[CFR][PATCH] Call proper signal handler from libthr for non-SA_SIGINFO case
Eygene Ryabinkin
rea at freebsd.org
Thu Nov 27 17:14:15 UTC 2014
Thu, Nov 27, 2014 at 12:14:06PM +0200, Konstantin Belousov wrote:
> On Thu, Nov 27, 2014 at 07:21:14AM +0300, Eygene Ryabinkin wrote:
> > "PROC_LOCK_ASSERT(td->td_proc, MA_OWNED);" be also present single
> > kern_sigprocmask() is called with SIGPROCMASK_PROC_LOCKED?
>
> This is what I suggested in my earlier mail. When I started looking into
> details, I decided not to do it. The reasoning is that the function
> itself touches no process state protected by the proc lock. It is
> kern_sigprocmask which works with process lock-protected data. On the
> other hand, the function works with p_sigacts, which is covered by
> ps_mtx, and I asserted it.
But sendsig_done() calls kern_sigprocmask with
(SIGPROCMASK_PROC_LOCKED | SIGPROCMASK_PS_LOCKED) thus guaranteeing
some set of locks, so its better to have some ways to support this
assertion. I understand that the current implementation of
kern_sigprocmask() will test such an assertion, but things may change
with time.
Moreover, having all asserts at the beginning of a function makes
at least myself to immediately recognise which lock(s) should be taken
before this function is to be called, so it is a kind of a documentation.
> I believe that the following patch is due. It is better way to ensure
> the invariants, instead of adding assert to postsig_done().
These are good, but, probably, you can do something like
{{{
PROC_LOCK_ASSERT(p, (flags & SIGPROCMASK_PROC_LOCKED) ? MA_OWNED : MA_NOTOWNED)
}}}
inside kern_sigprocmask to have a bit stronger assertion that covers
unlocked case.
> diff --git a/sys/kern/kern_sig.c b/sys/kern/kern_sig.c
> index 15638e0..502f334 100644
> --- a/sys/kern/kern_sig.c
> +++ b/sys/kern/kern_sig.c
> @@ -998,8 +998,12 @@ kern_sigprocmask(struct thread *td, int how, sigset_t *set, sigset_t *oset,
> int error;
>
> p = td->td_proc;
> - if (!(flags & SIGPROCMASK_PROC_LOCKED))
> + if ((flags & SIGPROCMASK_PROC_LOCKED) != 0)
> + PROC_LOCK_ASSERT(p, MA_OWNED);
> + else
> PROC_LOCK(p);
> + mtx_assert(&p->p_sigacts->ps_mtx, (flags & SIGPROCMASK_PS_LOCKED) != 0
> + ? MA_OWNED : MA_NOTOWNED);
> if (oset != NULL)
> *oset = td->td_sigmask;
>
> @@ -2510,9 +2514,11 @@ reschedule_signals(struct proc *p, sigset_t block, int flags)
> int sig;
>
> PROC_LOCK_ASSERT(p, MA_OWNED);
> + ps = p->p_sigacts;
> + mtx_assert(&ps->ps_mtx, (flags & SIGPROCMASK_PS_LOCKED) != 0 ?
> + MA_OWNED : MA_NOTOWNED);
> if (SIGISEMPTY(p->p_siglist))
> return;
> - ps = p->p_sigacts;
> SIGSETAND(block, p->p_siglist);
> while ((sig = sig_ffs(&block)) != 0) {
> SIGDELSET(block, sig);
>
And, being in the nit-picking mode, I'd apply the following patch
{{{
Index: sys/kern/kern_sig.c
===================================================================
--- sys/kern/kern_sig.c (revision 275189)
+++ sys/kern/kern_sig.c (working copy)
@@ -1043,7 +1043,7 @@
* signal, possibly waking it up.
*/
if (p->p_numthreads != 1)
- reschedule_signals(p, new_block, flags);
+ reschedule_signals(p, new_block, flags & SIGPROCMASK_PS_LOCKED);
}
out:
}}}
because reschedule_signals() is interested only in SIGPROCMASK_PS_LOCKED,
so there is no reason to pass other bits, since it may lead to some
confusion.
--
Eygene Ryabinkin ,,,^..^,,,
[ Life's unfair - but root password helps! | codelabs.ru ]
[ 82FE 06BC D497 C0DE 49EC 4FF0 16AF 9EAE 8152 ECFB | freebsd.org ]
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 343 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/freebsd-threads/attachments/20141127/c4f67846/attachment.sig>
More information about the freebsd-threads
mailing list