[CFR][PATCH] Call proper signal handler from libthr for non-SA_SIGINFO case
Konstantin Belousov
kostikbel at gmail.com
Fri Nov 28 10:13:19 UTC 2014
On Thu, Nov 27, 2014 at 08:14:09PM +0300, Eygene Ryabinkin wrote:
> Thu, Nov 27, 2014 at 12:14:06PM +0200, Konstantin Belousov wrote:
> > On Thu, Nov 27, 2014 at 07:21:14AM +0300, Eygene Ryabinkin wrote:
> > > "PROC_LOCK_ASSERT(td->td_proc, MA_OWNED);" be also present single
> > > kern_sigprocmask() is called with SIGPROCMASK_PROC_LOCKED?
> >
> > This is what I suggested in my earlier mail. When I started looking into
> > details, I decided not to do it. The reasoning is that the function
> > itself touches no process state protected by the proc lock. It is
> > kern_sigprocmask which works with process lock-protected data. On the
> > other hand, the function works with p_sigacts, which is covered by
> > ps_mtx, and I asserted it.
>
> But sendsig_done() calls kern_sigprocmask with
> (SIGPROCMASK_PROC_LOCKED | SIGPROCMASK_PS_LOCKED) thus guaranteeing
> some set of locks, so its better to have some ways to support this
> assertion. I understand that the current implementation of
> kern_sigprocmask() will test such an assertion, but things may change
> with time.
kern_sigprocmask (will) assert this on its own. (will == after the patch
is committed, which I am going to do right now).
>
> Moreover, having all asserts at the beginning of a function makes
> at least myself to immediately recognise which lock(s) should be taken
> before this function is to be called, so it is a kind of a documentation.
>
> > I believe that the following patch is due. It is better way to ensure
> > the invariants, instead of adding assert to postsig_done().
>
> These are good, but, probably, you can do something like
> {{{
> PROC_LOCK_ASSERT(p, (flags & SIGPROCMASK_PROC_LOCKED) ? MA_OWNED : MA_NOTOWNED)
> }}}
> inside kern_sigprocmask to have a bit stronger assertion that covers
> unlocked case.
This is not needed. The process lock is not recursive, so the mere call
to acquire the lock triggers the assertion on recursive acquire.
>
> > diff --git a/sys/kern/kern_sig.c b/sys/kern/kern_sig.c
> > index 15638e0..502f334 100644
> > --- a/sys/kern/kern_sig.c
> > +++ b/sys/kern/kern_sig.c
> > @@ -998,8 +998,12 @@ kern_sigprocmask(struct thread *td, int how, sigset_t *set, sigset_t *oset,
> > int error;
> >
> > p = td->td_proc;
> > - if (!(flags & SIGPROCMASK_PROC_LOCKED))
> > + if ((flags & SIGPROCMASK_PROC_LOCKED) != 0)
> > + PROC_LOCK_ASSERT(p, MA_OWNED);
> > + else
> > PROC_LOCK(p);
> > + mtx_assert(&p->p_sigacts->ps_mtx, (flags & SIGPROCMASK_PS_LOCKED) != 0
> > + ? MA_OWNED : MA_NOTOWNED);
> > if (oset != NULL)
> > *oset = td->td_sigmask;
> >
> > @@ -2510,9 +2514,11 @@ reschedule_signals(struct proc *p, sigset_t block, int flags)
> > int sig;
> >
> > PROC_LOCK_ASSERT(p, MA_OWNED);
> > + ps = p->p_sigacts;
> > + mtx_assert(&ps->ps_mtx, (flags & SIGPROCMASK_PS_LOCKED) != 0 ?
> > + MA_OWNED : MA_NOTOWNED);
> > if (SIGISEMPTY(p->p_siglist))
> > return;
> > - ps = p->p_sigacts;
> > SIGSETAND(block, p->p_siglist);
> > while ((sig = sig_ffs(&block)) != 0) {
> > SIGDELSET(block, sig);
> >
>
> And, being in the nit-picking mode, I'd apply the following patch
> {{{
> Index: sys/kern/kern_sig.c
> ===================================================================
> --- sys/kern/kern_sig.c (revision 275189)
> +++ sys/kern/kern_sig.c (working copy)
> @@ -1043,7 +1043,7 @@
> * signal, possibly waking it up.
> */
> if (p->p_numthreads != 1)
> - reschedule_signals(p, new_block, flags);
> + reschedule_signals(p, new_block, flags & SIGPROCMASK_PS_LOCKED);
> }
>
> out:
> }}}
> because reschedule_signals() is interested only in SIGPROCMASK_PS_LOCKED,
> so there is no reason to pass other bits, since it may lead to some
> confusion.
I disagree, I wrote reschedule_signals() to take the same set of flags as
kern_sigprocmask().
More information about the freebsd-threads
mailing list