Fri Jun 19 12:09:31 2009

Asterisk developer's documentation


astobj2.h

Go to the documentation of this file.
00001 /*
00002  * astobj2 - replacement containers for asterisk data structures.
00003  *
00004  * Copyright (C) 2006 Marta Carbone, Luigi Rizzo - Univ. di Pisa, Italy
00005  *
00006  * See http://www.asterisk.org for more information about
00007  * the Asterisk project. Please do not directly contact
00008  * any of the maintainers of this project for assistance;
00009  * the project provides a web site, mailing lists and IRC
00010  * channels for your use.
00011  *
00012  * This program is free software, distributed under the terms of
00013  * the GNU General Public License Version 2. See the LICENSE file
00014  * at the top of the source tree.
00015  */
00016 
00017 #ifndef _ASTERISK_ASTOBJ2_H
00018 #define _ASTERISK_ASTOBJ2_H
00019 
00020 #include "asterisk/compat.h"
00021 
00022 /*! \file
00023  * \ref AstObj2
00024  *
00025  * \page AstObj2 Object Model implementing objects and containers.
00026 
00027 This module implements an abstraction for objects (with locks and
00028 reference counts), and containers for these user-defined objects,
00029 also supporting locking, reference counting and callbacks.
00030 
00031 The internal implementation of objects and containers is opaque to the user,
00032 so we can use different data structures as needs arise.
00033 
00034 \section AstObj2_UsageObjects USAGE - OBJECTS
00035 
00036 An ao2 object is a block of memory that the user code can access,
00037 and for which the system keeps track (with a bit of help from the
00038 programmer) of the number of references around.  When an object has
00039 no more references (refcount == 0), it is destroyed, by first
00040 invoking whatever 'destructor' function the programmer specifies
00041 (it can be NULL if none is necessary), and then freeing the memory.
00042 This way objects can be shared without worrying who is in charge
00043 of freeing them.
00044 As an additional feature, ao2 objects are associated to individual
00045 locks.
00046 
00047 Creating an object requires the size of the object and
00048 and a pointer to the destructor function:
00049 
00050     struct foo *o;
00051 
00052     o = ao2_alloc(sizeof(struct foo), my_destructor_fn);
00053 
00054 The value returned points to the user-visible portion of the objects
00055 (user-data), but is also used as an identifier for all object-related
00056 operations such as refcount and lock manipulations.
00057 
00058 On return from ao2_alloc():
00059 
00060  - the object has a refcount = 1;
00061  - the memory for the object is allocated dynamically and zeroed;
00062  - we cannot realloc() the object itself;
00063  - we cannot call free(o) to dispose of the object. Rather, we
00064    tell the system that we do not need the reference anymore:
00065 
00066     ao2_ref(o, -1)
00067 
00068   causing the destructor to be called (and then memory freed) when
00069   the refcount goes to 0.
00070 
00071 - ao2_ref(o, +1) can be used to modify the refcount on the
00072   object in case we want to pass it around.
00073 
00074 - ao2_lock(obj), ao2_unlock(obj), ao2_trylock(obj) can be used
00075   to manipulate the lock associated with the object.
00076 
00077 
00078 \section AstObj2_UsageContainers USAGE - CONTAINERS
00079 
00080 An ao2 container is an abstract data structure where we can store
00081 ao2 objects, search them (hopefully in an efficient way), and iterate
00082 or apply a callback function to them. A container is just an ao2 object
00083 itself.
00084 
00085 A container must first be allocated, specifying the initial
00086 parameters. At the moment, this is done as follows:
00087 
00088     <b>Sample Usage:</b>
00089     \code
00090 
00091     struct ao2_container *c;
00092 
00093     c = ao2_container_alloc(MAX_BUCKETS, my_hash_fn, my_cmp_fn);
00094     \endcode
00095 
00096 where
00097 
00098 - MAX_BUCKETS is the number of buckets in the hash table,
00099 - my_hash_fn() is the (user-supplied) function that returns a
00100   hash key for the object (further reduced modulo MAX_BUCKETS
00101   by the container's code);
00102 - my_cmp_fn() is the default comparison function used when doing
00103   searches on the container,
00104 
00105 A container knows little or nothing about the objects it stores,
00106 other than the fact that they have been created by ao2_alloc().
00107 All knowledge of the (user-defined) internals of the objects
00108 is left to the (user-supplied) functions passed as arguments
00109 to ao2_container_alloc().
00110 
00111 If we want to insert an object in a container, we should
00112 initialize its fields -- especially, those used by my_hash_fn() --
00113 to compute the bucket to use.
00114 Once done, we can link an object to a container with
00115 
00116     ao2_link(c, o);
00117 
00118 The function returns NULL in case of errors (and the object
00119 is not inserted in the container). Other values mean success
00120 (we are not supposed to use the value as a pointer to anything).
00121 Linking an object to a container increases its refcount by 1
00122 automatically.
00123 
00124 \note While an object o is in a container, we expect that
00125 my_hash_fn(o) will always return the same value. The function
00126 does not lock the object to be computed, so modifications of
00127 those fields that affect the computation of the hash should
00128 be done by extracting the object from the container, and
00129 reinserting it after the change (this is not terribly expensive).
00130 
00131 \note A container with a single buckets is effectively a linked
00132 list. However there is no ordering among elements.
00133 
00134 - \ref AstObj2_Containers
00135 - \ref astobj2.h All documentation for functions and data structures
00136 
00137  */
00138 
00139 /*
00140 \note DEBUGGING REF COUNTS BIBLE:
00141 An interface to help debug refcounting is provided
00142 in this package. It is dependent on the REF_DEBUG macro being
00143 defined in a source file, before the #include of astobj2.h,
00144 and in using variants of the normal ao2_xxxx functions
00145 that are named ao2_t_xxxx instead, with an extra argument, a string,
00146 that will be printed out into /tmp/refs when the refcount for an
00147 object is changed.
00148 
00149   these ao2_t_xxxx variants are provided:
00150 
00151 ao2_t_alloc(arg1, arg2, arg3)
00152 ao2_t_ref(arg1,arg2,arg3)
00153 ao2_t_container_alloc(arg1,arg2,arg3,arg4)
00154 ao2_t_link(arg1, arg2, arg3)
00155 ao2_t_unlink(arg1, arg2, arg3)
00156 ao2_t_callback(arg1,arg2,arg3,arg4,arg5)
00157 ao2_t_find(arg1,arg2,arg3,arg4)
00158 ao2_t_iterator_next(arg1, arg2)
00159 
00160 If you study each argument list, you will see that these functions all have
00161 one extra argument that their ao2_xxx counterpart. The last argument in
00162 each case is supposed to be a string pointer, a "tag", that should contain
00163 enough of an explanation, that you can pair operations that increment the
00164 ref count, with operations that are meant to decrement the refcount.
00165 
00166 Each of these calls will generate at least one line of output in /tmp/refs.
00167 These lines look like this:
00168 ...
00169 0x8756f00 =1   chan_sip.c:22240:load_module (allocate users)
00170 0x86e3408 =1   chan_sip.c:22241:load_module (allocate peers)
00171 0x86dd380 =1   chan_sip.c:22242:load_module (allocate peers_by_ip)
00172 0x822d020 =1   chan_sip.c:22243:load_module (allocate dialogs)
00173 0x8930fd8 =1   chan_sip.c:20025:build_peer (allocate a peer struct)
00174 0x8930fd8 +1   chan_sip.c:21467:reload_config (link peer into peer table) [@1]
00175 0x8930fd8 -1   chan_sip.c:2370:unref_peer (unref_peer: from reload_config) [@2]
00176 0x89318b0 =1   chan_sip.c:20025:build_peer (allocate a peer struct)
00177 0x89318b0 +1   chan_sip.c:21467:reload_config (link peer into peer table) [@1]
00178 0x89318b0 -1   chan_sip.c:2370:unref_peer (unref_peer: from reload_config) [@2]
00179 0x8930218 =1   chan_sip.c:20025:build_peer (allocate a peer struct)
00180 0x8930218 +1   chan_sip.c:21539:reload_config (link peer into peers table) [@1]
00181 0x868c040 -1   chan_sip.c:2424:dialog_unlink_all (unset the relatedpeer->call field in tandem with relatedpeer field itself) [@2]
00182 0x868c040 -1   chan_sip.c:2443:dialog_unlink_all (Let's unbump the count in the unlink so the poor pvt can disappear if it is time) [@1]
00183 0x868c040 **call destructor** chan_sip.c:2443:dialog_unlink_all (Let's unbump the count in the unlink so the poor pvt can disappear if it is time)
00184 0x8cc07e8 -1   chan_sip.c:2370:unref_peer (unsetting a dialog relatedpeer field in sip_destroy) [@3]
00185 0x8cc07e8 +1   chan_sip.c:3876:find_peer (ao2_find in peers table) [@2]
00186 0x8cc07e8 -1   chan_sip.c:2370:unref_peer (unref_peer, from sip_devicestate, release ref from find_peer) [@3]
00187 ...
00188 
00189 The first column is the object address.
00190 The second column reflects how the operation affected the ref count
00191     for that object. Creation sets the ref count to 1 (=1).
00192     increment or decrement and amount are specified (-1/+1).
00193 The remainder of the line specifies where in the file the call was made,
00194     and the function name, and the tag supplied in the function call.
00195 
00196 The **call destructor** is specified when the the destroy routine is
00197 run for an object. It does not affect the ref count, but is important
00198 in debugging, because it is possible to have the astobj2 system run it
00199 multiple times on the same object, commonly fatal to asterisk.
00200 
00201 Sometimes you have some helper functions to do object ref/unref
00202 operations. Using these normally hides the place where these
00203 functions were called. To get the location where these functions
00204 were called to appear in /tmp/refs, you can do this sort of thing:
00205 
00206 #ifdef REF_DEBUG
00207 #define dialog_ref(arg1,arg2) dialog_ref_debug((arg1),(arg2), __FILE__, __LINE__, __PRETTY_FUNCTION__)
00208 #define dialog_unref(arg1,arg2) dialog_unref_debug((arg1),(arg2), __FILE__, __LINE__, __PRETTY_FUNCTION__)
00209 static struct sip_pvt *dialog_ref_debug(struct sip_pvt *p, char *tag, char *file, int line, const char *func)
00210 {
00211    if (p)
00212       ao2_ref_debug(p, 1, tag, file, line, func);
00213    else
00214       ast_log(LOG_ERROR, "Attempt to Ref a null pointer\n");
00215    return p;
00216 }
00217 
00218 static struct sip_pvt *dialog_unref_debug(struct sip_pvt *p, char *tag, char *file, int line, const char *func)
00219 {
00220    if (p)
00221       ao2_ref_debug(p, -1, tag, file, line, func);
00222    return NULL;
00223 }
00224 #else
00225 static struct sip_pvt *dialog_ref(struct sip_pvt *p, char *tag)
00226 {
00227    if (p)
00228       ao2_ref(p, 1);
00229    else
00230       ast_log(LOG_ERROR, "Attempt to Ref a null pointer\n");
00231    return p;
00232 }
00233 
00234 static struct sip_pvt *dialog_unref(struct sip_pvt *p, char *tag)
00235 {
00236    if (p)
00237       ao2_ref(p, -1);
00238    return NULL;
00239 }
00240 #endif
00241 
00242 In the above code, note that the "normal" helper funcs call ao2_ref() as
00243 normal, and the "helper" functions call ao2_ref_debug directly with the
00244 file, function, and line number info provided. You might find this
00245 well worth the effort to help track these function calls in the code.
00246 
00247 To find out why objects are not destroyed (a common bug), you can
00248 edit the source file to use the ao2_t_* variants, add the #define REF_DEBUG 1
00249 before the #include "asterisk/astobj2.h" line, and add a descriptive
00250 tag to each call. Recompile, and run Asterisk, exit asterisk with
00251 "stop gracefully", which should result in every object being destroyed.
00252 Then, you can "sort -k 1 /tmp/refs > x1" to get a sorted list of
00253 all the objects, or you can use "util/refcounter" to scan the file
00254 for you and output any problems it finds.
00255 
00256 The above may seem astronomically more work than it is worth to debug
00257 reference counts, which may be true in "simple" situations, but for
00258 more complex situations, it is easily worth 100 times this effort to
00259 help find problems.
00260 
00261 To debug, pair all calls so that each call that increments the
00262 refcount is paired with a corresponding call that decrements the
00263 count for the same reason. Hopefully, you will be left with one
00264 or more unpaired calls. This is where you start your search!
00265 
00266 For instance, here is an example of this for a dialog object in
00267 chan_sip, that was not getting destroyed, after I moved the lines around
00268 to pair operations:
00269 
00270    0x83787a0 =1   chan_sip.c:5733:sip_alloc (allocate a dialog(pvt) struct)
00271    0x83787a0 -1   chan_sip.c:19173:sip_poke_peer (unref dialog at end of sip_poke_peer, obtained from sip_alloc, just before it goes out of scope) [@4]
00272 
00273    0x83787a0 +1   chan_sip.c:5854:sip_alloc (link pvt into dialogs table) [@1]
00274    0x83787a0 -1   chan_sip.c:19150:sip_poke_peer (About to change the callid -- remove the old name) [@3]
00275    0x83787a0 +1   chan_sip.c:19152:sip_poke_peer (Linking in under new name) [@2]
00276    0x83787a0 -1   chan_sip.c:2399:dialog_unlink_all (unlinking dialog via ao2_unlink) [@5]
00277 
00278    0x83787a0 +1   chan_sip.c:19130:sip_poke_peer (copy sip alloc from p to peer->call) [@2]
00279 
00280 
00281    0x83787a0 +1   chan_sip.c:2996:__sip_reliable_xmit (__sip_reliable_xmit: setting pkt->owner) [@3]
00282    0x83787a0 -1   chan_sip.c:2425:dialog_unlink_all (remove all current packets in this dialog, and the pointer to the dialog too as part of __sip_destroy) [@4]
00283 
00284    0x83787a0 +1   chan_sip.c:22356:unload_module (iterate thru dialogs) [@4]
00285    0x83787a0 -1   chan_sip.c:22359:unload_module (toss dialog ptr from iterator_next) [@5]
00286 
00287 
00288    0x83787a0 +1   chan_sip.c:22373:unload_module (iterate thru dialogs) [@3]
00289    0x83787a0 -1   chan_sip.c:22375:unload_module (throw away iterator result) [@2]
00290 
00291    0x83787a0 +1   chan_sip.c:2397:dialog_unlink_all (Let's bump the count in the unlink so it doesn't accidentally become dead before we are done) [@4]
00292    0x83787a0 -1   chan_sip.c:2436:dialog_unlink_all (Let's unbump the count in the unlink so the poor pvt can disappear if it is time) [@3]
00293 
00294 As you can see, only one unbalanced operation is in the list, a ref count increment when
00295 the peer->call was set, but no corresponding decrement was made...
00296 
00297 Hopefully this helps you narrow your search and find those bugs.
00298 
00299 THE ART OF REFERENCE COUNTING
00300 (by Steve Murphy)
00301 SOME TIPS for complicated code, and ref counting:
00302 
00303 1. Theoretically, passing a refcounted object pointer into a function
00304 call is an act of copying the reference, and could be refcounted.
00305 But, upon examination, this sort of refcounting will explode the amount
00306 of code you have to enter, and for no tangible benefit, beyond
00307 creating more possible failure points/bugs. It will even
00308 complicate your code and make debugging harder, slow down your program
00309 doing useless increments and decrements of the ref counts.
00310 
00311 2. It is better to track places where a ref counted pointer
00312 is copied into a structure or stored. Make sure to decrement the refcount
00313 of any previous pointer that might have been there, if setting
00314 this field might erase a previous pointer. ao2_find and iterate_next
00315 internally increment the ref count when they return a pointer, so
00316 you need to decrement the count before the pointer goes out of scope.
00317 
00318 3. Any time you decrement a ref count, it may be possible that the
00319 object will be destroyed (freed) immediately by that call. If you
00320 are destroying a series of fields in a refcounted object, and
00321 any of the unref calls might possibly result in immediate destruction,
00322 you can first increment the count to prevent such behavior, then
00323 after the last test, decrement the pointer to allow the object
00324 to be destroyed, if the refcount would be zero.
00325 
00326 Example:
00327 
00328    dialog_ref(dialog, "Let's bump the count in the unlink so it doesn't accidentally become dead before we are done");
00329 
00330    ao2_t_unlink(dialogs, dialog, "unlinking dialog via ao2_unlink");
00331 
00332    *//* Unlink us from the owner (channel) if we have one *//*
00333    if (dialog->owner) {
00334       if (lockowner)
00335          ast_channel_lock(dialog->owner);
00336       ast_debug(1, "Detaching from channel %s\n", dialog->owner->name);
00337       dialog->owner->tech_pvt = dialog_unref(dialog->owner->tech_pvt, "resetting channel dialog ptr in unlink_all");
00338       if (lockowner)
00339          ast_channel_unlock(dialog->owner);
00340    }
00341    if (dialog->registry) {
00342       if (dialog->registry->call == dialog)
00343          dialog->registry->call = dialog_unref(dialog->registry->call, "nulling out the registry's call dialog field in unlink_all");
00344       dialog->registry = registry_unref(dialog->registry, "delete dialog->registry");
00345    }
00346     ...
00347    dialog_unref(dialog, "Let's unbump the count in the unlink so the poor pvt can disappear if it is time");
00348 
00349 In the above code, the ao2_t_unlink could end up destroying the dialog
00350 object; if this happens, then the subsequent usages of the dialog
00351 pointer could result in a core dump. So, we 'bump' the
00352 count upwards before beginning, and then decrementing the count when
00353 we are finished. This is analogous to 'locking' or 'protecting' operations
00354 for a short while.
00355 
00356 4. One of the most insidious problems I've run into when converting
00357 code to do ref counted automatic destruction, is in the destruction
00358 routines. Where a "destroy" routine had previously been called to
00359 get rid of an object in non-refcounted code, the new regime demands
00360 that you tear that "destroy" routine into two pieces, one that will
00361 tear down the links and 'unref' them, and the other to actually free
00362 and reset fields. A destroy routine that does any reference deletion
00363 for its own object, will never be called. Another insidious problem
00364 occurs in mutually referenced structures. As an example, a dialog contains
00365 a pointer to a peer, and a peer contains a pointer to a dialog. Watch
00366 out that the destruction of one doesn't depend on the destruction of the
00367 other, as in this case a dependency loop will result in neither being
00368 destroyed!
00369 
00370 Given the above, you should be ready to do a good job!
00371 
00372 murf
00373 
00374 */
00375 
00376 
00377 
00378 /*! \brief
00379  * Typedef for an object destructor. This is called just before freeing
00380  * the memory for the object. It is passed a pointer to the user-defined
00381  * data of the object.
00382  */
00383 typedef void (*ao2_destructor_fn)(void *);
00384 
00385 
00386 /*! \brief
00387  * Allocate and initialize an object.
00388  *
00389  * \param data_size The sizeof() of the user-defined structure.
00390  * \param destructor_fn The destructor function (can be NULL)
00391  * \return A pointer to user-data.
00392  *
00393  * Allocates a struct astobj2 with sufficient space for the
00394  * user-defined structure.
00395  * \note
00396  * - storage is zeroed; XXX maybe we want a flag to enable/disable this.
00397  * - the refcount of the object just created is 1
00398  * - the returned pointer cannot be free()'d or realloc()'ed;
00399  *   rather, we just call ao2_ref(o, -1);
00400  */
00401 
00402 #ifdef REF_DEBUG
00403 
00404 
00405 #define ao2_t_alloc(arg1, arg2, arg3) _ao2_alloc_debug((arg1), (arg2), (arg3),  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00406 #define ao2_alloc(arg1, arg2)         _ao2_alloc_debug((arg1), (arg2), "",  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00407 
00408 #else
00409 
00410 #define ao2_t_alloc(arg1,arg2,arg3) _ao2_alloc((arg1), (arg2))
00411 #define ao2_alloc(arg1,arg2)        _ao2_alloc((arg1), (arg2))
00412 
00413 #endif
00414 void *_ao2_alloc_debug(const size_t data_size, ao2_destructor_fn destructor_fn, char *tag, char *file, int line, const char *funcname);
00415 void *_ao2_alloc(const size_t data_size, ao2_destructor_fn destructor_fn);
00416 
00417 
00418 /*! \brief
00419  * Reference/unreference an object and return the old refcount.
00420  *
00421  * \param o A pointer to the object
00422  * \param delta Value to add to the reference counter.
00423  * \return The value of the reference counter before the operation.
00424  *
00425  * Increase/decrease the reference counter according
00426  * the value of delta.
00427  *
00428  * If the refcount goes to zero, the object is destroyed.
00429  *
00430  * \note The object must not be locked by the caller of this function, as
00431  *       it is invalid to try to unlock it after releasing the reference.
00432  *
00433  * \note if we know the pointer to an object, it is because we
00434  * have a reference count to it, so the only case when the object
00435  * can go away is when we release our reference, and it is
00436  * the last one in existence.
00437  */
00438 
00439 #ifdef REF_DEBUG
00440 #define ao2_t_ref(arg1,arg2,arg3) _ao2_ref_debug((arg1), (arg2), (arg3),  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00441 #define ao2_ref(arg1,arg2)        _ao2_ref_debug((arg1), (arg2), "",  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00442 #else
00443 #define ao2_t_ref(arg1,arg2,arg3) _ao2_ref((arg1), (arg2))
00444 #define ao2_ref(arg1,arg2)        _ao2_ref((arg1), (arg2))
00445 #endif
00446 int _ao2_ref_debug(void *o, int delta, char *tag, char *file, int line, const char *funcname);
00447 int _ao2_ref(void *o, int delta);
00448 
00449 /*! \brief
00450  * Lock an object.
00451  *
00452  * \param a A pointer to the object we want to lock.
00453  * \return 0 on success, other values on error.
00454  */
00455 #ifndef DEBUG_THREADS
00456 int ao2_lock(void *a);
00457 #else
00458 #define ao2_lock(a) _ao2_lock(a, __FILE__, __PRETTY_FUNCTION__, __LINE__, #a)
00459 int _ao2_lock(void *a, const char *file, const char *func, int line, const char *var);
00460 #endif
00461 
00462 /*! \brief
00463  * Unlock an object.
00464  *
00465  * \param a A pointer to the object we want unlock.
00466  * \return 0 on success, other values on error.
00467  */
00468 #ifndef DEBUG_THREADS
00469 int ao2_unlock(void *a);
00470 #else
00471 #define ao2_unlock(a) _ao2_unlock(a, __FILE__, __PRETTY_FUNCTION__, __LINE__, #a)
00472 int _ao2_unlock(void *a, const char *file, const char *func, int line, const char *var);
00473 #endif
00474 
00475 /*! \brief
00476  * Try locking-- (don't block if fail)
00477  *
00478  * \param a A pointer to the object we want to lock.
00479  * \return 0 on success, other values on error.
00480  */
00481 #ifndef DEBUG_THREADS
00482 int ao2_trylock(void *a);
00483 #else
00484 #define ao2_trylock(a) _ao2_trylock(a, __FILE__, __PRETTY_FUNCTION__, __LINE__, #a)
00485 int _ao2_trylock(void *a, const char *file, const char *func, int line, const char *var);
00486 #endif
00487 
00488 /*!
00489  * \brief Return the lock address of an object
00490  *
00491  * \param[in] obj A pointer to the object we want.
00492  * \return the address of the lock, else NULL.
00493  *
00494  * This function comes in handy mainly for debugging locking
00495  * situations, where the locking trace code reports the
00496  * lock address, this allows you to correlate against
00497  * object address, to match objects to reported locks.
00498  *
00499  * \since 1.6.1
00500  */
00501 void *ao2_object_get_lockaddr(void *obj);
00502 
00503 /*!
00504  \page AstObj2_Containers AstObj2 Containers
00505 
00506 Containers are data structures meant to store several objects,
00507 and perform various operations on them.
00508 Internally, objects are stored in lists, hash tables or other
00509 data structures depending on the needs.
00510 
00511 \note NOTA BENE: at the moment the only container we support is the
00512    hash table and its degenerate form, the list.
00513 
00514 Operations on container include:
00515 
00516   -  c = \b ao2_container_alloc(size, cmp_fn, hash_fn)
00517    allocate a container with desired size and default compare
00518    and hash function
00519          -The compare function returns an int, which
00520          can be 0 for not found, CMP_STOP to stop end a traversal,
00521          or CMP_MATCH if they are equal
00522          -The hash function returns an int. The hash function
00523          takes two argument, the object pointer and a flags field,
00524 
00525   -  \b ao2_find(c, arg, flags)
00526    returns zero or more element matching a given criteria
00527    (specified as arg). 'c' is the container pointer. Flags
00528     can be:
00529    OBJ_UNLINK - to remove the object, once found, from the container.
00530    OBJ_NODATA - don't return the object if found (no ref count change)
00531    OBJ_MULTIPLE - don't stop at first match (not fully implemented)
00532    OBJ_POINTER - if set, 'arg' is an object pointer, and a hashtable
00533                   search will be done. If not, a traversal is done.
00534 
00535   -  \b ao2_callback(c, flags, fn, arg)
00536    apply fn(obj, arg) to all objects in the container.
00537    Similar to find. fn() can tell when to stop, and
00538    do anything with the object including unlinking it.
00539      - c is the container;
00540       - flags can be
00541         OBJ_UNLINK   - to remove the object, once found, from the container.
00542         OBJ_NODATA   - don't return the object if found (no ref count change)
00543         OBJ_MULTIPLE - don't stop at first match (not fully implemented)
00544         OBJ_POINTER  - if set, 'arg' is an object pointer, and a hashtable
00545                         search will be done. If not, a traversal is done through
00546                         all the hashtable 'buckets'..
00547       - fn is a func that returns int, and takes 3 args:
00548         (void *obj, void *arg, int flags);
00549           obj is an object
00550           arg is the same as arg passed into ao2_callback
00551           flags is the same as flags passed into ao2_callback
00552          fn returns:
00553            0: no match, keep going
00554            CMP_STOP: stop search, no match
00555            CMP_MATCH: This object is matched.
00556 
00557    Note that the entire operation is run with the container
00558    locked, so noone else can change its content while we work on it.
00559    However, we pay this with the fact that doing
00560    anything blocking in the callback keeps the container
00561    blocked.
00562    The mechanism is very flexible because the callback function fn()
00563    can do basically anything e.g. counting, deleting records, etc.
00564    possibly using arg to store the results.
00565 
00566   -  \b iterate on a container
00567    this is done with the following sequence
00568 
00569 \code
00570 
00571        struct ao2_container *c = ... // our container
00572        struct ao2_iterator i;
00573        void *o;
00574 
00575        i = ao2_iterator_init(c, flags);
00576 
00577        while ( (o = ao2_iterator_next(&i)) ) {
00578       ... do something on o ...
00579       ao2_ref(o, -1);
00580        }
00581 \endcode
00582 
00583    The difference with the callback is that the control
00584    on how to iterate is left to us.
00585 
00586     - \b ao2_ref(c, -1)
00587    dropping a reference to a container destroys it, very simple!
00588 
00589 Containers are ao2 objects themselves, and this is why their
00590 implementation is simple too.
00591 
00592 Before declaring containers, we need to declare the types of the
00593 arguments passed to the constructor - in turn, this requires
00594 to define callback and hash functions and their arguments.
00595 
00596 - \ref AstObj2
00597 - \ref astobj2.h
00598  */
00599 
00600 /*! \brief
00601  * Type of a generic callback function
00602  * \param obj  pointer to the (user-defined part) of an object.
00603  * \param arg callback argument from ao2_callback()
00604  * \param flags flags from ao2_callback()
00605  *
00606  * The return values are a combination of enum _cb_results.
00607  * Callback functions are used to search or manipulate objects in a container,
00608  */
00609 typedef int (ao2_callback_fn)(void *obj, void *arg, int flags);
00610 
00611 /*! \brief a very common callback is one that matches by address. */
00612 ao2_callback_fn ao2_match_by_addr;
00613 
00614 /*! \brief
00615  * A callback function will return a combination of CMP_MATCH and CMP_STOP.
00616  * The latter will terminate the search in a container.
00617  */
00618 enum _cb_results {
00619    CMP_MATCH   = 0x1,   /*!< the object matches the request */
00620    CMP_STOP = 0x2,   /*!< stop the search now */
00621 };
00622 
00623 /*! \brief
00624  * Flags passed to ao2_callback() and ao2_hash_fn() to modify its behaviour.
00625  */
00626 enum search_flags {
00627    /*! Unlink the object for which the callback function
00628     *  returned CMP_MATCH . This is the only way to extract
00629     *  objects from a container. */
00630    OBJ_UNLINK   = (1 << 0),
00631    /*! On match, don't return the object hence do not increase
00632     *  its refcount. */
00633    OBJ_NODATA   = (1 << 1),
00634    /*! Don't stop at the first match in ao2_callback()
00635     *  \note This is not fully implemented.   Using OBJ_MULTIME with OBJ_NODATA
00636     *  is perfectly fine.  The part that is not implemented is the case where
00637     *  multiple objects should be returned by ao2_callback().
00638     */
00639    OBJ_MULTIPLE = (1 << 2),
00640    /*! obj is an object of the same type as the one being searched for,
00641     *  so use the object's hash function for optimized searching.
00642     *  The search function is unaffected (i.e. use the one passed as
00643     *  argument, or match_by_addr if none specified). */
00644    OBJ_POINTER  = (1 << 3),
00645 };
00646 
00647 /*!
00648  * Type of a generic function to generate a hash value from an object.
00649  * flags is ignored at the moment. Eventually, it will include the
00650  * value of OBJ_POINTER passed to ao2_callback().
00651  */
00652 typedef int (ao2_hash_fn)(const void *obj, const int flags);
00653 
00654 /*! \name Object Containers
00655  * Here start declarations of containers.
00656  */
00657 /*@{ */
00658 struct ao2_container;
00659 
00660 /*! \brief
00661  * Allocate and initialize a container
00662  * with the desired number of buckets.
00663  *
00664  * We allocate space for a struct astobj_container, struct container
00665  * and the buckets[] array.
00666  *
00667  * \param n_buckets Number of buckets for hash
00668  * \param hash_fn Pointer to a function computing a hash value.
00669  * \param cmp_fn Pointer to a function comparating key-value
00670  *          with a string. (can be NULL)
00671  * \return A pointer to a struct container.
00672  *
00673  * destructor is set implicitly.
00674  */
00675 
00676 #ifdef REF_DEBUG
00677 #define ao2_t_container_alloc(arg1,arg2,arg3,arg4) _ao2_container_alloc_debug((arg1), (arg2), (arg3), (arg4),  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00678 #define ao2_container_alloc(arg1,arg2,arg3)        _ao2_container_alloc_debug((arg1), (arg2), (arg3), "",  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00679 #else
00680 #define ao2_t_container_alloc(arg1,arg2,arg3,arg4) _ao2_container_alloc((arg1), (arg2), (arg3))
00681 #define ao2_container_alloc(arg1,arg2,arg3)        _ao2_container_alloc((arg1), (arg2), (arg3))
00682 #endif
00683 struct ao2_container *_ao2_container_alloc(const unsigned int n_buckets,
00684                                 ao2_hash_fn *hash_fn, ao2_callback_fn *cmp_fn);
00685 struct ao2_container *_ao2_container_alloc_debug(const unsigned int n_buckets,
00686                                     ao2_hash_fn *hash_fn, ao2_callback_fn *cmp_fn,
00687                                     char *tag, char *file, int line, const char *funcname);
00688 
00689 /*! \brief
00690  * Returns the number of elements in a container.
00691  */
00692 int ao2_container_count(struct ao2_container *c);
00693 /*@} */
00694 
00695 /*! \name Object Management
00696  * Here we have functions to manage objects.
00697  *
00698  * We can use the functions below on any kind of
00699  * object defined by the user.
00700  */
00701 /*@{ */
00702 
00703 /*!
00704  * \brief Add an object to a container.
00705  *
00706  * \param c the container to operate on.
00707  * \param newobj the object to be added.
00708  *
00709  * \retval NULL on errors
00710  * \retval newobj on success.
00711  *
00712  * This function inserts an object in a container according its key.
00713  *
00714  * \note Remember to set the key before calling this function.
00715  *
00716  * \note This function automatically increases the reference count to account
00717  *       for the reference that the container now holds to the object.
00718  */
00719 #ifdef REF_DEBUG
00720 
00721 #define ao2_t_link(arg1, arg2, arg3) _ao2_link_debug((arg1), (arg2), (arg3),  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00722 #define ao2_link(arg1, arg2)         _ao2_link_debug((arg1), (arg2), "",  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00723 #else
00724 #define ao2_t_link(arg1, arg2, arg3) _ao2_link((arg1), (arg2))
00725 #define ao2_link(arg1, arg2)         _ao2_link((arg1), (arg2))
00726 #endif
00727 void *_ao2_link_debug(struct ao2_container *c, void *new_obj, char *tag, char *file, int line, const char *funcname);
00728 void *_ao2_link(struct ao2_container *c, void *newobj);
00729 
00730 /*!
00731  * \brief Remove an object from the container
00732  *
00733  * \param c the container
00734  * \param obj the object to unlink
00735  *
00736  * \retval NULL, always
00737  *
00738  * \note The object requested to be unlinked must be valid.  However, if it turns
00739  *       out that it is not in the container, this function is still safe to
00740  *       be called.
00741  *
00742  * \note If the object gets unlinked from the container, the container's
00743  *       reference to the object will be automatically released. (The
00744  *       refcount will be decremented).
00745  */
00746 #ifdef REF_DEBUG
00747 #define ao2_t_unlink(arg1, arg2, arg3) _ao2_unlink_debug((arg1), (arg2), (arg3),  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00748 #define ao2_unlink(arg1, arg2)         _ao2_unlink_debug((arg1), (arg2), "",  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00749 #else
00750 #define ao2_t_unlink(arg1, arg2, arg3) _ao2_unlink((arg1), (arg2))
00751 #define ao2_unlink(arg1, arg2)         _ao2_unlink((arg1), (arg2))
00752 #endif
00753 void *_ao2_unlink_debug(struct ao2_container *c, void *obj, char *tag, char *file, int line, const char *funcname);
00754 void *_ao2_unlink(struct ao2_container *c, void *obj);
00755 
00756 
00757 /*! \brief Used as return value if the flag OBJ_MULTIPLE is set */
00758 struct ao2_list {
00759    struct ao2_list *next;
00760    void *obj;  /* pointer to the user portion of the object */
00761 };
00762 /*@} */
00763 
00764 /*! \brief
00765  * ao2_callback() is a generic function that applies cb_fn() to all objects
00766  * in a container, as described below.
00767  *
00768  * \param c A pointer to the container to operate on.
00769  * \param flags A set of flags specifying the operation to perform,
00770    partially used by the container code, but also passed to
00771    the callback.
00772      - If OBJ_NODATA is set, ao2_callback will return NULL. No refcounts
00773        of any of the traversed objects will be incremented.
00774        On the converse, if it is NOT set (the default), The ref count
00775        of each object for which CMP_MATCH was set will be incremented,
00776        and you will have no way of knowing which those are, until
00777        the multiple-object-return functionality is implemented.
00778      - If OBJ_POINTER is set, the traversed items will be restricted
00779        to the objects in the bucket that the object key hashes to.
00780  * \param cb_fn A function pointer, that will be called on all
00781     objects, to see if they match. This function returns CMP_MATCH
00782     if the object is matches the criteria; CMP_STOP if the traversal
00783     should immediately stop, or both (via bitwise ORing), if you find a
00784     match and want to end the traversal, and 0 if the object is not a match,
00785     but the traversal should continue. This is the function that is applied
00786     to each object traversed. It's arguments are:
00787         (void *obj, void *arg, int flags), where:
00788           obj is an object
00789           arg is the same as arg passed into ao2_callback
00790           flags is the same as flags passed into ao2_callback (flags are
00791            also used by ao2_callback).
00792  * \param arg passed to the callback.
00793  * \return  A pointer to the object found/marked,
00794  *       a pointer to a list of objects matching comparison function,
00795  *       NULL if not found.
00796  *
00797  * If the function returns any objects, their refcount is incremented,
00798  * and the caller is in charge of decrementing them once done.
00799  * Also, in case of multiple values returned, the list used
00800  * to store the objects must be freed by the caller.
00801  *
00802  * Typically, ao2_callback() is used for two purposes:
00803  * - to perform some action (including removal from the container) on one
00804  *   or more objects; in this case, cb_fn() can modify the object itself,
00805  *   and to perform deletion should set CMP_MATCH on the matching objects,
00806  *   and have OBJ_UNLINK set in flags.
00807  * - to look for a specific object in a container; in this case, cb_fn()
00808  *   should not modify the object, but just return a combination of
00809  *   CMP_MATCH and CMP_STOP on the desired object.
00810  * Other usages are also possible, of course.
00811 
00812  * This function searches through a container and performs operations
00813  * on objects according on flags passed.
00814  * XXX describe better
00815  * The comparison is done calling the compare function set implicitly.
00816  * The p pointer can be a pointer to an object or to a key,
00817  * we can say this looking at flags value.
00818  * If p points to an object we will search for the object pointed
00819  * by this value, otherwise we serch for a key value.
00820  * If the key is not uniq we only find the first matching valued.
00821  * If we use the OBJ_MARK flags, we mark all the objects matching
00822  * the condition.
00823  *
00824  * The use of flags argument is the follow:
00825  *
00826  * OBJ_UNLINK     unlinks the object found
00827  * OBJ_NODATA     on match, do return an object
00828  *          Callbacks use OBJ_NODATA as a default
00829  *          functions such as find() do
00830  * OBJ_MULTIPLE      return multiple matches
00831  *          Default for _find() is no.
00832  *          to a key (not yet supported)
00833  * OBJ_POINTER       the pointer is an object pointer
00834  *
00835  * In case we return a list, the callee must take care to destroy
00836  * that list when no longer used.
00837  *
00838  * \note When the returned object is no longer in use, ao2_ref() should
00839  * be used to free the additional reference possibly created by this function.
00840  */
00841 #ifdef REF_DEBUG
00842 #define ao2_t_callback(arg1,arg2,arg3,arg4,arg5) _ao2_callback_debug((arg1), (arg2), (arg3), (arg4), (arg5),  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00843 #define ao2_callback(arg1,arg2,arg3,arg4)        _ao2_callback_debug((arg1), (arg2), (arg3), (arg4), "",  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00844 #else
00845 #define ao2_t_callback(arg1,arg2,arg3,arg4,arg5) _ao2_callback((arg1), (arg2), (arg3), (arg4))
00846 #define ao2_callback(arg1,arg2,arg3,arg4)        _ao2_callback((arg1), (arg2), (arg3), (arg4))
00847 #endif
00848 void *_ao2_callback_debug(struct ao2_container *c, enum search_flags flags,
00849                     ao2_callback_fn *cb_fn, void *arg, char *tag,
00850                     char *file, int line, const char *funcname);
00851 void *_ao2_callback(struct ao2_container *c,
00852                enum search_flags flags,
00853                ao2_callback_fn *cb_fn, void *arg);
00854 
00855 /*! ao2_find() is a short hand for ao2_callback(c, flags, c->cmp_fn, arg)
00856  * XXX possibly change order of arguments ?
00857  */
00858 #ifdef REF_DEBUG
00859 #define ao2_t_find(arg1,arg2,arg3,arg4) _ao2_find_debug((arg1), (arg2), (arg3), (arg4),  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00860 #define ao2_find(arg1,arg2,arg3)        _ao2_find_debug((arg1), (arg2), (arg3), "",  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00861 #else
00862 #define ao2_t_find(arg1,arg2,arg3,arg4) _ao2_find((arg1), (arg2), (arg3))
00863 #define ao2_find(arg1,arg2,arg3)        _ao2_find((arg1), (arg2), (arg3))
00864 #endif
00865 void *_ao2_find_debug(struct ao2_container *c, void *arg, enum search_flags flags, char *tag, char *file, int line, const char *funcname);
00866 void *_ao2_find(struct ao2_container *c, void *arg, enum search_flags flags);
00867 
00868 /*! \brief
00869  *
00870  *
00871  * When we need to walk through a container, we use
00872  * ao2_iterator to keep track of the current position.
00873  *
00874  * Because the navigation is typically done without holding the
00875  * lock on the container across the loop,
00876  * objects can be inserted or deleted or moved
00877  * while we work. As a consequence, there is no guarantee that
00878  * the we manage to touch all the elements on the list, or it
00879  * is possible that we touch the same object multiple times.
00880  * However, within the current hash table container, the following is true:
00881  *  - It is not possible to miss an object in the container while iterating
00882  *    unless it gets added after the iteration begins and is added to a bucket
00883  *    that is before the one the current object is in.  In this case, even if
00884  *    you locked the container around the entire iteration loop, you still would
00885  *    not see this object, because it would still be waiting on the container
00886  *    lock so that it can be added.
00887  *  - It would be extremely rare to see an object twice.  The only way this can
00888  *    happen is if an object got unlinked from the container and added again
00889  *    during the same iteration.  Furthermore, when the object gets added back,
00890  *    it has to be in the current or later bucket for it to be seen again.
00891  *
00892  * An iterator must be first initialized with ao2_iterator_init(),
00893  * then we can use o = ao2_iterator_next() to move from one
00894  * element to the next. Remember that the object returned by
00895  * ao2_iterator_next() has its refcount incremented,
00896  * and the reference must be explicitly released when done with it.
00897  *
00898  * Example:
00899  *
00900  *  \code
00901  *
00902  *  struct ao2_container *c = ... // the container we want to iterate on
00903  *  struct ao2_iterator i;
00904  *  struct my_obj *o;
00905  *
00906  *  i = ao2_iterator_init(c, flags);
00907  *
00908  *  while ( (o = ao2_iterator_next(&i)) ) {
00909  *     ... do something on o ...
00910  *     ao2_ref(o, -1);
00911  *  }
00912  *
00913  *  \endcode
00914  *
00915  */
00916 
00917 /*! \brief
00918  * The Astobj2 iterator
00919  *
00920  * \note You are not supposed to know the internals of an iterator!
00921  * We would like the iterator to be opaque, unfortunately
00922  * its size needs to be known if we want to store it around
00923  * without too much trouble.
00924  * Anyways...
00925  * The iterator has a pointer to the container, and a flags
00926  * field specifying various things e.g. whether the container
00927  * should be locked or not while navigating on it.
00928  * The iterator "points" to the current object, which is identified
00929  * by three values:
00930  *
00931  * - a bucket number;
00932  * - the object_id, which is also the container version number
00933  *   when the object was inserted. This identifies the object
00934  *   univoquely, however reaching the desired object requires
00935  *   scanning a list.
00936  * - a pointer, and a container version when we saved the pointer.
00937  *   If the container has not changed its version number, then we
00938  *   can safely follow the pointer to reach the object in constant time.
00939  *
00940  * Details are in the implementation of ao2_iterator_next()
00941  * A freshly-initialized iterator has bucket=0, version = 0.
00942  */
00943 struct ao2_iterator {
00944    /*! the container */
00945    struct ao2_container *c;
00946    /*! operation flags */
00947    int flags;
00948 #define  F_AO2I_DONTLOCK   1  /*!< don't lock when iterating */
00949    /*! current bucket */
00950    int bucket;
00951    /*! container version */
00952    unsigned int c_version;
00953    /*! pointer to the current object */
00954    void *obj;
00955    /*! container version when the object was created */
00956    unsigned int version;
00957 };
00958 
00959 /* the flags field can contain F_AO2I_DONTLOCK, which will prevent
00960    ao2_iterator_next calls from locking the container while it
00961    searches for the next pointer */
00962 
00963 struct ao2_iterator ao2_iterator_init(struct ao2_container *c, int flags);
00964 #ifdef REF_DEBUG
00965 #define ao2_t_iterator_next(arg1, arg2) _ao2_iterator_next_debug((arg1), (arg2),  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00966 #define ao2_iterator_next(arg1)         _ao2_iterator_next_debug((arg1), "",  __FILE__, __LINE__, __PRETTY_FUNCTION__)
00967 #else
00968 #define ao2_t_iterator_next(arg1, arg2) _ao2_iterator_next((arg1))
00969 #define ao2_iterator_next(arg1)         _ao2_iterator_next((arg1))
00970 #endif
00971 void *_ao2_iterator_next_debug(struct ao2_iterator *a, char *tag, char *file, int line, const char *funcname);
00972 void *_ao2_iterator_next(struct ao2_iterator *a);
00973 
00974 /* extra functions */
00975 void ao2_bt(void);   /* backtrace */
00976 #endif /* _ASTERISK_ASTOBJ2_H */

Generated on Fri Jun 19 12:09:31 2009 for Asterisk - the Open Source PBX by  doxygen 1.4.7