14 #include "kmp_affinity.h"
19 #include "kmp_stats.h"
21 #include "kmp_wait_release.h"
22 #include "kmp_wrapper_getpid.h"
24 #if !KMP_OS_DRAGONFLY && !KMP_OS_FREEBSD && !KMP_OS_NETBSD && !KMP_OS_OPENBSD
29 #include <semaphore.h>
31 #include <sys/resource.h>
32 #include <sys/syscall.h>
34 #include <sys/times.h>
38 #include <sys/sysinfo.h>
53 #include <mach/mach.h>
54 #include <sys/sysctl.h>
55 #elif KMP_OS_DRAGONFLY || KMP_OS_FREEBSD
56 #include <sys/types.h>
57 #include <sys/sysctl.h>
59 #include <pthread_np.h>
60 #elif KMP_OS_NETBSD || KMP_OS_OPENBSD
61 #include <sys/types.h>
62 #include <sys/sysctl.h>
69 struct kmp_sys_timer {
70 struct timespec start;
74 #define TS2NS(timespec) \
75 (((timespec).tv_sec * (long int)1e9) + (timespec).tv_nsec)
77 static struct kmp_sys_timer __kmp_sys_timer_data;
79 #if KMP_HANDLE_SIGNALS
80 typedef void (*sig_func_t)(int);
81 STATIC_EFI2_WORKAROUND
struct sigaction __kmp_sighldrs[NSIG];
82 static sigset_t __kmp_sigset;
85 static int __kmp_init_runtime = FALSE;
87 static int __kmp_fork_count = 0;
89 static pthread_condattr_t __kmp_suspend_cond_attr;
90 static pthread_mutexattr_t __kmp_suspend_mutex_attr;
92 static kmp_cond_align_t __kmp_wait_cv;
93 static kmp_mutex_align_t __kmp_wait_mx;
95 kmp_uint64 __kmp_ticks_per_msec = 1000000;
96 kmp_uint64 __kmp_ticks_per_usec = 1000;
99 static void __kmp_print_cond(
char *buffer, kmp_cond_align_t *cond) {
100 KMP_SNPRINTF(buffer, 128,
"(cond (lock (%ld, %d)), (descr (%p)))",
101 cond->c_cond.__c_lock.__status, cond->c_cond.__c_lock.__spinlock,
102 cond->c_cond.__c_waiting);
106 #if ((KMP_OS_LINUX || KMP_OS_FREEBSD) && KMP_AFFINITY_SUPPORTED)
110 void __kmp_affinity_bind_thread(
int which) {
111 KMP_ASSERT2(KMP_AFFINITY_CAPABLE(),
112 "Illegal set affinity operation when not capable");
114 kmp_affin_mask_t *mask;
115 KMP_CPU_ALLOC_ON_STACK(mask);
117 KMP_CPU_SET(which, mask);
118 __kmp_set_system_affinity(mask, TRUE);
119 KMP_CPU_FREE_FROM_STACK(mask);
125 void __kmp_affinity_determine_capable(
const char *env_var) {
129 #define KMP_CPU_SET_SIZE_LIMIT (1024 * 1024)
130 #define KMP_CPU_SET_TRY_SIZE CACHE_LINE
132 #define KMP_CPU_SET_SIZE_LIMIT (sizeof(cpuset_t))
135 int verbose = __kmp_affinity.flags.verbose;
136 int warnings = __kmp_affinity.flags.warnings;
137 enum affinity_type type = __kmp_affinity.type;
142 buf = (
unsigned char *)KMP_INTERNAL_MALLOC(KMP_CPU_SET_SIZE_LIMIT);
146 gCode = syscall(__NR_sched_getaffinity, 0, KMP_CPU_SET_TRY_SIZE, buf);
147 KA_TRACE(30, (
"__kmp_affinity_determine_capable: "
148 "initial getaffinity call returned %ld errno = %d\n",
151 if (gCode < 0 && errno != EINVAL) {
154 (warnings && (type != affinity_none) && (type != affinity_default) &&
155 (type != affinity_disabled))) {
157 kmp_msg_t err_code = KMP_ERR(error);
158 __kmp_msg(kmp_ms_warning, KMP_MSG(GetAffSysCallNotSupported, env_var),
159 err_code, __kmp_msg_null);
160 if (__kmp_generate_warnings == kmp_warnings_off) {
161 __kmp_str_free(&err_code.str);
164 KMP_AFFINITY_DISABLE();
165 KMP_INTERNAL_FREE(buf);
167 }
else if (gCode > 0) {
169 KMP_AFFINITY_ENABLE(gCode);
170 KA_TRACE(10, (
"__kmp_affinity_determine_capable: "
171 "affinity supported (mask size %d)\n",
172 (
int)__kmp_affin_mask_size));
173 KMP_INTERNAL_FREE(buf);
179 KA_TRACE(30, (
"__kmp_affinity_determine_capable: "
180 "searching for proper set size\n"));
182 for (size = 1; size <= KMP_CPU_SET_SIZE_LIMIT; size *= 2) {
183 gCode = syscall(__NR_sched_getaffinity, 0, size, buf);
184 KA_TRACE(30, (
"__kmp_affinity_determine_capable: "
185 "getaffinity for mask size %ld returned %ld errno = %d\n",
186 size, gCode, errno));
189 if (errno == ENOSYS) {
191 KA_TRACE(30, (
"__kmp_affinity_determine_capable: "
192 "inconsistent OS call behavior: errno == ENOSYS for mask "
196 (warnings && (type != affinity_none) &&
197 (type != affinity_default) && (type != affinity_disabled))) {
199 kmp_msg_t err_code = KMP_ERR(error);
200 __kmp_msg(kmp_ms_warning, KMP_MSG(GetAffSysCallNotSupported, env_var),
201 err_code, __kmp_msg_null);
202 if (__kmp_generate_warnings == kmp_warnings_off) {
203 __kmp_str_free(&err_code.str);
206 KMP_AFFINITY_DISABLE();
207 KMP_INTERNAL_FREE(buf);
213 KMP_AFFINITY_ENABLE(gCode);
214 KA_TRACE(10, (
"__kmp_affinity_determine_capable: "
215 "affinity supported (mask size %d)\n",
216 (
int)__kmp_affin_mask_size));
217 KMP_INTERNAL_FREE(buf);
223 buf = (
unsigned char *)KMP_INTERNAL_MALLOC(KMP_CPU_SET_SIZE_LIMIT);
224 gCode = pthread_getaffinity_np(pthread_self(), KMP_CPU_SET_SIZE_LIMIT,
225 reinterpret_cast<cpuset_t *
>(buf));
226 KA_TRACE(30, (
"__kmp_affinity_determine_capable: "
227 "initial getaffinity call returned %d errno = %d\n",
230 KMP_AFFINITY_ENABLE(KMP_CPU_SET_SIZE_LIMIT);
231 KA_TRACE(10, (
"__kmp_affinity_determine_capable: "
232 "affinity supported (mask size %d)\n",
233 (
int)__kmp_affin_mask_size));
234 KMP_INTERNAL_FREE(buf);
238 KMP_INTERNAL_FREE(buf);
241 KMP_AFFINITY_DISABLE();
242 KA_TRACE(10, (
"__kmp_affinity_determine_capable: "
243 "cannot determine mask size - affinity not supported\n"));
244 if (verbose || (warnings && (type != affinity_none) &&
245 (type != affinity_default) && (type != affinity_disabled))) {
246 KMP_WARNING(AffCantGetMaskSize, env_var);
254 int __kmp_futex_determine_capable() {
256 long rc = syscall(__NR_futex, &loc, FUTEX_WAKE, 1, NULL, NULL, 0);
257 int retval = (rc == 0) || (errno != ENOSYS);
260 (
"__kmp_futex_determine_capable: rc = %d errno = %d\n", rc, errno));
261 KA_TRACE(10, (
"__kmp_futex_determine_capable: futex syscall%s supported\n",
262 retval ?
"" :
" not"));
269 #if (KMP_ARCH_X86 || KMP_ARCH_X86_64) && (!KMP_ASM_INTRINS)
273 kmp_int8 __kmp_test_then_or8(
volatile kmp_int8 *p, kmp_int8 d) {
274 kmp_int8 old_value, new_value;
276 old_value = TCR_1(*p);
277 new_value = old_value | d;
279 while (!KMP_COMPARE_AND_STORE_REL8(p, old_value, new_value)) {
281 old_value = TCR_1(*p);
282 new_value = old_value | d;
287 kmp_int8 __kmp_test_then_and8(
volatile kmp_int8 *p, kmp_int8 d) {
288 kmp_int8 old_value, new_value;
290 old_value = TCR_1(*p);
291 new_value = old_value & d;
293 while (!KMP_COMPARE_AND_STORE_REL8(p, old_value, new_value)) {
295 old_value = TCR_1(*p);
296 new_value = old_value & d;
301 kmp_uint32 __kmp_test_then_or32(
volatile kmp_uint32 *p, kmp_uint32 d) {
302 kmp_uint32 old_value, new_value;
304 old_value = TCR_4(*p);
305 new_value = old_value | d;
307 while (!KMP_COMPARE_AND_STORE_REL32(p, old_value, new_value)) {
309 old_value = TCR_4(*p);
310 new_value = old_value | d;
315 kmp_uint32 __kmp_test_then_and32(
volatile kmp_uint32 *p, kmp_uint32 d) {
316 kmp_uint32 old_value, new_value;
318 old_value = TCR_4(*p);
319 new_value = old_value & d;
321 while (!KMP_COMPARE_AND_STORE_REL32(p, old_value, new_value)) {
323 old_value = TCR_4(*p);
324 new_value = old_value & d;
330 kmp_int8 __kmp_test_then_add8(
volatile kmp_int8 *p, kmp_int8 d) {
331 kmp_int8 old_value, new_value;
333 old_value = TCR_1(*p);
334 new_value = old_value + d;
336 while (!KMP_COMPARE_AND_STORE_REL8(p, old_value, new_value)) {
338 old_value = TCR_1(*p);
339 new_value = old_value + d;
344 kmp_int64 __kmp_test_then_add64(
volatile kmp_int64 *p, kmp_int64 d) {
345 kmp_int64 old_value, new_value;
347 old_value = TCR_8(*p);
348 new_value = old_value + d;
350 while (!KMP_COMPARE_AND_STORE_REL64(p, old_value, new_value)) {
352 old_value = TCR_8(*p);
353 new_value = old_value + d;
359 kmp_uint64 __kmp_test_then_or64(
volatile kmp_uint64 *p, kmp_uint64 d) {
360 kmp_uint64 old_value, new_value;
362 old_value = TCR_8(*p);
363 new_value = old_value | d;
364 while (!KMP_COMPARE_AND_STORE_REL64(p, old_value, new_value)) {
366 old_value = TCR_8(*p);
367 new_value = old_value | d;
372 kmp_uint64 __kmp_test_then_and64(
volatile kmp_uint64 *p, kmp_uint64 d) {
373 kmp_uint64 old_value, new_value;
375 old_value = TCR_8(*p);
376 new_value = old_value & d;
377 while (!KMP_COMPARE_AND_STORE_REL64(p, old_value, new_value)) {
379 old_value = TCR_8(*p);
380 new_value = old_value & d;
387 void __kmp_terminate_thread(
int gtid) {
389 kmp_info_t *th = __kmp_threads[gtid];
394 #ifdef KMP_CANCEL_THREADS
395 KA_TRACE(10, (
"__kmp_terminate_thread: kill (%d)\n", gtid));
396 status = pthread_cancel(th->th.th_info.ds.ds_thread);
397 if (status != 0 && status != ESRCH) {
398 __kmp_fatal(KMP_MSG(CantTerminateWorkerThread), KMP_ERR(status),
409 static kmp_int32 __kmp_set_stack_info(
int gtid, kmp_info_t *th) {
411 #if KMP_OS_LINUX || KMP_OS_DRAGONFLY || KMP_OS_FREEBSD || KMP_OS_NETBSD || \
421 if (!KMP_UBER_GTID(gtid)) {
424 status = pthread_attr_init(&attr);
425 KMP_CHECK_SYSFAIL(
"pthread_attr_init", status);
426 #if KMP_OS_DRAGONFLY || KMP_OS_FREEBSD || KMP_OS_NETBSD
427 status = pthread_attr_get_np(pthread_self(), &attr);
428 KMP_CHECK_SYSFAIL(
"pthread_attr_get_np", status);
430 status = pthread_getattr_np(pthread_self(), &attr);
431 KMP_CHECK_SYSFAIL(
"pthread_getattr_np", status);
433 status = pthread_attr_getstack(&attr, &addr, &size);
434 KMP_CHECK_SYSFAIL(
"pthread_attr_getstack", status);
436 (
"__kmp_set_stack_info: T#%d pthread_attr_getstack returned size:"
437 " %lu, low addr: %p\n",
439 status = pthread_attr_destroy(&attr);
440 KMP_CHECK_SYSFAIL(
"pthread_attr_destroy", status);
443 if (size != 0 && addr != 0) {
445 TCW_PTR(th->th.th_info.ds.ds_stackbase, (((
char *)addr) + size));
446 TCW_PTR(th->th.th_info.ds.ds_stacksize, size);
447 TCW_4(th->th.th_info.ds.ds_stackgrow, FALSE);
453 TCW_PTR(th->th.th_info.ds.ds_stacksize, 0);
454 TCW_PTR(th->th.th_info.ds.ds_stackbase, &stack_data);
455 TCW_4(th->th.th_info.ds.ds_stackgrow, TRUE);
459 static void *__kmp_launch_worker(
void *thr) {
460 int status, old_type, old_state;
461 #ifdef KMP_BLOCK_SIGNALS
462 sigset_t new_set, old_set;
465 #if KMP_OS_LINUX || KMP_OS_DRAGONFLY || KMP_OS_FREEBSD || KMP_OS_NETBSD || \
466 KMP_OS_OPENBSD || KMP_OS_HURD
467 void *
volatile padding = 0;
471 gtid = ((kmp_info_t *)thr)->th.th_info.ds.ds_gtid;
472 __kmp_gtid_set_specific(gtid);
473 #ifdef KMP_TDATA_GTID
476 #if KMP_STATS_ENABLED
478 __kmp_stats_thread_ptr = ((kmp_info_t *)thr)->th.th_stats;
479 __kmp_stats_thread_ptr->startLife();
480 KMP_SET_THREAD_STATE(IDLE);
485 __kmp_itt_thread_name(gtid);
488 #if KMP_AFFINITY_SUPPORTED
489 __kmp_affinity_bind_init_mask(gtid);
492 #ifdef KMP_CANCEL_THREADS
493 status = pthread_setcanceltype(PTHREAD_CANCEL_ASYNCHRONOUS, &old_type);
494 KMP_CHECK_SYSFAIL(
"pthread_setcanceltype", status);
496 status = pthread_setcancelstate(PTHREAD_CANCEL_ENABLE, &old_state);
497 KMP_CHECK_SYSFAIL(
"pthread_setcancelstate", status);
500 #if KMP_ARCH_X86 || KMP_ARCH_X86_64
502 __kmp_clear_x87_fpu_status_word();
503 __kmp_load_x87_fpu_control_word(&__kmp_init_x87_fpu_control_word);
504 __kmp_load_mxcsr(&__kmp_init_mxcsr);
507 #ifdef KMP_BLOCK_SIGNALS
508 status = sigfillset(&new_set);
509 KMP_CHECK_SYSFAIL_ERRNO(
"sigfillset", status);
510 status = pthread_sigmask(SIG_BLOCK, &new_set, &old_set);
511 KMP_CHECK_SYSFAIL(
"pthread_sigmask", status);
514 #if KMP_OS_LINUX || KMP_OS_DRAGONFLY || KMP_OS_FREEBSD || KMP_OS_NETBSD || \
516 if (__kmp_stkoffset > 0 && gtid > 0) {
517 padding = KMP_ALLOCA(gtid * __kmp_stkoffset);
523 __kmp_set_stack_info(gtid, (kmp_info_t *)thr);
525 __kmp_check_stack_overlap((kmp_info_t *)thr);
527 exit_val = __kmp_launch_thread((kmp_info_t *)thr);
529 #ifdef KMP_BLOCK_SIGNALS
530 status = pthread_sigmask(SIG_SETMASK, &old_set, NULL);
531 KMP_CHECK_SYSFAIL(
"pthread_sigmask", status);
540 static void *__kmp_launch_monitor(
void *thr) {
541 int status, old_type, old_state;
542 #ifdef KMP_BLOCK_SIGNALS
545 struct timespec interval;
549 KA_TRACE(10, (
"__kmp_launch_monitor: #1 launched\n"));
552 __kmp_gtid_set_specific(KMP_GTID_MONITOR);
553 #ifdef KMP_TDATA_GTID
554 __kmp_gtid = KMP_GTID_MONITOR;
561 __kmp_itt_thread_ignore();
564 __kmp_set_stack_info(((kmp_info_t *)thr)->th.th_info.ds.ds_gtid,
567 __kmp_check_stack_overlap((kmp_info_t *)thr);
569 #ifdef KMP_CANCEL_THREADS
570 status = pthread_setcanceltype(PTHREAD_CANCEL_ASYNCHRONOUS, &old_type);
571 KMP_CHECK_SYSFAIL(
"pthread_setcanceltype", status);
573 status = pthread_setcancelstate(PTHREAD_CANCEL_ENABLE, &old_state);
574 KMP_CHECK_SYSFAIL(
"pthread_setcancelstate", status);
577 #if KMP_REAL_TIME_FIX
582 int sched = sched_getscheduler(0);
583 if (sched == SCHED_FIFO || sched == SCHED_RR) {
586 struct sched_param param;
587 int max_priority = sched_get_priority_max(sched);
589 KMP_WARNING(RealTimeSchedNotSupported);
590 sched_getparam(0, ¶m);
591 if (param.sched_priority < max_priority) {
592 param.sched_priority += 1;
593 rc = sched_setscheduler(0, sched, ¶m);
596 kmp_msg_t err_code = KMP_ERR(error);
597 __kmp_msg(kmp_ms_warning, KMP_MSG(CantChangeMonitorPriority),
598 err_code, KMP_MSG(MonitorWillStarve), __kmp_msg_null);
599 if (__kmp_generate_warnings == kmp_warnings_off) {
600 __kmp_str_free(&err_code.str);
607 __kmp_msg(kmp_ms_warning, KMP_MSG(RunningAtMaxPriority),
608 KMP_MSG(MonitorWillStarve), KMP_HNT(RunningAtMaxPriority),
613 TCW_4(__kmp_global.g.g_time.dt.t_value, 0);
619 if (__kmp_monitor_wakeups == 1) {
621 interval.tv_nsec = 0;
624 interval.tv_nsec = (KMP_NSEC_PER_SEC / __kmp_monitor_wakeups);
627 KA_TRACE(10, (
"__kmp_launch_monitor: #2 monitor\n"));
629 while (!TCR_4(__kmp_global.g.g_done)) {
635 KA_TRACE(15, (
"__kmp_launch_monitor: update\n"));
637 status = gettimeofday(&tval, NULL);
638 KMP_CHECK_SYSFAIL_ERRNO(
"gettimeofday", status);
639 TIMEVAL_TO_TIMESPEC(&tval, &now);
641 now.tv_sec += interval.tv_sec;
642 now.tv_nsec += interval.tv_nsec;
644 if (now.tv_nsec >= KMP_NSEC_PER_SEC) {
646 now.tv_nsec -= KMP_NSEC_PER_SEC;
649 status = pthread_mutex_lock(&__kmp_wait_mx.m_mutex);
650 KMP_CHECK_SYSFAIL(
"pthread_mutex_lock", status);
652 if (!TCR_4(__kmp_global.g.g_done)) {
653 status = pthread_cond_timedwait(&__kmp_wait_cv.c_cond,
654 &__kmp_wait_mx.m_mutex, &now);
656 if (status != ETIMEDOUT && status != EINTR) {
657 KMP_SYSFAIL(
"pthread_cond_timedwait", status);
661 status = pthread_mutex_unlock(&__kmp_wait_mx.m_mutex);
662 KMP_CHECK_SYSFAIL(
"pthread_mutex_unlock", status);
664 TCW_4(__kmp_global.g.g_time.dt.t_value,
665 TCR_4(__kmp_global.g.g_time.dt.t_value) + 1);
670 KA_TRACE(10, (
"__kmp_launch_monitor: #3 cleanup\n"));
672 #ifdef KMP_BLOCK_SIGNALS
673 status = sigfillset(&new_set);
674 KMP_CHECK_SYSFAIL_ERRNO(
"sigfillset", status);
675 status = pthread_sigmask(SIG_UNBLOCK, &new_set, NULL);
676 KMP_CHECK_SYSFAIL(
"pthread_sigmask", status);
679 KA_TRACE(10, (
"__kmp_launch_monitor: #4 finished\n"));
681 if (__kmp_global.g.g_abort != 0) {
687 KA_TRACE(10, (
"__kmp_launch_monitor: #5 terminate sig=%d\n",
688 __kmp_global.g.g_abort));
693 for (gtid = 1; gtid < __kmp_threads_capacity; ++gtid)
694 __kmp_terminate_thread(gtid);
698 KA_TRACE(10, (
"__kmp_launch_monitor: #6 raise sig=%d\n",
699 __kmp_global.g.g_abort));
701 if (__kmp_global.g.g_abort > 0)
702 raise(__kmp_global.g.g_abort);
705 KA_TRACE(10, (
"__kmp_launch_monitor: #7 exit\n"));
711 void __kmp_create_worker(
int gtid, kmp_info_t *th,
size_t stack_size) {
713 pthread_attr_t thread_attr;
716 th->th.th_info.ds.ds_gtid = gtid;
718 #if KMP_STATS_ENABLED
720 __kmp_acquire_tas_lock(&__kmp_stats_lock, gtid);
726 if (!KMP_UBER_GTID(gtid)) {
727 th->th.th_stats = __kmp_stats_list->push_back(gtid);
731 th->th.th_stats = __kmp_stats_thread_ptr;
733 __kmp_release_tas_lock(&__kmp_stats_lock, gtid);
737 if (KMP_UBER_GTID(gtid)) {
738 KA_TRACE(10, (
"__kmp_create_worker: uber thread (%d)\n", gtid));
739 th->th.th_info.ds.ds_thread = pthread_self();
740 __kmp_set_stack_info(gtid, th);
741 __kmp_check_stack_overlap(th);
745 KA_TRACE(10, (
"__kmp_create_worker: try to create thread (%d)\n", gtid));
749 #ifdef KMP_THREAD_ATTR
750 status = pthread_attr_init(&thread_attr);
752 __kmp_fatal(KMP_MSG(CantInitThreadAttrs), KMP_ERR(status), __kmp_msg_null);
754 status = pthread_attr_setdetachstate(&thread_attr, PTHREAD_CREATE_JOINABLE);
756 __kmp_fatal(KMP_MSG(CantSetWorkerState), KMP_ERR(status), __kmp_msg_null);
766 stack_size += gtid * __kmp_stkoffset * 2;
768 KA_TRACE(10, (
"__kmp_create_worker: T#%d, default stacksize = %lu bytes, "
769 "__kmp_stksize = %lu bytes, final stacksize = %lu bytes\n",
770 gtid, KMP_DEFAULT_STKSIZE, __kmp_stksize, stack_size));
772 #ifdef _POSIX_THREAD_ATTR_STACKSIZE
773 status = pthread_attr_setstacksize(&thread_attr, stack_size);
774 #ifdef KMP_BACKUP_STKSIZE
776 if (!__kmp_env_stksize) {
777 stack_size = KMP_BACKUP_STKSIZE + gtid * __kmp_stkoffset;
778 __kmp_stksize = KMP_BACKUP_STKSIZE;
779 KA_TRACE(10, (
"__kmp_create_worker: T#%d, default stacksize = %lu bytes, "
780 "__kmp_stksize = %lu bytes, (backup) final stacksize = %lu "
782 gtid, KMP_DEFAULT_STKSIZE, __kmp_stksize, stack_size));
783 status = pthread_attr_setstacksize(&thread_attr, stack_size);
788 __kmp_fatal(KMP_MSG(CantSetWorkerStackSize, stack_size), KMP_ERR(status),
789 KMP_HNT(ChangeWorkerStackSize), __kmp_msg_null);
796 pthread_create(&handle, &thread_attr, __kmp_launch_worker, (
void *)th);
797 if (status != 0 || !handle) {
798 #ifdef _POSIX_THREAD_ATTR_STACKSIZE
799 if (status == EINVAL) {
800 __kmp_fatal(KMP_MSG(CantSetWorkerStackSize, stack_size), KMP_ERR(status),
801 KMP_HNT(IncreaseWorkerStackSize), __kmp_msg_null);
803 if (status == ENOMEM) {
804 __kmp_fatal(KMP_MSG(CantSetWorkerStackSize, stack_size), KMP_ERR(status),
805 KMP_HNT(DecreaseWorkerStackSize), __kmp_msg_null);
808 if (status == EAGAIN) {
809 __kmp_fatal(KMP_MSG(NoResourcesForWorkerThread), KMP_ERR(status),
810 KMP_HNT(Decrease_NUM_THREADS), __kmp_msg_null);
812 KMP_SYSFAIL(
"pthread_create", status);
815 th->th.th_info.ds.ds_thread = handle;
817 #ifdef KMP_THREAD_ATTR
818 status = pthread_attr_destroy(&thread_attr);
820 kmp_msg_t err_code = KMP_ERR(status);
821 __kmp_msg(kmp_ms_warning, KMP_MSG(CantDestroyThreadAttrs), err_code,
823 if (__kmp_generate_warnings == kmp_warnings_off) {
824 __kmp_str_free(&err_code.str);
831 KA_TRACE(10, (
"__kmp_create_worker: done creating thread (%d)\n", gtid));
836 void __kmp_create_monitor(kmp_info_t *th) {
838 pthread_attr_t thread_attr;
841 int auto_adj_size = FALSE;
843 if (__kmp_dflt_blocktime == KMP_MAX_BLOCKTIME) {
845 KA_TRACE(10, (
"__kmp_create_monitor: skipping monitor thread because of "
847 th->th.th_info.ds.ds_tid = 0;
848 th->th.th_info.ds.ds_gtid = 0;
851 KA_TRACE(10, (
"__kmp_create_monitor: try to create monitor\n"));
855 th->th.th_info.ds.ds_tid = KMP_GTID_MONITOR;
856 th->th.th_info.ds.ds_gtid = KMP_GTID_MONITOR;
857 #if KMP_REAL_TIME_FIX
858 TCW_4(__kmp_global.g.g_time.dt.t_value,
861 TCW_4(__kmp_global.g.g_time.dt.t_value, 0);
864 #ifdef KMP_THREAD_ATTR
865 if (__kmp_monitor_stksize == 0) {
866 __kmp_monitor_stksize = KMP_DEFAULT_MONITOR_STKSIZE;
867 auto_adj_size = TRUE;
869 status = pthread_attr_init(&thread_attr);
871 __kmp_fatal(KMP_MSG(CantInitThreadAttrs), KMP_ERR(status), __kmp_msg_null);
873 status = pthread_attr_setdetachstate(&thread_attr, PTHREAD_CREATE_JOINABLE);
875 __kmp_fatal(KMP_MSG(CantSetMonitorState), KMP_ERR(status), __kmp_msg_null);
878 #ifdef _POSIX_THREAD_ATTR_STACKSIZE
879 status = pthread_attr_getstacksize(&thread_attr, &size);
880 KMP_CHECK_SYSFAIL(
"pthread_attr_getstacksize", status);
882 size = __kmp_sys_min_stksize;
886 if (__kmp_monitor_stksize == 0) {
887 __kmp_monitor_stksize = KMP_DEFAULT_MONITOR_STKSIZE;
889 if (__kmp_monitor_stksize < __kmp_sys_min_stksize) {
890 __kmp_monitor_stksize = __kmp_sys_min_stksize;
893 KA_TRACE(10, (
"__kmp_create_monitor: default stacksize = %lu bytes,"
894 "requested stacksize = %lu bytes\n",
895 size, __kmp_monitor_stksize));
900 #ifdef _POSIX_THREAD_ATTR_STACKSIZE
901 KA_TRACE(10, (
"__kmp_create_monitor: setting stacksize = %lu bytes,",
902 __kmp_monitor_stksize));
903 status = pthread_attr_setstacksize(&thread_attr, __kmp_monitor_stksize);
906 __kmp_monitor_stksize *= 2;
909 kmp_msg_t err_code = KMP_ERR(status);
910 __kmp_msg(kmp_ms_warning,
911 KMP_MSG(CantSetMonitorStackSize, (
long int)__kmp_monitor_stksize),
912 err_code, KMP_HNT(ChangeMonitorStackSize), __kmp_msg_null);
913 if (__kmp_generate_warnings == kmp_warnings_off) {
914 __kmp_str_free(&err_code.str);
920 pthread_create(&handle, &thread_attr, __kmp_launch_monitor, (
void *)th);
923 #ifdef _POSIX_THREAD_ATTR_STACKSIZE
924 if (status == EINVAL) {
925 if (auto_adj_size && (__kmp_monitor_stksize < (
size_t)0x40000000)) {
926 __kmp_monitor_stksize *= 2;
929 __kmp_fatal(KMP_MSG(CantSetMonitorStackSize, __kmp_monitor_stksize),
930 KMP_ERR(status), KMP_HNT(IncreaseMonitorStackSize),
933 if (status == ENOMEM) {
934 __kmp_fatal(KMP_MSG(CantSetMonitorStackSize, __kmp_monitor_stksize),
935 KMP_ERR(status), KMP_HNT(DecreaseMonitorStackSize),
939 if (status == EAGAIN) {
940 __kmp_fatal(KMP_MSG(NoResourcesForMonitorThread), KMP_ERR(status),
941 KMP_HNT(DecreaseNumberOfThreadsInUse), __kmp_msg_null);
943 KMP_SYSFAIL(
"pthread_create", status);
946 th->th.th_info.ds.ds_thread = handle;
948 #if KMP_REAL_TIME_FIX
950 KMP_DEBUG_ASSERT(
sizeof(kmp_uint32) ==
951 sizeof(__kmp_global.g.g_time.dt.t_value));
952 __kmp_wait_4((kmp_uint32
volatile *)&__kmp_global.g.g_time.dt.t_value, -1,
956 #ifdef KMP_THREAD_ATTR
957 status = pthread_attr_destroy(&thread_attr);
959 kmp_msg_t err_code = KMP_ERR(status);
960 __kmp_msg(kmp_ms_warning, KMP_MSG(CantDestroyThreadAttrs), err_code,
962 if (__kmp_generate_warnings == kmp_warnings_off) {
963 __kmp_str_free(&err_code.str);
970 KA_TRACE(10, (
"__kmp_create_monitor: monitor created %#.8lx\n",
971 th->th.th_info.ds.ds_thread));
976 void __kmp_exit_thread(
int exit_status) {
977 pthread_exit((
void *)(intptr_t)exit_status);
981 void __kmp_resume_monitor();
983 extern "C" void __kmp_reap_monitor(kmp_info_t *th) {
987 KA_TRACE(10, (
"__kmp_reap_monitor: try to reap monitor thread with handle"
989 th->th.th_info.ds.ds_thread));
994 KMP_DEBUG_ASSERT(th->th.th_info.ds.ds_tid == th->th.th_info.ds.ds_gtid);
995 if (th->th.th_info.ds.ds_gtid != KMP_GTID_MONITOR) {
996 KA_TRACE(10, (
"__kmp_reap_monitor: monitor did not start, returning\n"));
1006 status = pthread_kill(th->th.th_info.ds.ds_thread, 0);
1007 if (status != ESRCH) {
1008 __kmp_resume_monitor();
1010 KA_TRACE(10, (
"__kmp_reap_monitor: try to join with monitor\n"));
1011 status = pthread_join(th->th.th_info.ds.ds_thread, &exit_val);
1012 if (exit_val != th) {
1013 __kmp_fatal(KMP_MSG(ReapMonitorError), KMP_ERR(status), __kmp_msg_null);
1016 th->th.th_info.ds.ds_tid = KMP_GTID_DNE;
1017 th->th.th_info.ds.ds_gtid = KMP_GTID_DNE;
1019 KA_TRACE(10, (
"__kmp_reap_monitor: done reaping monitor thread with handle"
1021 th->th.th_info.ds.ds_thread));
1028 extern "C" void __kmp_reap_monitor(kmp_info_t *th) {
1033 void __kmp_reap_worker(kmp_info_t *th) {
1040 10, (
"__kmp_reap_worker: try to reap T#%d\n", th->th.th_info.ds.ds_gtid));
1042 status = pthread_join(th->th.th_info.ds.ds_thread, &exit_val);
1046 __kmp_fatal(KMP_MSG(ReapWorkerError), KMP_ERR(status), __kmp_msg_null);
1048 if (exit_val != th) {
1049 KA_TRACE(10, (
"__kmp_reap_worker: worker T#%d did not reap properly, "
1051 th->th.th_info.ds.ds_gtid, exit_val));
1057 KA_TRACE(10, (
"__kmp_reap_worker: done reaping T#%d\n",
1058 th->th.th_info.ds.ds_gtid));
1063 #if KMP_HANDLE_SIGNALS
1065 static void __kmp_null_handler(
int signo) {
1069 static void __kmp_team_handler(
int signo) {
1070 if (__kmp_global.g.g_abort == 0) {
1073 __kmp_debug_printf(
"__kmp_team_handler: caught signal = %d\n", signo);
1088 if (__kmp_debug_buf) {
1089 __kmp_dump_debug_buffer();
1091 __kmp_unregister_library();
1093 TCW_4(__kmp_global.g.g_abort, signo);
1095 TCW_4(__kmp_global.g.g_done, TRUE);
1100 __kmp_debug_printf(
"__kmp_team_handler: unknown signal type");
1107 static void __kmp_sigaction(
int signum,
const struct sigaction *act,
1108 struct sigaction *oldact) {
1109 int rc = sigaction(signum, act, oldact);
1110 KMP_CHECK_SYSFAIL_ERRNO(
"sigaction", rc);
1113 static void __kmp_install_one_handler(
int sig, sig_func_t handler_func,
1114 int parallel_init) {
1117 (
"__kmp_install_one_handler( %d, ..., %d )\n", sig, parallel_init));
1118 if (parallel_init) {
1119 struct sigaction new_action;
1120 struct sigaction old_action;
1121 new_action.sa_handler = handler_func;
1122 new_action.sa_flags = 0;
1123 sigfillset(&new_action.sa_mask);
1124 __kmp_sigaction(sig, &new_action, &old_action);
1125 if (old_action.sa_handler == __kmp_sighldrs[sig].sa_handler) {
1126 sigaddset(&__kmp_sigset, sig);
1129 __kmp_sigaction(sig, &old_action, NULL);
1133 __kmp_sigaction(sig, NULL, &__kmp_sighldrs[sig]);
1138 static void __kmp_remove_one_handler(
int sig) {
1139 KB_TRACE(60, (
"__kmp_remove_one_handler( %d )\n", sig));
1140 if (sigismember(&__kmp_sigset, sig)) {
1141 struct sigaction old;
1143 __kmp_sigaction(sig, &__kmp_sighldrs[sig], &old);
1144 if ((old.sa_handler != __kmp_team_handler) &&
1145 (old.sa_handler != __kmp_null_handler)) {
1147 KB_TRACE(10, (
"__kmp_remove_one_handler: oops, not our handler, "
1148 "restoring: sig=%d\n",
1150 __kmp_sigaction(sig, &old, NULL);
1152 sigdelset(&__kmp_sigset, sig);
1157 void __kmp_install_signals(
int parallel_init) {
1158 KB_TRACE(10, (
"__kmp_install_signals( %d )\n", parallel_init));
1159 if (__kmp_handle_signals || !parallel_init) {
1162 sigemptyset(&__kmp_sigset);
1163 __kmp_install_one_handler(SIGHUP, __kmp_team_handler, parallel_init);
1164 __kmp_install_one_handler(SIGINT, __kmp_team_handler, parallel_init);
1165 __kmp_install_one_handler(SIGQUIT, __kmp_team_handler, parallel_init);
1166 __kmp_install_one_handler(SIGILL, __kmp_team_handler, parallel_init);
1167 __kmp_install_one_handler(SIGABRT, __kmp_team_handler, parallel_init);
1168 __kmp_install_one_handler(SIGFPE, __kmp_team_handler, parallel_init);
1169 __kmp_install_one_handler(SIGBUS, __kmp_team_handler, parallel_init);
1170 __kmp_install_one_handler(SIGSEGV, __kmp_team_handler, parallel_init);
1172 __kmp_install_one_handler(SIGSYS, __kmp_team_handler, parallel_init);
1174 __kmp_install_one_handler(SIGTERM, __kmp_team_handler, parallel_init);
1176 __kmp_install_one_handler(SIGPIPE, __kmp_team_handler, parallel_init);
1181 void __kmp_remove_signals(
void) {
1183 KB_TRACE(10, (
"__kmp_remove_signals()\n"));
1184 for (sig = 1; sig < NSIG; ++sig) {
1185 __kmp_remove_one_handler(sig);
1191 void __kmp_enable(
int new_state) {
1192 #ifdef KMP_CANCEL_THREADS
1193 int status, old_state;
1194 status = pthread_setcancelstate(new_state, &old_state);
1195 KMP_CHECK_SYSFAIL(
"pthread_setcancelstate", status);
1196 KMP_DEBUG_ASSERT(old_state == PTHREAD_CANCEL_DISABLE);
1200 void __kmp_disable(
int *old_state) {
1201 #ifdef KMP_CANCEL_THREADS
1203 status = pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, old_state);
1204 KMP_CHECK_SYSFAIL(
"pthread_setcancelstate", status);
1208 static void __kmp_atfork_prepare(
void) {
1209 __kmp_acquire_bootstrap_lock(&__kmp_initz_lock);
1210 __kmp_acquire_bootstrap_lock(&__kmp_forkjoin_lock);
1213 static void __kmp_atfork_parent(
void) {
1214 __kmp_release_bootstrap_lock(&__kmp_forkjoin_lock);
1215 __kmp_release_bootstrap_lock(&__kmp_initz_lock);
1221 static void __kmp_atfork_child(
void) {
1222 __kmp_release_bootstrap_lock(&__kmp_forkjoin_lock);
1223 __kmp_release_bootstrap_lock(&__kmp_initz_lock);
1230 #if KMP_AFFINITY_SUPPORTED
1231 #if KMP_OS_LINUX || KMP_OS_FREEBSD
1234 kmp_set_thread_affinity_mask_initial();
1239 if (__kmp_nested_proc_bind.bind_types != NULL) {
1240 __kmp_nested_proc_bind.bind_types[0] = proc_bind_false;
1242 for (kmp_affinity_t *affinity : __kmp_affinities)
1243 *affinity = KMP_AFFINITY_INIT(affinity->env_var);
1244 __kmp_affin_fullMask =
nullptr;
1245 __kmp_affin_origMask =
nullptr;
1246 __kmp_topology =
nullptr;
1250 __kmp_init_monitor = 0;
1252 __kmp_init_parallel = FALSE;
1253 __kmp_init_middle = FALSE;
1254 __kmp_init_serial = FALSE;
1255 TCW_4(__kmp_init_gtid, FALSE);
1256 __kmp_init_common = FALSE;
1258 TCW_4(__kmp_init_user_locks, FALSE);
1259 #if !KMP_USE_DYNAMIC_LOCK
1260 __kmp_user_lock_table.used = 1;
1261 __kmp_user_lock_table.allocated = 0;
1262 __kmp_user_lock_table.table = NULL;
1263 __kmp_lock_blocks = NULL;
1267 TCW_4(__kmp_nth, 0);
1269 __kmp_thread_pool = NULL;
1270 __kmp_thread_pool_insert_pt = NULL;
1271 __kmp_team_pool = NULL;
1275 KA_TRACE(10, (
"__kmp_atfork_child: checking cache address list %p\n",
1276 __kmp_threadpriv_cache_list));
1278 while (__kmp_threadpriv_cache_list != NULL) {
1280 if (*__kmp_threadpriv_cache_list->addr != NULL) {
1281 KC_TRACE(50, (
"__kmp_atfork_child: zeroing cache at address %p\n",
1282 &(*__kmp_threadpriv_cache_list->addr)));
1284 *__kmp_threadpriv_cache_list->addr = NULL;
1286 __kmp_threadpriv_cache_list = __kmp_threadpriv_cache_list->next;
1289 __kmp_init_runtime = FALSE;
1292 __kmp_init_bootstrap_lock(&__kmp_initz_lock);
1293 __kmp_init_bootstrap_lock(&__kmp_stdio_lock);
1294 __kmp_init_bootstrap_lock(&__kmp_console_lock);
1295 __kmp_init_bootstrap_lock(&__kmp_task_team_lock);
1305 __kmp_need_register_serial = FALSE;
1306 __kmp_serial_initialize();
1320 void __kmp_register_atfork(
void) {
1321 if (__kmp_need_register_atfork) {
1322 int status = pthread_atfork(__kmp_atfork_prepare, __kmp_atfork_parent,
1323 __kmp_atfork_child);
1324 KMP_CHECK_SYSFAIL(
"pthread_atfork", status);
1325 __kmp_need_register_atfork = FALSE;
1329 void __kmp_suspend_initialize(
void) {
1331 status = pthread_mutexattr_init(&__kmp_suspend_mutex_attr);
1332 KMP_CHECK_SYSFAIL(
"pthread_mutexattr_init", status);
1333 status = pthread_condattr_init(&__kmp_suspend_cond_attr);
1334 KMP_CHECK_SYSFAIL(
"pthread_condattr_init", status);
1337 void __kmp_suspend_initialize_thread(kmp_info_t *th) {
1338 int old_value = KMP_ATOMIC_LD_RLX(&th->th.th_suspend_init_count);
1339 int new_value = __kmp_fork_count + 1;
1341 if (old_value == new_value)
1344 if (old_value == -1 || !__kmp_atomic_compare_store(
1345 &th->th.th_suspend_init_count, old_value, -1)) {
1346 while (KMP_ATOMIC_LD_ACQ(&th->th.th_suspend_init_count) != new_value) {
1352 status = pthread_cond_init(&th->th.th_suspend_cv.c_cond,
1353 &__kmp_suspend_cond_attr);
1354 KMP_CHECK_SYSFAIL(
"pthread_cond_init", status);
1355 status = pthread_mutex_init(&th->th.th_suspend_mx.m_mutex,
1356 &__kmp_suspend_mutex_attr);
1357 KMP_CHECK_SYSFAIL(
"pthread_mutex_init", status);
1358 KMP_ATOMIC_ST_REL(&th->th.th_suspend_init_count, new_value);
1362 void __kmp_suspend_uninitialize_thread(kmp_info_t *th) {
1363 if (KMP_ATOMIC_LD_ACQ(&th->th.th_suspend_init_count) > __kmp_fork_count) {
1368 status = pthread_cond_destroy(&th->th.th_suspend_cv.c_cond);
1369 if (status != 0 && status != EBUSY) {
1370 KMP_SYSFAIL(
"pthread_cond_destroy", status);
1372 status = pthread_mutex_destroy(&th->th.th_suspend_mx.m_mutex);
1373 if (status != 0 && status != EBUSY) {
1374 KMP_SYSFAIL(
"pthread_mutex_destroy", status);
1376 --th->th.th_suspend_init_count;
1377 KMP_DEBUG_ASSERT(KMP_ATOMIC_LD_RLX(&th->th.th_suspend_init_count) ==
1383 int __kmp_try_suspend_mx(kmp_info_t *th) {
1384 return (pthread_mutex_trylock(&th->th.th_suspend_mx.m_mutex) == 0);
1387 void __kmp_lock_suspend_mx(kmp_info_t *th) {
1388 int status = pthread_mutex_lock(&th->th.th_suspend_mx.m_mutex);
1389 KMP_CHECK_SYSFAIL(
"pthread_mutex_lock", status);
1392 void __kmp_unlock_suspend_mx(kmp_info_t *th) {
1393 int status = pthread_mutex_unlock(&th->th.th_suspend_mx.m_mutex);
1394 KMP_CHECK_SYSFAIL(
"pthread_mutex_unlock", status);
1400 static inline void __kmp_suspend_template(
int th_gtid, C *flag) {
1401 KMP_TIME_DEVELOPER_PARTITIONED_BLOCK(USER_suspend);
1402 kmp_info_t *th = __kmp_threads[th_gtid];
1404 typename C::flag_t old_spin;
1406 KF_TRACE(30, (
"__kmp_suspend_template: T#%d enter for flag = %p\n", th_gtid,
1409 __kmp_suspend_initialize_thread(th);
1411 __kmp_lock_suspend_mx(th);
1413 KF_TRACE(10, (
"__kmp_suspend_template: T#%d setting sleep bit for spin(%p)\n",
1414 th_gtid, flag->get()));
1418 old_spin = flag->set_sleeping();
1419 TCW_PTR(th->th.th_sleep_loc, (
void *)flag);
1420 th->th.th_sleep_loc_type = flag->get_type();
1421 if (__kmp_dflt_blocktime == KMP_MAX_BLOCKTIME &&
1422 __kmp_pause_status != kmp_soft_paused) {
1423 flag->unset_sleeping();
1424 TCW_PTR(th->th.th_sleep_loc, NULL);
1425 th->th.th_sleep_loc_type = flag_unset;
1426 __kmp_unlock_suspend_mx(th);
1429 KF_TRACE(5, (
"__kmp_suspend_template: T#%d set sleep bit for spin(%p)==%x,"
1431 th_gtid, flag->get(), flag->load(), old_spin));
1433 if (flag->done_check_val(old_spin) || flag->done_check()) {
1434 flag->unset_sleeping();
1435 TCW_PTR(th->th.th_sleep_loc, NULL);
1436 th->th.th_sleep_loc_type = flag_unset;
1437 KF_TRACE(5, (
"__kmp_suspend_template: T#%d false alarm, reset sleep bit "
1439 th_gtid, flag->get()));
1444 int deactivated = FALSE;
1446 while (flag->is_sleeping()) {
1447 #ifdef DEBUG_SUSPEND
1449 __kmp_suspend_count++;
1450 __kmp_print_cond(buffer, &th->th.th_suspend_cv);
1451 __kmp_printf(
"__kmp_suspend_template: suspending T#%d: %s\n", th_gtid,
1457 th->th.th_active = FALSE;
1458 if (th->th.th_active_in_pool) {
1459 th->th.th_active_in_pool = FALSE;
1460 KMP_ATOMIC_DEC(&__kmp_thread_pool_active_nth);
1461 KMP_DEBUG_ASSERT(TCR_4(__kmp_thread_pool_active_nth) >= 0);
1466 KMP_DEBUG_ASSERT(th->th.th_sleep_loc);
1467 KMP_DEBUG_ASSERT(flag->get_type() == th->th.th_sleep_loc_type);
1469 #if USE_SUSPEND_TIMEOUT
1470 struct timespec now;
1471 struct timeval tval;
1474 status = gettimeofday(&tval, NULL);
1475 KMP_CHECK_SYSFAIL_ERRNO(
"gettimeofday", status);
1476 TIMEVAL_TO_TIMESPEC(&tval, &now);
1478 msecs = (4 * __kmp_dflt_blocktime) + 200;
1479 now.tv_sec += msecs / 1000;
1480 now.tv_nsec += (msecs % 1000) * 1000;
1482 KF_TRACE(15, (
"__kmp_suspend_template: T#%d about to perform "
1483 "pthread_cond_timedwait\n",
1485 status = pthread_cond_timedwait(&th->th.th_suspend_cv.c_cond,
1486 &th->th.th_suspend_mx.m_mutex, &now);
1488 KF_TRACE(15, (
"__kmp_suspend_template: T#%d about to perform"
1489 " pthread_cond_wait\n",
1491 status = pthread_cond_wait(&th->th.th_suspend_cv.c_cond,
1492 &th->th.th_suspend_mx.m_mutex);
1495 if ((status != 0) && (status != EINTR) && (status != ETIMEDOUT)) {
1496 KMP_SYSFAIL(
"pthread_cond_wait", status);
1499 KMP_DEBUG_ASSERT(flag->get_type() == flag->get_ptr_type());
1501 if (!flag->is_sleeping() &&
1502 ((status == EINTR) || (status == ETIMEDOUT))) {
1506 flag->unset_sleeping();
1507 TCW_PTR(th->th.th_sleep_loc, NULL);
1508 th->th.th_sleep_loc_type = flag_unset;
1511 if (status == ETIMEDOUT) {
1512 if (flag->is_sleeping()) {
1514 (
"__kmp_suspend_template: T#%d timeout wakeup\n", th_gtid));
1516 KF_TRACE(2, (
"__kmp_suspend_template: T#%d timeout wakeup, sleep bit "
1519 TCW_PTR(th->th.th_sleep_loc, NULL);
1520 th->th.th_sleep_loc_type = flag_unset;
1522 }
else if (flag->is_sleeping()) {
1524 (
"__kmp_suspend_template: T#%d spurious wakeup\n", th_gtid));
1531 th->th.th_active = TRUE;
1532 if (TCR_4(th->th.th_in_pool)) {
1533 KMP_ATOMIC_INC(&__kmp_thread_pool_active_nth);
1534 th->th.th_active_in_pool = TRUE;
1540 TCW_PTR(th->th.th_sleep_loc, NULL);
1541 th->th.th_sleep_loc_type = flag_unset;
1543 KMP_DEBUG_ASSERT(!flag->is_sleeping());
1544 KMP_DEBUG_ASSERT(!th->th.th_sleep_loc);
1545 #ifdef DEBUG_SUSPEND
1548 __kmp_print_cond(buffer, &th->th.th_suspend_cv);
1549 __kmp_printf(
"__kmp_suspend_template: T#%d has awakened: %s\n", th_gtid,
1554 __kmp_unlock_suspend_mx(th);
1555 KF_TRACE(30, (
"__kmp_suspend_template: T#%d exit\n", th_gtid));
1558 template <
bool C,
bool S>
1559 void __kmp_suspend_32(
int th_gtid, kmp_flag_32<C, S> *flag) {
1560 __kmp_suspend_template(th_gtid, flag);
1562 template <
bool C,
bool S>
1563 void __kmp_suspend_64(
int th_gtid, kmp_flag_64<C, S> *flag) {
1564 __kmp_suspend_template(th_gtid, flag);
1566 template <
bool C,
bool S>
1567 void __kmp_atomic_suspend_64(
int th_gtid, kmp_atomic_flag_64<C, S> *flag) {
1568 __kmp_suspend_template(th_gtid, flag);
1570 void __kmp_suspend_oncore(
int th_gtid, kmp_flag_oncore *flag) {
1571 __kmp_suspend_template(th_gtid, flag);
1574 template void __kmp_suspend_32<false, false>(
int, kmp_flag_32<false, false> *);
1575 template void __kmp_suspend_64<false, true>(
int, kmp_flag_64<false, true> *);
1576 template void __kmp_suspend_64<true, false>(
int, kmp_flag_64<true, false> *);
1578 __kmp_atomic_suspend_64<false, true>(
int, kmp_atomic_flag_64<false, true> *);
1580 __kmp_atomic_suspend_64<true, false>(
int, kmp_atomic_flag_64<true, false> *);
1586 static inline void __kmp_resume_template(
int target_gtid, C *flag) {
1587 KMP_TIME_DEVELOPER_PARTITIONED_BLOCK(USER_resume);
1588 kmp_info_t *th = __kmp_threads[target_gtid];
1592 int gtid = TCR_4(__kmp_init_gtid) ? __kmp_get_gtid() : -1;
1595 KF_TRACE(30, (
"__kmp_resume_template: T#%d wants to wakeup T#%d enter\n",
1596 gtid, target_gtid));
1597 KMP_DEBUG_ASSERT(gtid != target_gtid);
1599 __kmp_suspend_initialize_thread(th);
1601 __kmp_lock_suspend_mx(th);
1603 if (!flag || flag != th->th.th_sleep_loc) {
1606 flag = (C *)CCAST(
void *, th->th.th_sleep_loc);
1612 KF_TRACE(5, (
"__kmp_resume_template: T#%d exiting, thread T#%d already "
1613 "awake: flag(%p)\n",
1614 gtid, target_gtid, (
void *)NULL));
1615 __kmp_unlock_suspend_mx(th);
1617 }
else if (flag->get_type() != th->th.th_sleep_loc_type) {
1622 (
"__kmp_resume_template: T#%d retrying, thread T#%d Mismatch flag(%p), "
1623 "spin(%p) type=%d ptr_type=%d\n",
1624 gtid, target_gtid, flag, flag->get(), flag->get_type(),
1625 th->th.th_sleep_loc_type));
1626 __kmp_unlock_suspend_mx(th);
1627 __kmp_null_resume_wrapper(th);
1631 if (!flag->is_sleeping()) {
1632 KF_TRACE(5, (
"__kmp_resume_template: T#%d exiting, thread T#%d already "
1633 "awake: flag(%p): %u\n",
1634 gtid, target_gtid, flag->get(), (
unsigned int)flag->load()));
1635 __kmp_unlock_suspend_mx(th);
1639 KMP_DEBUG_ASSERT(flag);
1640 flag->unset_sleeping();
1641 TCW_PTR(th->th.th_sleep_loc, NULL);
1642 th->th.th_sleep_loc_type = flag_unset;
1644 KF_TRACE(5, (
"__kmp_resume_template: T#%d about to wakeup T#%d, reset "
1645 "sleep bit for flag's loc(%p): %u\n",
1646 gtid, target_gtid, flag->get(), (
unsigned int)flag->load()));
1648 #ifdef DEBUG_SUSPEND
1651 __kmp_print_cond(buffer, &th->th.th_suspend_cv);
1652 __kmp_printf(
"__kmp_resume_template: T#%d resuming T#%d: %s\n", gtid,
1653 target_gtid, buffer);
1656 status = pthread_cond_signal(&th->th.th_suspend_cv.c_cond);
1657 KMP_CHECK_SYSFAIL(
"pthread_cond_signal", status);
1658 __kmp_unlock_suspend_mx(th);
1659 KF_TRACE(30, (
"__kmp_resume_template: T#%d exiting after signaling wake up"
1661 gtid, target_gtid));
1664 template <
bool C,
bool S>
1665 void __kmp_resume_32(
int target_gtid, kmp_flag_32<C, S> *flag) {
1666 __kmp_resume_template(target_gtid, flag);
1668 template <
bool C,
bool S>
1669 void __kmp_resume_64(
int target_gtid, kmp_flag_64<C, S> *flag) {
1670 __kmp_resume_template(target_gtid, flag);
1672 template <
bool C,
bool S>
1673 void __kmp_atomic_resume_64(
int target_gtid, kmp_atomic_flag_64<C, S> *flag) {
1674 __kmp_resume_template(target_gtid, flag);
1676 void __kmp_resume_oncore(
int target_gtid, kmp_flag_oncore *flag) {
1677 __kmp_resume_template(target_gtid, flag);
1680 template void __kmp_resume_32<false, true>(
int, kmp_flag_32<false, true> *);
1681 template void __kmp_resume_32<false, false>(
int, kmp_flag_32<false, false> *);
1682 template void __kmp_resume_64<false, true>(
int, kmp_flag_64<false, true> *);
1684 __kmp_atomic_resume_64<false, true>(
int, kmp_atomic_flag_64<false, true> *);
1687 void __kmp_resume_monitor() {
1688 KMP_TIME_DEVELOPER_PARTITIONED_BLOCK(USER_resume);
1691 int gtid = TCR_4(__kmp_init_gtid) ? __kmp_get_gtid() : -1;
1692 KF_TRACE(30, (
"__kmp_resume_monitor: T#%d wants to wakeup T#%d enter\n", gtid,
1694 KMP_DEBUG_ASSERT(gtid != KMP_GTID_MONITOR);
1696 status = pthread_mutex_lock(&__kmp_wait_mx.m_mutex);
1697 KMP_CHECK_SYSFAIL(
"pthread_mutex_lock", status);
1698 #ifdef DEBUG_SUSPEND
1701 __kmp_print_cond(buffer, &__kmp_wait_cv.c_cond);
1702 __kmp_printf(
"__kmp_resume_monitor: T#%d resuming T#%d: %s\n", gtid,
1703 KMP_GTID_MONITOR, buffer);
1706 status = pthread_cond_signal(&__kmp_wait_cv.c_cond);
1707 KMP_CHECK_SYSFAIL(
"pthread_cond_signal", status);
1708 status = pthread_mutex_unlock(&__kmp_wait_mx.m_mutex);
1709 KMP_CHECK_SYSFAIL(
"pthread_mutex_unlock", status);
1710 KF_TRACE(30, (
"__kmp_resume_monitor: T#%d exiting after signaling wake up"
1712 gtid, KMP_GTID_MONITOR));
1716 void __kmp_yield() { sched_yield(); }
1718 void __kmp_gtid_set_specific(
int gtid) {
1719 if (__kmp_init_gtid) {
1721 status = pthread_setspecific(__kmp_gtid_threadprivate_key,
1722 (
void *)(intptr_t)(gtid + 1));
1723 KMP_CHECK_SYSFAIL(
"pthread_setspecific", status);
1725 KA_TRACE(50, (
"__kmp_gtid_set_specific: runtime shutdown, returning\n"));
1729 int __kmp_gtid_get_specific() {
1731 if (!__kmp_init_gtid) {
1732 KA_TRACE(50, (
"__kmp_gtid_get_specific: runtime shutdown, returning "
1733 "KMP_GTID_SHUTDOWN\n"));
1734 return KMP_GTID_SHUTDOWN;
1736 gtid = (int)(
size_t)pthread_getspecific(__kmp_gtid_threadprivate_key);
1738 gtid = KMP_GTID_DNE;
1742 KA_TRACE(50, (
"__kmp_gtid_get_specific: key:%d gtid:%d\n",
1743 __kmp_gtid_threadprivate_key, gtid));
1747 double __kmp_read_cpu_time(
void) {
1753 return (
double)(buffer.tms_utime + buffer.tms_cutime) /
1754 (
double)CLOCKS_PER_SEC;
1757 int __kmp_read_system_info(
struct kmp_sys_info *info) {
1759 struct rusage r_usage;
1761 memset(info, 0,
sizeof(*info));
1763 status = getrusage(RUSAGE_SELF, &r_usage);
1764 KMP_CHECK_SYSFAIL_ERRNO(
"getrusage", status);
1767 info->maxrss = r_usage.ru_maxrss;
1769 info->minflt = r_usage.ru_minflt;
1771 info->majflt = r_usage.ru_majflt;
1773 info->nswap = r_usage.ru_nswap;
1775 info->inblock = r_usage.ru_inblock;
1777 info->oublock = r_usage.ru_oublock;
1779 info->nvcsw = r_usage.ru_nvcsw;
1781 info->nivcsw = r_usage.ru_nivcsw;
1783 return (status != 0);
1786 void __kmp_read_system_time(
double *delta) {
1788 struct timeval tval;
1789 struct timespec stop;
1792 status = gettimeofday(&tval, NULL);
1793 KMP_CHECK_SYSFAIL_ERRNO(
"gettimeofday", status);
1794 TIMEVAL_TO_TIMESPEC(&tval, &stop);
1795 t_ns = (double)(TS2NS(stop) - TS2NS(__kmp_sys_timer_data.start));
1796 *delta = (t_ns * 1e-9);
1799 void __kmp_clear_system_time(
void) {
1800 struct timeval tval;
1802 status = gettimeofday(&tval, NULL);
1803 KMP_CHECK_SYSFAIL_ERRNO(
"gettimeofday", status);
1804 TIMEVAL_TO_TIMESPEC(&tval, &__kmp_sys_timer_data.start);
1807 static int __kmp_get_xproc(
void) {
1813 __kmp_type_convert(sysconf(_SC_NPROCESSORS_CONF), &(r));
1815 #elif KMP_OS_DRAGONFLY || KMP_OS_FREEBSD || KMP_OS_NETBSD || KMP_OS_OPENBSD || \
1818 __kmp_type_convert(sysconf(_SC_NPROCESSORS_ONLN), &(r));
1826 host_basic_info_data_t info;
1827 mach_msg_type_number_t num = HOST_BASIC_INFO_COUNT;
1828 rc = host_info(mach_host_self(), HOST_BASIC_INFO, (host_info_t)&info, &num);
1829 if (rc == 0 && num == HOST_BASIC_INFO_COUNT) {
1832 r = info.avail_cpus;
1834 KMP_WARNING(CantGetNumAvailCPU);
1835 KMP_INFORM(AssumedNumCPU);
1840 #error "Unknown or unsupported OS."
1844 return r > 0 ? r : 2;
1848 int __kmp_read_from_file(
char const *path,
char const *format, ...) {
1852 va_start(args, format);
1853 FILE *f = fopen(path,
"rb");
1858 result = vfscanf(f, format, args);
1865 void __kmp_runtime_initialize(
void) {
1867 pthread_mutexattr_t mutex_attr;
1868 pthread_condattr_t cond_attr;
1870 if (__kmp_init_runtime) {
1874 #if (KMP_ARCH_X86 || KMP_ARCH_X86_64)
1875 if (!__kmp_cpuinfo.initialized) {
1876 __kmp_query_cpuid(&__kmp_cpuinfo);
1880 __kmp_xproc = __kmp_get_xproc();
1882 #if !KMP_32_BIT_ARCH
1886 status = getrlimit(RLIMIT_STACK, &rlim);
1888 __kmp_stksize = rlim.rlim_cur;
1889 __kmp_check_stksize(&__kmp_stksize);
1893 if (sysconf(_SC_THREADS)) {
1896 __kmp_type_convert(sysconf(_SC_THREAD_THREADS_MAX), &(__kmp_sys_max_nth));
1897 if (__kmp_sys_max_nth == -1) {
1899 __kmp_sys_max_nth = INT_MAX;
1900 }
else if (__kmp_sys_max_nth <= 1) {
1902 __kmp_sys_max_nth = KMP_MAX_NTH;
1906 __kmp_sys_min_stksize = sysconf(_SC_THREAD_STACK_MIN);
1907 if (__kmp_sys_min_stksize <= 1) {
1908 __kmp_sys_min_stksize = KMP_MIN_STKSIZE;
1913 __kmp_tls_gtid_min = KMP_TLS_GTID_MIN;
1915 status = pthread_key_create(&__kmp_gtid_threadprivate_key,
1916 __kmp_internal_end_dest);
1917 KMP_CHECK_SYSFAIL(
"pthread_key_create", status);
1918 status = pthread_mutexattr_init(&mutex_attr);
1919 KMP_CHECK_SYSFAIL(
"pthread_mutexattr_init", status);
1920 status = pthread_mutex_init(&__kmp_wait_mx.m_mutex, &mutex_attr);
1921 KMP_CHECK_SYSFAIL(
"pthread_mutex_init", status);
1922 status = pthread_mutexattr_destroy(&mutex_attr);
1923 KMP_CHECK_SYSFAIL(
"pthread_mutexattr_destroy", status);
1924 status = pthread_condattr_init(&cond_attr);
1925 KMP_CHECK_SYSFAIL(
"pthread_condattr_init", status);
1926 status = pthread_cond_init(&__kmp_wait_cv.c_cond, &cond_attr);
1927 KMP_CHECK_SYSFAIL(
"pthread_cond_init", status);
1928 status = pthread_condattr_destroy(&cond_attr);
1929 KMP_CHECK_SYSFAIL(
"pthread_condattr_destroy", status);
1931 __kmp_itt_initialize();
1934 __kmp_init_runtime = TRUE;
1937 void __kmp_runtime_destroy(
void) {
1940 if (!__kmp_init_runtime) {
1945 __kmp_itt_destroy();
1948 status = pthread_key_delete(__kmp_gtid_threadprivate_key);
1949 KMP_CHECK_SYSFAIL(
"pthread_key_delete", status);
1951 status = pthread_mutex_destroy(&__kmp_wait_mx.m_mutex);
1952 if (status != 0 && status != EBUSY) {
1953 KMP_SYSFAIL(
"pthread_mutex_destroy", status);
1955 status = pthread_cond_destroy(&__kmp_wait_cv.c_cond);
1956 if (status != 0 && status != EBUSY) {
1957 KMP_SYSFAIL(
"pthread_cond_destroy", status);
1959 #if KMP_AFFINITY_SUPPORTED
1960 __kmp_affinity_uninitialize();
1963 __kmp_init_runtime = FALSE;
1968 void __kmp_thread_sleep(
int millis) { sleep((millis + 500) / 1000); }
1971 void __kmp_elapsed(
double *t) {
1973 #ifdef FIX_SGI_CLOCK
1976 status = clock_gettime(CLOCK_PROCESS_CPUTIME_ID, &ts);
1977 KMP_CHECK_SYSFAIL_ERRNO(
"clock_gettime", status);
1979 (double)ts.tv_nsec * (1.0 / (
double)KMP_NSEC_PER_SEC) + (
double)ts.tv_sec;
1983 status = gettimeofday(&tv, NULL);
1984 KMP_CHECK_SYSFAIL_ERRNO(
"gettimeofday", status);
1986 (double)tv.tv_usec * (1.0 / (
double)KMP_USEC_PER_SEC) + (
double)tv.tv_sec;
1991 void __kmp_elapsed_tick(
double *t) { *t = 1 / (double)CLOCKS_PER_SEC; }
1994 kmp_uint64 __kmp_now_nsec() {
1996 gettimeofday(&t, NULL);
1997 kmp_uint64 nsec = (kmp_uint64)KMP_NSEC_PER_SEC * (kmp_uint64)t.tv_sec +
1998 (kmp_uint64)1000 * (kmp_uint64)t.tv_usec;
2002 #if KMP_ARCH_X86 || KMP_ARCH_X86_64
2004 void __kmp_initialize_system_tick() {
2005 kmp_uint64 now, nsec2, diff;
2006 kmp_uint64 delay = 1000000;
2007 kmp_uint64 nsec = __kmp_now_nsec();
2008 kmp_uint64 goal = __kmp_hardware_timestamp() + delay;
2009 while ((now = __kmp_hardware_timestamp()) < goal)
2011 nsec2 = __kmp_now_nsec();
2012 diff = nsec2 - nsec;
2014 double tpus = 1000.0 * (double)(delay + (now - goal)) / (
double)diff;
2016 __kmp_ticks_per_msec = (kmp_uint64)(tpus * 1000.0);
2017 __kmp_ticks_per_usec = (kmp_uint64)tpus;
2026 int __kmp_is_address_mapped(
void *addr) {
2031 #if KMP_OS_LINUX || KMP_OS_HURD
2036 char *name = __kmp_str_format(
"/proc/%d/maps", getpid());
2039 file = fopen(name,
"r");
2040 KMP_ASSERT(file != NULL);
2044 void *beginning = NULL;
2045 void *ending = NULL;
2048 rc = fscanf(file,
"%p-%p %4s %*[^\n]\n", &beginning, &ending, perms);
2052 KMP_ASSERT(rc == 3 &&
2053 KMP_STRLEN(perms) == 4);
2056 if ((addr >= beginning) && (addr < ending)) {
2058 if (strcmp(perms,
"rw") == 0) {
2068 KMP_INTERNAL_FREE(name);
2069 #elif KMP_OS_FREEBSD
2072 int mib[] = {CTL_KERN, KERN_PROC, KERN_PROC_VMMAP, getpid()};
2073 rc = sysctl(mib, 4, NULL, &lstsz, NULL, 0);
2078 lstsz = lstsz * 4 / 3;
2079 buf =
reinterpret_cast<char *
>(kmpc_malloc(lstsz));
2080 rc = sysctl(mib, 4, buf, &lstsz, NULL, 0);
2087 char *up = buf + lstsz;
2090 struct kinfo_vmentry *cur =
reinterpret_cast<struct kinfo_vmentry *
>(lw);
2091 size_t cursz = cur->kve_structsize;
2094 void *start =
reinterpret_cast<void *
>(cur->kve_start);
2095 void *end =
reinterpret_cast<void *
>(cur->kve_end);
2097 if ((addr >= start) && (addr < end)) {
2098 if ((cur->kve_protection & KVME_PROT_READ) != 0 &&
2099 (cur->kve_protection & KVME_PROT_WRITE) != 0) {
2115 rc = vm_read_overwrite(
2117 (vm_address_t)(addr),
2119 (vm_address_t)(&buffer),
2132 mib[2] = VM_PROC_MAP;
2134 mib[4] =
sizeof(
struct kinfo_vmentry);
2137 rc = sysctl(mib, __arraycount(mib), NULL, &size, NULL, 0);
2141 size = size * 4 / 3;
2142 struct kinfo_vmentry *kiv = (
struct kinfo_vmentry *)KMP_INTERNAL_MALLOC(size);
2145 rc = sysctl(mib, __arraycount(mib), kiv, &size, NULL, 0);
2149 for (
size_t i = 0; i < size; i++) {
2150 if (kiv[i].kve_start >= (uint64_t)addr &&
2151 kiv[i].kve_end <= (uint64_t)addr) {
2156 KMP_INTERNAL_FREE(kiv);
2157 #elif KMP_OS_OPENBSD
2161 mib[1] = KERN_PROC_VMMAP;
2166 rc = sysctl(mib, 3, NULL, &size, NULL, 0);
2171 struct kinfo_vmentry kiv = {.kve_start = 0};
2173 while ((rc = sysctl(mib, 3, &kiv, &size, NULL, 0)) == 0) {
2175 if (kiv.kve_end == end)
2178 if (kiv.kve_start >= (uint64_t)addr && kiv.kve_end <= (uint64_t)addr) {
2184 #elif KMP_OS_DRAGONFLY
2191 #error "Unknown or unsupported OS"
2199 #ifdef USE_LOAD_BALANCE
2201 #if KMP_OS_DARWIN || KMP_OS_NETBSD
2208 int __kmp_get_load_balance(
int max) {
2212 int res = getloadavg(averages, 3);
2217 if (__kmp_load_balance_interval < 180 && (res >= 1)) {
2218 ret_avg = (int)averages[0];
2219 }
else if ((__kmp_load_balance_interval >= 180 &&
2220 __kmp_load_balance_interval < 600) &&
2222 ret_avg = (int)averages[1];
2223 }
else if ((__kmp_load_balance_interval >= 600) && (res == 3)) {
2224 ret_avg = (int)averages[2];
2238 int __kmp_get_load_balance(
int max) {
2239 static int permanent_error = 0;
2240 static int glb_running_threads = 0;
2242 static double glb_call_time = 0;
2244 int running_threads = 0;
2246 DIR *proc_dir = NULL;
2247 struct dirent *proc_entry = NULL;
2249 kmp_str_buf_t task_path;
2250 DIR *task_dir = NULL;
2251 struct dirent *task_entry = NULL;
2252 int task_path_fixed_len;
2254 kmp_str_buf_t stat_path;
2256 int stat_path_fixed_len;
2259 int total_processes = 0;
2262 double call_time = 0.0;
2264 __kmp_str_buf_init(&task_path);
2265 __kmp_str_buf_init(&stat_path);
2267 __kmp_elapsed(&call_time);
2269 if (glb_call_time &&
2270 (call_time - glb_call_time < __kmp_load_balance_interval)) {
2271 running_threads = glb_running_threads;
2275 glb_call_time = call_time;
2278 if (permanent_error) {
2279 running_threads = -1;
2288 proc_dir = opendir(
"/proc");
2289 if (proc_dir == NULL) {
2292 running_threads = -1;
2293 permanent_error = 1;
2298 __kmp_str_buf_cat(&task_path,
"/proc/", 6);
2299 task_path_fixed_len = task_path.used;
2301 proc_entry = readdir(proc_dir);
2302 while (proc_entry != NULL) {
2305 if (proc_entry->d_type == DT_DIR && isdigit(proc_entry->d_name[0])) {
2315 KMP_DEBUG_ASSERT(total_processes != 1 ||
2316 strcmp(proc_entry->d_name,
"1") == 0);
2319 task_path.used = task_path_fixed_len;
2320 __kmp_str_buf_cat(&task_path, proc_entry->d_name,
2321 KMP_STRLEN(proc_entry->d_name));
2322 __kmp_str_buf_cat(&task_path,
"/task", 5);
2324 task_dir = opendir(task_path.str);
2325 if (task_dir == NULL) {
2334 if (strcmp(proc_entry->d_name,
"1") == 0) {
2335 running_threads = -1;
2336 permanent_error = 1;
2341 __kmp_str_buf_clear(&stat_path);
2342 __kmp_str_buf_cat(&stat_path, task_path.str, task_path.used);
2343 __kmp_str_buf_cat(&stat_path,
"/", 1);
2344 stat_path_fixed_len = stat_path.used;
2346 task_entry = readdir(task_dir);
2347 while (task_entry != NULL) {
2349 if (proc_entry->d_type == DT_DIR && isdigit(task_entry->d_name[0])) {
2356 stat_path_fixed_len;
2357 __kmp_str_buf_cat(&stat_path, task_entry->d_name,
2358 KMP_STRLEN(task_entry->d_name));
2359 __kmp_str_buf_cat(&stat_path,
"/stat", 5);
2363 stat_file = open(stat_path.str, O_RDONLY);
2364 if (stat_file == -1) {
2394 len = read(stat_file, buffer,
sizeof(buffer) - 1);
2401 char *close_parent = strstr(buffer,
") ");
2402 if (close_parent != NULL) {
2403 char state = *(close_parent + 2);
2406 if (running_threads >= max) {
2416 task_entry = readdir(task_dir);
2422 proc_entry = readdir(proc_dir);
2428 KMP_DEBUG_ASSERT(running_threads > 0);
2429 if (running_threads <= 0) {
2430 running_threads = 1;
2434 if (proc_dir != NULL) {
2437 __kmp_str_buf_free(&task_path);
2438 if (task_dir != NULL) {
2441 __kmp_str_buf_free(&stat_path);
2442 if (stat_file != -1) {
2446 glb_running_threads = running_threads;
2448 return running_threads;
2456 #if !(KMP_ARCH_X86 || KMP_ARCH_X86_64 || KMP_MIC || \
2457 ((KMP_OS_LINUX || KMP_OS_DARWIN) && KMP_ARCH_AARCH64) || \
2458 KMP_ARCH_PPC64 || KMP_ARCH_RISCV64 || KMP_ARCH_LOONGARCH64 || \
2459 KMP_ARCH_ARM || KMP_ARCH_VE)
2463 int __kmp_invoke_microtask(microtask_t pkfn,
int gtid,
int tid,
int argc,
2467 void **exit_frame_ptr
2471 *exit_frame_ptr = OMPT_GET_FRAME_ADDRESS(0);
2476 fprintf(stderr,
"Too many args to microtask: %d!\n", argc);
2480 (*pkfn)(>id, &tid);
2483 (*pkfn)(>id, &tid, p_argv[0]);
2486 (*pkfn)(>id, &tid, p_argv[0], p_argv[1]);
2489 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2]);
2492 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3]);
2495 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4]);
2498 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4],
2502 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4],
2503 p_argv[5], p_argv[6]);
2506 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4],
2507 p_argv[5], p_argv[6], p_argv[7]);
2510 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4],
2511 p_argv[5], p_argv[6], p_argv[7], p_argv[8]);
2514 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4],
2515 p_argv[5], p_argv[6], p_argv[7], p_argv[8], p_argv[9]);
2518 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4],
2519 p_argv[5], p_argv[6], p_argv[7], p_argv[8], p_argv[9], p_argv[10]);
2522 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4],
2523 p_argv[5], p_argv[6], p_argv[7], p_argv[8], p_argv[9], p_argv[10],
2527 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4],
2528 p_argv[5], p_argv[6], p_argv[7], p_argv[8], p_argv[9], p_argv[10],
2529 p_argv[11], p_argv[12]);
2532 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4],
2533 p_argv[5], p_argv[6], p_argv[7], p_argv[8], p_argv[9], p_argv[10],
2534 p_argv[11], p_argv[12], p_argv[13]);
2537 (*pkfn)(>id, &tid, p_argv[0], p_argv[1], p_argv[2], p_argv[3], p_argv[4],
2538 p_argv[5], p_argv[6], p_argv[7], p_argv[8], p_argv[9], p_argv[10],
2539 p_argv[11], p_argv[12], p_argv[13], p_argv[14]);
2552 pthread_cond_t hidden_helper_threads_initz_cond_var;
2553 pthread_mutex_t hidden_helper_threads_initz_lock;
2554 volatile int hidden_helper_initz_signaled = FALSE;
2557 pthread_cond_t hidden_helper_threads_deinitz_cond_var;
2558 pthread_mutex_t hidden_helper_threads_deinitz_lock;
2559 volatile int hidden_helper_deinitz_signaled = FALSE;
2562 pthread_cond_t hidden_helper_main_thread_cond_var;
2563 pthread_mutex_t hidden_helper_main_thread_lock;
2564 volatile int hidden_helper_main_thread_signaled = FALSE;
2569 sem_t hidden_helper_task_sem;
2572 void __kmp_hidden_helper_worker_thread_wait() {
2573 int status = sem_wait(&hidden_helper_task_sem);
2574 KMP_CHECK_SYSFAIL(
"sem_wait", status);
2577 void __kmp_do_initialize_hidden_helper_threads() {
2580 pthread_cond_init(&hidden_helper_threads_initz_cond_var,
nullptr);
2581 KMP_CHECK_SYSFAIL(
"pthread_cond_init", status);
2583 status = pthread_cond_init(&hidden_helper_threads_deinitz_cond_var,
nullptr);
2584 KMP_CHECK_SYSFAIL(
"pthread_cond_init", status);
2586 status = pthread_cond_init(&hidden_helper_main_thread_cond_var,
nullptr);
2587 KMP_CHECK_SYSFAIL(
"pthread_cond_init", status);
2589 status = pthread_mutex_init(&hidden_helper_threads_initz_lock,
nullptr);
2590 KMP_CHECK_SYSFAIL(
"pthread_mutex_init", status);
2592 status = pthread_mutex_init(&hidden_helper_threads_deinitz_lock,
nullptr);
2593 KMP_CHECK_SYSFAIL(
"pthread_mutex_init", status);
2595 status = pthread_mutex_init(&hidden_helper_main_thread_lock,
nullptr);
2596 KMP_CHECK_SYSFAIL(
"pthread_mutex_init", status);
2599 status = sem_init(&hidden_helper_task_sem, 0, 0);
2600 KMP_CHECK_SYSFAIL(
"sem_init", status);
2604 status = pthread_create(
2606 [](
void *) ->
void * {
2607 __kmp_hidden_helper_threads_initz_routine();
2611 KMP_CHECK_SYSFAIL(
"pthread_create", status);
2614 void __kmp_hidden_helper_threads_initz_wait() {
2617 int status = pthread_mutex_lock(&hidden_helper_threads_initz_lock);
2618 KMP_CHECK_SYSFAIL(
"pthread_mutex_lock", status);
2620 if (!TCR_4(hidden_helper_initz_signaled)) {
2621 status = pthread_cond_wait(&hidden_helper_threads_initz_cond_var,
2622 &hidden_helper_threads_initz_lock);
2623 KMP_CHECK_SYSFAIL(
"pthread_cond_wait", status);
2626 status = pthread_mutex_unlock(&hidden_helper_threads_initz_lock);
2627 KMP_CHECK_SYSFAIL(
"pthread_mutex_unlock", status);
2630 void __kmp_hidden_helper_initz_release() {
2632 int status = pthread_mutex_lock(&hidden_helper_threads_initz_lock);
2633 KMP_CHECK_SYSFAIL(
"pthread_mutex_lock", status);
2635 status = pthread_cond_signal(&hidden_helper_threads_initz_cond_var);
2636 KMP_CHECK_SYSFAIL(
"pthread_cond_wait", status);
2638 TCW_SYNC_4(hidden_helper_initz_signaled, TRUE);
2640 status = pthread_mutex_unlock(&hidden_helper_threads_initz_lock);
2641 KMP_CHECK_SYSFAIL(
"pthread_mutex_unlock", status);
2644 void __kmp_hidden_helper_main_thread_wait() {
2647 int status = pthread_mutex_lock(&hidden_helper_main_thread_lock);
2648 KMP_CHECK_SYSFAIL(
"pthread_mutex_lock", status);
2650 if (!TCR_4(hidden_helper_main_thread_signaled)) {
2651 status = pthread_cond_wait(&hidden_helper_main_thread_cond_var,
2652 &hidden_helper_main_thread_lock);
2653 KMP_CHECK_SYSFAIL(
"pthread_cond_wait", status);
2656 status = pthread_mutex_unlock(&hidden_helper_main_thread_lock);
2657 KMP_CHECK_SYSFAIL(
"pthread_mutex_unlock", status);
2660 void __kmp_hidden_helper_main_thread_release() {
2663 int status = pthread_mutex_lock(&hidden_helper_main_thread_lock);
2664 KMP_CHECK_SYSFAIL(
"pthread_mutex_lock", status);
2666 status = pthread_cond_signal(&hidden_helper_main_thread_cond_var);
2667 KMP_CHECK_SYSFAIL(
"pthread_cond_signal", status);
2670 TCW_SYNC_4(hidden_helper_main_thread_signaled, TRUE);
2672 status = pthread_mutex_unlock(&hidden_helper_main_thread_lock);
2673 KMP_CHECK_SYSFAIL(
"pthread_mutex_unlock", status);
2676 void __kmp_hidden_helper_worker_thread_signal() {
2677 int status = sem_post(&hidden_helper_task_sem);
2678 KMP_CHECK_SYSFAIL(
"sem_post", status);
2681 void __kmp_hidden_helper_threads_deinitz_wait() {
2684 int status = pthread_mutex_lock(&hidden_helper_threads_deinitz_lock);
2685 KMP_CHECK_SYSFAIL(
"pthread_mutex_lock", status);
2687 if (!TCR_4(hidden_helper_deinitz_signaled)) {
2688 status = pthread_cond_wait(&hidden_helper_threads_deinitz_cond_var,
2689 &hidden_helper_threads_deinitz_lock);
2690 KMP_CHECK_SYSFAIL(
"pthread_cond_wait", status);
2693 status = pthread_mutex_unlock(&hidden_helper_threads_deinitz_lock);
2694 KMP_CHECK_SYSFAIL(
"pthread_mutex_unlock", status);
2697 void __kmp_hidden_helper_threads_deinitz_release() {
2698 int status = pthread_mutex_lock(&hidden_helper_threads_deinitz_lock);
2699 KMP_CHECK_SYSFAIL(
"pthread_mutex_lock", status);
2701 status = pthread_cond_signal(&hidden_helper_threads_deinitz_cond_var);
2702 KMP_CHECK_SYSFAIL(
"pthread_cond_wait", status);
2704 TCW_SYNC_4(hidden_helper_deinitz_signaled, TRUE);
2706 status = pthread_mutex_unlock(&hidden_helper_threads_deinitz_lock);
2707 KMP_CHECK_SYSFAIL(
"pthread_mutex_unlock", status);
2710 void __kmp_hidden_helper_worker_thread_wait() {
2711 KMP_ASSERT(0 &&
"Hidden helper task is not supported on this OS");
2714 void __kmp_do_initialize_hidden_helper_threads() {
2715 KMP_ASSERT(0 &&
"Hidden helper task is not supported on this OS");
2718 void __kmp_hidden_helper_threads_initz_wait() {
2719 KMP_ASSERT(0 &&
"Hidden helper task is not supported on this OS");
2722 void __kmp_hidden_helper_initz_release() {
2723 KMP_ASSERT(0 &&
"Hidden helper task is not supported on this OS");
2726 void __kmp_hidden_helper_main_thread_wait() {
2727 KMP_ASSERT(0 &&
"Hidden helper task is not supported on this OS");
2730 void __kmp_hidden_helper_main_thread_release() {
2731 KMP_ASSERT(0 &&
"Hidden helper task is not supported on this OS");
2734 void __kmp_hidden_helper_worker_thread_signal() {
2735 KMP_ASSERT(0 &&
"Hidden helper task is not supported on this OS");
2738 void __kmp_hidden_helper_threads_deinitz_wait() {
2739 KMP_ASSERT(0 &&
"Hidden helper task is not supported on this OS");
2742 void __kmp_hidden_helper_threads_deinitz_release() {
2743 KMP_ASSERT(0 &&
"Hidden helper task is not supported on this OS");
#define KMP_INIT_PARTITIONED_TIMERS(name)
Initializes the partitioned timers to begin with name.