[PATCH] D94622: [clang-tidy] add concurrency-async-no-new-threads

Aaron Ballman via Phabricator via cfe-commits cfe-commits at lists.llvm.org
Thu Feb 11 09:38:47 PST 2021


aaron.ballman added inline comments.


================
Comment at: clang-tools-extra/clang-tidy/concurrency/AsyncNoNewThreadsCheck.cpp:41
+    /* WinAPI */
+    "CreateThread",         //
+    "CreateRemoteThread",   //
----------------
Missing the `::` in front of all of these identifiers.


================
Comment at: clang-tools-extra/clang-tidy/concurrency/AsyncNoNewThreadsCheck.cpp:22
+    /* C++ std */
+    "::std::async", //
+
----------------
segoon wrote:
> aaron.ballman wrote:
> > segoon wrote:
> > > aaron.ballman wrote:
> > > > The trailing comment markers don't really add much.
> > > it's a hack for clang-format, otherwise it contatenates the lines, creating unmaintainable mess of strings. "One line - one name" is much more suitable.
> > Ah, I didn't know that'd change the behavior of clang-format, that's neat!
> > 
> > FWIW, we usually don't do a whole lot of markup to avoid clang-format issues (such as the clang-format: on/off markers). Instead, we usually just ignore the LINT warnings in code review and check the code in as-is. This helps reduce clutter in the code base. In this case, the comments aren't adding a ton of clutter so maybe they're fine. But they definitely look odd as a reader of the code, which is a bit distracting.
> IMO having an ability to run clang-format for sources is very handy. It makes me sad if running clang-format against the source forces me to set some markers or reverting a part of clang-format changes in the source parts I have never touched. An ability to simply rerun checks/linters is very powerful.
I empathize, but clang-format is a moving target that hasn't existed as long as the rest of the project, so the project has a mismatch of formats. This is why the usual rule of thumb is: clang-format a full file and accept what it produces (on new files, like this one) or clang-format your diff (on existing files). If you don't like what clang-format produces in either situation, we typically format it by hand and then don't worry about it until the next time someone touches that code. Of course, I notice that we don't mention clang-format anywhere in the style guide at all. :-(

I won't insist on a change here, but I also would not be surprised if the useless comment markers were removed by someone during a "cleanup" either.


================
Comment at: clang-tools-extra/docs/clang-tidy/checks/concurrency-async-no-new-threads.rst:8-10
+functions and types. E.g. if the code uses C++ coroutines, it is expected
+that only new coroutines or coroutine-based primitives are created
+instead of heavy system threads.
----------------
segoon wrote:
> aaron.ballman wrote:
> > segoon wrote:
> > > aaron.ballman wrote:
> > > > FWIW, this suggests to me that what you really want is a way for APIs to opt into this behavior. There's no reason why you wouldn't have a complex system that has both threads and coroutines in it, but it does stand to reason that you may want to say "this function, and everything called within this function, should not create any system threads" in some situations.
> > > > 
> > > > The note below helps call out the expectations from the check, but it requires the developer to restructure the way they write code pretty drastically in order to make the checking behavior more reasonable, which does not seem ideal.
> > > I think it is a complex problem, so it should be separated into smaller tasks.
> > > 
> > > Step one - checks with hardcoded functions/types with user-guided enabling on a per-file basis. A semi-automated check.
> > > 
> > > Step two - try to solve other parts of the puzzle. Maybe try to add [clang:coroutine_safe] tag and teach clang static analyzer to deduce coroutine safety property and use it for enabling/disabling the cheks. Maybe reuse other (not yet implemented) heuristics from static analyzer (or other tools) to identify coroutine functions and check only these functions. I'm not an expert in static analyzer, so other LLVM developers might find a clever heuristics when to enable/disable these checks or maybe how to deduce blacklisted/whitelisted functions/types lists (e.g. for concurrency-async-{fs,blocking}).
> > > 
> > > Indeed, the current approach has its own limitations. But it may be a first step in the right direction.
> > My fear with the current approach is that I don't think projects usually split their code in the way this check requires, and so the check will not be very useful in practice because it will be too chatty. Have you tried running this check over some large projects that use coroutines to see what the diagnostic results look like?
> I haven't conducted a survey, but I can say for Yandex.Taxi where the patch has originated. The codebase is ~350KLOC. The main parts are:
> 1) a coroutine framework that uses blocking functions / threads creation /etc. inside - concurrency-async-* disabled
> 2) coroutine libraries consisting of coroutine-only code - concurrency-async-* enabled
> 3) services with coroutine-only code - concurrency-async-* enabled
> 
> All 3 parts are clearly separated from each other from the filesystem prospective. Actually I think there are plenty of other invariants that must be met for coroutine code, so separate coroutine/non-coroutine namespaces (and consequently, filesystem separation) is a must. E.g. there are filesystem::RewriteFileContents() and filesystem::blocking::RewriteFileContents() - trivial to realize whether you may call it or not. I admit that other projects may have quite different approach to namespaces/modules, though.
>  I admit that other projects may have quite different approach to namespaces/modules, though.

That's why I'm hoping you can take some measurements of other projects -- it wouldn't be good to add a check that's highly specific to one project's coding style (unless it's a check for a particular style guide that's published somewhere), and I worry a bit that's what is happening here.


CHANGES SINCE LAST ACTION
  https://reviews.llvm.org/D94622/new/

https://reviews.llvm.org/D94622



More information about the cfe-commits mailing list