summaryrefslogtreecommitdiffstats
path: root/lib/libkse/thread
Commit message (Collapse)AuthorAgeFilesLines
...
* Use a generic way to back threads out of wait queues when handlingdeischen2004-12-1815-347/+410
| | | | | | | | | | | | | | | | | | | | | | | | | signals instead of having more intricate knowledge of thread state within signal handling. Simplify signal code because of above (by David Xu). Use macros for libpthread usage of pthread_cleanup_push() and pthread_cleanup_pop(). This removes some instances of malloc() and free() from the semaphore and pthread_once() implementations. When single threaded and forking(), make sure that the current thread's signal mask is inherited by the forked thread. Use private mutexes for libc and libpthread. Signals are deferred while threads hold private mutexes. This fix also breaks www/linuxpluginwrapper; a patch that fixes it is at http://people.freebsd.org/~deischen/kse/linuxpluginwrapper.diff Fix race condition in condition variables where handling a signal (pthread_kill() or kill()) may not see a wakeup (pthread_cond_signal() or pthread_cond_broadcast()). In collaboration with: davidxu
* Save cancelflags in signal frame, this fixes a problem thatdavidxu2004-11-012-0/+3
| | | | | | | a thread in pthread_cond_wait handled a signal can no longer be canceled. Reviewed by: deischen
* Make pthread_mutex_trylock(3) return EBUSY on failure, as all softwaregreen2004-10-311-8/+1
| | | | | | | | | packages expect and seems to be most correct according to the slightly- ambiguous standards. MFC after: 1 month Corroborated by: POSIX <http://tinyurl.com/4uvub> Reviewed by: silence on threads@
* Check unhandled signals before thread marks itself as DEAD,davidxu2004-10-231-1/+14
| | | | | this reduces chances of signal losting problem found by Peter Holm <peter@holm.cc>
* 1. Move thread list flags into new separate member, and atomicallydavidxu2004-10-235-24/+45
| | | | | | | | | | | put DEAD thread on GC list, this closes a race between pthread_join and thr_cleanup. 2. Introduce a mutex to protect tcb initialization, tls allocation and deallocation code in rtld seems no lock protection or it is broken, under stress testing, memory is corrupted. Reviewed by: deischen patch partly provided by: deischen
* Decrease reference count if we won't use the thread, this avoids memorydavidxu2004-10-211-0/+4
| | | | leak under some cases.
* if system scope thread didn't set timeout, don't call clock_gettime syscalldavidxu2004-10-081-8/+9
| | | | | | before and after sleeping. Reviewed by: deischen
* Use PTHREAD_SCOPE_SYSTEM to decide what should be done.davidxu2004-10-071-3/+2
|
* Follow kernel change, restore signal mask correctly by using a commanddavidxu2004-10-071-21/+17
| | | | of kse_thr_interrupt.
* Allocate red zone and stack space together and then split red zone fromdavidxu2004-10-061-7/+17
| | | | | allocated space, orignal code left red zone unallocated, but those space can be allocated by user code, and result was providing no protection.
* Add a wrapper for execve(). The exec'd process must be started withdeischen2004-09-262-0/+69
| | | | | | | | | | | | | | the signal mask and pending signals of the calling thread. These are stored in userland in libpthread. There is a small race condition in this patch which could cause problems if a signal arrives after setting the (kernel) signal mask and before exec'ing. The thread's set of pending signals also are not yet installed in the exec'd process. Both of these will be corrected with the addition of a special syscall. Reported & Tested by: Joost Bekkers <joost at jodocus dot org> Reviewed by: julian, davidxu
* Make sure we don't call _thr_start_sig_daemon() when SYSTEM_SCOPE_ONLY is ↵ssouhlal2004-09-241-2/+3
| | | | | | defined. This makes libpthread usable on powerpc. Approved by: grehan (mentor), deischen
* Pull debug symbols in for statically linked binary.davidxu2004-08-211-0/+4
| | | | Reviewed by: desichen
* 1. Add macro DTV_OFFSET to calculate dtv offset in tcb.davidxu2004-08-161-0/+1
| | | | 2. Export symbols needed by debugger.
* Add a file to collection all symbols will be needed by debugger.davidxu2004-08-161-0/+60
|
* Add TLS support for i386 and amd64.dfr2004-08-151-1/+1
|
* As long as we have a knob to force system scope threads, why not havedeischen2004-08-124-8/+13
| | | | | | | | | | | | | a knob to force process scope threads. If the environment variable LIBPTHREAD_PROCESS_SCOPE is set, force all threads to be process scope threads regardless of how the application creates them. If LIBPTHREAD_SYSTEM_SCOPE is set (forcing system scope threads), it overrides LIBPTHREAD_PROCESS_SCOPE. $ # To force system scope threads $ LIBPTHREAD_SYSTEM_SCOPE=anything threaded_app $ # To force process scope threads $ LIBPTHREAD_PROCESS_SCOPE=anything threaded_app
* Check debugger suspending flag for system scope thread.davidxu2004-08-081-3/+7
| | | | Reviewed by: deischen
* Add a way to force 1:1 mode for libpthread. To do this, definedeischen2004-08-075-42/+41
| | | | | | | | | | | LIBPTHREAD_SYSTEM_SCOPE in the environment. You can still force libpthread to be built in strictly 1:1 by adding -DSYSTEM_SCOPE_ONLY to CFLAGS. This is kept for archs that don't yet support M:N mode. Requested by: rwatson Reviewed by: davidxu
* s/TMDF_DONOTRUNUSER/TMDF_SUSPEND/gdavidxu2004-08-033-4/+4
| | | | Dicussed with: deischen
* Don't include lock.h and pthread_md.h when we're being included bymarcel2004-07-181-0/+2
| | | | libthread_db. Both headers are included seperately.
* Remove unused symbols.davidxu2004-07-131-14/+0
|
* Let debugger check signal, make SIGINFO works.davidxu2004-07-131-12/+25
|
* If _libkse_debug is not zero, activate thread mode.davidxu2004-07-131-0/+6
|
* Add code to support thread debugging.davidxu2004-07-135-44/+146
| | | | | | | | | | | | | | | 1. Add global varible _libkse_debug, debugger uses the varible to identify libpthread. when the varible is written to non-zero by debugger, libpthread will take some special action at context switch time, it will check TMDF_DOTRUNUSER flags, if a thread has the flags set by debugger, it won't be scheduled, when a thread leaves KSE critical region, thread checks the flag, if it was set, the thread relinquish CPU. 2. Add pq_first_debug to select a thread allowd to run by debugger. 3. Some names prefixed with _thr are renamed to _thread prefix. which is allowed to run by debugger.
* Check pending signals, if there is signal will be unblocked bydavidxu2004-06-124-22/+25
| | | | | | | | | | | | | | | | | | sigsuspend, thread shouldn't wait, in old code, it may be ignored. When a signal handler is invoked in sigsuspend, thread gets two different signal masks, one is in thread structure, sigprocmask() can retrieve it, another is in ucontext which is a third parameter of signal handler, the former is the result of sigsuspend mask ORed with sigaction's sa_mask and current signal, the later is the mask in thread structure before sigsuspend is called. After signal handler is called, the mask in ucontext should be copied into thread structure, and becomes CURRENT signal mask, then sigsuspend returns to user code. Reviewed by: deischen Tested by: Sean McNeil <sean@mcneil.com>
* After forking and initializing the library to single-threadeddeischen2004-04-081-2/+3
| | | | | | | | | | mode (where the forked thread is the one and only thread and is marked as system scope), set the system scope flag before initializing the signal mask. This prevents trying to use internal locks that haven't yet been initialized. Reported by: Dan Nelson <dnelson at allantgroup.com> Reviewed by: davidxu
* Fix a POSIX conformance bug. POSIX says sigwait should return error numberdavidxu2004-03-171-3/+3
| | | | in return value not in errno.
* Fixed a misspelling of 0 as NULL.bde2004-03-141-1/+1
|
* style cleanup: Remove duplicate $FreeBSD$ tags.cperciva2004-02-101-2/+0
| | | | | | | | These files had tags after the copyright notice, inside the comment block (incorrect, removed), and outside the comment block (correct). Approved by: rwatson (mentor)
* Add cancellation point to sem_wait() and sem_timedwait() for pshareddeischen2004-02-061-10/+18
| | | | | | | | semaphores. Also add cancellation cleanup handlers to keep semaphores in a consistent state. Submitted in part by: davidxu Reviewed by: davidxu
* Provide a userland version of non-pshared semaphores and add cancellationdeischen2004-02-032-169/+153
| | | | points to sem_wait() and sem_timedwait(). Also make sem_post signal-safe.
* Return EPERM if mutex owner is not current thread but it tries todavidxu2004-01-171-18/+3
| | | | | | unlock the mutex, old code confuses some programs when it returns EINVAL. Noticed by: bland
* Add a simple work-around for deadlocking on recursive read locksdeischen2004-01-083-48/+86
| | | | | | | | | | on a rwlock while there are writers waiting. We normally favor writers but when a reader already has at least one other read lock, we favor the reader. We don't track all the rwlocks owned by a thread, nor all the threads that own a rwlock -- we just keep a count of all the read locks owned by a thread. PR: 24641
* Kernel now supports per-thread sigaltstack, follow the change todavidxu2004-01-031-6/+1
| | | | enable sigaltstack for scope system thread.
* Return error code in errno, not in return value.davidxu2004-01-021-3/+6
|
* Fix a typo.davidxu2004-01-021-1/+1
|
* Forgot to commit this file for last commit. :(davidxu2003-12-291-0/+4
|
* Implement sigaltstack() as per-threaded. Current only scope process threaddavidxu2003-12-294-24/+231
| | | | | | | | is supported, for scope system process, kernel signal bits need to be changed. Reviewed by: deischen Tested on : i386 amd64 ia64
* Correctly retrieve sigaction flags.davidxu2003-12-281-2/+2
|
* Replace a comment with more accurated one, memory heap is now protected bydavidxu2003-12-191-3/+2
| | | | new fork() wrapper.
* Code clean up, remove unused MACROS and function prototypes.davidxu2003-12-191-18/+0
|
* accept() returns a file descriptor when it succeeds which is verydeischen2003-12-092-2/+2
| | | | | | | | | likely to be non-zero. When leaving the cancellation point, check the return value against -1 to see if cancellation should be checked. While I'm here, make the same change to connect() just to be consisitent. Pointed out by: davidxu
* Remove an unused struct definition.deischen2003-12-091-12/+0
|
* Add cancellation points for accept() and connect().deischen2003-12-094-0/+102
|
* Use mutex instead of low level thread lock to implement spinlock, thisdavidxu2003-12-091-30/+18
| | | | avoids signal to be blocked when otherwise it can be handled.
* Rename _thr_enter_cancellation_point to _thr_cancel_enter, renamedavidxu2003-12-0930-136/+148
| | | | | | | | | | | | | | | | | | | | | _thr_leave_cancellation_point to _thr_cancel_leave, add a parameter to _thr_cancel_leave to indicate whether cancellation point should be checked, this gives us an option to not check cancallation point if a syscall successfully returns to avoid any leaks, current I have creat(), open() and fcntl(F_DUPFD) to not check cancellation point after they sucessfully returned. Replace some members in structure kse with bit flags to same some memory. Conditionally compile THR_ASSERT to nothing if _PTHREAD_INVARIANTS is not defined. Inline some small functions in thr_cancel.c. Use __predict_false in thr_kern.c for some executed only once code. Reviewd by: deischen
* More reliably check timeout for pthread_mutex_timedlock.davidxu2003-12-091-1/+1
|
* Go back to using rev 1.18 where thread locks are used instead of KSEdeischen2003-12-081-17/+16
| | | | | | | locks for [libc] spinlock implementation. This was previously backed out because it exposed a bug in ia64 implementation. OK'd by: marcel
* 1.Macro optimizing KSE_LOCK_ACQUIRE and THR_LOCK_ACQUIRE to use static falldavidxu2003-11-292-99/+31
| | | | | | | | | | | | | | through branch predict as suggested in INTEL IA32 optimization guide. 2.Allocate siginfo arrary separately to avoid pthread to be allocated at 2K boundary, which hits L1 address alias problem and causes context switch to be slow down. 3.Simplify context switch code by removing redundant code, code size is reduced, so it is expected to run faster. Reviewed by: deischen Approved by: re (scottl)
OpenPOWER on IntegriCloud