source: libcfa/src/concurrency/preemption.cfa @ 4fa8f1a

ADTarm-ehast-experimentalenumforall-pointer-decayjacob/cs343-translationjenkins-sandboxnew-astnew-ast-unique-exprpthread-emulationqualifiedEnum
Last change on this file since 4fa8f1a was 27f5f71, checked in by Peter A. Buhr <pabuhr@…>, 5 years ago

explicitly create stack for pthread thread, change NULL to 0p

  • Property mode set to 100644
File size: 17.6 KB
RevLine 
[c81ebf9]1//
2// Cforall Version 1.0.0 Copyright (C) 2016 University of Waterloo
3//
4// The contents of this file are covered under the licence agreement in the
5// file "LICENCE" distributed with Cforall.
6//
7// signal.c --
8//
9// Author           : Thierry Delisle
10// Created On       : Mon Jun 5 14:20:42 2017
[6b0b624]11// Last Modified By : Peter A. Buhr
[27f5f71]12// Last Modified On : Sat Nov 30 08:02:56 2019
13// Update Count     : 39
[c81ebf9]14//
15
[2026bb6]16#define __cforall_thread__
17
[73abe95]18#include "preemption.hfa"
[a83ffa4]19#include <assert.h>
[c81ebf9]20
21extern "C" {
[82ff5845]22#include <errno.h>
23#include <stdio.h>
24#include <string.h>
25#include <unistd.h>
[27f5f71]26#include <limits.h>                                                                             // PTHREAD_STACK_MIN
[c81ebf9]27}
28
[73abe95]29#include "bits/signal.hfa"
[82ff5845]30
[d8548e2]31#if !defined(__CFA_DEFAULT_PREEMPTION__)
[2a84d06d]32#define __CFA_DEFAULT_PREEMPTION__ 10`ms
[d8548e2]33#endif
[c81ebf9]34
[2a84d06d]35Duration default_preemption() __attribute__((weak)) {
[c81ebf9]36        return __CFA_DEFAULT_PREEMPTION__;
37}
38
[969b3fe]39// FwdDeclarations : timeout handlers
[c81ebf9]40static void preempt( processor   * this );
41static void timeout( thread_desc * this );
42
[969b3fe]43// FwdDeclarations : Signal handlers
[c29c342]44static void sigHandler_ctxSwitch( __CFA_SIGPARMS__ );
45static void sigHandler_segv     ( __CFA_SIGPARMS__ );
46static void sigHandler_ill      ( __CFA_SIGPARMS__ );
47static void sigHandler_fpe      ( __CFA_SIGPARMS__ );
48static void sigHandler_abort    ( __CFA_SIGPARMS__ );
[82ff5845]49
[969b3fe]50// FwdDeclarations : alarm thread main
[c29c342]51static void * alarm_loop( __attribute__((unused)) void * args );
[969b3fe]52
53// Machine specific register name
[381fdee]54#if   defined( __i386 )
[b2b44d8]55#define CFA_REG_IP gregs[REG_EIP]
[381fdee]56#elif defined( __x86_64 )
57#define CFA_REG_IP gregs[REG_RIP]
58#elif defined( __ARM_ARCH )
[b2b44d8]59#define CFA_REG_IP arm_pc
[381fdee]60#else
61#error unknown hardware architecture
[cd17862]62#endif
63
[969b3fe]64KERNEL_STORAGE(event_kernel_t, event_kernel);         // private storage for event kernel
65event_kernel_t * event_kernel;                        // kernel public handle to even kernel
66static pthread_t alarm_thread;                        // pthread handle to alarm thread
67
[c29c342]68static void ?{}(event_kernel_t & this) with( this ) {
[65deb18]69        alarms{};
70        lock{};
[969b3fe]71}
[82ff5845]72
[4dad189]73enum {
74        PREEMPT_NORMAL    = 0,
75        PREEMPT_TERMINATE = 1,
76};
77
[c81ebf9]78//=============================================================================================
79// Kernel Preemption logic
80//=============================================================================================
81
[969b3fe]82// Get next expired node
[2a84d06d]83static inline alarm_node_t * get_expired( alarm_list_t * alarms, Time currtime ) {
[27f5f71]84        if( !alarms->head ) return 0p;                                          // If no alarms return null
85        if( alarms->head->alarm >= currtime ) return 0p;        // If alarms head not expired return null
86        return pop(alarms);                                                                     // Otherwise just pop head
[969b3fe]87}
88
89// Tick one frame of the Discrete Event Simulation for alarms
[c29c342]90static void tick_preemption() {
[27f5f71]91        alarm_node_t * node = 0p;                                                       // Used in the while loop but cannot be declared in the while condition
92        alarm_list_t * alarms = &event_kernel->alarms;          // Local copy for ease of reading
93        Time currtime = __kernel_get_time();                            // Check current time once so everything "happens at once"
[8cb529e]94
[969b3fe]95        //Loop throught every thing expired
96        while( node = get_expired( alarms, currtime ) ) {
[b1a4300]97                // __cfaabi_dbg_print_buffer_decl( " KERNEL: preemption tick.\n" );
[1c273d0]98
[969b3fe]99                // Check if this is a kernel
[c81ebf9]100                if( node->kernel_alarm ) {
101                        preempt( node->proc );
102                }
103                else {
104                        timeout( node->thrd );
105                }
106
[969b3fe]107                // Check if this is a periodic alarm
[2a84d06d]108                Duration period = node->period;
[8cb529e]109                if( period > 0 ) {
[b1a4300]110                        // __cfaabi_dbg_print_buffer_local( " KERNEL: alarm period is %lu.\n", period.tv );
[969b3fe]111                        node->alarm = currtime + period;    // Alarm is periodic, add currtime to it (used cached current time)
112                        insert( alarms, node );             // Reinsert the node for the next time it triggers
[c81ebf9]113                }
114                else {
[969b3fe]115                        node->set = false;                  // Node is one-shot, just mark it as not pending
[c81ebf9]116                }
117        }
118
[969b3fe]119        // If there are still alarms pending, reset the timer
[b1a4300]120        if( alarms->head ) {
[f083335]121                __cfaabi_dbg_print_buffer_decl( " KERNEL: @%ju(%ju) resetting alarm to %ju.\n", currtime.tv, __kernel_get_time().tv, (alarms->head->alarm - currtime).tv);
[b1a4300]122                Duration delta = alarms->head->alarm - currtime;
123                Duration caped = max(delta, 50`us);
124                // itimerval tim  = { caped };
125                // __cfaabi_dbg_print_buffer_local( "    Values are %lu, %lu, %lu %lu.\n", delta.tv, caped.tv, tim.it_value.tv_sec, tim.it_value.tv_usec);
126
127                __kernel_set_timer( caped );
128        }
[c81ebf9]129}
130
[969b3fe]131// Update the preemption of a processor and notify interested parties
[2a84d06d]132void update_preemption( processor * this, Duration duration ) {
[c81ebf9]133        alarm_node_t * alarm = this->preemption_alarm;
134
135        // Alarms need to be enabled
[2a84d06d]136        if ( duration > 0 && ! alarm->set ) {
[c81ebf9]137                alarm->alarm = __kernel_get_time() + duration;
138                alarm->period = duration;
139                register_self( alarm );
140        }
[8ad6533]141        // Zero duration but alarm is set
[c81ebf9]142        else if ( duration == 0 && alarm->set ) {
143                unregister_self( alarm );
144                alarm->alarm = 0;
145                alarm->period = 0;
146        }
147        // If alarm is different from previous, change it
148        else if ( duration > 0 && alarm->period != duration ) {
149                unregister_self( alarm );
150                alarm->alarm = __kernel_get_time() + duration;
151                alarm->period = duration;
152                register_self( alarm );
153        }
154}
155
156//=============================================================================================
[cd17862]157// Kernel Signal Tools
[c81ebf9]158//=============================================================================================
159
[36982fc]160__cfaabi_dbg_debug_do( static thread_local void * last_interrupt = 0; )
[b227f68]161
[82ff5845]162extern "C" {
[969b3fe]163        // Disable interrupts by incrementing the counter
[82ff5845]164        void disable_interrupts() {
[afd550c]165                with( kernelTLS.preemption_state ) {
[1f81d61]166                        #if GCC_VERSION > 50000
[13073be]167                        static_assert(__atomic_always_lock_free(sizeof(enabled), &enabled), "Must be lock-free");
[1f81d61]168                        #endif
[13073be]169
170                        // Set enabled flag to false
171                        // should be atomic to avoid preemption in the middle of the operation.
172                        // use memory order RELAXED since there is no inter-thread on this variable requirements
173                        __atomic_store_n(&enabled, false, __ATOMIC_RELAXED);
174
175                        // Signal the compiler that a fence is needed but only for signal handlers
176                        __atomic_signal_fence(__ATOMIC_ACQUIRE);
177
[de6319f]178                        __attribute__((unused)) unsigned short new_val = disable_count + 1;
179                        disable_count = new_val;
180                        verify( new_val < 65_000u );              // If this triggers someone is disabling interrupts without enabling them
181                }
[82ff5845]182        }
183
[969b3fe]184        // Enable interrupts by decrementing the counter
185        // If counter reaches 0, execute any pending CtxSwitch
[36982fc]186        void enable_interrupts( __cfaabi_dbg_ctx_param ) {
[13073be]187                processor   * proc = kernelTLS.this_processor; // Cache the processor now since interrupts can start happening after the atomic store
188                thread_desc * thrd = kernelTLS.this_thread;       // Cache the thread now since interrupts can start happening after the atomic store
[969b3fe]189
[afd550c]190                with( kernelTLS.preemption_state ){
[de6319f]191                        unsigned short prev = disable_count;
192                        disable_count -= 1;
193                        verify( prev != 0u );                     // If this triggers someone is enabled already enabled interruptsverify( prev != 0u );
194
195                        // Check if we need to prempt the thread because an interrupt was missed
196                        if( prev == 1 ) {
[1f81d61]197                                #if GCC_VERSION > 50000
[13073be]198                                static_assert(__atomic_always_lock_free(sizeof(enabled), &enabled), "Must be lock-free");
[1f81d61]199                                #endif
[13073be]200
201                                // Set enabled flag to true
202                                // should be atomic to avoid preemption in the middle of the operation.
203                                // use memory order RELAXED since there is no inter-thread on this variable requirements
204                                __atomic_store_n(&enabled, true, __ATOMIC_RELAXED);
205
206                                // Signal the compiler that a fence is needed but only for signal handlers
207                                __atomic_signal_fence(__ATOMIC_RELEASE);
[de6319f]208                                if( proc->pending_preemption ) {
209                                        proc->pending_preemption = false;
210                                        BlockInternal( thrd );
211                                }
[d0a045c7]212                        }
[82ff5845]213                }
[4e6fb8e]214
[969b3fe]215                // For debugging purposes : keep track of the last person to enable the interrupts
[36982fc]216                __cfaabi_dbg_debug_do( proc->last_enable = caller; )
[82ff5845]217        }
[969b3fe]218
219        // Disable interrupts by incrementint the counter
220        // Don't execute any pending CtxSwitch even if counter reaches 0
221        void enable_interrupts_noPoll() {
[afd550c]222                unsigned short prev = kernelTLS.preemption_state.disable_count;
223                kernelTLS.preemption_state.disable_count -= 1;
[2e9aed4]224                verifyf( prev != 0u, "Incremented from %u\n", prev );                     // If this triggers someone is enabled already enabled interrupts
[d0a045c7]225                if( prev == 1 ) {
[1f81d61]226                        #if GCC_VERSION > 50000
[13073be]227                        static_assert(__atomic_always_lock_free(sizeof(kernelTLS.preemption_state.enabled), &kernelTLS.preemption_state.enabled), "Must be lock-free");
[1f81d61]228                        #endif
[13073be]229                        // Set enabled flag to true
230                        // should be atomic to avoid preemption in the middle of the operation.
231                        // use memory order RELAXED since there is no inter-thread on this variable requirements
232                        __atomic_store_n(&kernelTLS.preemption_state.enabled, true, __ATOMIC_RELAXED);
233
234                        // Signal the compiler that a fence is needed but only for signal handlers
235                        __atomic_signal_fence(__ATOMIC_RELEASE);
[d0a045c7]236                }
[969b3fe]237        }
[82ff5845]238}
239
[969b3fe]240// sigprocmask wrapper : unblock a single signal
[1c273d0]241static inline void signal_unblock( int sig ) {
[82ff5845]242        sigset_t mask;
243        sigemptyset( &mask );
[1c273d0]244        sigaddset( &mask, sig );
[82ff5845]245
[27f5f71]246        if ( pthread_sigmask( SIG_UNBLOCK, &mask, 0p ) == -1 ) {
[169d944]247            abort( "internal error, pthread_sigmask" );
[cd17862]248        }
[82ff5845]249}
250
[969b3fe]251// sigprocmask wrapper : block a single signal
[cd17862]252static inline void signal_block( int sig ) {
253        sigset_t mask;
254        sigemptyset( &mask );
255        sigaddset( &mask, sig );
[47ecf2b]256
[27f5f71]257        if ( pthread_sigmask( SIG_BLOCK, &mask, 0p ) == -1 ) {
[169d944]258            abort( "internal error, pthread_sigmask" );
[cd17862]259        }
260}
[47ecf2b]261
[969b3fe]262// kill wrapper : signal a processor
[cd17862]263static void preempt( processor * this ) {
[4dad189]264        sigval_t value = { PREEMPT_NORMAL };
265        pthread_sigqueue( this->kernel_thread, SIGUSR1, value );
266}
267
[969b3fe]268// reserved for future use
[cd17862]269static void timeout( thread_desc * this ) {
270        //TODO : implement waking threads
271}
272
[14a61b5]273// KERNEL ONLY
[969b3fe]274// Check if a CtxSwitch signal handler shoud defer
275// If true  : preemption is safe
276// If false : preemption is unsafe and marked as pending
277static inline bool preemption_ready() {
[14a61b5]278        // Check if preemption is safe
279        bool ready = kernelTLS.preemption_state.enabled && ! kernelTLS.preemption_state.in_progress;
280
281        // Adjust the pending flag accordingly
282        kernelTLS.this_processor->pending_preemption = !ready;
[969b3fe]283        return ready;
284}
285
[cd17862]286//=============================================================================================
287// Kernel Signal Startup/Shutdown logic
288//=============================================================================================
289
[969b3fe]290// Startup routine to activate preemption
291// Called from kernel_startup
[cd17862]292void kernel_start_preemption() {
[169d944]293        __cfaabi_dbg_print_safe( "Kernel : Starting preemption\n" );
[969b3fe]294
295        // Start with preemption disabled until ready
[14a61b5]296        kernelTLS.preemption_state.enabled = false;
297        kernelTLS.preemption_state.disable_count = 1;
[969b3fe]298
299        // Initialize the event kernel
300        event_kernel = (event_kernel_t *)&storage_event_kernel;
[9236060]301        (*event_kernel){};
[969b3fe]302
303        // Setup proper signal handlers
[27f5f71]304        __cfaabi_sigaction( SIGUSR1, sigHandler_ctxSwitch, SA_SIGINFO | SA_RESTART ); // CtxSwitch handler
[cd17862]305
306        signal_block( SIGALRM );
307
[27f5f71]308        pthread_attr_t attr;
309        int ret;
310        ret = pthread_attr_init( &attr );                                       // initialize attribute
311        if ( ret ) {
312                abort( "%s : internal error, pthread_attr_init failed, error(%d) %s.", __PRETTY_FUNCTION__, ret, strerror( ret ) );
313        } // if
314
315        size_t stacksize;
316        ret = pthread_attr_getstacksize( &attr, &stacksize ); // default stack size, normally defined by shell limit
317        if ( ret ) {
318                abort( "%s : internal error, pthread_attr_getstacksize failed, error(%d) %s.", __PRETTY_FUNCTION__, ret, strerror( ret ) );
319        } // if
320        assert( stacksize >= PTHREAD_STACK_MIN );
321
322        kernelTLS.preemption_state.stack = malloc( stacksize );
323        ret = pthread_attr_setstack( &attr, kernelTLS.preemption_state.stack, stacksize );
324        if ( ret ) {
325                abort( "%s : internal error, pthread_attr_setstack failed, error(%d) %s.", __PRETTY_FUNCTION__, ret, strerror( ret ) );
326        } // if
327
328        ret = pthread_create( &alarm_thread, &attr, alarm_loop, 0p );
329        if ( ret ) {
330                abort( "%s : internal error, pthread_create failed, error(%d) %s.", __PRETTY_FUNCTION__, ret, strerror( ret ) );
331        } // if
[cd17862]332}
333
[969b3fe]334// Shutdown routine to deactivate preemption
335// Called from kernel_shutdown
[cd17862]336void kernel_stop_preemption() {
[169d944]337        __cfaabi_dbg_print_safe( "Kernel : Preemption stopping\n" );
[d6ff3ff]338
[969b3fe]339        // Block all signals since we are already shutting down
[cd17862]340        sigset_t mask;
341        sigfillset( &mask );
[27f5f71]342        sigprocmask( SIG_BLOCK, &mask, 0p );
[cd17862]343
[969b3fe]344        // Notify the alarm thread of the shutdown
[a0b3e32]345        sigval val = { 1 };
346        pthread_sigqueue( alarm_thread, SIGALRM, val );
[969b3fe]347
348        // Wait for the preemption thread to finish
[27f5f71]349
350        pthread_join( alarm_thread, 0p );
351        free( kernelTLS.preemption_state.stack );
[969b3fe]352
353        // Preemption is now fully stopped
354
[169d944]355        __cfaabi_dbg_print_safe( "Kernel : Preemption stopped\n" );
[cd17862]356}
357
[969b3fe]358// Raii ctor/dtor for the preemption_scope
359// Used by thread to control when they want to receive preemption signals
[242a902]360void ?{}( preemption_scope & this, processor * proc ) {
[2a84d06d]361        (this.alarm){ proc, (Time){ 0 }, 0`s };
[242a902]362        this.proc = proc;
363        this.proc->preemption_alarm = &this.alarm;
[969b3fe]364
[d8548e2]365        update_preemption( this.proc, this.proc->cltr->preemption_rate );
[cd17862]366}
367
[242a902]368void ^?{}( preemption_scope & this ) {
[cd17862]369        disable_interrupts();
370
[2a84d06d]371        update_preemption( this.proc, 0`s );
[cd17862]372}
373
374//=============================================================================================
375// Kernel Signal Handlers
376//=============================================================================================
[47ecf2b]377
[969b3fe]378// Context switch signal handler
379// Receives SIGUSR1 signal and causes the current thread to yield
[c29c342]380static void sigHandler_ctxSwitch( __CFA_SIGPARMS__ ) {
[b2b44d8]381        __cfaabi_dbg_debug_do( last_interrupt = (void *)(cxt->uc_mcontext.CFA_REG_IP); )
[969b3fe]382
[4dad189]383        // SKULLDUGGERY: if a thread creates a processor and the immediately deletes it,
384        // the interrupt that is supposed to force the kernel thread to preempt might arrive
385        // before the kernel thread has even started running. When that happens an iterrupt
386        // we a null 'this_processor' will be caught, just ignore it.
[14a61b5]387        if(! kernelTLS.this_processor ) return;
[4dad189]388
389        choose(sfp->si_value.sival_int) {
390                case PREEMPT_NORMAL   : ;// Normal case, nothing to do here
[ea8b2f7]391                case PREEMPT_TERMINATE: verify( __atomic_load_n( &kernelTLS.this_processor->do_terminate, __ATOMIC_SEQ_CST ) );
[4dad189]392                default:
[ff878b7]393                        abort( "internal error, signal value is %d", sfp->si_value.sival_int );
[4dad189]394        }
395
[b2b44d8]396        // Check if it is safe to preempt here
[969b3fe]397        if( !preemption_ready() ) { return; }
398
[b1a4300]399        __cfaabi_dbg_print_buffer_decl( " KERNEL: preempting core %p (%p @ %p).\n", kernelTLS.this_processor, kernelTLS.this_thread, (void *)(cxt->uc_mcontext.CFA_REG_IP) );
[14a61b5]400
401        // Sync flag : prevent recursive calls to the signal handler
402        kernelTLS.preemption_state.in_progress = true;
403
[a83ffa4]404        // Clear sighandler mask before context switching.
[1f81d61]405        #if GCC_VERSION > 50000
[a83ffa4]406        static_assert( sizeof( sigset_t ) == sizeof( cxt->uc_sigmask ), "Expected cxt->uc_sigmask to be of sigset_t" );
[1f81d61]407        #endif
[27f5f71]408        if ( pthread_sigmask( SIG_SETMASK, (sigset_t *)&(cxt->uc_sigmask), 0p ) == -1 ) {
[a83ffa4]409                abort( "internal error, sigprocmask" );
410        }
[05615ba]411
[14a61b5]412        // TODO: this should go in finish action
413        // Clear the in progress flag
414        kernelTLS.preemption_state.in_progress = false;
[969b3fe]415
416        // Preemption can occur here
417
[14a61b5]418        BlockInternal( kernelTLS.this_thread ); // Do the actual CtxSwitch
[c81ebf9]419}
420
[969b3fe]421// Main of the alarm thread
422// Waits on SIGALRM and send SIGUSR1 to whom ever needs it
[c29c342]423static void * alarm_loop( __attribute__((unused)) void * args ) {
[969b3fe]424        // Block sigalrms to control when they arrive
[cd17862]425        sigset_t mask;
[ade5272]426        sigfillset(&mask);
[27f5f71]427        if ( pthread_sigmask( SIG_BLOCK, &mask, 0p ) == -1 ) {
[169d944]428            abort( "internal error, pthread_sigmask" );
[82ff5845]429        }
[c81ebf9]430
[ade5272]431        sigemptyset( &mask );
432        sigaddset( &mask, SIGALRM );
433
[969b3fe]434        // Main loop
[cd17862]435        while( true ) {
[969b3fe]436                // Wait for a sigalrm
[a0b3e32]437                siginfo_t info;
438                int sig = sigwaitinfo( &mask, &info );
[969b3fe]439
[e2f7bc3]440                if( sig < 0 ) {
441                        //Error!
442                        int err = errno;
443                        switch( err ) {
444                                case EAGAIN :
445                                case EINTR :
[b1a4300]446                                        {__cfaabi_dbg_print_buffer_decl( " KERNEL: Spurious wakeup %d.\n", err );}
[e2f7bc3]447                                        continue;
[27f5f71]448                                case EINVAL :
[169d944]449                                        abort( "Timeout was invalid." );
[e2f7bc3]450                                default:
[169d944]451                                        abort( "Unhandled error %d", err);
[e2f7bc3]452                        }
453                }
454
[969b3fe]455                // If another signal arrived something went wrong
[8cb529e]456                assertf(sig == SIGALRM, "Kernel Internal Error, sigwait: Unexpected signal %d (%d : %d)\n", sig, info.si_code, info.si_value.sival_int);
457
[169d944]458                // __cfaabi_dbg_print_safe( "Kernel : Caught alarm from %d with %d\n", info.si_code, info.si_value.sival_int );
[969b3fe]459                // Switch on the code (a.k.a. the sender) to
[8cb529e]460                switch( info.si_code )
[a0b3e32]461                {
[969b3fe]462                // Timers can apparently be marked as sent for the kernel
463                // In either case, tick preemption
[8cb529e]464                case SI_TIMER:
465                case SI_KERNEL:
[169d944]466                        // __cfaabi_dbg_print_safe( "Kernel : Preemption thread tick\n" );
[36982fc]467                        lock( event_kernel->lock __cfaabi_dbg_ctx2 );
[8cb529e]468                        tick_preemption();
[ea7d2b0]469                        unlock( event_kernel->lock );
[8cb529e]470                        break;
[969b3fe]471                // Signal was not sent by the kernel but by an other thread
[8cb529e]472                case SI_QUEUE:
[969b3fe]473                        // For now, other thread only signal the alarm thread to shut it down
474                        // If this needs to change use info.si_value and handle the case here
[8cb529e]475                        goto EXIT;
[cd17862]476                }
477        }
[a0b3e32]478
[8cb529e]479EXIT:
[169d944]480        __cfaabi_dbg_print_safe( "Kernel : Preemption thread stopping\n" );
[27f5f71]481        return 0p;
[82ff5845]482}
483
[b68fc85]484//=============================================================================================
485// Kernel Signal Debug
486//=============================================================================================
487
488void __cfaabi_check_preemption() {
[14a61b5]489        bool ready = kernelTLS.preemption_state.enabled;
[b68fc85]490        if(!ready) { abort("Preemption should be ready"); }
491
492        sigset_t oldset;
493        int ret;
[27f5f71]494        ret = pthread_sigmask(0, 0p, &oldset);
[b68fc85]495        if(ret != 0) { abort("ERROR sigprocmask returned %d", ret); }
496
497        ret = sigismember(&oldset, SIGUSR1);
498        if(ret <  0) { abort("ERROR sigismember returned %d", ret); }
499        if(ret == 1) { abort("ERROR SIGUSR1 is disabled"); }
[a83ffa4]500
501        ret = sigismember(&oldset, SIGALRM);
502        if(ret <  0) { abort("ERROR sigismember returned %d", ret); }
503        if(ret == 0) { abort("ERROR SIGALRM is enabled"); }
504
505        ret = sigismember(&oldset, SIGTERM);
506        if(ret <  0) { abort("ERROR sigismember returned %d", ret); }
507        if(ret == 1) { abort("ERROR SIGTERM is disabled"); }
[b68fc85]508}
509
[ea8b2f7]510#ifdef __CFA_WITH_VERIFY__
511bool __cfaabi_dbg_in_kernel() {
512        return !kernelTLS.preemption_state.enabled;
513}
514#endif
515
[6b0b624]516// Local Variables: //
517// mode: c //
518// tab-width: 4 //
519// End: //
Note: See TracBrowser for help on using the repository browser.