]> git.ipfire.org Git - thirdparty/glibc.git/blame - nptl/nptl-init.c
NPTL: Conditionalize more uses of SIGCANCEL and SIGSETXID.
[thirdparty/glibc.git] / nptl / nptl-init.c
CommitLineData
d4697bc9 1/* Copyright (C) 2002-2014 Free Software Foundation, Inc.
76a50749
UD
2 This file is part of the GNU C Library.
3 Contributed by Ulrich Drepper <drepper@redhat.com>, 2002.
4
5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Lesser General Public
7 License as published by the Free Software Foundation; either
8 version 2.1 of the License, or (at your option) any later version.
9
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Lesser General Public License for more details.
14
15 You should have received a copy of the GNU Lesser General Public
59ba27a6
PE
16 License along with the GNU C Library; if not, see
17 <http://www.gnu.org/licenses/>. */
76a50749
UD
18
19#include <assert.h>
cbd8aeb8 20#include <errno.h>
76a50749
UD
21#include <limits.h>
22#include <signal.h>
23#include <stdlib.h>
24#include <unistd.h>
25#include <sys/param.h>
26#include <sys/resource.h>
27#include <pthreadP.h>
28#include <atomic.h>
29#include <ldsodefs.h>
30#include <tls.h>
7a775e6b 31#include <list.h>
76a50749
UD
32#include <fork.h>
33#include <version.h>
bf293afe 34#include <shlib-compat.h>
2c0b891a 35#include <smp.h>
2edb61e3 36#include <lowlevellock.h>
f8de5057 37#include <kernel-features.h>
76a50749
UD
38
39
76a50749
UD
40/* Size and alignment of static TLS block. */
41size_t __static_tls_size;
923e02ea 42size_t __static_tls_align_m1;
76a50749 43
0f6699ea
UD
44#ifndef __ASSUME_SET_ROBUST_LIST
45/* Negative if we do not have the system call and we can use it. */
46int __set_robust_list_avail;
47# define set_robust_list_not_avail() \
48 __set_robust_list_avail = -1
49#else
50# define set_robust_list_not_avail() do { } while (0)
51#endif
52
cbd8aeb8
UD
53#ifndef __ASSUME_FUTEX_CLOCK_REALTIME
54/* Nonzero if we do not have FUTEX_CLOCK_REALTIME. */
55int __have_futex_clock_realtime;
56# define __set_futex_clock_realtime() \
57 __have_futex_clock_realtime = 1
58#else
59#define __set_futex_clock_realtime() do { } while (0)
60#endif
61
76a50749 62/* Version of the library, used in libthread_db to detect mismatches. */
e3b22ad3 63static const char nptl_version[] __attribute_used__ = VERSION;
76a50749
UD
64
65
11bf311e 66#ifndef SHARED
76a50749
UD
67extern void __libc_setup_tls (size_t tcbsize, size_t tcbalign);
68#endif
69
6f8326ca
UD
70#ifdef SHARED
71static
72#else
73extern
74#endif
75void __nptl_set_robust (struct pthread *);
76
30991b8b 77#ifdef SHARED
cca50323
UD
78static void nptl_freeres (void);
79
76a50749 80
630d93a7 81static const struct pthread_functions pthread_functions =
8454830b
UD
82 {
83 .ptr_pthread_attr_destroy = __pthread_attr_destroy,
73e9ae88 84# if SHLIB_COMPAT(libpthread, GLIBC_2_0, GLIBC_2_1)
49e9f864 85 .ptr___pthread_attr_init_2_0 = __pthread_attr_init_2_0,
73e9ae88 86# endif
49e9f864 87 .ptr___pthread_attr_init_2_1 = __pthread_attr_init_2_1,
8454830b
UD
88 .ptr_pthread_attr_getdetachstate = __pthread_attr_getdetachstate,
89 .ptr_pthread_attr_setdetachstate = __pthread_attr_setdetachstate,
90 .ptr_pthread_attr_getinheritsched = __pthread_attr_getinheritsched,
91 .ptr_pthread_attr_setinheritsched = __pthread_attr_setinheritsched,
92 .ptr_pthread_attr_getschedparam = __pthread_attr_getschedparam,
93 .ptr_pthread_attr_setschedparam = __pthread_attr_setschedparam,
94 .ptr_pthread_attr_getschedpolicy = __pthread_attr_getschedpolicy,
95 .ptr_pthread_attr_setschedpolicy = __pthread_attr_setschedpolicy,
96 .ptr_pthread_attr_getscope = __pthread_attr_getscope,
97 .ptr_pthread_attr_setscope = __pthread_attr_setscope,
98 .ptr_pthread_condattr_destroy = __pthread_condattr_destroy,
99 .ptr_pthread_condattr_init = __pthread_condattr_init,
bf293afe
UD
100 .ptr___pthread_cond_broadcast = __pthread_cond_broadcast,
101 .ptr___pthread_cond_destroy = __pthread_cond_destroy,
102 .ptr___pthread_cond_init = __pthread_cond_init,
103 .ptr___pthread_cond_signal = __pthread_cond_signal,
104 .ptr___pthread_cond_wait = __pthread_cond_wait,
c503d3dc 105 .ptr___pthread_cond_timedwait = __pthread_cond_timedwait,
73e9ae88 106# if SHLIB_COMPAT(libpthread, GLIBC_2_0, GLIBC_2_3_2)
bf293afe
UD
107 .ptr___pthread_cond_broadcast_2_0 = __pthread_cond_broadcast_2_0,
108 .ptr___pthread_cond_destroy_2_0 = __pthread_cond_destroy_2_0,
109 .ptr___pthread_cond_init_2_0 = __pthread_cond_init_2_0,
110 .ptr___pthread_cond_signal_2_0 = __pthread_cond_signal_2_0,
111 .ptr___pthread_cond_wait_2_0 = __pthread_cond_wait_2_0,
c503d3dc 112 .ptr___pthread_cond_timedwait_2_0 = __pthread_cond_timedwait_2_0,
73e9ae88 113# endif
8454830b 114 .ptr_pthread_equal = __pthread_equal,
49e9f864 115 .ptr___pthread_exit = __pthread_exit,
8454830b
UD
116 .ptr_pthread_getschedparam = __pthread_getschedparam,
117 .ptr_pthread_setschedparam = __pthread_setschedparam,
4d17e683
AS
118 .ptr_pthread_mutex_destroy = __pthread_mutex_destroy,
119 .ptr_pthread_mutex_init = __pthread_mutex_init,
120 .ptr_pthread_mutex_lock = __pthread_mutex_lock,
121 .ptr_pthread_mutex_unlock = __pthread_mutex_unlock,
8454830b
UD
122 .ptr_pthread_self = __pthread_self,
123 .ptr_pthread_setcancelstate = __pthread_setcancelstate,
73e9ae88
UD
124 .ptr_pthread_setcanceltype = __pthread_setcanceltype,
125 .ptr___pthread_cleanup_upto = __pthread_cleanup_upto,
4d17e683
AS
126 .ptr___pthread_once = __pthread_once,
127 .ptr___pthread_rwlock_rdlock = __pthread_rwlock_rdlock,
128 .ptr___pthread_rwlock_wrlock = __pthread_rwlock_wrlock,
129 .ptr___pthread_rwlock_unlock = __pthread_rwlock_unlock,
130 .ptr___pthread_key_create = __pthread_key_create,
131 .ptr___pthread_getspecific = __pthread_getspecific,
132 .ptr___pthread_setspecific = __pthread_setspecific,
73e9ae88 133 .ptr__pthread_cleanup_push_defer = __pthread_cleanup_push_defer,
47202270 134 .ptr__pthread_cleanup_pop_restore = __pthread_cleanup_pop_restore,
6efd4814 135 .ptr_nthreads = &__nptl_nthreads,
3fa21fd8 136 .ptr___pthread_unwind = &__pthread_unwind,
2edb61e3 137 .ptr__nptl_deallocate_tsd = __nptl_deallocate_tsd,
ba408f84
UD
138 .ptr__nptl_setxid = __nptl_setxid,
139 /* For now only the stack cache needs to be freed. */
6f8326ca
UD
140 .ptr_freeres = nptl_freeres,
141 .ptr_set_robust = __nptl_set_robust
8454830b
UD
142 };
143# define ptr_pthread_functions &pthread_functions
144#else
145# define ptr_pthread_functions NULL
146#endif
147
148
30991b8b 149#ifdef SHARED
cca50323
UD
150/* This function is called indirectly from the freeres code in libc. */
151static void
152__libc_freeres_fn_section
153nptl_freeres (void)
154{
cca50323 155 __unwind_freeres ();
cca50323
UD
156 __free_stacks (0);
157}
6f8326ca
UD
158
159
160static
30991b8b 161#endif
6f8326ca
UD
162void
163__nptl_set_robust (struct pthread *self)
164{
b0643088 165#ifdef __NR_set_robust_list
6f8326ca
UD
166 INTERNAL_SYSCALL_DECL (err);
167 INTERNAL_SYSCALL (set_robust_list, err, 2, &self->robust_head,
168 sizeof (struct robust_list_head));
b0643088 169#endif
6f8326ca 170}
cca50323
UD
171
172
327ae257 173#ifdef SIGCANCEL
76a50749
UD
174/* For asynchronous cancellation we use a signal. This is the handler. */
175static void
a1ed6b4c 176sigcancel_handler (int sig, siginfo_t *si, void *ctx)
76a50749 177{
7960f2a7
UD
178 /* Determine the process ID. It might be negative if the thread is
179 in the middle of a fork() call. */
180 pid_t pid = THREAD_GETMEM (THREAD_SELF, pid);
a1ffb40e 181 if (__glibc_unlikely (pid < 0))
7960f2a7 182 pid = -pid;
7960f2a7 183
a1ed6b4c 184 /* Safety check. It would be possible to call this function for
2edb61e3 185 other signals and send a signal from another process. This is not
a1ed6b4c
UD
186 correct and might even be a security problem. Try to catch as
187 many incorrect invocations as possible. */
188 if (sig != SIGCANCEL
7960f2a7 189 || si->si_pid != pid
a1ed6b4c 190 || si->si_code != SI_TKILL)
a1ed6b4c
UD
191 return;
192
76a50749
UD
193 struct pthread *self = THREAD_SELF;
194
b22d701b 195 int oldval = THREAD_GETMEM (self, cancelhandling);
76a50749
UD
196 while (1)
197 {
198 /* We are canceled now. When canceled by another thread this flag
199 is already set but if the signal is directly send (internally or
200 from another process) is has to be done here. */
e320ef46 201 int newval = oldval | CANCELING_BITMASK | CANCELED_BITMASK;
76a50749
UD
202
203 if (oldval == newval || (oldval & EXITING_BITMASK) != 0)
204 /* Already canceled or exiting. */
205 break;
206
b22d701b
UD
207 int curval = THREAD_ATOMIC_CMPXCHG_VAL (self, cancelhandling, newval,
208 oldval);
209 if (curval == oldval)
76a50749
UD
210 {
211 /* Set the return value. */
212 THREAD_SETMEM (self, result, PTHREAD_CANCELED);
213
214 /* Make sure asynchronous cancellation is still enabled. */
215 if ((newval & CANCELTYPE_BITMASK) != 0)
d9eb687b
UD
216 /* Run the registered destructors and terminate the thread. */
217 __do_cancel ();
76a50749
UD
218
219 break;
220 }
b22d701b
UD
221
222 oldval = curval;
76a50749
UD
223 }
224}
327ae257 225#endif
76a50749
UD
226
227
327ae257 228#ifdef SIGSETXID
2edb61e3
UD
229struct xid_command *__xidcmd attribute_hidden;
230
a9843058
SP
231/* We use the SIGSETXID signal in the setuid, setgid, etc. implementations to
232 tell each thread to call the respective setxid syscall on itself. This is
233 the handler. */
2edb61e3
UD
234static void
235sighandler_setxid (int sig, siginfo_t *si, void *ctx)
236{
7960f2a7
UD
237 /* Determine the process ID. It might be negative if the thread is
238 in the middle of a fork() call. */
239 pid_t pid = THREAD_GETMEM (THREAD_SELF, pid);
13f7fe35 240 int result;
a1ffb40e 241 if (__glibc_unlikely (pid < 0))
7960f2a7 242 pid = -pid;
7960f2a7 243
2edb61e3
UD
244 /* Safety check. It would be possible to call this function for
245 other signals and send a signal from another process. This is not
246 correct and might even be a security problem. Try to catch as
247 many incorrect invocations as possible. */
248 if (sig != SIGSETXID
7960f2a7 249 || si->si_pid != pid
2edb61e3
UD
250 || si->si_code != SI_TKILL)
251 return;
252
253 INTERNAL_SYSCALL_DECL (err);
13f7fe35
FW
254 result = INTERNAL_SYSCALL_NCS (__xidcmd->syscall_no, err, 3, __xidcmd->id[0],
255 __xidcmd->id[1], __xidcmd->id[2]);
771eb141 256 int error = 0;
13f7fe35 257 if (__glibc_unlikely (INTERNAL_SYSCALL_ERROR_P (result, err)))
771eb141
FW
258 error = INTERNAL_SYSCALL_ERRNO (result, err);
259 __nptl_setxid_error (__xidcmd, error);
2edb61e3 260
dff9a7a1
UD
261 /* Reset the SETXID flag. */
262 struct pthread *self = THREAD_SELF;
25db0f6c
DJ
263 int flags, newval;
264 do
265 {
266 flags = THREAD_GETMEM (self, cancelhandling);
267 newval = THREAD_ATOMIC_CMPXCHG_VAL (self, cancelhandling,
268 flags & ~SETXID_BITMASK, flags);
269 }
270 while (flags != newval);
dff9a7a1
UD
271
272 /* And release the futex. */
273 self->setxid_futex = 1;
085a4412 274 lll_futex_wake (&self->setxid_futex, 1, LLL_PRIVATE);
25db0f6c
DJ
275
276 if (atomic_decrement_val (&__xidcmd->cntr) == 0)
277 lll_futex_wake (&__xidcmd->cntr, 1, LLL_PRIVATE);
2edb61e3 278}
327ae257 279#endif
2edb61e3
UD
280
281
b1531183
UD
282/* When using __thread for this, we do it in libc so as not
283 to give libpthread its own TLS segment just for this. */
284extern void **__libc_dl_error_tsd (void) __attribute__ ((const));
285
76a50749 286
0ecf9c10 287/* This can be set by the debugger before initialization is complete. */
e965d514 288static bool __nptl_initial_report_events __attribute_used__;
0ecf9c10 289
76a50749 290void
4e9b5995 291__pthread_initialize_minimal_internal (void)
76a50749 292{
76a50749
UD
293#ifndef SHARED
294 /* Unlike in the dynamically linked case the dynamic linker has not
295 taken care of initializing the TLS data structures. */
296 __libc_setup_tls (TLS_TCB_SIZE, TLS_TCB_ALIGN);
85631c8e
UD
297
298 /* We must prevent gcc from being clever and move any of the
299 following code ahead of the __libc_setup_tls call. This function
300 will initialize the thread register which is subsequently
301 used. */
302 __asm __volatile ("");
76a50749
UD
303#endif
304
305 /* Minimal initialization of the thread descriptor. */
75cddafe 306 struct pthread *pd = THREAD_SELF;
6aca81bb 307 INTERNAL_SYSCALL_DECL (err);
db54f488 308 pd->pid = pd->tid = INTERNAL_SYSCALL (set_tid_address, err, 1, &pd->tid);
76a50749
UD
309 THREAD_SETMEM (pd, specific[0], &pd->specific_1stblock[0]);
310 THREAD_SETMEM (pd, user_stack, true);
311 if (LLL_LOCK_INITIALIZER != 0)
312 THREAD_SETMEM (pd, lock, LLL_LOCK_INITIALIZER);
313#if HP_TIMING_AVAIL
314 THREAD_SETMEM (pd, cpuclock_offset, GL(dl_cpuclock_offset));
315#endif
316
0f6699ea
UD
317 /* Initialize the robust mutex data. */
318#ifdef __PTHREAD_MUTEX_HAVE_PREV
319 pd->robust_prev = &pd->robust_head;
320#endif
321 pd->robust_head.list = &pd->robust_head;
322#ifdef __NR_set_robust_list
323 pd->robust_head.futex_offset = (offsetof (pthread_mutex_t, __data.__lock)
324 - offsetof (pthread_mutex_t,
325 __data.__list.__next));
326 int res = INTERNAL_SYSCALL (set_robust_list, err, 2, &pd->robust_head,
327 sizeof (struct robust_list_head));
328 if (INTERNAL_SYSCALL_ERROR_P (res, err))
329#endif
330 set_robust_list_not_avail ();
331
e59660bc 332#ifndef __ASSUME_PRIVATE_FUTEX
5a8075b1
UD
333 /* Private futexes are always used (at least internally) so that
334 doing the test once this early is beneficial. */
335 {
e807818b 336 int word = 0;
e59660bc 337 word = INTERNAL_SYSCALL (futex, err, 3, &word,
5a8075b1 338 FUTEX_WAKE | FUTEX_PRIVATE_FLAG, 1);
e59660bc
UD
339 if (!INTERNAL_SYSCALL_ERROR_P (word, err))
340 THREAD_SETMEM (pd, header.private_futex, FUTEX_PRIVATE_FLAG);
5a8075b1 341 }
5a8075b1 342
3c612057
UD
343 /* Private futexes have been introduced earlier than the
344 FUTEX_CLOCK_REALTIME flag. We don't have to run the test if we
345 know the former are not supported. This also means we know the
346 kernel will return ENOSYS for unknown operations. */
347 if (THREAD_GETMEM (pd, header.private_futex) != 0)
348#endif
cbd8aeb8 349#ifndef __ASSUME_FUTEX_CLOCK_REALTIME
3c612057
UD
350 {
351 int word = 0;
352 /* NB: the syscall actually takes six parameters. The last is the
353 bit mask. But since we will not actually wait at all the value
354 is irrelevant. Given that passing six parameters is difficult
355 on some architectures we just pass whatever random value the
356 calling convention calls for to the kernel. It causes no harm. */
357 word = INTERNAL_SYSCALL (futex, err, 5, &word,
358 FUTEX_WAIT_BITSET | FUTEX_CLOCK_REALTIME
359 | FUTEX_PRIVATE_FLAG, 1, NULL, 0);
360 assert (INTERNAL_SYSCALL_ERROR_P (word, err));
361 if (INTERNAL_SYSCALL_ERRNO (word, err) != ENOSYS)
362 __set_futex_clock_realtime ();
363 }
cbd8aeb8
UD
364#endif
365
675620f7
UD
366 /* Set initial thread's stack block from 0 up to __libc_stack_end.
367 It will be bigger than it actually is, but for unwind.c/pt-longjmp.c
368 purposes this is good enough. */
369 THREAD_SETMEM (pd, stackblock_size, (size_t) __libc_stack_end);
370
fde89ad0 371 /* Initialize the list of all running threads with the main thread. */
a4548cea 372 INIT_LIST_HEAD (&__stack_user);
d4f64e1a 373 list_add (&pd->list, &__stack_user);
76a50749 374
0ecf9c10
RM
375 /* Before initializing __stack_user, the debugger could not find us and
376 had to set __nptl_initial_report_events. Propagate its setting. */
377 THREAD_SETMEM (pd, report_events, __nptl_initial_report_events);
76a50749 378
327ae257
RM
379#if defined SIGCANCEL || defined SIGSETXID
380 struct sigaction sa;
381 __sigemptyset (&sa.sa_mask);
382
383# ifdef SIGCANCEL
76a50749
UD
384 /* Install the cancellation signal handler. If for some reason we
385 cannot install the handler we do not abort. Maybe we should, but
386 it is only asynchronous cancellation which is affected. */
a1ed6b4c
UD
387 sa.sa_sigaction = sigcancel_handler;
388 sa.sa_flags = SA_SIGINFO;
76a50749 389 (void) __libc_sigaction (SIGCANCEL, &sa, NULL);
327ae257 390# endif
76a50749 391
327ae257 392# ifdef SIGSETXID
2edb61e3
UD
393 /* Install the handle to change the threads' uid/gid. */
394 sa.sa_sigaction = sighandler_setxid;
395 sa.sa_flags = SA_SIGINFO | SA_RESTART;
2edb61e3 396 (void) __libc_sigaction (SIGSETXID, &sa, NULL);
327ae257 397# endif
2edb61e3 398
708bfb9a 399 /* The parent process might have left the signals blocked. Just in
f006d3a0
UD
400 case, unblock it. We reuse the signal mask in the sigaction
401 structure. It is already cleared. */
327ae257 402# ifdef SIGCANCEL
f006d3a0 403 __sigaddset (&sa.sa_mask, SIGCANCEL);
327ae257
RM
404# endif
405# ifdef SIGSETXID
708bfb9a 406 __sigaddset (&sa.sa_mask, SIGSETXID);
327ae257 407# endif
f006d3a0
UD
408 (void) INTERNAL_SYSCALL (rt_sigprocmask, err, 4, SIG_UNBLOCK, &sa.sa_mask,
409 NULL, _NSIG / 8);
327ae257 410#endif
f006d3a0 411
b399707e
RM
412 /* Get the size of the static and alignment requirements for the TLS
413 block. */
414 size_t static_tls_align;
415 _dl_get_tls_static_info (&__static_tls_size, &static_tls_align);
416
417 /* Make sure the size takes all the alignments into account. */
418 if (STACK_ALIGN > static_tls_align)
419 static_tls_align = STACK_ALIGN;
420 __static_tls_align_m1 = static_tls_align - 1;
421
422 __static_tls_size = roundup (__static_tls_size, static_tls_align);
76a50749 423
4e9b5995
CD
424 /* Determine the default allowed stack size. This is the size used
425 in case the user does not specify one. */
426 struct rlimit limit;
427 if (getrlimit (RLIMIT_STACK, &limit) != 0
428 || limit.rlim_cur == RLIM_INFINITY)
429 /* The system limit is not usable. Use an architecture-specific
430 default. */
431 limit.rlim_cur = ARCH_STACK_DEFAULT_SIZE;
432 else if (limit.rlim_cur < PTHREAD_STACK_MIN)
433 /* The system limit is unusably small.
434 Use the minimal size acceptable. */
435 limit.rlim_cur = PTHREAD_STACK_MIN;
e23872c8 436
4e9b5995
CD
437 /* Make sure it meets the minimum size that allocate_stack
438 (allocatestack.c) will demand, which depends on the page size. */
439 const uintptr_t pagesz = GLRO(dl_pagesize);
440 const size_t minstack = pagesz + __static_tls_size + MINIMAL_REST_STACK;
441 if (limit.rlim_cur < minstack)
442 limit.rlim_cur = minstack;
e23872c8 443
4e9b5995
CD
444 /* Round the resource limit up to page size. */
445 limit.rlim_cur = (limit.rlim_cur + pagesz - 1) & -pagesz;
61dd6208 446 lll_lock (__default_pthread_attr_lock, LLL_PRIVATE);
e903a713
SP
447 __default_pthread_attr.stacksize = limit.rlim_cur;
448 __default_pthread_attr.guardsize = GLRO (dl_pagesize);
61dd6208 449 lll_unlock (__default_pthread_attr_lock, LLL_PRIVATE);
76a50749 450
b1531183
UD
451#ifdef SHARED
452 /* Transfer the old value from the dynamic linker's internal location. */
453 *__libc_dl_error_tsd () = *(*GL(dl_error_catch_tsd)) ();
454 GL(dl_error_catch_tsd) = &__libc_dl_error_tsd;
334fcf2a
UD
455
456 /* Make __rtld_lock_{,un}lock_recursive use pthread_mutex_{,un}lock,
457 keep the lock count from the ld.so implementation. */
4d17e683
AS
458 GL(dl_rtld_lock_recursive) = (void *) __pthread_mutex_lock;
459 GL(dl_rtld_unlock_recursive) = (void *) __pthread_mutex_unlock;
334fcf2a
UD
460 unsigned int rtld_lock_count = GL(dl_load_lock).mutex.__data.__count;
461 GL(dl_load_lock).mutex.__data.__count = 0;
462 while (rtld_lock_count-- > 0)
4d17e683 463 __pthread_mutex_lock (&GL(dl_load_lock).mutex);
54ee14b3
UD
464
465 GL(dl_make_stack_executable_hook) = &__make_stacks_executable;
b1531183
UD
466#endif
467
adc12574
UD
468 GL(dl_init_static_tls) = &__pthread_init_static_tls;
469
7adefea8
UD
470 GL(dl_wait_lookup_done) = &__wait_lookup_done;
471
76a50749 472 /* Register the fork generation counter with the libc. */
5a03acfe
UD
473#ifndef TLS_MULTIPLE_THREADS_IN_TCB
474 __libc_multiple_threads_ptr =
475#endif
476 __libc_pthread_init (&__fork_generation, __reclaim_stacks,
477 ptr_pthread_functions);
2c0b891a
UD
478
479 /* Determine whether the machine is SMP or not. */
480 __is_smp = is_smp_system ();
76a50749 481}
2ae920ed
UD
482strong_alias (__pthread_initialize_minimal_internal,
483 __pthread_initialize_minimal)
2c1094bd
UD
484
485
486size_t
487__pthread_get_minstack (const pthread_attr_t *attr)
488{
489 struct pthread_attr *iattr = (struct pthread_attr *) attr;
490
491 return (GLRO(dl_pagesize) + __static_tls_size + PTHREAD_STACK_MIN
492 + iattr->guardsize);
493}