source: libcfa/src/concurrency/kernel.cfa@ 8d462e5

ADT arm-eh ast-experimental enum forall-pointer-decay jacob/cs343-translation new-ast new-ast-unique-expr pthread-emulation qualifiedEnum
Last change on this file since 8d462e5 was 70ac8d0, checked in by Thierry Delisle <tdelisle@…>, 6 years ago

Merge branch 'master' of plg.uwaterloo.ca:software/cfa/cfa-cc

  • Property mode set to 100644
File size: 35.2 KB
RevLine 
[8118303]1//
2// Cforall Version 1.0.0 Copyright (C) 2016 University of Waterloo
3//
4// The contents of this file are covered under the licence agreement in the
5// file "LICENCE" distributed with Cforall.
6//
7// kernel.c --
8//
9// Author : Thierry Delisle
[75f3522]10// Created On : Tue Jan 17 12:27:26 2017
[6b0b624]11// Last Modified By : Peter A. Buhr
[e3fea42]12// Last Modified On : Tue Feb 4 13:03:15 2020
13// Update Count : 58
[8118303]14//
15
[2026bb6]16#define __cforall_thread__
[4069faad]17// #define __CFA_DEBUG_PRINT_RUNTIME_CORE__
[2026bb6]18
[8118303]19//C Includes
[c84e80a]20#include <stddef.h>
[214e8da]21#include <errno.h>
[ea8b2f7]22#include <string.h>
[eb2e723]23extern "C" {
[9d944b2]24#include <stdio.h>
[8fcbb4c]25#include <fenv.h>
[eb2e723]26#include <sys/resource.h>
[58b6d1b]27#include <signal.h>
[9d944b2]28#include <unistd.h>
[27f5f71]29#include <limits.h> // PTHREAD_STACK_MIN
[1a3040c]30#include <sys/mman.h> // mprotect
[eb2e723]31}
[8118303]32
33//CFA Includes
[58b6d1b]34#include "time.hfa"
[73abe95]35#include "kernel_private.hfa"
36#include "preemption.hfa"
37#include "startup.hfa"
[8118303]38
39//Private includes
40#define __CFA_INVOKE_PRIVATE__
41#include "invoke.h"
42
[4069faad]43
[deca0f5]44//-----------------------------------------------------------------------------
45// Some assembly required
[1805b1b]46#if defined( __i386 )
[deca0f5]47 #define CtxGet( ctx ) \
48 __asm__ volatile ( \
49 "movl %%esp,%0\n"\
50 "movl %%ebp,%1\n"\
51 : "=rm" (ctx.SP),\
52 "=rm" (ctx.FP) \
53 )
54
55 // mxcr : SSE Status and Control bits (control bits are preserved across function calls)
56 // fcw : X87 FPU control word (preserved across function calls)
57 #define __x87_store \
58 uint32_t __mxcr; \
59 uint16_t __fcw; \
60 __asm__ volatile ( \
61 "stmxcsr %0\n" \
62 "fnstcw %1\n" \
63 : "=m" (__mxcr),\
64 "=m" (__fcw) \
65 )
66
67 #define __x87_load \
68 __asm__ volatile ( \
69 "fldcw %1\n" \
70 "ldmxcsr %0\n" \
71 ::"m" (__mxcr),\
72 "m" (__fcw) \
73 )
74
75#elif defined( __x86_64 )
76 #define CtxGet( ctx ) \
77 __asm__ volatile ( \
78 "movq %%rsp,%0\n"\
79 "movq %%rbp,%1\n"\
80 : "=rm" (ctx.SP),\
81 "=rm" (ctx.FP) \
82 )
83
84 #define __x87_store \
85 uint32_t __mxcr; \
86 uint16_t __fcw; \
87 __asm__ volatile ( \
88 "stmxcsr %0\n" \
89 "fnstcw %1\n" \
90 : "=m" (__mxcr),\
91 "=m" (__fcw) \
92 )
93
94 #define __x87_load \
95 __asm__ volatile ( \
96 "fldcw %1\n" \
97 "ldmxcsr %0\n" \
98 :: "m" (__mxcr),\
99 "m" (__fcw) \
100 )
101
102
103#elif defined( __ARM_ARCH )
104#define CtxGet( ctx ) __asm__ ( \
105 "mov %0,%%sp\n" \
106 "mov %1,%%r11\n" \
107 : "=rm" (ctx.SP), "=rm" (ctx.FP) )
108#else
109 #error unknown hardware architecture
110#endif
111
112//-----------------------------------------------------------------------------
[2ac095d]113//Start and stop routine for the kernel, declared first to make sure they run first
[8c50aed]114static void __kernel_startup (void) __attribute__(( constructor( STARTUP_PRIORITY_KERNEL ) ));
115static void __kernel_shutdown(void) __attribute__(( destructor ( STARTUP_PRIORITY_KERNEL ) ));
[2ac095d]116
[92e7631]117//-----------------------------------------------------------------------------
118// Kernel Scheduling logic
119static $thread * __next_thread(cluster * this);
120static void __run_thread(processor * this, $thread * dst);
121static $thread * __halt(processor * this);
122static bool __wake_one(cluster * cltr, bool was_empty);
123static bool __wake_proc(processor *);
124
[8def349]125//-----------------------------------------------------------------------------
126// Kernel storage
[b2f6113]127KERNEL_STORAGE(cluster, mainCluster);
128KERNEL_STORAGE(processor, mainProcessor);
[ac2b598]129KERNEL_STORAGE($thread, mainThread);
[b2f6113]130KERNEL_STORAGE(__stack_t, mainThreadCtx);
[8def349]131
[de6319f]132cluster * mainCluster;
133processor * mainProcessor;
[ac2b598]134$thread * mainThread;
[eb2e723]135
[ea8b2f7]136extern "C" {
[1805b1b]137 struct { __dllist_t(cluster) list; __spinlock_t lock; } __cfa_dbg_global_clusters;
[ea8b2f7]138}
[de94a60]139
[b2f6113]140size_t __page_size = 0;
141
[bd98b58]142//-----------------------------------------------------------------------------
143// Global state
[afc2427]144thread_local struct KernelThreadData kernelTLS __attribute__ ((tls_model ( "initial-exec" ))) = {
[1805b1b]145 NULL, // cannot use 0p
[b10affd]146 NULL,
[09d4b22]147 { 1, false, false },
[21184e3]148 6u //this should be seeded better but due to a bug calling rdtsc doesn't work
[b10affd]149};
[c84e80a]150
151//-----------------------------------------------------------------------------
[de6319f]152// Struct to steal stack
[8def349]153struct current_stack_info_t {
[1805b1b]154 __stack_t * storage; // pointer to stack object
155 void * base; // base of stack
156 void * limit; // stack grows towards stack limit
157 void * context; // address of cfa_context_t
[c84e80a]158};
159
[242a902]160void ?{}( current_stack_info_t & this ) {
[b2f6113]161 __stack_context_t ctx;
162 CtxGet( ctx );
163 this.base = ctx.FP;
[8def349]164
165 rlimit r;
[132fad4]166 getrlimit( RLIMIT_STACK, &r);
[69a61d2]167 size_t size = r.rlim_cur;
[8def349]168
[69a61d2]169 this.limit = (void *)(((intptr_t)this.base) - size);
[9236060]170 this.context = &storage_mainThreadCtx;
[8def349]171}
172
[de6319f]173//-----------------------------------------------------------------------------
174// Main thread construction
[8def349]175
[ac2b598]176void ?{}( $coroutine & this, current_stack_info_t * info) with( this ) {
[b2f6113]177 stack.storage = info->storage;
178 with(*stack.storage) {
179 limit = info->limit;
180 base = info->base;
181 }
[ffe2fad]182 __attribute__((may_alias)) intptr_t * istorage = (intptr_t*) &stack.storage;
183 *istorage |= 0x1;
[65deb18]184 name = "Main Thread";
185 state = Start;
[1805b1b]186 starter = 0p;
187 last = 0p;
188 cancellation = 0p;
[8def349]189}
190
[ac2b598]191void ?{}( $thread & this, current_stack_info_t * info) with( this ) {
[e8e457e]192 state = Start;
[65deb18]193 self_cor{ info };
[82c948c]194 curr_cor = &self_cor;
[de6319f]195 curr_cluster = mainCluster;
[82c948c]196 self_mon.owner = &this;
197 self_mon.recursion = 1;
198 self_mon_p = &self_mon;
[1805b1b]199 next = 0p;
[de94a60]200
[1805b1b]201 node.next = 0p;
202 node.prev = 0p;
[a1a17a74]203 doregister(curr_cluster, this);
[82c948c]204
205 monitors{ &self_mon_p, 1, (fptr_t)0 };
[8def349]206}
[c84e80a]207
[8def349]208//-----------------------------------------------------------------------------
209// Processor coroutine
[de6319f]210void ?{}(processorCtx_t & this) {
[39fea2f]211
[8def349]212}
213
[39fea2f]214// Construct the processor context of non-main processors
[c29c342]215static void ?{}(processorCtx_t & this, processor * proc, current_stack_info_t * info) {
[242a902]216 (this.__cor){ info };
217 this.proc = proc;
[8def349]218}
219
[c7a900a]220static void * __invoke_processor(void * arg);
[8c50aed]221
[e3fea42]222void ?{}(processor & this, const char name[], cluster & cltr) with( this ) {
[de6319f]223 this.name = name;
224 this.cltr = &cltr;
[c40e7c5]225 terminated{ 0 };
[b0c7419]226 destroyer = 0p;
[c40e7c5]227 do_terminate = false;
[1805b1b]228 preemption_alarm = 0p;
[c40e7c5]229 pending_preemption = false;
[094476d]230 runner.proc = &this;
[8def349]231
[92e7631]232 idle{};
[6b4cdd3]233
[4069faad]234 __cfadbg_print_safe(runtime_core, "Kernel : Starting core %p\n", &this);
[8c50aed]235
[c7a900a]236 this.stack = __create_pthread( &this.kernel_thread, __invoke_processor, (void *)&this );
[8c50aed]237
[4069faad]238 __cfadbg_print_safe(runtime_core, "Kernel : core %p created\n", &this);
[c84e80a]239}
240
[65deb18]241void ^?{}(processor & this) with( this ){
[ea8b2f7]242 if( ! __atomic_load_n(&do_terminate, __ATOMIC_ACQUIRE) ) {
[4069faad]243 __cfadbg_print_safe(runtime_core, "Kernel : core %p signaling termination\n", &this);
[85b1deb]244
245 __atomic_store_n(&do_terminate, true, __ATOMIC_RELAXED);
[92e7631]246 __wake_proc( &this );
[85b1deb]247
[65deb18]248 P( terminated );
[14a61b5]249 verify( kernelTLS.this_processor != &this);
[8def349]250 }
[6b4cdd3]251
[c66f6cb]252 int err = pthread_join( kernel_thread, 0p );
253 if( err != 0 ) abort("KERNEL ERROR: joining processor %p caused error %s\n", &this, strerror(err));
254
[27f5f71]255 free( this.stack );
[8def349]256}
257
[dd4e2d7]258void ?{}(cluster & this, const char name[], Duration preemption_rate, unsigned io_flags) with( this ) {
[de6319f]259 this.name = name;
260 this.preemption_rate = preemption_rate;
[65deb18]261 ready_queue{};
262 ready_queue_lock{};
[de94a60]263
[038be32]264 #if !defined(__CFA_NO_STATISTICS__)
265 print_stats = false;
266 #endif
267
[de94a60]268 procs{ __get };
269 idles{ __get };
[a1a17a74]270 threads{ __get };
[de94a60]271
[b6f2b213]272 __kernel_io_startup( this, io_flags, &this == mainCluster );
[92976d9]273
[de94a60]274 doregister(this);
[8def349]275}
276
[242a902]277void ^?{}(cluster & this) {
[f6660520]278 __kernel_io_shutdown( this, &this == mainCluster );
[92976d9]279
[de94a60]280 unregister(this);
[c84e80a]281}
282
[75f3522]283//=============================================================================================
284// Kernel Scheduling logic
285//=============================================================================================
[8fcbb4c]286//Main of the processor contexts
[83a071f9]287void main(processorCtx_t & runner) {
[21184e3]288 // Because of a bug, we couldn't initialized the seed on construction
289 // Do it here
[57c764c4]290 kernelTLS.rand_seed ^= rdtscl();
[21184e3]291
[83a071f9]292 processor * this = runner.proc;
[094476d]293 verify(this);
[c81ebf9]294
[4069faad]295 __cfadbg_print_safe(runtime_core, "Kernel : core %p starting\n", this);
[8118303]296
[de94a60]297 doregister(this->cltr, this);
298
[75f3522]299 {
[c81ebf9]300 // Setup preemption data
301 preemption_scope scope = { this };
302
[4069faad]303 __cfadbg_print_safe(runtime_core, "Kernel : core %p started\n", this);
[8118303]304
[ac2b598]305 $thread * readyThread = 0p;
[1a3040c]306 for( unsigned int spin_count = 0; ! __atomic_load_n(&this->do_terminate, __ATOMIC_SEQ_CST); spin_count++ ) {
[92e7631]307 // Try to get the next thread
[8c50aed]308 readyThread = __next_thread( this->cltr );
[75f3522]309
[92e7631]310 // If no ready thread
311 if( readyThread == 0p ) {
312 // Block until a thread is ready
313 readyThread = __halt(this);
314 }
315
316 // Check if we actually found a thread
317 if( readyThread ) {
[3381ed7]318 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[92e7631]319 /* paranoid */ verifyf( readyThread->state == Ready || readyThread->preempted != __NO_PREEMPTION, "state : %d, preempted %d\n", readyThread->state, readyThread->preempted);
[3381ed7]320 /* paranoid */ verifyf( readyThread->next == 0p, "Expected null got %p", readyThread->next );
[4e6fb8e]321
[92e7631]322 // We found a thread run it
[8c50aed]323 __run_thread(this, readyThread);
[75f3522]324
[3381ed7]325 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[c81ebf9]326 }
327 }
328
[4069faad]329 __cfadbg_print_safe(runtime_core, "Kernel : core %p stopping\n", this);
[c84e80a]330 }
[8118303]331
[de94a60]332 unregister(this->cltr, this);
333
[92e7631]334 V( this->terminated );
[bdeba0b]335
[4069faad]336 __cfadbg_print_safe(runtime_core, "Kernel : core %p terminated\n", this);
[92e7631]337
338 // HACK : the coroutine context switch expects this_thread to be set
339 // and it make sense for it to be set in all other cases except here
340 // fake it
341 if( this == mainProcessor ) kernelTLS.this_thread = mainThread;
[c84e80a]342}
343
[5c1a531]344static int * __volatile_errno() __attribute__((noinline));
345static int * __volatile_errno() { asm(""); return &errno; }
346
[14a61b5]347// KERNEL ONLY
[1c273d0]348// runThread runs a thread by context switching
349// from the processor coroutine to the target thread
[ac2b598]350static void __run_thread(processor * this, $thread * thrd_dst) {
351 $coroutine * proc_cor = get_coroutine(this->runner);
[1c273d0]352
[14a61b5]353 // Update global state
[e8e457e]354 kernelTLS.this_thread = thrd_dst;
355
[9f575ea]356 // set state of processor coroutine to inactive
357 verify(proc_cor->state == Active);
[ae7be7a]358 proc_cor->state = Blocked;
[e8e457e]359
[9f575ea]360 // Actually run the thread
[3381ed7]361 RUNNING: while(true) {
[9f575ea]362 if(unlikely(thrd_dst->preempted)) {
[3381ed7]363 thrd_dst->preempted = __NO_PREEMPTION;
[92e7631]364 verify(thrd_dst->state == Active || thrd_dst->state == Rerun);
[9f575ea]365 } else {
[92e7631]366 verify(thrd_dst->state == Blocked || thrd_dst->state == Ready); // Ready means scheduled normally, blocked means rerun
[9f575ea]367 thrd_dst->state = Active;
368 }
369
[ae66348]370 __cfaabi_dbg_debug_do(
[276ae57e]371 thrd_dst->park_stale = true;
372 thrd_dst->unpark_stale = true;
[ae66348]373 )
374
[3381ed7]375 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[a7b486b]376 /* paranoid */ verify( kernelTLS.this_thread == thrd_dst );
[210b8b3]377 /* paranoid */ verifyf( ((uintptr_t)thrd_dst->context.SP) < ((uintptr_t)__get_stack(thrd_dst->curr_cor)->base ) || thrd_dst->curr_cor == proc_cor, "ERROR : Destination $thread %p has been corrupted.\n StackPointer too small.\n", thrd_dst ); // add escape condition if we are setting up the processor
378 /* paranoid */ verifyf( ((uintptr_t)thrd_dst->context.SP) > ((uintptr_t)__get_stack(thrd_dst->curr_cor)->limit) || thrd_dst->curr_cor == proc_cor, "ERROR : Destination $thread %p has been corrupted.\n StackPointer too large.\n", thrd_dst ); // add escape condition if we are setting up the processor
[3381ed7]379
[9f575ea]380 // set context switch to the thread that the processor is executing
381 verify( thrd_dst->context.SP );
[c7a900a]382 __cfactx_switch( &proc_cor->context, &thrd_dst->context );
383 // when __cfactx_switch returns we are back in the processor coroutine
[9f575ea]384
[210b8b3]385 /* paranoid */ verifyf( ((uintptr_t)thrd_dst->context.SP) > ((uintptr_t)__get_stack(thrd_dst->curr_cor)->limit), "ERROR : Destination $thread %p has been corrupted.\n StackPointer too large.\n", thrd_dst );
386 /* paranoid */ verifyf( ((uintptr_t)thrd_dst->context.SP) < ((uintptr_t)__get_stack(thrd_dst->curr_cor)->base ), "ERROR : Destination $thread %p has been corrupted.\n StackPointer too small.\n", thrd_dst );
[a7b486b]387 /* paranoid */ verify( kernelTLS.this_thread == thrd_dst );
[3381ed7]388 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[75f3522]389
[3381ed7]390
391 // We just finished running a thread, there are a few things that could have happened.
392 // 1 - Regular case : the thread has blocked and now one has scheduled it yet.
393 // 2 - Racy case : the thread has blocked but someone has already tried to schedule it.
394 // 4 - Preempted
395 // In case 1, we may have won a race so we can't write to the state again.
396 // In case 2, we lost the race so we now own the thread.
397
398 if(unlikely(thrd_dst->preempted != __NO_PREEMPTION)) {
399 // The thread was preempted, reschedule it and reset the flag
[8c50aed]400 __schedule_thread( thrd_dst );
[3381ed7]401 break RUNNING;
402 }
403
404 // set state of processor coroutine to active and the thread to inactive
405 static_assert(sizeof(thrd_dst->state) == sizeof(int));
[ae7be7a]406 enum coroutine_state old_state = __atomic_exchange_n(&thrd_dst->state, Blocked, __ATOMIC_SEQ_CST);
407 __cfaabi_dbg_debug_do( thrd_dst->park_result = old_state; )
[3381ed7]408 switch(old_state) {
409 case Halted:
410 // The thread has halted, it should never be scheduled/run again, leave it back to Halted and move on
411 thrd_dst->state = Halted;
[b0c7419]412
413 // We may need to wake someone up here since
[ae66348]414 unpark( this->destroyer __cfaabi_dbg_ctx2 );
[b0c7419]415 this->destroyer = 0p;
[3381ed7]416 break RUNNING;
417 case Active:
418 // This is case 1, the regular case, nothing more is needed
419 break RUNNING;
420 case Rerun:
421 // This is case 2, the racy case, someone tried to run this thread before it finished blocking
422 // In this case, just run it again.
423 continue RUNNING;
424 default:
425 // This makes no sense, something is wrong abort
[ae7be7a]426 abort("Finished running a thread that was Blocked/Start/Primed %d\n", old_state);
[3381ed7]427 }
[9f575ea]428 }
429
430 // Just before returning to the processor, set the processor coroutine to active
[e8e457e]431 proc_cor->state = Active;
[ae7be7a]432 kernelTLS.this_thread = 0p;
[75f3522]433}
434
[14a61b5]435// KERNEL_ONLY
[b0c7419]436void returnToKernel() {
[3381ed7]437 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[ac2b598]438 $coroutine * proc_cor = get_coroutine(kernelTLS.this_processor->runner);
439 $thread * thrd_src = kernelTLS.this_thread;
[e8e457e]440
[9f575ea]441 // Run the thread on this processor
442 {
443 int local_errno = *__volatile_errno();
444 #if defined( __i386 ) || defined( __x86_64 )
445 __x87_store;
446 #endif
447 verify( proc_cor->context.SP );
[c7a900a]448 __cfactx_switch( &thrd_src->context, &proc_cor->context );
[9f575ea]449 #if defined( __i386 ) || defined( __x86_64 )
450 __x87_load;
451 #endif
452 *__volatile_errno() = local_errno;
453 }
[deca0f5]454
[3381ed7]455 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[210b8b3]456 /* paranoid */ verifyf( ((uintptr_t)thrd_src->context.SP) < ((uintptr_t)__get_stack(thrd_src->curr_cor)->base ), "ERROR : Returning $thread %p has been corrupted.\n StackPointer too small.\n", thrd_src );
457 /* paranoid */ verifyf( ((uintptr_t)thrd_src->context.SP) > ((uintptr_t)__get_stack(thrd_src->curr_cor)->limit), "ERROR : Returning $thread %p has been corrupted.\n StackPointer too large.\n", thrd_src );
[c84e80a]458}
459
[14a61b5]460// KERNEL_ONLY
[0c92c9f]461// Context invoker for processors
462// This is the entry point for processors (kernel threads)
463// It effectively constructs a coroutine by stealing the pthread stack
[c7a900a]464static void * __invoke_processor(void * arg) {
[8def349]465 processor * proc = (processor *) arg;
[14a61b5]466 kernelTLS.this_processor = proc;
[1805b1b]467 kernelTLS.this_thread = 0p;
[14a61b5]468 kernelTLS.preemption_state.[enabled, disable_count] = [false, 1];
[8def349]469 // SKULLDUGGERY: We want to create a context for the processor coroutine
470 // which is needed for the 2-step context switch. However, there is no reason
[1c273d0]471 // to waste the perfectly valid stack create by pthread.
[8def349]472 current_stack_info_t info;
[b2f6113]473 __stack_t ctx;
474 info.storage = &ctx;
[094476d]475 (proc->runner){ proc, &info };
[8def349]476
[b2f6113]477 __cfaabi_dbg_print_safe("Coroutine : created stack %p\n", get_coroutine(proc->runner)->stack.storage);
[8fcbb4c]478
[0c92c9f]479 //Set global state
[1805b1b]480 kernelTLS.this_thread = 0p;
[8def349]481
482 //We now have a proper context from which to schedule threads
[4069faad]483 __cfadbg_print_safe(runtime_core, "Kernel : core %p created (%p, %p)\n", proc, &proc->runner, &ctx);
[8def349]484
[1c273d0]485 // SKULLDUGGERY: Since the coroutine doesn't have its own stack, we can't
486 // resume it to start it like it normally would, it will just context switch
487 // back to here. Instead directly call the main since we already are on the
[8def349]488 // appropriate stack.
[094476d]489 get_coroutine(proc->runner)->state = Active;
490 main( proc->runner );
491 get_coroutine(proc->runner)->state = Halted;
[8def349]492
[0c92c9f]493 // Main routine of the core returned, the core is now fully terminated
[4069faad]494 __cfadbg_print_safe(runtime_core, "Kernel : core %p main ended (%p)\n", proc, &proc->runner);
[8def349]495
[1805b1b]496 return 0p;
[c84e80a]497}
498
[e3fea42]499static void Abort( int ret, const char func[] ) {
[1a3040c]500 if ( ret ) { // pthread routines return errno values
[1805b1b]501 abort( "%s : internal error, error(%d) %s.", func, ret, strerror( ret ) );
[27f5f71]502 } // if
[1805b1b]503} // Abort
504
[8c50aed]505void * __create_pthread( pthread_t * pthread, void * (*start)(void *), void * arg ) {
[1805b1b]506 pthread_attr_t attr;
507
508 Abort( pthread_attr_init( &attr ), "pthread_attr_init" ); // initialize attribute
509
[27f5f71]510 size_t stacksize;
[09d4b22]511 // default stack size, normally defined by shell limit
[1a3040c]512 Abort( pthread_attr_getstacksize( &attr, &stacksize ), "pthread_attr_getstacksize" );
[27f5f71]513 assert( stacksize >= PTHREAD_STACK_MIN );
[1a3040c]514
[09d4b22]515 void * stack;
516 __cfaabi_dbg_debug_do(
517 stack = memalign( __page_size, stacksize + __page_size );
518 // pthread has no mechanism to create the guard page in user supplied stack.
519 if ( mprotect( stack, __page_size, PROT_NONE ) == -1 ) {
520 abort( "mprotect : internal error, mprotect failure, error(%d) %s.", errno, strerror( errno ) );
521 } // if
522 );
523 __cfaabi_dbg_no_debug_do(
524 stack = malloc( stacksize );
525 );
[1a3040c]526
[09f357ec]527 Abort( pthread_attr_setstack( &attr, stack, stacksize ), "pthread_attr_setstack" );
[27f5f71]528
[1805b1b]529 Abort( pthread_create( pthread, &attr, start, arg ), "pthread_create" );
530 return stack;
531}
[27f5f71]532
[14a61b5]533// KERNEL_ONLY
[8c50aed]534static void __kernel_first_resume( processor * this ) {
[ac2b598]535 $thread * src = mainThread;
536 $coroutine * dst = get_coroutine(this->runner);
[b69ea6b]537
[14a61b5]538 verify( ! kernelTLS.preemption_state.enabled );
[b69ea6b]539
[09f357ec]540 kernelTLS.this_thread->curr_cor = dst;
[b2f6113]541 __stack_prepare( &dst->stack, 65000 );
[c7a900a]542 __cfactx_start(main, dst, this->runner, __cfactx_invoke_coroutine);
[b69ea6b]543
[14a61b5]544 verify( ! kernelTLS.preemption_state.enabled );
[b69ea6b]545
[e8e457e]546 dst->last = &src->self_cor;
547 dst->starter = dst->starter ? dst->starter : &src->self_cor;
[b69ea6b]548
[92e7631]549 // make sure the current state is still correct
550 /* paranoid */ verify(src->state == Ready);
[b69ea6b]551
552 // context switch to specified coroutine
[69a61d2]553 verify( dst->context.SP );
[c7a900a]554 __cfactx_switch( &src->context, &dst->context );
555 // when __cfactx_switch returns we are back in the src coroutine
[b69ea6b]556
[09f357ec]557 mainThread->curr_cor = &mainThread->self_cor;
558
[92e7631]559 // make sure the current state has been update
560 /* paranoid */ verify(src->state == Active);
[b69ea6b]561
[14a61b5]562 verify( ! kernelTLS.preemption_state.enabled );
[b69ea6b]563}
564
[e8e457e]565// KERNEL_ONLY
[8c50aed]566static void __kernel_last_resume( processor * this ) {
[ac2b598]567 $coroutine * src = &mainThread->self_cor;
568 $coroutine * dst = get_coroutine(this->runner);
[e8e457e]569
570 verify( ! kernelTLS.preemption_state.enabled );
571 verify( dst->starter == src );
572 verify( dst->context.SP );
573
[f586539]574 // SKULLDUGGERY in debug the processors check that the
575 // stack is still within the limit of the stack limits after running a thread.
576 // that check doesn't make sense if we context switch to the processor using the
577 // coroutine semantics. Since this is a special case, use the current context
578 // info to populate these fields.
579 __cfaabi_dbg_debug_do(
580 __stack_context_t ctx;
581 CtxGet( ctx );
582 mainThread->context.SP = ctx.SP;
583 mainThread->context.FP = ctx.FP;
584 )
585
[e8e457e]586 // context switch to the processor
[c7a900a]587 __cfactx_switch( &src->context, &dst->context );
[e8e457e]588}
589
[8def349]590//-----------------------------------------------------------------------------
591// Scheduler routines
[14a61b5]592// KERNEL ONLY
[ac2b598]593void __schedule_thread( $thread * thrd ) with( *thrd->curr_cluster ) {
[9f575ea]594 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[3381ed7]595 /* paranoid */ #if defined( __CFA_WITH_VERIFY__ )
[ae7be7a]596 /* paranoid */ if( thrd->state == Blocked || thrd->state == Start ) assertf( thrd->preempted == __NO_PREEMPTION,
[3381ed7]597 "Error inactive thread marked as preempted, state %d, preemption %d\n", thrd->state, thrd->preempted );
[b0c7419]598 /* paranoid */ if( thrd->preempted != __NO_PREEMPTION ) assertf(thrd->state == Active || thrd->state == Rerun,
[3381ed7]599 "Error preempted thread marked as not currently running, state %d, preemption %d\n", thrd->state, thrd->preempted );
600 /* paranoid */ #endif
[9f575ea]601 /* paranoid */ verifyf( thrd->next == 0p, "Expected null got %p", thrd->next );
602
[ae7be7a]603 if (thrd->preempted == __NO_PREEMPTION) thrd->state = Ready;
604
[9f575ea]605 lock ( ready_queue_lock __cfaabi_dbg_ctx2 );
606 bool was_empty = !(ready_queue != 0);
607 append( ready_queue, thrd );
608 unlock( ready_queue_lock );
[6b4cdd3]609
[92e7631]610 __wake_one(thrd->curr_cluster, was_empty);
[1c273d0]611
[9f575ea]612 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[db6f06a]613}
614
[14a61b5]615// KERNEL ONLY
[ac2b598]616static $thread * __next_thread(cluster * this) with( *this ) {
[3381ed7]617 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
618
[65deb18]619 lock( ready_queue_lock __cfaabi_dbg_ctx2 );
[ac2b598]620 $thread * head = pop_head( ready_queue );
[65deb18]621 unlock( ready_queue_lock );
[eb2e723]622
[3381ed7]623 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
624 return head;
[75f3522]625}
626
[2d8f7b0]627// KERNEL ONLY unpark with out disabling interrupts
628void __unpark( $thread * thrd __cfaabi_dbg_ctx_param2 ) {
[3381ed7]629 static_assert(sizeof(thrd->state) == sizeof(int));
[ae7be7a]630
[ae66348]631 // record activity
632 __cfaabi_dbg_record_thrd( *thrd, false, caller );
633
[b0c7419]634 enum coroutine_state old_state = __atomic_exchange_n(&thrd->state, Rerun, __ATOMIC_SEQ_CST);
[ae7be7a]635 __cfaabi_dbg_debug_do( thrd->unpark_result = old_state; )
[3381ed7]636 switch(old_state) {
637 case Active:
638 // Wake won the race, the thread will reschedule/rerun itself
639 break;
[ae7be7a]640 case Blocked:
[3381ed7]641 /* paranoid */ verify( ! thrd->preempted != __NO_PREEMPTION );
[0b33412]642
[3381ed7]643 // Wake lost the race,
[ae7be7a]644 thrd->state = Blocked;
[8c50aed]645 __schedule_thread( thrd );
[3381ed7]646 break;
647 case Rerun:
648 abort("More than one thread attempted to schedule thread %p\n", thrd);
649 break;
650 case Halted:
651 case Start:
652 case Primed:
653 default:
654 // This makes no sense, something is wrong abort
655 abort();
656 }
[2d8f7b0]657}
658
659void unpark( $thread * thrd __cfaabi_dbg_ctx_param2 ) {
660 if( !thrd ) return;
661
662 disable_interrupts();
663 __unpark( thrd __cfaabi_dbg_ctx_fwd2 );
[36982fc]664 enable_interrupts( __cfaabi_dbg_ctx );
[db6f06a]665}
666
[ae66348]667void park( __cfaabi_dbg_ctx_param ) {
[3381ed7]668 /* paranoid */ verify( kernelTLS.preemption_state.enabled );
[82ff5845]669 disable_interrupts();
[3381ed7]670 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
671 /* paranoid */ verify( kernelTLS.this_thread->preempted == __NO_PREEMPTION );
[0b33412]672
[ae66348]673 // record activity
674 __cfaabi_dbg_record_thrd( *kernelTLS.this_thread, true, caller );
675
[82c948c]676 returnToKernel();
[0b33412]677
[3381ed7]678 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[36982fc]679 enable_interrupts( __cfaabi_dbg_ctx );
[3381ed7]680 /* paranoid */ verify( kernelTLS.preemption_state.enabled );
[eb2e723]681
[0c78741]682}
683
[3381ed7]684// KERNEL ONLY
[b0c7419]685void __leave_thread() {
[3381ed7]686 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[82c948c]687 returnToKernel();
[b0c7419]688 abort();
[0c78741]689}
690
[3381ed7]691// KERNEL ONLY
692bool force_yield( __Preemption_Reason reason ) {
693 /* paranoid */ verify( kernelTLS.preemption_state.enabled );
[09800e9]694 disable_interrupts();
[3381ed7]695 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[09800e9]696
[ac2b598]697 $thread * thrd = kernelTLS.this_thread;
[b0c7419]698 /* paranoid */ verify(thrd->state == Active || thrd->state == Rerun);
[3381ed7]699
700 // SKULLDUGGERY: It is possible that we are preempting this thread just before
701 // it was going to park itself. If that is the case and it is already using the
702 // intrusive fields then we can't use them to preempt the thread
703 // If that is the case, abandon the preemption.
704 bool preempted = false;
705 if(thrd->next == 0p) {
706 preempted = true;
707 thrd->preempted = reason;
708 returnToKernel();
709 }
[09800e9]710
[3381ed7]711 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
712 enable_interrupts_noPoll();
713 /* paranoid */ verify( kernelTLS.preemption_state.enabled );
[f2b12406]714
[3381ed7]715 return preempted;
[f2b12406]716}
717
[fa21ac9]718//=============================================================================================
719// Kernel Setup logic
720//=============================================================================================
[eb2e723]721//-----------------------------------------------------------------------------
722// Kernel boot procedures
[8c50aed]723static void __kernel_startup(void) {
[14a61b5]724 verify( ! kernelTLS.preemption_state.enabled );
[4069faad]725 __cfadbg_print_safe(runtime_core, "Kernel : Starting\n");
[eb2e723]726
[b2f6113]727 __page_size = sysconf( _SC_PAGESIZE );
728
[ea8b2f7]729 __cfa_dbg_global_clusters.list{ __get };
730 __cfa_dbg_global_clusters.lock{};
[de94a60]731
[de6319f]732 // Initialize the main cluster
733 mainCluster = (cluster *)&storage_mainCluster;
734 (*mainCluster){"Main Cluster"};
735
[4069faad]736 __cfadbg_print_safe(runtime_core, "Kernel : Main cluster ready\n");
[de6319f]737
[eb2e723]738 // Start by initializing the main thread
[1c273d0]739 // SKULLDUGGERY: the mainThread steals the process main thread
[969b3fe]740 // which will then be scheduled by the mainProcessor normally
[ac2b598]741 mainThread = ($thread *)&storage_mainThread;
[8fcbb4c]742 current_stack_info_t info;
[b2f6113]743 info.storage = (__stack_t*)&storage_mainThreadCtx;
[83a071f9]744 (*mainThread){ &info };
[eb2e723]745
[4069faad]746 __cfadbg_print_safe(runtime_core, "Kernel : Main thread ready\n");
[fa21ac9]747
[bd98b58]748
[de6319f]749
750 // Construct the processor context of the main processor
751 void ?{}(processorCtx_t & this, processor * proc) {
752 (this.__cor){ "Processor" };
[1805b1b]753 this.__cor.starter = 0p;
[de6319f]754 this.proc = proc;
755 }
756
757 void ?{}(processor & this) with( this ) {
758 name = "Main Processor";
759 cltr = mainCluster;
760 terminated{ 0 };
761 do_terminate = false;
[1805b1b]762 preemption_alarm = 0p;
[de6319f]763 pending_preemption = false;
764 kernel_thread = pthread_self();
765
766 runner{ &this };
[4069faad]767 __cfadbg_print_safe(runtime_core, "Kernel : constructed main processor context %p\n", &runner);
[de6319f]768 }
[fa21ac9]769
[969b3fe]770 // Initialize the main processor and the main processor ctx
[eb2e723]771 // (the coroutine that contains the processing control flow)
[969b3fe]772 mainProcessor = (processor *)&storage_mainProcessor;
[de6319f]773 (*mainProcessor){};
[eb2e723]774
[dcb42b8]775 //initialize the global state variables
[14a61b5]776 kernelTLS.this_processor = mainProcessor;
777 kernelTLS.this_thread = mainThread;
[eb2e723]778
[82ff5845]779 // Enable preemption
780 kernel_start_preemption();
781
[969b3fe]782 // Add the main thread to the ready queue
783 // once resume is called on mainProcessor->runner the mainThread needs to be scheduled like any normal thread
[8c50aed]784 __schedule_thread(mainThread);
[969b3fe]785
786 // SKULLDUGGERY: Force a context switch to the main processor to set the main thread's context to the current UNIX
[c7a900a]787 // context. Hence, the main thread does not begin through __cfactx_invoke_thread, like all other threads. The trick here is that
[1c273d0]788 // mainThread is on the ready queue when this call is made.
[8c50aed]789 __kernel_first_resume( kernelTLS.this_processor );
[eb2e723]790
[dcb42b8]791
792 // THE SYSTEM IS NOW COMPLETELY RUNNING
[f6660520]793
794
795 // Now that the system is up, finish creating systems that need threading
796 __kernel_io_finish_start( *mainCluster );
797
798
799 __cfadbg_print_safe(runtime_core, "Kernel : Started\n--------------------------------------------------\n\n");
[82ff5845]800
[14a61b5]801 verify( ! kernelTLS.preemption_state.enabled );
[36982fc]802 enable_interrupts( __cfaabi_dbg_ctx );
[afd550c]803 verify( TL_GET( preemption_state.enabled ) );
[eb2e723]804}
805
[8c50aed]806static void __kernel_shutdown(void) {
[f6660520]807 //Before we start shutting things down, wait for systems that need threading to shutdown
808 __kernel_io_prepare_stop( *mainCluster );
[eb2e723]809
[92e7631]810 /* paranoid */ verify( TL_GET( preemption_state.enabled ) );
[4e6fb8e]811 disable_interrupts();
[92e7631]812 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[4e6fb8e]813
[f6660520]814 __cfadbg_print_safe(runtime_core, "\n--------------------------------------------------\nKernel : Shutting down\n");
815
[969b3fe]816 // SKULLDUGGERY: Notify the mainProcessor it needs to terminates.
[dcb42b8]817 // When its coroutine terminates, it return control to the mainThread
818 // which is currently here
[ea8b2f7]819 __atomic_store_n(&mainProcessor->do_terminate, true, __ATOMIC_RELEASE);
[8c50aed]820 __kernel_last_resume( kernelTLS.this_processor );
[ea8b2f7]821 mainThread->self_cor.state = Halted;
[eb2e723]822
[dcb42b8]823 // THE SYSTEM IS NOW COMPLETELY STOPPED
[eb2e723]824
[82ff5845]825 // Disable preemption
826 kernel_stop_preemption();
827
[969b3fe]828 // Destroy the main processor and its context in reverse order of construction
[dcb42b8]829 // These were manually constructed so we need manually destroy them
[c66f6cb]830 void ^?{}(processor & this) with( this ){
831 /* paranoid */ verify( this.do_terminate == true );
832 }
833
[210b8b3]834 ^(*mainProcessor){};
[eb2e723]835
[dcb42b8]836 // Final step, destroy the main thread since it is no longer needed
837 // Since we provided a stack to this taxk it will not destroy anything
[210b8b3]838 /* paranoid */ verify(mainThread->self_cor.stack.storage == (__stack_t*)(((uintptr_t)&storage_mainThreadCtx)| 0x1));
839 ^(*mainThread){};
[eb2e723]840
[92976d9]841 ^(*mainCluster){};
842
[ea8b2f7]843 ^(__cfa_dbg_global_clusters.list){};
844 ^(__cfa_dbg_global_clusters.lock){};
[a1a17a74]845
[4069faad]846 __cfadbg_print_safe(runtime_core, "Kernel : Shutdown complete\n");
[9d944b2]847}
848
[14a61b5]849//=============================================================================================
[92e7631]850// Kernel Idle Sleep
[14a61b5]851//=============================================================================================
[92e7631]852static $thread * __halt(processor * this) with( *this ) {
853 if( do_terminate ) return 0p;
[ea8b2f7]854
[92e7631]855 // First, lock the cluster idle
856 lock( cltr->idle_lock __cfaabi_dbg_ctx2 );
857
858 // Check if we can find a thread
859 if( $thread * found = __next_thread( cltr ) ) {
860 unlock( cltr->idle_lock );
861 return found;
[6b4cdd3]862 }
[14a61b5]863
[92e7631]864 // Move this processor from the active list to the idle list
865 move_to_front(cltr->procs, cltr->idles, *this);
[14a61b5]866
[92e7631]867 // Unlock the idle lock so we don't go to sleep with a lock
868 unlock (cltr->idle_lock);
869
870 // We are ready to sleep
[4069faad]871 __cfadbg_print_safe(runtime_core, "Kernel : Processor %p ready to sleep\n", this);
[92e7631]872 wait( idle );
[14a61b5]873
[92e7631]874 // We have woken up
[4069faad]875 __cfadbg_print_safe(runtime_core, "Kernel : Processor %p woke up and ready to run\n", this);
[14a61b5]876
[92e7631]877 // Get ourself off the idle list
[6b4cdd3]878 with( *cltr ) {
[92e7631]879 lock (idle_lock __cfaabi_dbg_ctx2);
880 move_to_front(idles, procs, *this);
881 unlock(idle_lock);
[6b4cdd3]882 }
[92e7631]883
884 // Don't check the ready queue again, we may not be in a position to run a thread
885 return 0p;
886}
887
888// Wake a thread from the front if there are any
889static bool __wake_one(cluster * this, __attribute__((unused)) bool force) {
890 // if we don't want to force check if we know it's false
[4069faad]891 // if( !this->idles.head && !force ) return false;
[92e7631]892
893 // First, lock the cluster idle
894 lock( this->idle_lock __cfaabi_dbg_ctx2 );
895
896 // Check if there is someone to wake up
897 if( !this->idles.head ) {
898 // Nope unlock and return false
899 unlock( this->idle_lock );
900 return false;
901 }
902
903 // Wake them up
[4069faad]904 __cfadbg_print_safe(runtime_core, "Kernel : waking Processor %p\n", this->idles.head);
[8e16177]905 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
[92e7631]906 post( this->idles.head->idle );
907
908 // Unlock and return true
909 unlock( this->idle_lock );
910 return true;
911}
912
913// Unconditionnaly wake a thread
914static bool __wake_proc(processor * this) {
[4069faad]915 __cfadbg_print_safe(runtime_core, "Kernel : waking Processor %p\n", this);
[8e16177]916
917 disable_interrupts();
918 /* paranoid */ verify( ! kernelTLS.preemption_state.enabled );
919 bool ret = post( this->idle );
920 enable_interrupts( __cfaabi_dbg_ctx );
921
922 return ret;
[6b4cdd3]923}
924
[dbe9b08]925//=============================================================================================
926// Unexpected Terminating logic
927//=============================================================================================
[ea7d2b0]928static __spinlock_t kernel_abort_lock;
[9d944b2]929static bool kernel_abort_called = false;
930
[afd550c]931void * kernel_abort(void) __attribute__ ((__nothrow__)) {
[9d944b2]932 // abort cannot be recursively entered by the same or different processors because all signal handlers return when
933 // the globalAbort flag is true.
[36982fc]934 lock( kernel_abort_lock __cfaabi_dbg_ctx2 );
[9d944b2]935
936 // first task to abort ?
[de94a60]937 if ( kernel_abort_called ) { // not first task to abort ?
[ea7d2b0]938 unlock( kernel_abort_lock );
[1c273d0]939
[9d944b2]940 sigset_t mask;
941 sigemptyset( &mask );
[de94a60]942 sigaddset( &mask, SIGALRM ); // block SIGALRM signals
[8a13c47]943 sigaddset( &mask, SIGUSR1 ); // block SIGALRM signals
944 sigsuspend( &mask ); // block the processor to prevent further damage during abort
945 _exit( EXIT_FAILURE ); // if processor unblocks before it is killed, terminate it
[de94a60]946 }
947 else {
948 kernel_abort_called = true;
949 unlock( kernel_abort_lock );
[9d944b2]950 }
951
[14a61b5]952 return kernelTLS.this_thread;
[9d944b2]953}
954
955void kernel_abort_msg( void * kernel_data, char * abort_text, int abort_text_size ) {
[ac2b598]956 $thread * thrd = kernel_data;
[9d944b2]957
[de94a60]958 if(thrd) {
959 int len = snprintf( abort_text, abort_text_size, "Error occurred while executing thread %.256s (%p)", thrd->self_cor.name, thrd );
[1c40091]960 __cfaabi_bits_write( STDERR_FILENO, abort_text, len );
[de94a60]961
[212c2187]962 if ( &thrd->self_cor != thrd->curr_cor ) {
963 len = snprintf( abort_text, abort_text_size, " in coroutine %.256s (%p).\n", thrd->curr_cor->name, thrd->curr_cor );
[1c40091]964 __cfaabi_bits_write( STDERR_FILENO, abort_text, len );
[de94a60]965 }
966 else {
[1c40091]967 __cfaabi_bits_write( STDERR_FILENO, ".\n", 2 );
[de94a60]968 }
[1c273d0]969 }
[9d944b2]970 else {
[de94a60]971 int len = snprintf( abort_text, abort_text_size, "Error occurred outside of any thread.\n" );
[1c40091]972 __cfaabi_bits_write( STDERR_FILENO, abort_text, len );
[9d944b2]973 }
974}
975
[2b8bc41]976int kernel_abort_lastframe( void ) __attribute__ ((__nothrow__)) {
[14a61b5]977 return get_coroutine(kernelTLS.this_thread) == get_coroutine(mainThread) ? 4 : 2;
[2b8bc41]978}
979
[de94a60]980static __spinlock_t kernel_debug_lock;
981
[9d944b2]982extern "C" {
[1c40091]983 void __cfaabi_bits_acquire() {
[36982fc]984 lock( kernel_debug_lock __cfaabi_dbg_ctx2 );
[9d944b2]985 }
986
[1c40091]987 void __cfaabi_bits_release() {
[ea7d2b0]988 unlock( kernel_debug_lock );
[9d944b2]989 }
[8118303]990}
991
[fa21ac9]992//=============================================================================================
993// Kernel Utilities
994//=============================================================================================
[bd98b58]995//-----------------------------------------------------------------------------
996// Locks
[242a902]997void ?{}( semaphore & this, int count = 1 ) {
998 (this.lock){};
999 this.count = count;
1000 (this.waiting){};
[db6f06a]1001}
[242a902]1002void ^?{}(semaphore & this) {}
[db6f06a]1003
[71c8b7e]1004bool P(semaphore & this) with( this ){
[65deb18]1005 lock( lock __cfaabi_dbg_ctx2 );
1006 count -= 1;
1007 if ( count < 0 ) {
[bdeba0b]1008 // queue current task
[14a61b5]1009 append( waiting, kernelTLS.this_thread );
[bdeba0b]1010
1011 // atomically release spin lock and block
[3381ed7]1012 unlock( lock );
[ae66348]1013 park( __cfaabi_dbg_ctx );
[71c8b7e]1014 return true;
[8def349]1015 }
[4e6fb8e]1016 else {
[65deb18]1017 unlock( lock );
[71c8b7e]1018 return false;
[4e6fb8e]1019 }
[bd98b58]1020}
1021
[f0ce5f4]1022bool V(semaphore & this) with( this ) {
[ac2b598]1023 $thread * thrd = 0p;
[65deb18]1024 lock( lock __cfaabi_dbg_ctx2 );
1025 count += 1;
1026 if ( count <= 0 ) {
[bdeba0b]1027 // remove task at head of waiting list
[65deb18]1028 thrd = pop_head( waiting );
[bd98b58]1029 }
[bdeba0b]1030
[65deb18]1031 unlock( lock );
[bdeba0b]1032
1033 // make new owner
[ae66348]1034 unpark( thrd __cfaabi_dbg_ctx2 );
[f0ce5f4]1035
[d384787]1036 return thrd != 0p;
1037}
1038
1039bool V(semaphore & this, unsigned diff) with( this ) {
1040 $thread * thrd = 0p;
1041 lock( lock __cfaabi_dbg_ctx2 );
1042 int release = max(-count, (int)diff);
1043 count += diff;
1044 for(release) {
1045 unpark( pop_head( waiting ) __cfaabi_dbg_ctx2 );
1046 }
1047
1048 unlock( lock );
1049
[f0ce5f4]1050 return thrd != 0p;
[bd98b58]1051}
1052
[f7d6bb0]1053//-----------------------------------------------------------------------------
[de94a60]1054// Global Queues
1055void doregister( cluster & cltr ) {
[ea8b2f7]1056 lock ( __cfa_dbg_global_clusters.lock __cfaabi_dbg_ctx2);
1057 push_front( __cfa_dbg_global_clusters.list, cltr );
1058 unlock ( __cfa_dbg_global_clusters.lock );
[de94a60]1059}
[f7d6bb0]1060
[de94a60]1061void unregister( cluster & cltr ) {
[ea8b2f7]1062 lock ( __cfa_dbg_global_clusters.lock __cfaabi_dbg_ctx2);
1063 remove( __cfa_dbg_global_clusters.list, cltr );
1064 unlock( __cfa_dbg_global_clusters.lock );
[de94a60]1065}
[f7d6bb0]1066
[ac2b598]1067void doregister( cluster * cltr, $thread & thrd ) {
[a1a17a74]1068 lock (cltr->thread_list_lock __cfaabi_dbg_ctx2);
[d4e68a6]1069 cltr->nthreads += 1;
[a1a17a74]1070 push_front(cltr->threads, thrd);
1071 unlock (cltr->thread_list_lock);
1072}
1073
[ac2b598]1074void unregister( cluster * cltr, $thread & thrd ) {
[a1a17a74]1075 lock (cltr->thread_list_lock __cfaabi_dbg_ctx2);
1076 remove(cltr->threads, thrd );
[d4e68a6]1077 cltr->nthreads -= 1;
[a1a17a74]1078 unlock(cltr->thread_list_lock);
1079}
[9181f1d]1080
[de94a60]1081void doregister( cluster * cltr, processor * proc ) {
[92e7631]1082 lock (cltr->idle_lock __cfaabi_dbg_ctx2);
[d4e68a6]1083 cltr->nprocessors += 1;
[639991a]1084 push_front(cltr->procs, *proc);
[92e7631]1085 unlock (cltr->idle_lock);
[de94a60]1086}
1087
1088void unregister( cluster * cltr, processor * proc ) {
[92e7631]1089 lock (cltr->idle_lock __cfaabi_dbg_ctx2);
[639991a]1090 remove(cltr->procs, *proc );
[d4e68a6]1091 cltr->nprocessors -= 1;
[92e7631]1092 unlock(cltr->idle_lock);
[de94a60]1093}
1094
1095//-----------------------------------------------------------------------------
1096// Debug
1097__cfaabi_dbg_debug_do(
[1997b4e]1098 extern "C" {
[ae66348]1099 void __cfaabi_dbg_record_lock(__spinlock_t & this, const char prev_name[]) {
[1997b4e]1100 this.prev_name = prev_name;
1101 this.prev_thrd = kernelTLS.this_thread;
1102 }
[ae66348]1103
1104 void __cfaabi_dbg_record_thrd($thread & this, bool park, const char prev_name[]) {
1105 if(park) {
[f0ce5f4]1106 this.park_caller = prev_name;
1107 this.park_stale = false;
[ae66348]1108 }
1109 else {
[f0ce5f4]1110 this.unpark_caller = prev_name;
1111 this.unpark_stale = false;
[ae66348]1112 }
1113 }
[9181f1d]1114 }
[f7d6bb0]1115)
[2026bb6]1116
1117//-----------------------------------------------------------------------------
1118// Debug
[8c50aed]1119bool threading_enabled(void) __attribute__((const)) {
[2026bb6]1120 return true;
1121}
[8118303]1122// Local Variables: //
1123// mode: c //
1124// tab-width: 4 //
1125// End: //
Note: See TracBrowser for help on using the repository browser.