diff options
author | jhb <jhb@FreeBSD.org> | 2002-10-15 00:14:32 +0000 |
---|---|---|
committer | jhb <jhb@FreeBSD.org> | 2002-10-15 00:14:32 +0000 |
commit | e1100fc10b0a417512cfccfdb275c15700c398ec (patch) | |
tree | d9e7f15a07b01e094393816a21e214800c2bec47 /sys/kern/kern_fork.c | |
parent | db8a406c24025647789a4d21484a3b79c09714f9 (diff) | |
download | FreeBSD-src-e1100fc10b0a417512cfccfdb275c15700c398ec.zip FreeBSD-src-e1100fc10b0a417512cfccfdb275c15700c398ec.tar.gz |
- Add a new global mutex 'ppeers_lock' to protect the p_peers list of
processes forked with RFTHREAD.
- Use a goto to a label for common code when exiting from fork1() in case
of an error.
- Move the RFTHREAD linkage setup code later in fork since the ppeers_lock
cannot be locked while holding a proc lock. Handle the race of a task
leader exiting and killing its peers while a peer is forking a new child.
In that case, go ahead and let the peer process proceed normally as the
parent is about to kill it. However, the task leader may have already
gone to sleep to wait for the peers to die, so the new child process may
not receive a SIGKILL from the task leader. Rather than try to destruct
the new child process, just go ahead and send it a SIGKILL directly and
add it to the p_peers list. This ensures that the task leader will wait
until both the peer process doing the fork() and the new child process
have received their KILL signals and exited.
Discussed with: truckman (earlier versions)
Diffstat (limited to 'sys/kern/kern_fork.c')
-rw-r--r-- | sys/kern/kern_fork.c | 88 |
1 files changed, 50 insertions, 38 deletions
diff --git a/sys/kern/kern_fork.c b/sys/kern/kern_fork.c index 9c2169a..1efb908 100644 --- a/sys/kern/kern_fork.c +++ b/sys/kern/kern_fork.c @@ -236,6 +236,7 @@ fork1(td, flags, pages, procp) struct ksegrp *kg2; struct sigacts *newsigacts; struct procsig *newprocsig; + int error; GIANT_REQUIRED; @@ -319,16 +320,10 @@ fork1(td, flags, pages, procp) sx_xlock(&allproc_lock); uid = td->td_ucred->cr_ruid; if ((nprocs >= maxproc - 10 && uid != 0) || nprocs >= maxproc) { - sx_xunlock(&allproc_lock); - uma_zfree(proc_zone, newproc); - if (p1->p_flag & P_KSES) { - PROC_LOCK(p1); - thread_single_end(); - PROC_UNLOCK(p1); - } - tsleep(&forksleep, PUSER, "fork", hz / 2); - return (EAGAIN); + error = EAGAIN; + goto fail; } + /* * Increment the count of procs running with this uid. Don't allow * a nonprivileged user to exceed their current limit. @@ -338,15 +333,8 @@ fork1(td, flags, pages, procp) (uid != 0) ? p1->p_rlimit[RLIMIT_NPROC].rlim_cur : 0); PROC_UNLOCK(p1); if (!ok) { - sx_xunlock(&allproc_lock); - uma_zfree(proc_zone, newproc); - if (p1->p_flag & P_KSES) { - PROC_LOCK(p1); - thread_single_end(); - PROC_UNLOCK(p1); - } - tsleep(&forksleep, PUSER, "fork", hz / 2); - return (EAGAIN); + error = EAGAIN; + goto fail; } /* @@ -526,26 +514,6 @@ again: p2->p_ucred = crhold(td->td_ucred); td2->td_ucred = crhold(p2->p_ucred); /* XXXKSE */ - /* - * Setup linkage for kernel based threading - */ - if((flags & RFTHREAD) != 0) { - /* - * XXX: This assumes a leader is a parent or grandparent of - * all processes in a task. - */ - if (p1->p_leader != p1) - PROC_LOCK(p1->p_leader); - p2->p_peers = p1->p_peers; - p1->p_peers = p2; - p2->p_leader = p1->p_leader; - if (p1->p_leader != p1) - PROC_UNLOCK(p1->p_leader); - } else { - p2->p_peers = NULL; - p2->p_leader = p2; - } - pargs_hold(p2->p_args); if (flags & RFSIGSHARE) { @@ -595,6 +563,40 @@ again: p2->p_limit->p_refcnt++; } + /* + * Setup linkage for kernel based threading + */ + if((flags & RFTHREAD) != 0) { + mtx_lock(&ppeers_lock); + p2->p_peers = p1->p_peers; + p1->p_peers = p2; + p2->p_leader = p1->p_leader; + mtx_unlock(&ppeers_lock); + PROC_LOCK(p1->p_leader); + if ((p1->p_leader->p_flag & P_WEXIT) != 0) { + PROC_UNLOCK(p1->p_leader); + /* + * The task leader is exiting, so process p1 is + * going to be killed shortly. Since p1 obviously + * isn't dead yet, we know that the leader is either + * sending SIGKILL's to all the processes in this + * task or is sleeping waiting for all the peers to + * exit. We let p1 complete the fork, but we need + * to go ahead and kill the new process p2 since + * the task leader may not get a chance to send + * SIGKILL to it. We leave it on the list so that + * the task leader will wait for this new process + * to commit suicide. + */ + PROC_LOCK(p2); + psignal(p2, SIGKILL); + PROC_UNLOCK(p2); + } + } else { + p2->p_peers = NULL; + p2->p_leader = p2; + } + sx_xlock(&proctree_lock); PGRP_LOCK(p1->p_pgrp); PROC_LOCK(p2); @@ -752,6 +754,16 @@ again: */ *procp = p2; return (0); +fail: + sx_xunlock(&allproc_lock); + uma_zfree(proc_zone, newproc); + if (p1->p_flag & P_KSES) { + PROC_LOCK(p1); + thread_single_end(); + PROC_UNLOCK(p1); + } + tsleep(&forksleep, PUSER, "fork", hz / 2); + return (error); } /* |