source: libcfa/src/concurrency/preemption.cfa@ 76e2113

ADT arm-eh ast-experimental enum forall-pointer-decay jacob/cs343-translation new-ast new-ast-unique-expr pthread-emulation qualifiedEnum
Last change on this file since 76e2113 was 2d8f7b0, checked in by Thierry Delisle <tdelisle@…>, 5 years ago

Implemented basic non-blocking io

  • Property mode set to 100644
File size: 16.6 KB
RevLine 
[c81ebf9]1//
2// Cforall Version 1.0.0 Copyright (C) 2016 University of Waterloo
3//
4// The contents of this file are covered under the licence agreement in the
5// file "LICENCE" distributed with Cforall.
6//
7// signal.c --
8//
9// Author : Thierry Delisle
10// Created On : Mon Jun 5 14:20:42 2017
[6b0b624]11// Last Modified By : Peter A. Buhr
[09d4b22]12// Last Modified On : Thu Dec 5 16:34:05 2019
13// Update Count : 43
[c81ebf9]14//
15
[2026bb6]16#define __cforall_thread__
17
[73abe95]18#include "preemption.hfa"
[a83ffa4]19#include <assert.h>
[c81ebf9]20
21extern "C" {
[82ff5845]22#include <errno.h>
23#include <stdio.h>
24#include <string.h>
25#include <unistd.h>
[27f5f71]26#include <limits.h> // PTHREAD_STACK_MIN
[c81ebf9]27}
28
[73abe95]29#include "bits/signal.hfa"
[82ff5845]30
[d8548e2]31#if !defined(__CFA_DEFAULT_PREEMPTION__)
[2a84d06d]32#define __CFA_DEFAULT_PREEMPTION__ 10`ms
[d8548e2]33#endif
[c81ebf9]34
[2a84d06d]35Duration default_preemption() __attribute__((weak)) {
[c81ebf9]36 return __CFA_DEFAULT_PREEMPTION__;
37}
38
[969b3fe]39// FwdDeclarations : timeout handlers
[c81ebf9]40static void preempt( processor * this );
[ac2b598]41static void timeout( $thread * this );
[c81ebf9]42
[969b3fe]43// FwdDeclarations : Signal handlers
[c29c342]44static void sigHandler_ctxSwitch( __CFA_SIGPARMS__ );
45static void sigHandler_segv ( __CFA_SIGPARMS__ );
46static void sigHandler_ill ( __CFA_SIGPARMS__ );
47static void sigHandler_fpe ( __CFA_SIGPARMS__ );
48static void sigHandler_abort ( __CFA_SIGPARMS__ );
[82ff5845]49
[969b3fe]50// FwdDeclarations : alarm thread main
[c29c342]51static void * alarm_loop( __attribute__((unused)) void * args );
[969b3fe]52
53// Machine specific register name
[381fdee]54#if defined( __i386 )
[b2b44d8]55#define CFA_REG_IP gregs[REG_EIP]
[381fdee]56#elif defined( __x86_64 )
57#define CFA_REG_IP gregs[REG_RIP]
58#elif defined( __ARM_ARCH )
[b2b44d8]59#define CFA_REG_IP arm_pc
[381fdee]60#else
61#error unknown hardware architecture
[cd17862]62#endif
63
[969b3fe]64KERNEL_STORAGE(event_kernel_t, event_kernel); // private storage for event kernel
65event_kernel_t * event_kernel; // kernel public handle to even kernel
66static pthread_t alarm_thread; // pthread handle to alarm thread
[09d4b22]67static void * alarm_stack; // pthread stack for alarm thread
[969b3fe]68
[c29c342]69static void ?{}(event_kernel_t & this) with( this ) {
[65deb18]70 alarms{};
71 lock{};
[969b3fe]72}
[82ff5845]73
[4dad189]74enum {
75 PREEMPT_NORMAL = 0,
76 PREEMPT_TERMINATE = 1,
77};
78
[c81ebf9]79//=============================================================================================
80// Kernel Preemption logic
81//=============================================================================================
82
[969b3fe]83// Get next expired node
[2a84d06d]84static inline alarm_node_t * get_expired( alarm_list_t * alarms, Time currtime ) {
[27f5f71]85 if( !alarms->head ) return 0p; // If no alarms return null
86 if( alarms->head->alarm >= currtime ) return 0p; // If alarms head not expired return null
87 return pop(alarms); // Otherwise just pop head
[969b3fe]88}
89
90// Tick one frame of the Discrete Event Simulation for alarms
[c29c342]91static void tick_preemption() {
[27f5f71]92 alarm_node_t * node = 0p; // Used in the while loop but cannot be declared in the while condition
93 alarm_list_t * alarms = &event_kernel->alarms; // Local copy for ease of reading
94 Time currtime = __kernel_get_time(); // Check current time once so everything "happens at once"
[8cb529e]95
[969b3fe]96 //Loop throught every thing expired
97 while( node = get_expired( alarms, currtime ) ) {
[b1a4300]98 // __cfaabi_dbg_print_buffer_decl( " KERNEL: preemption tick.\n" );
[1c273d0]99
[969b3fe]100 // Check if this is a kernel
[c81ebf9]101 if( node->kernel_alarm ) {
102 preempt( node->proc );
103 }
104 else {
105 timeout( node->thrd );
106 }
107
[969b3fe]108 // Check if this is a periodic alarm
[2a84d06d]109 Duration period = node->period;
[8cb529e]110 if( period > 0 ) {
[b1a4300]111 // __cfaabi_dbg_print_buffer_local( " KERNEL: alarm period is %lu.\n", period.tv );
[969b3fe]112 node->alarm = currtime + period; // Alarm is periodic, add currtime to it (used cached current time)
113 insert( alarms, node ); // Reinsert the node for the next time it triggers
[c81ebf9]114 }
115 else {
[969b3fe]116 node->set = false; // Node is one-shot, just mark it as not pending
[c81ebf9]117 }
118 }
119
[969b3fe]120 // If there are still alarms pending, reset the timer
[b1a4300]121 if( alarms->head ) {
[f083335]122 __cfaabi_dbg_print_buffer_decl( " KERNEL: @%ju(%ju) resetting alarm to %ju.\n", currtime.tv, __kernel_get_time().tv, (alarms->head->alarm - currtime).tv);
[b1a4300]123 Duration delta = alarms->head->alarm - currtime;
124 Duration caped = max(delta, 50`us);
125 // itimerval tim = { caped };
126 // __cfaabi_dbg_print_buffer_local( " Values are %lu, %lu, %lu %lu.\n", delta.tv, caped.tv, tim.it_value.tv_sec, tim.it_value.tv_usec);
127
128 __kernel_set_timer( caped );
129 }
[c81ebf9]130}
131
[969b3fe]132// Update the preemption of a processor and notify interested parties
[2a84d06d]133void update_preemption( processor * this, Duration duration ) {
[c81ebf9]134 alarm_node_t * alarm = this->preemption_alarm;
135
136 // Alarms need to be enabled
[2a84d06d]137 if ( duration > 0 && ! alarm->set ) {
[c81ebf9]138 alarm->alarm = __kernel_get_time() + duration;
139 alarm->period = duration;
140 register_self( alarm );
141 }
[8ad6533]142 // Zero duration but alarm is set
[c81ebf9]143 else if ( duration == 0 && alarm->set ) {
144 unregister_self( alarm );
145 alarm->alarm = 0;
146 alarm->period = 0;
147 }
148 // If alarm is different from previous, change it
149 else if ( duration > 0 && alarm->period != duration ) {
150 unregister_self( alarm );
151 alarm->alarm = __kernel_get_time() + duration;
152 alarm->period = duration;
153 register_self( alarm );
154 }
155}
156
157//=============================================================================================
[cd17862]158// Kernel Signal Tools
[c81ebf9]159//=============================================================================================
160
[36982fc]161__cfaabi_dbg_debug_do( static thread_local void * last_interrupt = 0; )
[b227f68]162
[82ff5845]163extern "C" {
[969b3fe]164 // Disable interrupts by incrementing the counter
[82ff5845]165 void disable_interrupts() {
[afd550c]166 with( kernelTLS.preemption_state ) {
[1f81d61]167 #if GCC_VERSION > 50000
[13073be]168 static_assert(__atomic_always_lock_free(sizeof(enabled), &enabled), "Must be lock-free");
[1f81d61]169 #endif
[13073be]170
171 // Set enabled flag to false
172 // should be atomic to avoid preemption in the middle of the operation.
173 // use memory order RELAXED since there is no inter-thread on this variable requirements
174 __atomic_store_n(&enabled, false, __ATOMIC_RELAXED);
175
176 // Signal the compiler that a fence is needed but only for signal handlers
177 __atomic_signal_fence(__ATOMIC_ACQUIRE);
178
[de6319f]179 __attribute__((unused)) unsigned short new_val = disable_count + 1;
180 disable_count = new_val;
181 verify( new_val < 65_000u ); // If this triggers someone is disabling interrupts without enabling them
182 }
[82ff5845]183 }
184
[969b3fe]185 // Enable interrupts by decrementing the counter
[c7a900a]186 // If counter reaches 0, execute any pending __cfactx_switch
[36982fc]187 void enable_interrupts( __cfaabi_dbg_ctx_param ) {
[13073be]188 processor * proc = kernelTLS.this_processor; // Cache the processor now since interrupts can start happening after the atomic store
[969b3fe]189
[afd550c]190 with( kernelTLS.preemption_state ){
[de6319f]191 unsigned short prev = disable_count;
192 disable_count -= 1;
193 verify( prev != 0u ); // If this triggers someone is enabled already enabled interruptsverify( prev != 0u );
194
195 // Check if we need to prempt the thread because an interrupt was missed
196 if( prev == 1 ) {
[1f81d61]197 #if GCC_VERSION > 50000
[13073be]198 static_assert(__atomic_always_lock_free(sizeof(enabled), &enabled), "Must be lock-free");
[1f81d61]199 #endif
[13073be]200
201 // Set enabled flag to true
202 // should be atomic to avoid preemption in the middle of the operation.
203 // use memory order RELAXED since there is no inter-thread on this variable requirements
204 __atomic_store_n(&enabled, true, __ATOMIC_RELAXED);
205
206 // Signal the compiler that a fence is needed but only for signal handlers
207 __atomic_signal_fence(__ATOMIC_RELEASE);
[de6319f]208 if( proc->pending_preemption ) {
209 proc->pending_preemption = false;
[3381ed7]210 force_yield( __POLL_PREEMPTION );
[de6319f]211 }
[d0a045c7]212 }
[82ff5845]213 }
[4e6fb8e]214
[969b3fe]215 // For debugging purposes : keep track of the last person to enable the interrupts
[36982fc]216 __cfaabi_dbg_debug_do( proc->last_enable = caller; )
[82ff5845]217 }
[969b3fe]218
219 // Disable interrupts by incrementint the counter
[c7a900a]220 // Don't execute any pending __cfactx_switch even if counter reaches 0
[969b3fe]221 void enable_interrupts_noPoll() {
[afd550c]222 unsigned short prev = kernelTLS.preemption_state.disable_count;
223 kernelTLS.preemption_state.disable_count -= 1;
[2e9aed4]224 verifyf( prev != 0u, "Incremented from %u\n", prev ); // If this triggers someone is enabled already enabled interrupts
[d0a045c7]225 if( prev == 1 ) {
[1f81d61]226 #if GCC_VERSION > 50000
[13073be]227 static_assert(__atomic_always_lock_free(sizeof(kernelTLS.preemption_state.enabled), &kernelTLS.preemption_state.enabled), "Must be lock-free");
[1f81d61]228 #endif
[13073be]229 // Set enabled flag to true
230 // should be atomic to avoid preemption in the middle of the operation.
231 // use memory order RELAXED since there is no inter-thread on this variable requirements
232 __atomic_store_n(&kernelTLS.preemption_state.enabled, true, __ATOMIC_RELAXED);
233
234 // Signal the compiler that a fence is needed but only for signal handlers
235 __atomic_signal_fence(__ATOMIC_RELEASE);
[d0a045c7]236 }
[969b3fe]237 }
[82ff5845]238}
239
[969b3fe]240// sigprocmask wrapper : unblock a single signal
[1c273d0]241static inline void signal_unblock( int sig ) {
[82ff5845]242 sigset_t mask;
243 sigemptyset( &mask );
[1c273d0]244 sigaddset( &mask, sig );
[82ff5845]245
[27f5f71]246 if ( pthread_sigmask( SIG_UNBLOCK, &mask, 0p ) == -1 ) {
[169d944]247 abort( "internal error, pthread_sigmask" );
[cd17862]248 }
[82ff5845]249}
250
[969b3fe]251// sigprocmask wrapper : block a single signal
[cd17862]252static inline void signal_block( int sig ) {
253 sigset_t mask;
254 sigemptyset( &mask );
255 sigaddset( &mask, sig );
[47ecf2b]256
[27f5f71]257 if ( pthread_sigmask( SIG_BLOCK, &mask, 0p ) == -1 ) {
[169d944]258 abort( "internal error, pthread_sigmask" );
[cd17862]259 }
260}
[47ecf2b]261
[969b3fe]262// kill wrapper : signal a processor
[cd17862]263static void preempt( processor * this ) {
[4dad189]264 sigval_t value = { PREEMPT_NORMAL };
265 pthread_sigqueue( this->kernel_thread, SIGUSR1, value );
266}
267
[969b3fe]268// reserved for future use
[ac2b598]269static void timeout( $thread * this ) {
[2d8f7b0]270 __unpark( this __cfaabi_dbg_ctx2 );
[cd17862]271}
272
[14a61b5]273// KERNEL ONLY
[c7a900a]274// Check if a __cfactx_switch signal handler shoud defer
[969b3fe]275// If true : preemption is safe
276// If false : preemption is unsafe and marked as pending
277static inline bool preemption_ready() {
[14a61b5]278 // Check if preemption is safe
279 bool ready = kernelTLS.preemption_state.enabled && ! kernelTLS.preemption_state.in_progress;
280
281 // Adjust the pending flag accordingly
282 kernelTLS.this_processor->pending_preemption = !ready;
[969b3fe]283 return ready;
284}
285
[cd17862]286//=============================================================================================
287// Kernel Signal Startup/Shutdown logic
288//=============================================================================================
289
[969b3fe]290// Startup routine to activate preemption
291// Called from kernel_startup
[cd17862]292void kernel_start_preemption() {
[169d944]293 __cfaabi_dbg_print_safe( "Kernel : Starting preemption\n" );
[969b3fe]294
295 // Start with preemption disabled until ready
[14a61b5]296 kernelTLS.preemption_state.enabled = false;
297 kernelTLS.preemption_state.disable_count = 1;
[969b3fe]298
299 // Initialize the event kernel
300 event_kernel = (event_kernel_t *)&storage_event_kernel;
[9236060]301 (*event_kernel){};
[969b3fe]302
303 // Setup proper signal handlers
[c7a900a]304 __cfaabi_sigaction( SIGUSR1, sigHandler_ctxSwitch, SA_SIGINFO | SA_RESTART ); // __cfactx_switch handler
[cd17862]305
306 signal_block( SIGALRM );
307
[8c50aed]308 alarm_stack = __create_pthread( &alarm_thread, alarm_loop, 0p );
[cd17862]309}
310
[969b3fe]311// Shutdown routine to deactivate preemption
312// Called from kernel_shutdown
[cd17862]313void kernel_stop_preemption() {
[169d944]314 __cfaabi_dbg_print_safe( "Kernel : Preemption stopping\n" );
[d6ff3ff]315
[969b3fe]316 // Block all signals since we are already shutting down
[cd17862]317 sigset_t mask;
318 sigfillset( &mask );
[27f5f71]319 sigprocmask( SIG_BLOCK, &mask, 0p );
[cd17862]320
[969b3fe]321 // Notify the alarm thread of the shutdown
[a0b3e32]322 sigval val = { 1 };
323 pthread_sigqueue( alarm_thread, SIGALRM, val );
[969b3fe]324
325 // Wait for the preemption thread to finish
[27f5f71]326
327 pthread_join( alarm_thread, 0p );
[09d4b22]328 free( alarm_stack );
[969b3fe]329
330 // Preemption is now fully stopped
331
[169d944]332 __cfaabi_dbg_print_safe( "Kernel : Preemption stopped\n" );
[cd17862]333}
334
[969b3fe]335// Raii ctor/dtor for the preemption_scope
336// Used by thread to control when they want to receive preemption signals
[242a902]337void ?{}( preemption_scope & this, processor * proc ) {
[2a84d06d]338 (this.alarm){ proc, (Time){ 0 }, 0`s };
[242a902]339 this.proc = proc;
340 this.proc->preemption_alarm = &this.alarm;
[969b3fe]341
[d8548e2]342 update_preemption( this.proc, this.proc->cltr->preemption_rate );
[cd17862]343}
344
[242a902]345void ^?{}( preemption_scope & this ) {
[cd17862]346 disable_interrupts();
347
[2a84d06d]348 update_preemption( this.proc, 0`s );
[cd17862]349}
350
351//=============================================================================================
352// Kernel Signal Handlers
353//=============================================================================================
[47ecf2b]354
[969b3fe]355// Context switch signal handler
356// Receives SIGUSR1 signal and causes the current thread to yield
[c29c342]357static void sigHandler_ctxSwitch( __CFA_SIGPARMS__ ) {
[b2b44d8]358 __cfaabi_dbg_debug_do( last_interrupt = (void *)(cxt->uc_mcontext.CFA_REG_IP); )
[969b3fe]359
[4dad189]360 // SKULLDUGGERY: if a thread creates a processor and the immediately deletes it,
361 // the interrupt that is supposed to force the kernel thread to preempt might arrive
362 // before the kernel thread has even started running. When that happens an iterrupt
363 // we a null 'this_processor' will be caught, just ignore it.
[14a61b5]364 if(! kernelTLS.this_processor ) return;
[4dad189]365
366 choose(sfp->si_value.sival_int) {
367 case PREEMPT_NORMAL : ;// Normal case, nothing to do here
[ea8b2f7]368 case PREEMPT_TERMINATE: verify( __atomic_load_n( &kernelTLS.this_processor->do_terminate, __ATOMIC_SEQ_CST ) );
[4dad189]369 default:
[ff878b7]370 abort( "internal error, signal value is %d", sfp->si_value.sival_int );
[4dad189]371 }
372
[b2b44d8]373 // Check if it is safe to preempt here
[969b3fe]374 if( !preemption_ready() ) { return; }
375
[b1a4300]376 __cfaabi_dbg_print_buffer_decl( " KERNEL: preempting core %p (%p @ %p).\n", kernelTLS.this_processor, kernelTLS.this_thread, (void *)(cxt->uc_mcontext.CFA_REG_IP) );
[14a61b5]377
378 // Sync flag : prevent recursive calls to the signal handler
379 kernelTLS.preemption_state.in_progress = true;
380
[a83ffa4]381 // Clear sighandler mask before context switching.
[1f81d61]382 #if GCC_VERSION > 50000
[a83ffa4]383 static_assert( sizeof( sigset_t ) == sizeof( cxt->uc_sigmask ), "Expected cxt->uc_sigmask to be of sigset_t" );
[1f81d61]384 #endif
[27f5f71]385 if ( pthread_sigmask( SIG_SETMASK, (sigset_t *)&(cxt->uc_sigmask), 0p ) == -1 ) {
[a83ffa4]386 abort( "internal error, sigprocmask" );
387 }
[05615ba]388
[14a61b5]389 // TODO: this should go in finish action
390 // Clear the in progress flag
391 kernelTLS.preemption_state.in_progress = false;
[969b3fe]392
393 // Preemption can occur here
394
[c7a900a]395 force_yield( __ALARM_PREEMPTION ); // Do the actual __cfactx_switch
[c81ebf9]396}
397
[969b3fe]398// Main of the alarm thread
399// Waits on SIGALRM and send SIGUSR1 to whom ever needs it
[c29c342]400static void * alarm_loop( __attribute__((unused)) void * args ) {
[969b3fe]401 // Block sigalrms to control when they arrive
[cd17862]402 sigset_t mask;
[ade5272]403 sigfillset(&mask);
[27f5f71]404 if ( pthread_sigmask( SIG_BLOCK, &mask, 0p ) == -1 ) {
[169d944]405 abort( "internal error, pthread_sigmask" );
[82ff5845]406 }
[c81ebf9]407
[ade5272]408 sigemptyset( &mask );
409 sigaddset( &mask, SIGALRM );
410
[969b3fe]411 // Main loop
[cd17862]412 while( true ) {
[969b3fe]413 // Wait for a sigalrm
[a0b3e32]414 siginfo_t info;
415 int sig = sigwaitinfo( &mask, &info );
[969b3fe]416
[e2f7bc3]417 if( sig < 0 ) {
418 //Error!
419 int err = errno;
420 switch( err ) {
421 case EAGAIN :
422 case EINTR :
[b1a4300]423 {__cfaabi_dbg_print_buffer_decl( " KERNEL: Spurious wakeup %d.\n", err );}
[e2f7bc3]424 continue;
[27f5f71]425 case EINVAL :
[169d944]426 abort( "Timeout was invalid." );
[e2f7bc3]427 default:
[169d944]428 abort( "Unhandled error %d", err);
[e2f7bc3]429 }
430 }
431
[969b3fe]432 // If another signal arrived something went wrong
[8cb529e]433 assertf(sig == SIGALRM, "Kernel Internal Error, sigwait: Unexpected signal %d (%d : %d)\n", sig, info.si_code, info.si_value.sival_int);
434
[169d944]435 // __cfaabi_dbg_print_safe( "Kernel : Caught alarm from %d with %d\n", info.si_code, info.si_value.sival_int );
[969b3fe]436 // Switch on the code (a.k.a. the sender) to
[8cb529e]437 switch( info.si_code )
[a0b3e32]438 {
[969b3fe]439 // Timers can apparently be marked as sent for the kernel
440 // In either case, tick preemption
[8cb529e]441 case SI_TIMER:
442 case SI_KERNEL:
[169d944]443 // __cfaabi_dbg_print_safe( "Kernel : Preemption thread tick\n" );
[36982fc]444 lock( event_kernel->lock __cfaabi_dbg_ctx2 );
[8cb529e]445 tick_preemption();
[ea7d2b0]446 unlock( event_kernel->lock );
[8cb529e]447 break;
[969b3fe]448 // Signal was not sent by the kernel but by an other thread
[8cb529e]449 case SI_QUEUE:
[969b3fe]450 // For now, other thread only signal the alarm thread to shut it down
451 // If this needs to change use info.si_value and handle the case here
[8cb529e]452 goto EXIT;
[cd17862]453 }
454 }
[a0b3e32]455
[8cb529e]456EXIT:
[169d944]457 __cfaabi_dbg_print_safe( "Kernel : Preemption thread stopping\n" );
[27f5f71]458 return 0p;
[82ff5845]459}
460
[b68fc85]461//=============================================================================================
462// Kernel Signal Debug
463//=============================================================================================
464
465void __cfaabi_check_preemption() {
[14a61b5]466 bool ready = kernelTLS.preemption_state.enabled;
[b68fc85]467 if(!ready) { abort("Preemption should be ready"); }
468
469 sigset_t oldset;
470 int ret;
[27f5f71]471 ret = pthread_sigmask(0, 0p, &oldset);
[b68fc85]472 if(ret != 0) { abort("ERROR sigprocmask returned %d", ret); }
473
474 ret = sigismember(&oldset, SIGUSR1);
475 if(ret < 0) { abort("ERROR sigismember returned %d", ret); }
476 if(ret == 1) { abort("ERROR SIGUSR1 is disabled"); }
[a83ffa4]477
478 ret = sigismember(&oldset, SIGALRM);
479 if(ret < 0) { abort("ERROR sigismember returned %d", ret); }
480 if(ret == 0) { abort("ERROR SIGALRM is enabled"); }
481
482 ret = sigismember(&oldset, SIGTERM);
483 if(ret < 0) { abort("ERROR sigismember returned %d", ret); }
484 if(ret == 1) { abort("ERROR SIGTERM is disabled"); }
[b68fc85]485}
486
[ea8b2f7]487#ifdef __CFA_WITH_VERIFY__
488bool __cfaabi_dbg_in_kernel() {
489 return !kernelTLS.preemption_state.enabled;
490}
491#endif
492
[6b0b624]493// Local Variables: //
494// mode: c //
495// tab-width: 4 //
496// End: //
Note: See TracBrowser for help on using the repository browser.