source: libcfa/src/concurrency/preemption.cfa @ 4b30e8cc

ADTarm-ehast-experimentalenumforall-pointer-decayjacob/cs343-translationnew-ast-unique-exprpthread-emulationqualifiedEnum
Last change on this file since 4b30e8cc was 4b30e8cc, checked in by Colby Alexander Parsons <caparsons@…>, 3 years ago

added callback support

  • Property mode set to 100644
File size: 17.4 KB
RevLine 
[c81ebf9]1//
2// Cforall Version 1.0.0 Copyright (C) 2016 University of Waterloo
3//
4// The contents of this file are covered under the licence agreement in the
5// file "LICENCE" distributed with Cforall.
6//
7// signal.c --
8//
9// Author           : Thierry Delisle
10// Created On       : Mon Jun 5 14:20:42 2017
[6b0b624]11// Last Modified By : Peter A. Buhr
[e9b49379]12// Last Modified On : Wed Aug 26 16:46:03 2020
13// Update Count     : 53
[c81ebf9]14//
15
[2026bb6]16#define __cforall_thread__
17
[73abe95]18#include "preemption.hfa"
[a83ffa4]19#include <assert.h>
[c81ebf9]20
[82ff5845]21#include <errno.h>
22#include <stdio.h>
23#include <string.h>
24#include <unistd.h>
[27f5f71]25#include <limits.h>                                                                             // PTHREAD_STACK_MIN
[c81ebf9]26
[73abe95]27#include "bits/signal.hfa"
[e660761]28#include "kernel_private.hfa"
[82ff5845]29
[d8548e2]30#if !defined(__CFA_DEFAULT_PREEMPTION__)
[2a84d06d]31#define __CFA_DEFAULT_PREEMPTION__ 10`ms
[d8548e2]32#endif
[c81ebf9]33
[2a84d06d]34Duration default_preemption() __attribute__((weak)) {
[c81ebf9]35        return __CFA_DEFAULT_PREEMPTION__;
36}
37
[969b3fe]38// FwdDeclarations : timeout handlers
[c81ebf9]39static void preempt( processor   * this );
[9b1dcc2]40static void timeout( struct __processor_id_t * id, $thread * this );
[c81ebf9]41
[969b3fe]42// FwdDeclarations : Signal handlers
[c29c342]43static void sigHandler_ctxSwitch( __CFA_SIGPARMS__ );
[c59a346]44static void sigHandler_alarm    ( __CFA_SIGPARMS__ );
[c29c342]45static void sigHandler_segv     ( __CFA_SIGPARMS__ );
46static void sigHandler_ill      ( __CFA_SIGPARMS__ );
47static void sigHandler_fpe      ( __CFA_SIGPARMS__ );
48static void sigHandler_abort    ( __CFA_SIGPARMS__ );
[82ff5845]49
[969b3fe]50// FwdDeclarations : alarm thread main
[c29c342]51static void * alarm_loop( __attribute__((unused)) void * args );
[969b3fe]52
53// Machine specific register name
[381fdee]54#if   defined( __i386 )
[b2b44d8]55#define CFA_REG_IP gregs[REG_EIP]
[381fdee]56#elif defined( __x86_64 )
57#define CFA_REG_IP gregs[REG_RIP]
[e9b49379]58#elif defined( __arm__ )
59#define CFA_REG_IP arm_pc
60#elif defined( __aarch64__ )
[482fa08]61#define CFA_REG_IP pc
[381fdee]62#else
[e9b49379]63#error unsupported hardware architecture
[cd17862]64#endif
65
[969b3fe]66KERNEL_STORAGE(event_kernel_t, event_kernel);         // private storage for event kernel
67event_kernel_t * event_kernel;                        // kernel public handle to even kernel
68static pthread_t alarm_thread;                        // pthread handle to alarm thread
[09d4b22]69static void * alarm_stack;                                                        // pthread stack for alarm thread
[969b3fe]70
[c29c342]71static void ?{}(event_kernel_t & this) with( this ) {
[65deb18]72        alarms{};
73        lock{};
[969b3fe]74}
[82ff5845]75
[4dad189]76enum {
77        PREEMPT_NORMAL    = 0,
78        PREEMPT_TERMINATE = 1,
79};
80
[c81ebf9]81//=============================================================================================
82// Kernel Preemption logic
83//=============================================================================================
84
[969b3fe]85// Get next expired node
[2a84d06d]86static inline alarm_node_t * get_expired( alarm_list_t * alarms, Time currtime ) {
[d3ab183]87        if( ! & (*alarms)`first ) return 0p;                                            // If no alarms return null
88        if( (*alarms)`first.alarm >= currtime ) return 0p;      // If alarms head not expired return null
[27f5f71]89        return pop(alarms);                                                                     // Otherwise just pop head
[969b3fe]90}
91
92// Tick one frame of the Discrete Event Simulation for alarms
[9b1dcc2]93static void tick_preemption( struct __processor_id_t * id ) {
[27f5f71]94        alarm_node_t * node = 0p;                                                       // Used in the while loop but cannot be declared in the while condition
95        alarm_list_t * alarms = &event_kernel->alarms;          // Local copy for ease of reading
96        Time currtime = __kernel_get_time();                            // Check current time once so everything "happens at once"
[8cb529e]97
[969b3fe]98        //Loop throught every thing expired
99        while( node = get_expired( alarms, currtime ) ) {
[b1a4300]100                // __cfaabi_dbg_print_buffer_decl( " KERNEL: preemption tick.\n" );
[185efe6]101                Duration period = node->period;
102                if( period == 0) {
103                        node->set = false;                  // Node is one-shot, just mark it as not pending
104                }
[1c273d0]105
[969b3fe]106                // Check if this is a kernel
[4b30e8cc]107                if( node->type == Kernel ) {
[c81ebf9]108                        preempt( node->proc );
109                }
[4b30e8cc]110                else if( node->type == User ) {
[9b1dcc2]111                        timeout( id, node->thrd );
[c81ebf9]112                }
[4b30e8cc]113                else {
114                        bool unpark_thd = node->callback(*node);
115                        if (unpark_thd) timeout( id, node->thrd );
116                }
[c81ebf9]117
[969b3fe]118                // Check if this is a periodic alarm
[8cb529e]119                if( period > 0 ) {
[b1a4300]120                        // __cfaabi_dbg_print_buffer_local( " KERNEL: alarm period is %lu.\n", period.tv );
[969b3fe]121                        node->alarm = currtime + period;    // Alarm is periodic, add currtime to it (used cached current time)
122                        insert( alarms, node );             // Reinsert the node for the next time it triggers
[c81ebf9]123                }
124        }
125
[969b3fe]126        // If there are still alarms pending, reset the timer
[d3ab183]127        if( & (*alarms)`first ) {
[6a490b2]128                __cfadbg_print_buffer_decl(preemption, " KERNEL: @%ju(%ju) resetting alarm to %ju.\n", currtime.tv, __kernel_get_time().tv, (alarms->head->alarm - currtime).tv);
[d3ab183]129                Duration delta = (*alarms)`first.alarm - currtime;
130                Duration capped = max(delta, 50`us);
[b1a4300]131                // itimerval tim  = { caped };
132                // __cfaabi_dbg_print_buffer_local( "    Values are %lu, %lu, %lu %lu.\n", delta.tv, caped.tv, tim.it_value.tv_sec, tim.it_value.tv_usec);
133
[d3ab183]134                __kernel_set_timer( capped );
[b1a4300]135        }
[c81ebf9]136}
137
[969b3fe]138// Update the preemption of a processor and notify interested parties
[2a84d06d]139void update_preemption( processor * this, Duration duration ) {
[c81ebf9]140        alarm_node_t * alarm = this->preemption_alarm;
141
142        // Alarms need to be enabled
[2a84d06d]143        if ( duration > 0 && ! alarm->set ) {
[c81ebf9]144                alarm->alarm = __kernel_get_time() + duration;
145                alarm->period = duration;
146                register_self( alarm );
147        }
[8ad6533]148        // Zero duration but alarm is set
[c81ebf9]149        else if ( duration == 0 && alarm->set ) {
150                unregister_self( alarm );
151                alarm->alarm = 0;
152                alarm->period = 0;
153        }
154        // If alarm is different from previous, change it
155        else if ( duration > 0 && alarm->period != duration ) {
156                unregister_self( alarm );
157                alarm->alarm = __kernel_get_time() + duration;
158                alarm->period = duration;
159                register_self( alarm );
160        }
161}
162
163//=============================================================================================
[cd17862]164// Kernel Signal Tools
[c81ebf9]165//=============================================================================================
166
[36982fc]167__cfaabi_dbg_debug_do( static thread_local void * last_interrupt = 0; )
[b227f68]168
[82ff5845]169extern "C" {
[969b3fe]170        // Disable interrupts by incrementing the counter
[82ff5845]171        void disable_interrupts() {
[afd550c]172                with( kernelTLS.preemption_state ) {
[1f81d61]173                        #if GCC_VERSION > 50000
[13073be]174                        static_assert(__atomic_always_lock_free(sizeof(enabled), &enabled), "Must be lock-free");
[1f81d61]175                        #endif
[13073be]176
177                        // Set enabled flag to false
178                        // should be atomic to avoid preemption in the middle of the operation.
179                        // use memory order RELAXED since there is no inter-thread on this variable requirements
180                        __atomic_store_n(&enabled, false, __ATOMIC_RELAXED);
181
182                        // Signal the compiler that a fence is needed but only for signal handlers
183                        __atomic_signal_fence(__ATOMIC_ACQUIRE);
184
[de6319f]185                        __attribute__((unused)) unsigned short new_val = disable_count + 1;
186                        disable_count = new_val;
187                        verify( new_val < 65_000u );              // If this triggers someone is disabling interrupts without enabling them
188                }
[82ff5845]189        }
190
[969b3fe]191        // Enable interrupts by decrementing the counter
[c7a900a]192        // If counter reaches 0, execute any pending __cfactx_switch
[36982fc]193        void enable_interrupts( __cfaabi_dbg_ctx_param ) {
[13073be]194                processor   * proc = kernelTLS.this_processor; // Cache the processor now since interrupts can start happening after the atomic store
[8e9e9a2]195                /* paranoid */ verify( proc );
[969b3fe]196
[afd550c]197                with( kernelTLS.preemption_state ){
[de6319f]198                        unsigned short prev = disable_count;
199                        disable_count -= 1;
200                        verify( prev != 0u );                     // If this triggers someone is enabled already enabled interruptsverify( prev != 0u );
201
202                        // Check if we need to prempt the thread because an interrupt was missed
203                        if( prev == 1 ) {
[1f81d61]204                                #if GCC_VERSION > 50000
[13073be]205                                static_assert(__atomic_always_lock_free(sizeof(enabled), &enabled), "Must be lock-free");
[1f81d61]206                                #endif
[13073be]207
208                                // Set enabled flag to true
209                                // should be atomic to avoid preemption in the middle of the operation.
210                                // use memory order RELAXED since there is no inter-thread on this variable requirements
211                                __atomic_store_n(&enabled, true, __ATOMIC_RELAXED);
212
213                                // Signal the compiler that a fence is needed but only for signal handlers
214                                __atomic_signal_fence(__ATOMIC_RELEASE);
[de6319f]215                                if( proc->pending_preemption ) {
216                                        proc->pending_preemption = false;
[3381ed7]217                                        force_yield( __POLL_PREEMPTION );
[de6319f]218                                }
[d0a045c7]219                        }
[82ff5845]220                }
[4e6fb8e]221
[969b3fe]222                // For debugging purposes : keep track of the last person to enable the interrupts
[36982fc]223                __cfaabi_dbg_debug_do( proc->last_enable = caller; )
[82ff5845]224        }
[969b3fe]225
226        // Disable interrupts by incrementint the counter
[c7a900a]227        // Don't execute any pending __cfactx_switch even if counter reaches 0
[969b3fe]228        void enable_interrupts_noPoll() {
[afd550c]229                unsigned short prev = kernelTLS.preemption_state.disable_count;
230                kernelTLS.preemption_state.disable_count -= 1;
[2e9aed4]231                verifyf( prev != 0u, "Incremented from %u\n", prev );                     // If this triggers someone is enabled already enabled interrupts
[d0a045c7]232                if( prev == 1 ) {
[1f81d61]233                        #if GCC_VERSION > 50000
[13073be]234                        static_assert(__atomic_always_lock_free(sizeof(kernelTLS.preemption_state.enabled), &kernelTLS.preemption_state.enabled), "Must be lock-free");
[1f81d61]235                        #endif
[13073be]236                        // Set enabled flag to true
237                        // should be atomic to avoid preemption in the middle of the operation.
238                        // use memory order RELAXED since there is no inter-thread on this variable requirements
239                        __atomic_store_n(&kernelTLS.preemption_state.enabled, true, __ATOMIC_RELAXED);
240
241                        // Signal the compiler that a fence is needed but only for signal handlers
242                        __atomic_signal_fence(__ATOMIC_RELEASE);
[d0a045c7]243                }
[969b3fe]244        }
[82ff5845]245}
246
[969b3fe]247// sigprocmask wrapper : unblock a single signal
[1c273d0]248static inline void signal_unblock( int sig ) {
[82ff5845]249        sigset_t mask;
250        sigemptyset( &mask );
[1c273d0]251        sigaddset( &mask, sig );
[82ff5845]252
[27f5f71]253        if ( pthread_sigmask( SIG_UNBLOCK, &mask, 0p ) == -1 ) {
[169d944]254            abort( "internal error, pthread_sigmask" );
[cd17862]255        }
[82ff5845]256}
257
[969b3fe]258// sigprocmask wrapper : block a single signal
[cd17862]259static inline void signal_block( int sig ) {
260        sigset_t mask;
261        sigemptyset( &mask );
262        sigaddset( &mask, sig );
[47ecf2b]263
[27f5f71]264        if ( pthread_sigmask( SIG_BLOCK, &mask, 0p ) == -1 ) {
[c59a346]265                abort( "internal error, pthread_sigmask" );
[cd17862]266        }
267}
[47ecf2b]268
[969b3fe]269// kill wrapper : signal a processor
[cd17862]270static void preempt( processor * this ) {
[4dad189]271        sigval_t value = { PREEMPT_NORMAL };
272        pthread_sigqueue( this->kernel_thread, SIGUSR1, value );
273}
274
[969b3fe]275// reserved for future use
[9b1dcc2]276static void timeout( struct __processor_id_t * id, $thread * this ) {
[8834751]277        #if !defined( __CFA_NO_STATISTICS__ )
278                kernelTLS.this_stats = this->curr_cluster->stats;
279        #endif
[e235429]280        __unpark( id, this );
[cd17862]281}
282
[14a61b5]283// KERNEL ONLY
[c7a900a]284// Check if a __cfactx_switch signal handler shoud defer
[969b3fe]285// If true  : preemption is safe
286// If false : preemption is unsafe and marked as pending
287static inline bool preemption_ready() {
[14a61b5]288        // Check if preemption is safe
289        bool ready = kernelTLS.preemption_state.enabled && ! kernelTLS.preemption_state.in_progress;
290
291        // Adjust the pending flag accordingly
292        kernelTLS.this_processor->pending_preemption = !ready;
[969b3fe]293        return ready;
294}
295
[cd17862]296//=============================================================================================
297// Kernel Signal Startup/Shutdown logic
298//=============================================================================================
299
[969b3fe]300// Startup routine to activate preemption
301// Called from kernel_startup
[e660761]302void __kernel_alarm_startup() {
[169d944]303        __cfaabi_dbg_print_safe( "Kernel : Starting preemption\n" );
[969b3fe]304
305        // Start with preemption disabled until ready
[14a61b5]306        kernelTLS.preemption_state.enabled = false;
307        kernelTLS.preemption_state.disable_count = 1;
[969b3fe]308
309        // Initialize the event kernel
310        event_kernel = (event_kernel_t *)&storage_event_kernel;
[9236060]311        (*event_kernel){};
[969b3fe]312
313        // Setup proper signal handlers
[c7a900a]314        __cfaabi_sigaction( SIGUSR1, sigHandler_ctxSwitch, SA_SIGINFO | SA_RESTART ); // __cfactx_switch handler
[c59a346]315        __cfaabi_sigaction( SIGALRM, sigHandler_alarm    , SA_SIGINFO | SA_RESTART ); // debug handler
[cd17862]316
317        signal_block( SIGALRM );
318
[8c50aed]319        alarm_stack = __create_pthread( &alarm_thread, alarm_loop, 0p );
[cd17862]320}
321
[969b3fe]322// Shutdown routine to deactivate preemption
323// Called from kernel_shutdown
[e660761]324void __kernel_alarm_shutdown() {
[169d944]325        __cfaabi_dbg_print_safe( "Kernel : Preemption stopping\n" );
[d6ff3ff]326
[969b3fe]327        // Block all signals since we are already shutting down
[cd17862]328        sigset_t mask;
329        sigfillset( &mask );
[27f5f71]330        sigprocmask( SIG_BLOCK, &mask, 0p );
[cd17862]331
[969b3fe]332        // Notify the alarm thread of the shutdown
[a0b3e32]333        sigval val = { 1 };
334        pthread_sigqueue( alarm_thread, SIGALRM, val );
[969b3fe]335
336        // Wait for the preemption thread to finish
[27f5f71]337
338        pthread_join( alarm_thread, 0p );
[09d4b22]339        free( alarm_stack );
[969b3fe]340
341        // Preemption is now fully stopped
342
[169d944]343        __cfaabi_dbg_print_safe( "Kernel : Preemption stopped\n" );
[cd17862]344}
345
[969b3fe]346// Raii ctor/dtor for the preemption_scope
347// Used by thread to control when they want to receive preemption signals
[242a902]348void ?{}( preemption_scope & this, processor * proc ) {
[2a84d06d]349        (this.alarm){ proc, (Time){ 0 }, 0`s };
[242a902]350        this.proc = proc;
351        this.proc->preemption_alarm = &this.alarm;
[969b3fe]352
[d8548e2]353        update_preemption( this.proc, this.proc->cltr->preemption_rate );
[cd17862]354}
355
[242a902]356void ^?{}( preemption_scope & this ) {
[cd17862]357        disable_interrupts();
358
[2a84d06d]359        update_preemption( this.proc, 0`s );
[cd17862]360}
361
362//=============================================================================================
363// Kernel Signal Handlers
364//=============================================================================================
[47ecf2b]365
[969b3fe]366// Context switch signal handler
367// Receives SIGUSR1 signal and causes the current thread to yield
[c29c342]368static void sigHandler_ctxSwitch( __CFA_SIGPARMS__ ) {
[b2b44d8]369        __cfaabi_dbg_debug_do( last_interrupt = (void *)(cxt->uc_mcontext.CFA_REG_IP); )
[969b3fe]370
[4dad189]371        // SKULLDUGGERY: if a thread creates a processor and the immediately deletes it,
372        // the interrupt that is supposed to force the kernel thread to preempt might arrive
[482fa08]373        // before the kernel thread has even started running. When that happens, an interrupt
[97cba9f]374        // with a null 'this_processor' will be caught, just ignore it.
[14a61b5]375        if(! kernelTLS.this_processor ) return;
[4dad189]376
377        choose(sfp->si_value.sival_int) {
378                case PREEMPT_NORMAL   : ;// Normal case, nothing to do here
[ea8b2f7]379                case PREEMPT_TERMINATE: verify( __atomic_load_n( &kernelTLS.this_processor->do_terminate, __ATOMIC_SEQ_CST ) );
[4dad189]380                default:
[ff878b7]381                        abort( "internal error, signal value is %d", sfp->si_value.sival_int );
[4dad189]382        }
383
[b2b44d8]384        // Check if it is safe to preempt here
[969b3fe]385        if( !preemption_ready() ) { return; }
386
[b1a4300]387        __cfaabi_dbg_print_buffer_decl( " KERNEL: preempting core %p (%p @ %p).\n", kernelTLS.this_processor, kernelTLS.this_thread, (void *)(cxt->uc_mcontext.CFA_REG_IP) );
[14a61b5]388
389        // Sync flag : prevent recursive calls to the signal handler
390        kernelTLS.preemption_state.in_progress = true;
391
[a83ffa4]392        // Clear sighandler mask before context switching.
[1f81d61]393        #if GCC_VERSION > 50000
[a83ffa4]394        static_assert( sizeof( sigset_t ) == sizeof( cxt->uc_sigmask ), "Expected cxt->uc_sigmask to be of sigset_t" );
[1f81d61]395        #endif
[27f5f71]396        if ( pthread_sigmask( SIG_SETMASK, (sigset_t *)&(cxt->uc_sigmask), 0p ) == -1 ) {
[a83ffa4]397                abort( "internal error, sigprocmask" );
398        }
[05615ba]399
[14a61b5]400        // TODO: this should go in finish action
401        // Clear the in progress flag
402        kernelTLS.preemption_state.in_progress = false;
[969b3fe]403
404        // Preemption can occur here
405
[c7a900a]406        force_yield( __ALARM_PREEMPTION ); // Do the actual __cfactx_switch
[c81ebf9]407}
408
[c59a346]409static void sigHandler_alarm( __CFA_SIGPARMS__ ) {
410        abort("SIGALRM should never reach the signal handler");
[c81ebf9]411}
412
[969b3fe]413// Main of the alarm thread
414// Waits on SIGALRM and send SIGUSR1 to whom ever needs it
[c29c342]415static void * alarm_loop( __attribute__((unused)) void * args ) {
[9b1dcc2]416        __processor_id_t id;
[58d64a4]417        id.full_proc = false;
[9b1dcc2]418        id.id = doregister(&id);
419
[969b3fe]420        // Block sigalrms to control when they arrive
[cd17862]421        sigset_t mask;
[ade5272]422        sigfillset(&mask);
[27f5f71]423        if ( pthread_sigmask( SIG_BLOCK, &mask, 0p ) == -1 ) {
[169d944]424            abort( "internal error, pthread_sigmask" );
[82ff5845]425        }
[c81ebf9]426
[ade5272]427        sigemptyset( &mask );
428        sigaddset( &mask, SIGALRM );
429
[969b3fe]430        // Main loop
[cd17862]431        while( true ) {
[969b3fe]432                // Wait for a sigalrm
[a0b3e32]433                siginfo_t info;
434                int sig = sigwaitinfo( &mask, &info );
[969b3fe]435
[e2f7bc3]436                if( sig < 0 ) {
437                        //Error!
438                        int err = errno;
439                        switch( err ) {
440                                case EAGAIN :
441                                case EINTR :
[b1a4300]442                                        {__cfaabi_dbg_print_buffer_decl( " KERNEL: Spurious wakeup %d.\n", err );}
[e2f7bc3]443                                        continue;
[27f5f71]444                                case EINVAL :
[169d944]445                                        abort( "Timeout was invalid." );
[e2f7bc3]446                                default:
[169d944]447                                        abort( "Unhandled error %d", err);
[e2f7bc3]448                        }
449                }
450
[969b3fe]451                // If another signal arrived something went wrong
[8cb529e]452                assertf(sig == SIGALRM, "Kernel Internal Error, sigwait: Unexpected signal %d (%d : %d)\n", sig, info.si_code, info.si_value.sival_int);
453
[169d944]454                // __cfaabi_dbg_print_safe( "Kernel : Caught alarm from %d with %d\n", info.si_code, info.si_value.sival_int );
[969b3fe]455                // Switch on the code (a.k.a. the sender) to
[8cb529e]456                switch( info.si_code )
[a0b3e32]457                {
[969b3fe]458                // Timers can apparently be marked as sent for the kernel
459                // In either case, tick preemption
[8cb529e]460                case SI_TIMER:
461                case SI_KERNEL:
[169d944]462                        // __cfaabi_dbg_print_safe( "Kernel : Preemption thread tick\n" );
[36982fc]463                        lock( event_kernel->lock __cfaabi_dbg_ctx2 );
[9b1dcc2]464                        tick_preemption( &id );
[ea7d2b0]465                        unlock( event_kernel->lock );
[8cb529e]466                        break;
[969b3fe]467                // Signal was not sent by the kernel but by an other thread
[8cb529e]468                case SI_QUEUE:
[969b3fe]469                        // For now, other thread only signal the alarm thread to shut it down
470                        // If this needs to change use info.si_value and handle the case here
[8cb529e]471                        goto EXIT;
[cd17862]472                }
473        }
[a0b3e32]474
[8cb529e]475EXIT:
[169d944]476        __cfaabi_dbg_print_safe( "Kernel : Preemption thread stopping\n" );
[9b1dcc2]477        unregister(&id);
[27f5f71]478        return 0p;
[82ff5845]479}
480
[b68fc85]481//=============================================================================================
482// Kernel Signal Debug
483//=============================================================================================
484
485void __cfaabi_check_preemption() {
[14a61b5]486        bool ready = kernelTLS.preemption_state.enabled;
[b68fc85]487        if(!ready) { abort("Preemption should be ready"); }
488
489        sigset_t oldset;
490        int ret;
[b81fd95]491        ret = pthread_sigmask(0, ( const sigset_t * ) 0p, &oldset);  // workaround trac#208: cast should be unnecessary
[b68fc85]492        if(ret != 0) { abort("ERROR sigprocmask returned %d", ret); }
493
494        ret = sigismember(&oldset, SIGUSR1);
495        if(ret <  0) { abort("ERROR sigismember returned %d", ret); }
496        if(ret == 1) { abort("ERROR SIGUSR1 is disabled"); }
[a83ffa4]497
498        ret = sigismember(&oldset, SIGALRM);
499        if(ret <  0) { abort("ERROR sigismember returned %d", ret); }
500        if(ret == 0) { abort("ERROR SIGALRM is enabled"); }
501
502        ret = sigismember(&oldset, SIGTERM);
503        if(ret <  0) { abort("ERROR sigismember returned %d", ret); }
504        if(ret == 1) { abort("ERROR SIGTERM is disabled"); }
[b68fc85]505}
506
[ea8b2f7]507#ifdef __CFA_WITH_VERIFY__
508bool __cfaabi_dbg_in_kernel() {
509        return !kernelTLS.preemption_state.enabled;
510}
511#endif
512
[6b0b624]513// Local Variables: //
514// mode: c //
515// tab-width: 4 //
516// End: //
Note: See TracBrowser for help on using the repository browser.