From nobody Sat May 11 08:56:49 2024 X-Original-To: dev-commits-src-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Vc0415ZXHz5JRtS; Sat, 11 May 2024 08:56:49 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Vc0414vyYz4NGQ; Sat, 11 May 2024 08:56:49 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1715417809; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=LmkHb8InUIBFplwoqTGrgbbg1TN3u3DmKEY+ThVc7gg=; b=QNax3MnsViAimthwP0lnWn1EDUUl7i6TqQ+pys7unNv+yhlovaEC+IErIu7L8pdbo142aW IyabSUsSQ6hTQ81R4MaxdsydNWPZRUBbsAyRHBXdA/w9DDmjJku+gbpUjUoYG0ZnYs9MiE Fn0uzA15JT3gUqie35LnieZngtR0q91UMWGCUSd6KBnCdxbhHVPBBEYe0ZlH/FqskjvsPv yWwIFD1hBBDwctK/bnKtK1oEoBS+7hQziOUy2+40bhDBohiwnLa6oY0jkiqMK5ZiywiOR2 uZBgHuIk0ntPA6yh9SzIwP8ZGVmIREWzI+olmaNDkOfcptPpg4UKic1CauuqUg== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1715417809; a=rsa-sha256; cv=none; b=egI6U6ljrv7qncBsKwPJtGKlsrT6/eip/UwKrEOBQXY5NlCQ9ytNAfRQ4iwkvnfzjG9DAc 1MMvqCIcsCrVPrMYEhhsc2PHJa/Srs4EGLINonafipKQlLS06K+v6zFu98OaDEf0ufl5Vz B9ggPjkOd0tLlYgtlewEfbt4liZI0p1IjKvR2T9UaoTRXLJLG6vJE8uGu6P062PYAYlObl r9TXmNAluWQEbTaR1jOQ50dFXATejNMXBsGF0MPy9qOvAR/PScERrxKEjEgPWpsFLNg2Jb 1w3ze4jTIcSTrM2KLCkyQ+6VR0w8sNmgo1Ix5+b0KReKhkIGzA6C9CLS40yaSw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1715417809; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=LmkHb8InUIBFplwoqTGrgbbg1TN3u3DmKEY+ThVc7gg=; b=BKEYaCUU6eWnAOiu5aw1hfeXSDfBD9C9PlZtYwkFtK+g+8JBLYHk/A7VHJ6U0SPD0vxv8B rzv+DuX0gDR4cg/T8jDb8LfijM1QAv5OBVYVH5dNw+B24ReJx7K7fCbV4NY2Pq6Wr84npE DvgtJGY67AGt9KWtVrI6DT2LXFhSZVtfYpEdFK8Kak6rFIxv+tQASsgKb5KmQhNwO+Umlv TbSaZ2x6KMnKZQbZ1Y4Ufl2284qX7oHECKjP2uUldfE3KJgY3q/m5mQd5+n2HqMoW7wU61 RYxV81Z1JF6Z6N9QTibWp8RDeddvWzaPTFGl026xyjMJC4Ne9gFws7ctlo5SgQ== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Vc0414CTDzDsM; Sat, 11 May 2024 08:56:49 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 44B8unAh063658; Sat, 11 May 2024 08:56:49 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 44B8unj0063655; Sat, 11 May 2024 08:56:49 GMT (envelope-from git) Date: Sat, 11 May 2024 08:56:49 GMT Message-Id: <202405110856.44B8unj0063655@gitrepo.freebsd.org> To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org From: Dimitry Andric Subject: git: 426e07d79164 - stable/14 - Merge commit 5300a6731e98 from llvm-project (by Jonathan Peyton): List-Id: Commit messages for all branches of the src repository List-Archive: https://lists.freebsd.org/archives/dev-commits-src-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-src-all@freebsd.org Sender: owner-dev-commits-src-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: dim X-Git-Repository: src X-Git-Refname: refs/heads/stable/14 X-Git-Reftype: branch X-Git-Commit: 426e07d791641e80e90af89d52008635a35e4794 Auto-Submitted: auto-generated The branch stable/14 has been updated by dim: URL: https://cgit.FreeBSD.org/src/commit/?id=426e07d791641e80e90af89d52008635a35e4794 commit 426e07d791641e80e90af89d52008635a35e4794 Author: Dimitry Andric AuthorDate: 2024-05-08 16:55:08 +0000 Commit: Dimitry Andric CommitDate: 2024-05-11 08:56:22 +0000 Merge commit 5300a6731e98 from llvm-project (by Jonathan Peyton): [OpenMP] Fix re-locking hang found in issue 86684 (#88539) This was initially reported here (including stacktraces): https://stackoverflow.com/questions/78183545/does-compiling-imagick-with-openmp-enabled-in-freebsd-13-2-cause-sched-yield If `__kmp_register_library_startup()` detects that another instance of the library is present, `__kmp_is_address_mapped()` is eventually called. which uses `kmpc_alloc()` to allocate memory. This function calls `__kmp_entry_thread()` to access the thread-local memory pool, which is a bad idea during initialization. This macro internally calls `__kmp_get_global_thread_id_reg()` which sets the bootstrap lock at the beginning (before calling `__kmp_register_library_startup()`). The fix is to use `KMP_INTERNAL_MALLOC()`/`KMP_INTERNAL_FREE()` instead of `kmpc_malloc()`/`kmpc_free()`. `KMP_INTERNAL_MALLOC` and `KMP_INTERNAL_FREE` do not use any bootstrap locks. They just translate to `malloc()`/`free()` and are meant to be used during library initialization before other library-specific allocators have been initialized. Fixes: #86684 This should fix OpenMP processes sometimes getting locked with 100% CPU usage, endlessly calling sched_yield(2). PR: 278845 Reported by: Cassidy B. Larson MFC after: 3 days (cherry picked from commit da15ed2e982180198f77a0fa26628e6d414cb10e) --- contrib/llvm-project/openmp/runtime/src/z_Linux_util.cpp | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/contrib/llvm-project/openmp/runtime/src/z_Linux_util.cpp b/contrib/llvm-project/openmp/runtime/src/z_Linux_util.cpp index b9ff96873702..97ddb8a608b7 100644 --- a/contrib/llvm-project/openmp/runtime/src/z_Linux_util.cpp +++ b/contrib/llvm-project/openmp/runtime/src/z_Linux_util.cpp @@ -2129,10 +2129,10 @@ int __kmp_is_address_mapped(void *addr) { // We pass from number of vm entry's semantic // to size of whole entry map list. lstsz = lstsz * 4 / 3; - buf = reinterpret_cast(kmpc_malloc(lstsz)); + buf = reinterpret_cast(KMP_INTERNAL_MALLOC(lstsz)); rc = sysctl(mib, 4, buf, &lstsz, NULL, 0); if (rc < 0) { - kmpc_free(buf); + KMP_INTERNAL_FREE(buf); return 0; } @@ -2156,7 +2156,7 @@ int __kmp_is_address_mapped(void *addr) { } lw += cursz; } - kmpc_free(buf); + KMP_INTERNAL_FREE(buf); #elif KMP_OS_DARWIN