summaryrefslogtreecommitdiff
path: root/src/thread/x86_64
AgeCommit message (Collapse)AuthorLines
2011-06-13remove all .size and .type directives for functions from the asmRich Felker-7/+0
these are useless and have caused problems for users trying to build with non-gnu tools like tcc's assembler.
2011-04-22fix initial stack alignment in new threads on x86_64Rich Felker-1/+1
2011-04-17fix typo in x86_64 cancellable syscall asmRich Felker-1/+1
2011-04-17fix bugs in cancellable syscall asmRich Felker-5/+6
x86_64 was just plain wrong in the cancel-flag-already-set path, and crashing. the more subtle error was not clearing the saved stack pointer before returning to c code. this could result in the signal handler misidentifying c code as the pre-syscall part of the asm, and acting on cancellation at the wrong time, and thus resource leak race conditions. also, now __cancel (in the c code) is responsible for clearing the saved sp in the already-cancelled branch. this means we have to use call rather than jmp to ensure the stack pointer in the c will never match what the asm saved.
2011-04-17fix some minor issues in cancellation handling patchRich Felker-1/+1
signals were wrongly left masked, and cancellability state was not switched to disabled, during the execution of cleanup handlers.
2011-04-17overhaul pthread cancellationRich Felker-0/+24
this patch improves the correctness, simplicity, and size of cancellation-related code. modulo any small errors, it should now be completely conformant, safe, and resource-leak free. the notion of entering and exiting cancellation-point context has been completely eliminated and replaced with alternative syscall assembly code for cancellable syscalls. the assembly is responsible for setting up execution context information (stack pointer and address of the syscall instruction) which the cancellation signal handler can use to determine whether the interrupted code was in a cancellable state. these changes eliminate race conditions in the previous generation of cancellation handling code (whereby a cancellation request received just prior to the syscall would not be processed, leaving the syscall to block, potentially indefinitely), and remedy an issue where non-cancellable syscalls made from signal handlers became cancellable if the signal handler interrupted a cancellation point. x86_64 asm is untested and may need a second try to get it right.
2011-04-06consistency: change all remaining syscalls to use SYS_ rather than __NR_ prefixRich Felker-2/+2
2011-02-19race condition fix: block all signals before decrementing thread countRich Felker-13/+0
the existence of a (kernelspace) thread must never have observable effects after the thread count is decremented. if signals are not blocked, it could end up handling the signal for rsyscall and contributing towards the count of threads which have changed ids, causing a thread to be missed. this could lead to one thread retaining unwanted privilege level. this change may also address other subtle race conditions in application code that uses signals.
2011-02-16patch by njk, simplifies thread register initialization for x86_64Rich Felker-4/+0
It's not necessary to save any registers on the stack across syscall in x86_64 __set_thread_area. Don't waste cycles or bytes on it.
2011-02-16patch from njk: make x86_64 __uniclone branchless.Rich Felker-6/+6
2011-02-15Port musl to x86-64. One giant commit!Nicholas J. Kain-0/+61