try_to_freeze() called with IRQs disabled on ARM
Ulrich.Weigand at de.ibm.com
Fri Sep 2 14:47:35 UTC 2011
Russell King - ARM Linux <linux at arm.linux.org.uk> wrote on 09/01/2011
> On Thu, Sep 01, 2011 at 03:41:22PM +0200, Ulrich Weigand wrote:
> > One way to fix this might be to make the TIF_SYS_RESTART flag
> > itself visible to ptrace, so the GDB could save/restore it
> > along with the rest of the register set; this would be similar
> > to how that problem is handled on other platforms. However,
> > there doesn't appear to be an obvious place for the flag in
> > the ptrace register set ...
> Thanks for looking at this.
> I don't think we can augment the ptrace register set - that would be a
> major API change which would immediately break lots of userspace,
> causing user stack overflows and such like.
Well, it wouldn't need to go into the default register set (REGSET_GPR),
but could be in a new register set. This shouldn't change anything for
existing applications, but GDB could probe for support for the new
regset and use it if present.
> I can't see a way out of this - and given the seriousness of the kernel
> side issue (causing kernel warnings), and that your change altered the
> strace behaviour (an unintended user-visible change) I think we're going
> to have to live with the gdb testcase failing until we can come up with
> a better fix for it.
The change you suggest, with the addition of making the flag available
to the debugger in a new register set, should be fine for GDB.
I agree that the race you pointed out in the initial mail to this thread
needs to be fixed; an in fact, it seems that this race is also present
on s390 ... In discussions with Martin, we were wondering however
whether the fix you suggest does actually fully plug the race:
Assume the scenario you initally describe, where a first signal is
ignored and leads to system call restart. With your latest patch,
you call into syscall_restart which sets everything up to restart
the call (with interrupts disabled). Then, you go back to user space,
with PC pointing to the SVC that is to be restarted. Now assume that
some interrupt is pending at this point. At the switch to user
space, interrupts will be enabled. Can it now happen that this
pending interrupt is recognized *before* the SVC is executed?
(Maybe the hardware doesn't allow that on ARM ... it definitely
*is* possible on s390, though.)
If so, can this not then lead to the exact same race you initially
described (the interrupt causing some other task to be scheduled,
and then an second signal to be delivered to the task about to
restart the SVC)?
I guess one way to fix this would be to not actually go back to
user space for system call restart at all, but instead just short-
cut this in entry.S and simply go right back to the system call
entry path. As a side benefit, this could eliminate the need to
create a stack frame for the OABI RESTARTBLOCK case ... (This is
what we do on s390 b.t.w., where there is a similar issue with the
system call number being an immediate argument to the SVC
> I also wonder what the validity of this behaviour is - there are cases
> where you can't do what gdb's trying to do - eg, with a syscall using
> a restart block (-ERESTART_RESTARTBLOCK) because the restart information
> could be wiped out by a new syscall performed by the function gdb wants
> to run. Or when the program receives a signal for it to handle while
> running that function.
Yes, performing an inferior call during a system call that restarts
using RESTARTBLOCK is broken. This is a problem on all architectures,
and has been ever since the RESTARTBLOCK mechanism was introduced ...
To really fix this case would probably require some way for the
debugger to save and restore the restore_block saved state. This
is not quite trivial, since it would expose that state to user space,
effectively creating a new ABI (and probably requiring sanity checks
to ensure a valid state is restored). This probably cannot be fixed
by one architecture for itself, but would need support from common
More information about the linaro-toolchain