Commit Graph

1489 Commits

Author SHA1 Message Date
a37452430f simplify and optimize FILE lock handling 2011-03-24 23:16:52 -04:00
d8dc2faf10 prepare pthread_spin_unlock for archs that need memory barriers 2011-03-24 23:06:48 -04:00
b8b85a4272 optimize contended case for pthread_spin_trylock 2011-03-24 23:06:08 -04:00
c322fe4e1a optimize spinlock spin 2011-03-24 23:05:17 -04:00
8ae2fa6563 fix non-atomicity of puts 2011-03-24 22:58:21 -04:00
b470030f83 overhaul cancellation to fix resource leaks and dangerous behavior with signals
this commit addresses two issues:

1. a race condition, whereby a cancellation request occurring after a
syscall returned from kernelspace but before the subsequent
CANCELPT_END would cause cancellable resource-allocating syscalls
(like open) to leak resources.

2. signal handlers invoked while the thread was blocked at a
cancellation point behaved as if asynchronous cancellation mode wer in
effect, resulting in potentially dangerous state corruption if a
cancellation request occurs.

the glibc/nptl implementation of threads shares both of these issues.

with this commit, both are fixed. however, cancellation points
encountered in a signal handler will not be acted upon if the signal
was received while the thread was already at a cancellation point.
they will of course be acted upon after the signal handler returns, so
in real-world usage where signal handlers quickly return, it should
not be a problem. it's possible to solve this problem too by having
sigaction() wrap all signal handlers with a function that uses a
pthread_cleanup handler to catch cancellation, patch up the saved
context, and return into the cancellable function that will catch and
act upon the cancellation. however that would be a lot of complexity
for minimal if any benefit...
2011-03-24 14:18:00 -04:00
0958200166 very cheap double-free checks in malloc 2011-03-23 13:24:00 -04:00
aa398f56fa global cleanup to use the new syscall interface 2011-03-20 00:16:43 -04:00
be82e122bf if returning errno value directly from a syscall, we need to negate it. 2011-03-19 23:18:34 -04:00
685e40bb09 syscall overhaul part two - unify public and internal syscall interface
with this patch, the syscallN() functions are no longer needed; a
variadic syscall() macro allows syscalls with anywhere from 0 to 6
arguments to be made with a single macro name. also, manually casting
each non-integer argument with (long) is no longer necessary; the
casts are hidden in the macros.

some source files which depended on being able to define the old macro
SYSCALL_RETURNS_ERRNO have been modified to directly use __syscall()
instead of syscall(). references to SYSCALL_SIGSET_SIZE and SYSCALL_LL
have also been changed.

x86_64 has not been tested, and may need a follow-up commit to fix any
minor bugs/oversights.
2011-03-19 21:36:10 -04:00
462dbfc207 remove comment cruft that got left behind in x86_64 syscall.s 2011-03-19 19:05:43 -04:00
d00ff2950e overhaul syscall interface
this commit shuffles around the location of syscall definitions so
that we can make a syscall() library function with both SYS_* and
__NR_* style syscall names available to user applications, provides
the syscall() library function, and optimizes the code that performs
the actual inline syscalls in the library itself.

previously on i386 when built as PIC (shared library), syscalls were
incurring bus lock (lock prefix) overhead at entry and exit, due to
the way the ebx register was being loaded (xchg instruction with a
memory operand). now the xchg takes place between two registers.

further cleanup to arch/$(ARCH)/syscall.h is planned.
2011-03-19 18:51:42 -04:00
f5ba2bc9ca various legacy and linux-specific stuff
this commit is part of an effort to make more of busybox work
out-of-the-box.
2011-03-18 21:52:26 -04:00
e18b563821 implement [v]swprintf 2011-03-18 09:19:09 -04:00
c35bb6645f implement wprintf family of functions
this implementation is extremely ugly and inefficient, but it avoids a
good deal of code duplication and bloat. it may be cleaned up later to
eliminate the remaining code duplication and some of the warts, but i
don't really care about its performance.

note that swprintf is not yet implemented.
2011-03-17 22:55:43 -04:00
a012aa879f fix broken wmemchr (unbounded search) 2011-03-17 22:38:45 -04:00
047e434ef5 implement robust mutexes
some of this code should be cleaned up, e.g. using macros for some of
the bit flags, masks, etc. nonetheless, the code is believed to be
working and correct at this point.
2011-03-17 20:41:37 -04:00
18c7ea8055 avoid function call to pthread_self in mutex unlock
if the mutex was previously locked, we can assume pthread_self was
already called at the time of locking, and thus that the thread
pointer is initialized.
2011-03-17 13:35:08 -04:00
93cc986ab3 reorder mutex struct fields to make room for pointers (upcoming robust mutexes)
the layout has been chosen so that pointer slots 3 and 4 fit between
the integer slots on 32-bit archs, and come after the integer slots on
64-bit archs.
2011-03-17 13:17:15 -04:00
b1c43161c2 unify lock and owner fields of mutex structure
this change is necessary to free up one slot in the mutex structure so
that we can use doubly-linked lists in the implementation of robust
mutexes.
2011-03-17 12:21:32 -04:00
e914f8b7ec optimize contended normal mutex case; add int compare-and-swap atomic 2011-03-17 12:14:40 -04:00
1d59f1eddb simplify logic, slightly optimize contended case for non-default mutex types 2011-03-16 16:49:42 -04:00
d4f9e0b364 correct error returns for error-checking mutexes 2011-03-16 16:25:00 -04:00
29fae65780 cut out a syscall on thread creation in the case where guard size is 0 2011-03-16 11:36:21 -04:00
cc832d8a31 don't expose EAGAIN, etc. from timed futex wait to caller 2011-03-16 11:35:46 -04:00
4d9cc0b399 optimize file locking: avoid cache-polluting writes to global storage 2011-03-16 10:39:45 -04:00
9dd7d7e3f6 partially-written draft of fmemopen, still in #if 0 2011-03-14 11:49:55 -04:00
eff62b8a96 misplaced & in times() made it fail to work, and clobber the stack 2011-03-12 22:53:17 -05:00
5eb0d33ec0 implement flockfile api, rework stdio locking 2011-03-12 21:55:45 -05:00
243b542382 implement dummy pthread_attr_[gs]etschedparam functions
for some reason these functions are not shaded by the PS/TPS option in
POSIX, so presumably they are mandatory, even though the functionality
they offer is optional. for now, provide them in case any programs
depend on their existence, but disallow any priority except the
default.
2011-03-11 09:51:54 -05:00
1659aa0e62 fix pthread_attr_* implementations to match corrected prototypes 2011-03-11 09:51:14 -05:00
682a0f271f fix failure behavior of sem_open when sem does not exist 2011-03-10 22:05:16 -05:00
cfe581b6bc fix some semaphore wait semantics (race condition deadlock and error checking) 2011-03-10 21:52:18 -05:00
81af503610 fix sem_open and sem_close to obey posix semantics
multiple opens of the same named semaphore must return the same
pointer, and only the last close can unmap it. thus the ugly global
state keeping track of mappings. the maximum number of distinct named
semaphores that can be opened is limited sufficiently small that the
linear searches take trivial time, especially compared to the syscall
overhead of these functions.
2011-03-10 21:34:19 -05:00
5fcebcde6a optimize pthread termination in the non-detached case
we can avoid blocking signals by simply using a flag to mark that the
thread has exited and prevent it from getting counted in the rsyscall
signal-pingpong. this restores the original pthread create/join
throughput from before the sigprocmask call was added.
2011-03-10 18:31:37 -05:00
dc54a7cbb9 fix errors in sigqueue (potential information leak, wrong behavior)
1. any padding in the siginfo struct was not necessarily zero-filled,
so it might have contained private data off the caller's stack.

2. the uid and pid must be filled in from userspace. the previous
rsyscall fix broke rsyscalls because the values were always incorrect.
2011-03-10 18:26:29 -05:00
52213f7341 security fix: check that cancel/rsyscall signal was sent by the process itself 2011-03-10 11:59:39 -05:00
11dbbe9fba more cancellation points: tcdrain, clock_nanosleep 2011-03-10 11:06:50 -05:00
c8c4ef7d44 remove useless return value checks for functions that cannot fail 2011-03-10 11:02:29 -05:00
0f8cc94d68 make sigsuspend a cancellation point 2011-03-10 11:01:11 -05:00
5b9429adb7 make sigtimedwait a cancellation point 2011-03-10 10:59:50 -05:00
0a949ebdf0 don't fail with EINTR in sigtimedwait
POSIX allows either behavior, but sigwait is not allowed to fail with
EINTR, so the retry loop would have to be in one or the other anyway.
2011-03-10 10:43:09 -05:00
0558683d3d fix sigsuspend syscall 2011-03-10 10:26:16 -05:00
6871fd773d make sigaltstack work (missing macros in signal.h, error conditions) 2011-03-10 10:17:29 -05:00
1b538acb0a fix errno behavior in clock_* functions
these functions are specified inconsistent in whether they're
specified to return an error value, or return -1 and set errno.
hopefully now they all match what POSIX requires.
2011-03-10 09:54:23 -05:00
500c969f05 fix error handling for pthread_sigmask
it must return errno, not -1, and should reject invalud values for how.
2011-03-09 20:31:06 -05:00
3f5420bcda make fork properly initialize the main thread in the child process 2011-03-09 20:23:44 -05:00
6dc05fbe19 optimize pthread initialization
the set_tid_address returns the tid (which is also the pid when called
from the initial thread) so there is no need to make a separate
syscall to get pid/tid.
2011-03-09 20:21:23 -05:00
0bed7e0acf fix race condition in raise - just mask signals
a signal handler could fork after the pid/tid were read, causing the
wrong process to be signalled. i'm not sure if this is supposed to
have UB or not, but raise is async-signal-safe, so it probably is
allowed. the current solution is slightly expensive so this
implementation is likely to be changed in the future.
2011-03-09 20:07:24 -05:00
370f78f2c8 fix raise semantics with threads. 2011-03-09 19:42:06 -05:00