of future operations that are really not correct, but are not obviously incorrect. * The goal of rvalueification is to make sure methods that are logically rvalue-qualified are actually rvalue-qualified, which forces callsites to acknowledge that rvalueification, e.g., `std::move(f).semi()` instead of `f.semi()`. This syntactic change in the callsites forces callers to acknowledge the method's rvalue semantics. Reviewed By: LeeHowes Differential Revision: D9442704 fbshipit-source-id: 50b1912e33ac23d1a693682fbcd55cd637cdb149
-
Yedidya Feldblum authored
Summary: [Folly] Cut use of boost headers in `sorted_vector_types.h`. Reviewed By: elsteveogrande Differential Revision: D9508079 fbshipit-source-id: 46950a07d1fbc0e316bd6a8cb9766f5d0aeaa74b
-