diff options
author | Rich Felker <dalias@aerifal.cx> | 2014-08-17 00:46:26 -0400 |
---|---|---|
committer | Rich Felker <dalias@aerifal.cx> | 2014-08-17 00:46:26 -0400 |
commit | de7e99c58508ca70f0b1b8ef259a823a3766c434 (patch) | |
tree | 68fbc616cb85a0a5a2992f64080d19b25855088f /src/thread/pthread_condattr_destroy.c | |
parent | d338b506e39b1e2c68366b12be90704c635602ce (diff) | |
download | musl-de7e99c58508ca70f0b1b8ef259a823a3766c434.tar.gz musl-de7e99c58508ca70f0b1b8ef259a823a3766c434.tar.bz2 musl-de7e99c58508ca70f0b1b8ef259a823a3766c434.tar.xz musl-de7e99c58508ca70f0b1b8ef259a823a3766c434.zip |
make pointers used in robust list volatile
when manipulating the robust list, the order of stores matters,
because the code may be asynchronously interrupted by a fatal signal
and the kernel will then access the robust list in what is essentially
an async-signal context.
previously, aliasing considerations made it seem unlikely that a
compiler could reorder the stores, but proving that they could not be
reordered incorrectly would have been extremely difficult. instead
I've opted to make all the pointers used as part of the robust list,
including those in the robust list head and in the individual mutexes,
volatile.
in addition, the format of the robust list has been changed to point
back to the head at the end, rather than ending with a null pointer.
this is to match the documented kernel robust list ABI. the null
pointer, which was previously used, only worked because faults during
access terminate the robust list processing.
Diffstat (limited to 'src/thread/pthread_condattr_destroy.c')
0 files changed, 0 insertions, 0 deletions