mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
thread.c: fix some mutexes remaining locked after forking
* thread.c (terminate_atfork_i): fix locking mutexes not unlocked in forks when not tracked in thread. [ruby-core:55102] [Bug #8433] git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@43148 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
This commit is contained in:
parent
a10c9a0e76
commit
57b8687deb
3 changed files with 58 additions and 6 deletions
|
@ -1,3 +1,8 @@
|
|||
Sat Oct 5 11:20:24 2013 Aaron Pfeifer <aaron.pfeifer@gmail.com>
|
||||
|
||||
* thread.c (terminate_atfork_i): fix locking mutexes not unlocked in
|
||||
forks when not tracked in thread. [ruby-core:55102] [Bug #8433]
|
||||
|
||||
Fri Oct 4 19:54:09 2013 Zachary Scott <e@zzak.io>
|
||||
|
||||
* ext/dbm/dbm.c: [DOC] Fix wrong constant name in DBM by @edward
|
||||
|
|
|
@ -909,4 +909,31 @@ Thread.new(Thread.current) {|mth|
|
|||
size_large = invoke_rec script, vm_stack_size, 1024 * 1024 * 10
|
||||
assert_operator(size_default, :<=, size_large, "large size")
|
||||
end
|
||||
|
||||
def test_blocking_mutex_unlocked_on_fork
|
||||
bug8433 = '[ruby-core:55102] [Bug #8433]'
|
||||
|
||||
mutex = Mutex.new
|
||||
flag = false
|
||||
mutex.lock
|
||||
|
||||
th = Thread.new do
|
||||
mutex.synchronize do
|
||||
flag = true
|
||||
sleep
|
||||
end
|
||||
end
|
||||
|
||||
Thread.pass until th.stop?
|
||||
mutex.unlock
|
||||
|
||||
pid = Process.fork do
|
||||
exit(mutex.locked?)
|
||||
end
|
||||
|
||||
th.kill
|
||||
|
||||
pid, status = Process.waitpid2(pid)
|
||||
assert_equal(false, status.success?, bug8433)
|
||||
end
|
||||
end
|
||||
|
|
32
thread.c
32
thread.c
|
@ -396,6 +396,8 @@ typedef struct rb_mutex_struct
|
|||
} rb_mutex_t;
|
||||
|
||||
static void rb_mutex_abandon_all(rb_mutex_t *mutexes);
|
||||
static void rb_mutex_abandon_keeping_mutexes(rb_thread_t *th);
|
||||
static void rb_mutex_abandon_locking_mutex(rb_thread_t *th);
|
||||
static const char* rb_mutex_unlock_th(rb_mutex_t *mutex, rb_thread_t volatile *th);
|
||||
|
||||
void
|
||||
|
@ -3892,10 +3894,8 @@ terminate_atfork_i(st_data_t key, st_data_t val, st_data_t current_th)
|
|||
GetThreadPtr(thval, th);
|
||||
|
||||
if (th != (rb_thread_t *)current_th) {
|
||||
if (th->keeping_mutexes) {
|
||||
rb_mutex_abandon_all(th->keeping_mutexes);
|
||||
}
|
||||
th->keeping_mutexes = NULL;
|
||||
rb_mutex_abandon_keeping_mutexes(th);
|
||||
rb_mutex_abandon_locking_mutex(th);
|
||||
thread_cleanup_func(th, TRUE);
|
||||
}
|
||||
return ST_CONTINUE;
|
||||
|
@ -4155,8 +4155,6 @@ thgroup_add(VALUE group, VALUE thread)
|
|||
#define GetMutexPtr(obj, tobj) \
|
||||
TypedData_Get_Struct((obj), rb_mutex_t, &mutex_data_type, (tobj))
|
||||
|
||||
static const char *rb_mutex_unlock_th(rb_mutex_t *mutex, rb_thread_t volatile *th);
|
||||
|
||||
#define mutex_mark NULL
|
||||
|
||||
static void
|
||||
|
@ -4487,6 +4485,28 @@ rb_mutex_unlock(VALUE self)
|
|||
return self;
|
||||
}
|
||||
|
||||
static void
|
||||
rb_mutex_abandon_keeping_mutexes(rb_thread_t *th)
|
||||
{
|
||||
if (th->keeping_mutexes) {
|
||||
rb_mutex_abandon_all(th->keeping_mutexes);
|
||||
}
|
||||
th->keeping_mutexes = NULL;
|
||||
}
|
||||
|
||||
static void
|
||||
rb_mutex_abandon_locking_mutex(rb_thread_t *th)
|
||||
{
|
||||
rb_mutex_t *mutex;
|
||||
|
||||
if (!th->locking_mutex) return;
|
||||
|
||||
GetMutexPtr(th->locking_mutex, mutex);
|
||||
if (mutex->th == th)
|
||||
rb_mutex_abandon_all(mutex);
|
||||
th->locking_mutex = Qfalse;
|
||||
}
|
||||
|
||||
static void
|
||||
rb_mutex_abandon_all(rb_mutex_t *mutexes)
|
||||
{
|
||||
|
|
Loading…
Reference in a new issue