From owner-cvs-src@FreeBSD.ORG Mon Jul 7 05:56:29 2003 Return-Path: Delivered-To: cvs-src@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id BB59837B401; Mon, 7 Jul 2003 05:56:29 -0700 (PDT) Received: from mail.pcnet.com (mail.pcnet.com [204.213.232.4]) by mx1.FreeBSD.org (Postfix) with ESMTP id 9A7E943FCB; Mon, 7 Jul 2003 05:56:28 -0700 (PDT) (envelope-from eischen@vigrid.com) Received: from mail.pcnet.com (mail.pcnet.com [204.213.232.4]) by mail.pcnet.com (8.12.8/8.12.1) with ESMTP id h67CuPAI025291; Mon, 7 Jul 2003 08:56:25 -0400 (EDT) Date: Mon, 7 Jul 2003 08:56:25 -0400 (EDT) From: Daniel Eischen X-Sender: eischen@pcnet5.pcnet.com To: David Schultz In-Reply-To: <20030707082506.GA90638@HAL9000.homeunix.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII cc: David Xu cc: src-committers@FreeBSD.org cc: cvs-all@FreeBSD.org cc: cvs-src@FreeBSD.org Subject: Re: cvs commit: src/lib/libpthread/thread thr_attr_get_np.cthr_cancel.cthr_sigaction.c thr_sigmask.c thr_sigpending.c thr_sigsuspend.c X-BeenThere: cvs-src@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: deischen@FreeBSD.org List-Id: CVS commit messages for the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Jul 2003 12:56:30 -0000 On Mon, 7 Jul 2003, David Schultz wrote: > On Mon, Jul 07, 2003, David Xu wrote: > > > > davidxu 2003/07/06 21:28:23 PDT > > > > > > > > FreeBSD src repository > > > > > > > > Modified files: > > > > lib/libpthread/thread thr_attr_get_np.c thr_cancel.c > > > > thr_getschedparam.c thr_join.c > > > > thr_mutex_prioceiling.c thr_sigaction.c > > > > thr_sigmask.c thr_sigpending.c > > > > thr_sigsuspend.c > > > > Log: > > > > Avoid accessing user provided parameters in critical region. > > > > > > Cool. What happens if a page fault is taken in a critical region? > > > Does this merely make the KSE unusable by other threads until the > > > page is faulted in, or does it deadlock the UTS? (If the latter > > > is true, you'd need to wire a stack page or two to ensure > > > correctness, or do soemthing differently.) > > > > > > > The change is nothing to do with page fault, also page fault > > shouldn't cause deadlock. It is true the kse can not be used > > by other threads if page fault occurs while in critical region. > > For normal page fault not in critical region, kernel KSE codes > > still does not call thread_user_enter(), but I want to insert > > such call in trap.c, so when a page fault occurs, and thread > > is blocked in paging, other threads still can run in userland, > > if a user thread is in kernel mode, it is not affected. > > That's what I was talking about. If you enter the UTS upon taking > a page fault, you have to be sure that the page that faulted > didn't belong to the UTS itself, or you at least have to have some > way of breaking the loop. But since the UTS is unaware of page > faults presently, I guess this isn't a problem yet. When we're in the UTS, upcalls are blocked so a page fault in the UTS doesn't matter; that KSE will not run until the page is present. The code questioned is when we are not in the UTS but have a current thread. We block upcalls when threads are in critical regions (so the thread won't be swapped out onto a different KSE by the kernel). In those regions, we can page fault and the KSE will not run again until the page is present (just like above), but we don't want a SEGV caused by an application parameter. If we get a SEGV, the KSE will not run again (because upcalls are blocked) and the application will not get the signal. -- Dan Eischen