diff options
author | Adhemerval Zanella <adhemerval.zanella@linaro.com> | 2015-09-21 15:55:58 -0700 |
---|---|---|
committer | Adhemerval Zanella <adhemerval.zanella@linaro.org> | 2019-01-03 18:38:09 -0200 |
commit | d0d7f85f66a19c3110d550c3c24247f7b4f2c58a (patch) | |
tree | 1e5707d171b1c6ca7c911e37c78d3b7bbc341dce /debug/tst-backtrace5.c | |
parent | 17cc27d5b7e74fe92db11caf989b941c1fd0d9f7 (diff) | |
download | glibc-d0d7f85f66a19c3110d550c3c24247f7b4f2c58a.tar glibc-d0d7f85f66a19c3110d550c3c24247f7b4f2c58a.tar.gz glibc-d0d7f85f66a19c3110d550c3c24247f7b4f2c58a.tar.bz2 glibc-d0d7f85f66a19c3110d550c3c24247f7b4f2c58a.zip |
nptl: Fix testcases for new pthread cancellation mechanism
With upcoming fix for BZ#12683, pthread cancellation does not act for:
1. If syscall is blocked but with some side effects already having
taken place (e.g. a partial read or write).
2. After the syscall has returned.
The main change is due the fact programs need to act in syscalls with
side-effects (for instance, to avoid leak of allocated resources or
handle partial read/write).
This patch changes the NPTL testcase that assumes the old behavior and
also changes the tst-backtrace{5,6} to ignore the cancellable wrappers.
Checked on i686-linux-gnu, x86_64-linux-gnu, x86_64-linux-gnux32,
aarch64-linux-gnu, arm-linux-gnueabihf, powerpc64le-linux-gnu,
powerpc-linux-gnu, sparcv9-linux-gnu, and sparc64-linux-gnu.
* debug/tst-backtrace5.c (handle_signal): Avoid cancellable wrappers
in backtrace analysis.
* nptl/tst-cancel4.c (tf_write): Handle cancelled syscall with
side-effects.
(tf_send): Likewise.
Diffstat (limited to 'debug/tst-backtrace5.c')
-rw-r--r-- | debug/tst-backtrace5.c | 19 |
1 files changed, 10 insertions, 9 deletions
diff --git a/debug/tst-backtrace5.c b/debug/tst-backtrace5.c index dfbe4c1912..5a5ce8bc79 100644 --- a/debug/tst-backtrace5.c +++ b/debug/tst-backtrace5.c @@ -69,17 +69,18 @@ handle_signal (int signum) FAIL (); return; } - /* Do not check name for signal trampoline. */ - i = 2; - if (!match (symbols[i++], "read")) + + /* Do not check name for signal trampoline or cancellable syscall + wrappers (__syscall_cancel*). */ + for (; i < n - 1; i++) + if (match (symbols[i], "read")) + break; + if (i == n - 1) { - /* Perhaps symbols[2] is __kernel_vsyscall? */ - if (!match (symbols[i++], "read")) - { - FAIL (); - return; - } + FAIL (); + return; } + for (; i < n - 1; i++) if (!match (symbols[i], "fn")) { |