Commit Graph

2411 Commits

Author SHA1 Message Date
15b77d52c9 eventfd syscall wrapper and read/write wrappers 2011-05-08 00:03:00 -04:00
11e4b92556 optimize out useless default-attribute object in pthread_create 2011-05-07 23:39:48 -04:00
4c4e22d781 optimize compound-literal sigset_t's not to contain useless hurd bits 2011-05-07 23:37:10 -04:00
99b8a25e94 overhaul implementation-internal signal protections
the new approach relies on the fact that the only ways to create
sigset_t objects without invoking UB are to use the sig*set()
functions, or from the masks returned by sigprocmask, sigaction, etc.
or in the ucontext_t argument to a signal handler. thus, as long as
sigfillset and sigaddset avoid adding the "protected" signals, there
is no way the application will ever obtain a sigset_t including these
bits, and thus no need to add the overhead of checking/clearing them
when sigprocmask or sigaction is called.

note that the old code actually *failed* to remove the bits from
sa_mask when sigaction was called.

the new implementations are also significantly smaller, simpler, and
faster due to ignoring the useless "GNU HURD signals" 65-1024, which
are not used and, if there's any sanity in the world, never will be
used.
2011-05-07 23:23:58 -04:00
77f15d108e reduce some ridiculously large spin counts
these should be tweaked according to testing. offhand i know 1000 is
too low and 5000 is likely to be sufficiently high. consider trying to
add futexes to file locking, too...
2011-05-06 21:45:48 -04:00
9dd6399c95 remove debug code that was missed in barrier commit 2011-05-06 20:27:45 -04:00
f16a3089be completely new barrier implementation, addressing major correctness issues
the previous implementation had at least 2 problems:

1. the case where additional threads reached the barrier before the
first wave was finished leaving the barrier was untested and seemed
not to be working.

2. threads leaving the barrier continued to access memory within the
barrier object after other threads had successfully returned from
pthread_barrier_wait. this could lead to memory corruption or crashes
if the barrier object had automatic storage in one of the waiting
threads and went out of scope before all threads finished returning,
or if one thread unmapped the memory in which the barrier object
lived.

the new implementation avoids both problems by making the barrier
state essentially local to the first thread which enters the barrier
wait, and forces that thread to be the last to return.
2011-05-06 20:00:59 -04:00
78c808b126 fix fclose return status logic, again
the previous fix was incorrect, as it would prevent f->close(f) from
being called if fflush(f) failed. i believe this was the original
motivation for using | rather than ||. so now let's just use a second
statement to constrain the order of function calls, and to back to
using |.
2011-05-02 09:18:03 -04:00
bd67467325 fix undefined call order in fclose, possible lost output depending on compiler
pcc turned up this bug by calling f->close(f) before fflush(f),
resulting in lost output and error on flush.
2011-05-01 22:59:14 -04:00
a9be201cc0 workaround for preprocessor bug in pcc
with this patch, musl compiles and mostly works with pcc 1.0.0. a few
tests are still failing and i'm uncertain whether they are due to
portability problems in musl, or bugs in pcc, but i suspect the
latter.
2011-05-01 22:16:04 -04:00
d02c50d6a3 minor optimization in puts: use inline putc_unlocked macro for newline 2011-05-01 20:12:51 -04:00
1477a3be62 avoid crashing when nel==0 is passed to qsort 2011-04-29 11:14:55 -04:00
e6bac87d0e correct variadic prototypes for execl* family
the old versions worked, but conflicted with programs which declared
their own prototypes and generated warnings with some versions of gcc.
2011-04-27 16:06:33 -04:00
22263709ed replace heap sort with smoothsort implementation by Valentin Ochs
Smoothsort is an adaptive variant of heapsort. This version was
written by Valentin Ochs (apo) specifically for inclusion in musl. I
worked with him to get it working in O(1) memory usage even with giant
array element widths, and to optimize it heavily for size and speed.
It's still roughly 4 times as large as the old heap sort
implementation, but roughly 20 times faster given an almost-sorted
array of 1M elements (20 being the base-2 log of 1M), i.e. it really
does reduce O(n log n) to O(n) in the mostly-sorted case. It's still
somewhat slower than glibc's Introsort for random input, but now
considerably faster than glibc when the input is already sorted, or
mostly sorted.
2011-04-27 13:27:04 -04:00
b5b41212a6 function signature fix: add const qualifier to mempcpy src arg 2011-04-26 12:28:41 -04:00
3486365e95 fix bug in ipv6 parsing that prevented parsing a lone "::" 2011-04-25 17:49:21 -04:00
34d81974d3 ipv6 parsing code (formerly dummied-out) 2011-04-25 17:04:40 -04:00
5efc6af4eb fix 2 eof-related bugs in scanf
1. failed match of literal chars from the format string would always
return matching failure rather than input failure at eof, leading to
infinite loops in some programs.

2. unread of eof would wrongly adjust the character counts reported by
%n, yielding an off-by-one error.
2011-04-25 10:40:25 -04:00
e6cc1d6c0e fix initial stack alignment in new threads on x86_64 2011-04-22 18:48:57 -04:00
d878dcecca omit errno update path for syscalls that cannot fail 2011-04-21 21:52:41 -04:00
31f014e0a7 fix bogus return values for inet_pton 2011-04-21 16:57:00 -04:00
870cc67977 fix minor bugs due to incorrect threaded-predicate semantics
some functions that should have been testing whether pthread_self()
had been called and initialized the thread pointer were instead
testing whether pthread_create() had been called and actually made the
program "threaded". while it's unlikely any mismatch would occur in
real-world problems, this could have introduced subtle bugs. now, we
store the address of the main thread's thread descriptor in the libc
structure and use its presence as a flag that the thread register is
initialized. note that after fork, the calling thread (not necessarily
the original main thread) is the new main thread.
2011-04-20 21:41:45 -04:00
f9a6372a98 workaround bug in linux dup2
the linux documentation for dup2 says it can fail with EBUSY due to a
race condition with open and dup in the kernel. shield applications
(and the rest of libc) from this nonsense by looping until it succeeds
2011-04-20 21:05:10 -04:00
10d7561db5 properly create new session/controlling terminal in forkpty 2011-04-20 21:01:42 -04:00
4921ce0867 implement (nonstandard) forkpty 2011-04-20 20:55:13 -04:00
f1ac8a28d8 disallow blank strings as service or host name 2011-04-20 20:02:35 -04:00
d4b5d6e981 fix bugs in ipv4 parsing 2011-04-20 20:00:59 -04:00
29a15ad077 fix initgroups (uninitialized count passed to getgrouplist) 2011-04-20 19:15:27 -04:00
18bca57510 shadow password fixes: empty fields should read as -1 not 0 2011-04-20 19:05:59 -04:00
b052f13cd1 namespace fixes for sys/mman.h 2011-04-20 15:55:58 -04:00
53ab4e793b fix missing include in posix_madvise.c (compile error) 2011-04-20 15:36:15 -04:00
2357350924 support posix_madvise (previous a stub)
the check against MADV_DONTNEED to because linux MADV_DONTNEED
semantics conflict dangerously with the POSIX semantics
2011-04-20 15:25:28 -04:00
1c76683cb4 add syscall wrappers for posix_fadvise, posix_fallocate 2011-04-20 15:20:22 -04:00
145c05345d block cancellation in wordexp, handle more errors 2011-04-19 23:42:56 -04:00
f0fc95d439 avoid malloc of potentially-large string in wordexp 2011-04-19 23:37:57 -04:00
a6054e3c94 move some more code out of pthread_create.c
this also de-uglifies the dummy function aliasing a bit.
2011-04-19 23:09:14 -04:00
4f24994920 fix uninitialized waiters field in semaphores 2011-04-19 13:16:59 -04:00
43ee4df338 dns lookups: protect against cancellation and fix incorrect error codes 2011-04-18 21:35:14 -04:00
75a0be1f65 avoid fd leak if opendir is cancelled when calloc has failed 2011-04-18 21:22:14 -04:00
df9e11bb06 protect ftw and nftw against cancellation 2011-04-18 21:17:03 -04:00
d2c604d5a4 protect syslog against cancellation
these functions are allowed to be cancellation points, but then we
would have to install cleanup handlers to avoid termination with locks
held.
2011-04-18 21:11:23 -04:00
be2e06d347 recheck cancellation disabled flag after syscall returns EINTR
we already checked before making the syscall, but it's possible that a
signal handler interrupted the blocking syscall and disabled
cancellation, and that this is the cause of EINTR. in this case, the
old behavior was testably wrong.
2011-04-18 20:50:37 -04:00
61b56a8d21 remove bogus extra logic for close cancellability
like all other syscalls, close should return to the caller if and only
if it successfully performed its action. it is necessary that the
application be able to determine whether the close succeeded.
2011-04-18 18:42:34 -04:00
1bc44a4734 fix typo in x86_64 cancellable syscall asm 2011-04-17 19:25:17 -04:00
e98bdca9df minimal realpath implementation using /proc
clean and simple, but fails when the caller does not have permissions
to open the file for reading or when /proc is not available. i may
replace this with a full implementation later, possibly leaving this
version as an optimization to use when it works.
2011-04-17 17:32:36 -04:00
2afed79f15 pthread_exit is not supposed to affect cancellability
if the exit was caused by cancellation, __cancel has already set these
flags anyway.
2011-04-17 17:09:41 -04:00
1ebde9c3a2 fix pthread_exit from cancellation handler
cancellation frames were not correctly popped, so this usage would not
only loop, but also reuse discarded and invalid parts of the stack.
2011-04-17 17:06:05 -04:00
9080cc153c clean up handling of thread/nothread mode, locking 2011-04-17 16:53:54 -04:00
eb0e8fa0b1 debloat: use __syscall instead of syscall where possible
don't waste time (and significant code size due to function call
overhead!) setting errno when the result of a syscall does not matter
or when it can't fail.
2011-04-17 16:32:15 -04:00
09dae2b7b6 fix bugs in cancellable syscall asm
x86_64 was just plain wrong in the cancel-flag-already-set path, and
crashing.

the more subtle error was not clearing the saved stack pointer before
returning to c code. this could result in the signal handler
misidentifying c code as the pre-syscall part of the asm, and acting
on cancellation at the wrong time, and thus resource leak race
conditions.

also, now __cancel (in the c code) is responsible for clearing the
saved sp in the already-cancelled branch. this means we have to use
call rather than jmp to ensure the stack pointer in the c will never
match what the asm saved.
2011-04-17 15:30:08 -04:00