]> git.ipfire.org Git - thirdparty/glibc.git/blame - nptl/nptl-init.c
Fix sign of zero part from ctan / ctanh when argument infinite (bug 17118).
[thirdparty/glibc.git] / nptl / nptl-init.c
CommitLineData
b168057a 1/* Copyright (C) 2002-2015 Free Software Foundation, Inc.
76a50749
UD
2 This file is part of the GNU C Library.
3 Contributed by Ulrich Drepper <drepper@redhat.com>, 2002.
4
5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Lesser General Public
7 License as published by the Free Software Foundation; either
8 version 2.1 of the License, or (at your option) any later version.
9
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Lesser General Public License for more details.
14
15 You should have received a copy of the GNU Lesser General Public
59ba27a6
PE
16 License along with the GNU C Library; if not, see
17 <http://www.gnu.org/licenses/>. */
76a50749
UD
18
19#include <assert.h>
cbd8aeb8 20#include <errno.h>
76a50749
UD
21#include <limits.h>
22#include <signal.h>
23#include <stdlib.h>
24#include <unistd.h>
25#include <sys/param.h>
26#include <sys/resource.h>
27#include <pthreadP.h>
28#include <atomic.h>
29#include <ldsodefs.h>
30#include <tls.h>
7a775e6b 31#include <list.h>
76a50749
UD
32#include <fork.h>
33#include <version.h>
bf293afe 34#include <shlib-compat.h>
2c0b891a 35#include <smp.h>
2edb61e3 36#include <lowlevellock.h>
a2f0363f 37#include <futex-internal.h>
f8de5057 38#include <kernel-features.h>
6d03458e 39#include <libc-internal.h>
7cea6212 40#include <pthread-pids.h>
76a50749 41
c6aab2cb
RM
42#ifndef TLS_MULTIPLE_THREADS_IN_TCB
43/* Pointer to the corresponding variable in libc. */
44int *__libc_multiple_threads_ptr attribute_hidden;
45#endif
46
76a50749
UD
47/* Size and alignment of static TLS block. */
48size_t __static_tls_size;
923e02ea 49size_t __static_tls_align_m1;
76a50749 50
0f6699ea
UD
51#ifndef __ASSUME_SET_ROBUST_LIST
52/* Negative if we do not have the system call and we can use it. */
53int __set_robust_list_avail;
54# define set_robust_list_not_avail() \
55 __set_robust_list_avail = -1
56#else
57# define set_robust_list_not_avail() do { } while (0)
58#endif
59
cbd8aeb8
UD
60#ifndef __ASSUME_FUTEX_CLOCK_REALTIME
61/* Nonzero if we do not have FUTEX_CLOCK_REALTIME. */
62int __have_futex_clock_realtime;
63# define __set_futex_clock_realtime() \
64 __have_futex_clock_realtime = 1
65#else
66#define __set_futex_clock_realtime() do { } while (0)
67#endif
68
76a50749 69/* Version of the library, used in libthread_db to detect mismatches. */
e3b22ad3 70static const char nptl_version[] __attribute_used__ = VERSION;
76a50749
UD
71
72
11bf311e 73#ifndef SHARED
76a50749
UD
74extern void __libc_setup_tls (size_t tcbsize, size_t tcbalign);
75#endif
76
6f8326ca
UD
77#ifdef SHARED
78static
79#else
80extern
81#endif
82void __nptl_set_robust (struct pthread *);
83
30991b8b 84#ifdef SHARED
cca50323
UD
85static void nptl_freeres (void);
86
76a50749 87
630d93a7 88static const struct pthread_functions pthread_functions =
8454830b
UD
89 {
90 .ptr_pthread_attr_destroy = __pthread_attr_destroy,
73e9ae88 91# if SHLIB_COMPAT(libpthread, GLIBC_2_0, GLIBC_2_1)
49e9f864 92 .ptr___pthread_attr_init_2_0 = __pthread_attr_init_2_0,
73e9ae88 93# endif
49e9f864 94 .ptr___pthread_attr_init_2_1 = __pthread_attr_init_2_1,
8454830b
UD
95 .ptr_pthread_attr_getdetachstate = __pthread_attr_getdetachstate,
96 .ptr_pthread_attr_setdetachstate = __pthread_attr_setdetachstate,
97 .ptr_pthread_attr_getinheritsched = __pthread_attr_getinheritsched,
98 .ptr_pthread_attr_setinheritsched = __pthread_attr_setinheritsched,
99 .ptr_pthread_attr_getschedparam = __pthread_attr_getschedparam,
100 .ptr_pthread_attr_setschedparam = __pthread_attr_setschedparam,
101 .ptr_pthread_attr_getschedpolicy = __pthread_attr_getschedpolicy,
102 .ptr_pthread_attr_setschedpolicy = __pthread_attr_setschedpolicy,
103 .ptr_pthread_attr_getscope = __pthread_attr_getscope,
104 .ptr_pthread_attr_setscope = __pthread_attr_setscope,
105 .ptr_pthread_condattr_destroy = __pthread_condattr_destroy,
106 .ptr_pthread_condattr_init = __pthread_condattr_init,
bf293afe
UD
107 .ptr___pthread_cond_broadcast = __pthread_cond_broadcast,
108 .ptr___pthread_cond_destroy = __pthread_cond_destroy,
109 .ptr___pthread_cond_init = __pthread_cond_init,
110 .ptr___pthread_cond_signal = __pthread_cond_signal,
111 .ptr___pthread_cond_wait = __pthread_cond_wait,
c503d3dc 112 .ptr___pthread_cond_timedwait = __pthread_cond_timedwait,
73e9ae88 113# if SHLIB_COMPAT(libpthread, GLIBC_2_0, GLIBC_2_3_2)
bf293afe
UD
114 .ptr___pthread_cond_broadcast_2_0 = __pthread_cond_broadcast_2_0,
115 .ptr___pthread_cond_destroy_2_0 = __pthread_cond_destroy_2_0,
116 .ptr___pthread_cond_init_2_0 = __pthread_cond_init_2_0,
117 .ptr___pthread_cond_signal_2_0 = __pthread_cond_signal_2_0,
118 .ptr___pthread_cond_wait_2_0 = __pthread_cond_wait_2_0,
c503d3dc 119 .ptr___pthread_cond_timedwait_2_0 = __pthread_cond_timedwait_2_0,
73e9ae88 120# endif
8454830b 121 .ptr_pthread_equal = __pthread_equal,
49e9f864 122 .ptr___pthread_exit = __pthread_exit,
8454830b
UD
123 .ptr_pthread_getschedparam = __pthread_getschedparam,
124 .ptr_pthread_setschedparam = __pthread_setschedparam,
4d17e683
AS
125 .ptr_pthread_mutex_destroy = __pthread_mutex_destroy,
126 .ptr_pthread_mutex_init = __pthread_mutex_init,
127 .ptr_pthread_mutex_lock = __pthread_mutex_lock,
128 .ptr_pthread_mutex_unlock = __pthread_mutex_unlock,
8454830b
UD
129 .ptr_pthread_self = __pthread_self,
130 .ptr_pthread_setcancelstate = __pthread_setcancelstate,
73e9ae88
UD
131 .ptr_pthread_setcanceltype = __pthread_setcanceltype,
132 .ptr___pthread_cleanup_upto = __pthread_cleanup_upto,
4d17e683
AS
133 .ptr___pthread_once = __pthread_once,
134 .ptr___pthread_rwlock_rdlock = __pthread_rwlock_rdlock,
135 .ptr___pthread_rwlock_wrlock = __pthread_rwlock_wrlock,
136 .ptr___pthread_rwlock_unlock = __pthread_rwlock_unlock,
137 .ptr___pthread_key_create = __pthread_key_create,
138 .ptr___pthread_getspecific = __pthread_getspecific,
139 .ptr___pthread_setspecific = __pthread_setspecific,
73e9ae88 140 .ptr__pthread_cleanup_push_defer = __pthread_cleanup_push_defer,
47202270 141 .ptr__pthread_cleanup_pop_restore = __pthread_cleanup_pop_restore,
6efd4814 142 .ptr_nthreads = &__nptl_nthreads,
3fa21fd8 143 .ptr___pthread_unwind = &__pthread_unwind,
2edb61e3 144 .ptr__nptl_deallocate_tsd = __nptl_deallocate_tsd,
cc40d25e 145# ifdef SIGSETXID
ba408f84 146 .ptr__nptl_setxid = __nptl_setxid,
cc40d25e 147# endif
ba408f84 148 /* For now only the stack cache needs to be freed. */
6f8326ca
UD
149 .ptr_freeres = nptl_freeres,
150 .ptr_set_robust = __nptl_set_robust
8454830b
UD
151 };
152# define ptr_pthread_functions &pthread_functions
153#else
154# define ptr_pthread_functions NULL
155#endif
156
157
30991b8b 158#ifdef SHARED
cca50323
UD
159/* This function is called indirectly from the freeres code in libc. */
160static void
161__libc_freeres_fn_section
162nptl_freeres (void)
163{
cca50323 164 __unwind_freeres ();
cca50323
UD
165 __free_stacks (0);
166}
6f8326ca
UD
167
168
169static
30991b8b 170#endif
6f8326ca
UD
171void
172__nptl_set_robust (struct pthread *self)
173{
b0643088 174#ifdef __NR_set_robust_list
6f8326ca
UD
175 INTERNAL_SYSCALL_DECL (err);
176 INTERNAL_SYSCALL (set_robust_list, err, 2, &self->robust_head,
177 sizeof (struct robust_list_head));
b0643088 178#endif
6f8326ca 179}
cca50323
UD
180
181
327ae257 182#ifdef SIGCANCEL
76a50749
UD
183/* For asynchronous cancellation we use a signal. This is the handler. */
184static void
a1ed6b4c 185sigcancel_handler (int sig, siginfo_t *si, void *ctx)
76a50749 186{
7960f2a7
UD
187 /* Determine the process ID. It might be negative if the thread is
188 in the middle of a fork() call. */
189 pid_t pid = THREAD_GETMEM (THREAD_SELF, pid);
a1ffb40e 190 if (__glibc_unlikely (pid < 0))
7960f2a7 191 pid = -pid;
7960f2a7 192
a1ed6b4c 193 /* Safety check. It would be possible to call this function for
2edb61e3 194 other signals and send a signal from another process. This is not
a1ed6b4c
UD
195 correct and might even be a security problem. Try to catch as
196 many incorrect invocations as possible. */
197 if (sig != SIGCANCEL
7960f2a7 198 || si->si_pid != pid
a1ed6b4c 199 || si->si_code != SI_TKILL)
a1ed6b4c
UD
200 return;
201
76a50749
UD
202 struct pthread *self = THREAD_SELF;
203
b22d701b 204 int oldval = THREAD_GETMEM (self, cancelhandling);
76a50749
UD
205 while (1)
206 {
207 /* We are canceled now. When canceled by another thread this flag
208 is already set but if the signal is directly send (internally or
209 from another process) is has to be done here. */
e320ef46 210 int newval = oldval | CANCELING_BITMASK | CANCELED_BITMASK;
76a50749
UD
211
212 if (oldval == newval || (oldval & EXITING_BITMASK) != 0)
213 /* Already canceled or exiting. */
214 break;
215
b22d701b
UD
216 int curval = THREAD_ATOMIC_CMPXCHG_VAL (self, cancelhandling, newval,
217 oldval);
218 if (curval == oldval)
76a50749
UD
219 {
220 /* Set the return value. */
221 THREAD_SETMEM (self, result, PTHREAD_CANCELED);
222
223 /* Make sure asynchronous cancellation is still enabled. */
224 if ((newval & CANCELTYPE_BITMASK) != 0)
d9eb687b
UD
225 /* Run the registered destructors and terminate the thread. */
226 __do_cancel ();
76a50749
UD
227
228 break;
229 }
b22d701b
UD
230
231 oldval = curval;
76a50749
UD
232 }
233}
327ae257 234#endif
76a50749
UD
235
236
327ae257 237#ifdef SIGSETXID
2edb61e3
UD
238struct xid_command *__xidcmd attribute_hidden;
239
a9843058
SP
240/* We use the SIGSETXID signal in the setuid, setgid, etc. implementations to
241 tell each thread to call the respective setxid syscall on itself. This is
242 the handler. */
2edb61e3
UD
243static void
244sighandler_setxid (int sig, siginfo_t *si, void *ctx)
245{
7960f2a7
UD
246 /* Determine the process ID. It might be negative if the thread is
247 in the middle of a fork() call. */
248 pid_t pid = THREAD_GETMEM (THREAD_SELF, pid);
13f7fe35 249 int result;
a1ffb40e 250 if (__glibc_unlikely (pid < 0))
7960f2a7 251 pid = -pid;
7960f2a7 252
2edb61e3
UD
253 /* Safety check. It would be possible to call this function for
254 other signals and send a signal from another process. This is not
255 correct and might even be a security problem. Try to catch as
256 many incorrect invocations as possible. */
257 if (sig != SIGSETXID
7960f2a7 258 || si->si_pid != pid
2edb61e3
UD
259 || si->si_code != SI_TKILL)
260 return;
261
262 INTERNAL_SYSCALL_DECL (err);
13f7fe35
FW
263 result = INTERNAL_SYSCALL_NCS (__xidcmd->syscall_no, err, 3, __xidcmd->id[0],
264 __xidcmd->id[1], __xidcmd->id[2]);
771eb141 265 int error = 0;
13f7fe35 266 if (__glibc_unlikely (INTERNAL_SYSCALL_ERROR_P (result, err)))
771eb141
FW
267 error = INTERNAL_SYSCALL_ERRNO (result, err);
268 __nptl_setxid_error (__xidcmd, error);
2edb61e3 269
dff9a7a1
UD
270 /* Reset the SETXID flag. */
271 struct pthread *self = THREAD_SELF;
25db0f6c
DJ
272 int flags, newval;
273 do
274 {
275 flags = THREAD_GETMEM (self, cancelhandling);
276 newval = THREAD_ATOMIC_CMPXCHG_VAL (self, cancelhandling,
277 flags & ~SETXID_BITMASK, flags);
278 }
279 while (flags != newval);
dff9a7a1
UD
280
281 /* And release the futex. */
282 self->setxid_futex = 1;
a2f0363f 283 futex_wake (&self->setxid_futex, 1, FUTEX_PRIVATE);
25db0f6c
DJ
284
285 if (atomic_decrement_val (&__xidcmd->cntr) == 0)
a2f0363f 286 futex_wake ((unsigned int *) &__xidcmd->cntr, 1, FUTEX_PRIVATE);
2edb61e3 287}
327ae257 288#endif
2edb61e3
UD
289
290
b1531183
UD
291/* When using __thread for this, we do it in libc so as not
292 to give libpthread its own TLS segment just for this. */
293extern void **__libc_dl_error_tsd (void) __attribute__ ((const));
294
76a50749 295
0ecf9c10 296/* This can be set by the debugger before initialization is complete. */
e965d514 297static bool __nptl_initial_report_events __attribute_used__;
0ecf9c10 298
76a50749 299void
4e9b5995 300__pthread_initialize_minimal_internal (void)
76a50749 301{
76a50749
UD
302#ifndef SHARED
303 /* Unlike in the dynamically linked case the dynamic linker has not
304 taken care of initializing the TLS data structures. */
305 __libc_setup_tls (TLS_TCB_SIZE, TLS_TCB_ALIGN);
85631c8e
UD
306
307 /* We must prevent gcc from being clever and move any of the
308 following code ahead of the __libc_setup_tls call. This function
309 will initialize the thread register which is subsequently
310 used. */
311 __asm __volatile ("");
76a50749
UD
312#endif
313
314 /* Minimal initialization of the thread descriptor. */
75cddafe 315 struct pthread *pd = THREAD_SELF;
7cea6212 316 __pthread_initialize_pids (pd);
76a50749
UD
317 THREAD_SETMEM (pd, specific[0], &pd->specific_1stblock[0]);
318 THREAD_SETMEM (pd, user_stack, true);
319 if (LLL_LOCK_INITIALIZER != 0)
320 THREAD_SETMEM (pd, lock, LLL_LOCK_INITIALIZER);
321#if HP_TIMING_AVAIL
322 THREAD_SETMEM (pd, cpuclock_offset, GL(dl_cpuclock_offset));
323#endif
324
0f6699ea 325 /* Initialize the robust mutex data. */
992328e5 326 {
0f6699ea 327#ifdef __PTHREAD_MUTEX_HAVE_PREV
992328e5 328 pd->robust_prev = &pd->robust_head;
0f6699ea 329#endif
992328e5 330 pd->robust_head.list = &pd->robust_head;
0f6699ea 331#ifdef __NR_set_robust_list
992328e5
RM
332 pd->robust_head.futex_offset = (offsetof (pthread_mutex_t, __data.__lock)
333 - offsetof (pthread_mutex_t,
334 __data.__list.__next));
335 INTERNAL_SYSCALL_DECL (err);
336 int res = INTERNAL_SYSCALL (set_robust_list, err, 2, &pd->robust_head,
337 sizeof (struct robust_list_head));
338 if (INTERNAL_SYSCALL_ERROR_P (res, err))
0f6699ea 339#endif
992328e5
RM
340 set_robust_list_not_avail ();
341 }
0f6699ea 342
184ee940
RM
343#ifdef __NR_futex
344# ifndef __ASSUME_PRIVATE_FUTEX
5a8075b1
UD
345 /* Private futexes are always used (at least internally) so that
346 doing the test once this early is beneficial. */
347 {
e807818b 348 int word = 0;
992328e5 349 INTERNAL_SYSCALL_DECL (err);
e59660bc 350 word = INTERNAL_SYSCALL (futex, err, 3, &word,
5a8075b1 351 FUTEX_WAKE | FUTEX_PRIVATE_FLAG, 1);
e59660bc
UD
352 if (!INTERNAL_SYSCALL_ERROR_P (word, err))
353 THREAD_SETMEM (pd, header.private_futex, FUTEX_PRIVATE_FLAG);
5a8075b1 354 }
5a8075b1 355
3c612057
UD
356 /* Private futexes have been introduced earlier than the
357 FUTEX_CLOCK_REALTIME flag. We don't have to run the test if we
358 know the former are not supported. This also means we know the
359 kernel will return ENOSYS for unknown operations. */
360 if (THREAD_GETMEM (pd, header.private_futex) != 0)
184ee940
RM
361# endif
362# ifndef __ASSUME_FUTEX_CLOCK_REALTIME
3c612057
UD
363 {
364 int word = 0;
365 /* NB: the syscall actually takes six parameters. The last is the
366 bit mask. But since we will not actually wait at all the value
367 is irrelevant. Given that passing six parameters is difficult
368 on some architectures we just pass whatever random value the
369 calling convention calls for to the kernel. It causes no harm. */
992328e5 370 INTERNAL_SYSCALL_DECL (err);
3c612057
UD
371 word = INTERNAL_SYSCALL (futex, err, 5, &word,
372 FUTEX_WAIT_BITSET | FUTEX_CLOCK_REALTIME
373 | FUTEX_PRIVATE_FLAG, 1, NULL, 0);
374 assert (INTERNAL_SYSCALL_ERROR_P (word, err));
375 if (INTERNAL_SYSCALL_ERRNO (word, err) != ENOSYS)
376 __set_futex_clock_realtime ();
377 }
184ee940 378# endif
cbd8aeb8
UD
379#endif
380
675620f7
UD
381 /* Set initial thread's stack block from 0 up to __libc_stack_end.
382 It will be bigger than it actually is, but for unwind.c/pt-longjmp.c
383 purposes this is good enough. */
384 THREAD_SETMEM (pd, stackblock_size, (size_t) __libc_stack_end);
385
fde89ad0 386 /* Initialize the list of all running threads with the main thread. */
a4548cea 387 INIT_LIST_HEAD (&__stack_user);
d4f64e1a 388 list_add (&pd->list, &__stack_user);
76a50749 389
0ecf9c10
RM
390 /* Before initializing __stack_user, the debugger could not find us and
391 had to set __nptl_initial_report_events. Propagate its setting. */
392 THREAD_SETMEM (pd, report_events, __nptl_initial_report_events);
76a50749 393
327ae257
RM
394#if defined SIGCANCEL || defined SIGSETXID
395 struct sigaction sa;
396 __sigemptyset (&sa.sa_mask);
397
398# ifdef SIGCANCEL
76a50749
UD
399 /* Install the cancellation signal handler. If for some reason we
400 cannot install the handler we do not abort. Maybe we should, but
401 it is only asynchronous cancellation which is affected. */
a1ed6b4c
UD
402 sa.sa_sigaction = sigcancel_handler;
403 sa.sa_flags = SA_SIGINFO;
76a50749 404 (void) __libc_sigaction (SIGCANCEL, &sa, NULL);
327ae257 405# endif
76a50749 406
327ae257 407# ifdef SIGSETXID
2edb61e3
UD
408 /* Install the handle to change the threads' uid/gid. */
409 sa.sa_sigaction = sighandler_setxid;
410 sa.sa_flags = SA_SIGINFO | SA_RESTART;
2edb61e3 411 (void) __libc_sigaction (SIGSETXID, &sa, NULL);
327ae257 412# endif
2edb61e3 413
708bfb9a 414 /* The parent process might have left the signals blocked. Just in
f006d3a0
UD
415 case, unblock it. We reuse the signal mask in the sigaction
416 structure. It is already cleared. */
327ae257 417# ifdef SIGCANCEL
f006d3a0 418 __sigaddset (&sa.sa_mask, SIGCANCEL);
327ae257
RM
419# endif
420# ifdef SIGSETXID
708bfb9a 421 __sigaddset (&sa.sa_mask, SIGSETXID);
327ae257 422# endif
992328e5
RM
423 {
424 INTERNAL_SYSCALL_DECL (err);
425 (void) INTERNAL_SYSCALL (rt_sigprocmask, err, 4, SIG_UNBLOCK, &sa.sa_mask,
426 NULL, _NSIG / 8);
427 }
327ae257 428#endif
f006d3a0 429
b399707e
RM
430 /* Get the size of the static and alignment requirements for the TLS
431 block. */
432 size_t static_tls_align;
433 _dl_get_tls_static_info (&__static_tls_size, &static_tls_align);
434
435 /* Make sure the size takes all the alignments into account. */
436 if (STACK_ALIGN > static_tls_align)
437 static_tls_align = STACK_ALIGN;
438 __static_tls_align_m1 = static_tls_align - 1;
439
440 __static_tls_size = roundup (__static_tls_size, static_tls_align);
76a50749 441
4e9b5995
CD
442 /* Determine the default allowed stack size. This is the size used
443 in case the user does not specify one. */
444 struct rlimit limit;
c5c2b7c3 445 if (__getrlimit (RLIMIT_STACK, &limit) != 0
4e9b5995
CD
446 || limit.rlim_cur == RLIM_INFINITY)
447 /* The system limit is not usable. Use an architecture-specific
448 default. */
449 limit.rlim_cur = ARCH_STACK_DEFAULT_SIZE;
450 else if (limit.rlim_cur < PTHREAD_STACK_MIN)
451 /* The system limit is unusably small.
452 Use the minimal size acceptable. */
453 limit.rlim_cur = PTHREAD_STACK_MIN;
e23872c8 454
4e9b5995
CD
455 /* Make sure it meets the minimum size that allocate_stack
456 (allocatestack.c) will demand, which depends on the page size. */
457 const uintptr_t pagesz = GLRO(dl_pagesize);
458 const size_t minstack = pagesz + __static_tls_size + MINIMAL_REST_STACK;
459 if (limit.rlim_cur < minstack)
460 limit.rlim_cur = minstack;
e23872c8 461
4e9b5995 462 /* Round the resource limit up to page size. */
6d03458e 463 limit.rlim_cur = ALIGN_UP (limit.rlim_cur, pagesz);
61dd6208 464 lll_lock (__default_pthread_attr_lock, LLL_PRIVATE);
e903a713
SP
465 __default_pthread_attr.stacksize = limit.rlim_cur;
466 __default_pthread_attr.guardsize = GLRO (dl_pagesize);
61dd6208 467 lll_unlock (__default_pthread_attr_lock, LLL_PRIVATE);
76a50749 468
b1531183
UD
469#ifdef SHARED
470 /* Transfer the old value from the dynamic linker's internal location. */
471 *__libc_dl_error_tsd () = *(*GL(dl_error_catch_tsd)) ();
472 GL(dl_error_catch_tsd) = &__libc_dl_error_tsd;
334fcf2a
UD
473
474 /* Make __rtld_lock_{,un}lock_recursive use pthread_mutex_{,un}lock,
475 keep the lock count from the ld.so implementation. */
4d17e683
AS
476 GL(dl_rtld_lock_recursive) = (void *) __pthread_mutex_lock;
477 GL(dl_rtld_unlock_recursive) = (void *) __pthread_mutex_unlock;
334fcf2a
UD
478 unsigned int rtld_lock_count = GL(dl_load_lock).mutex.__data.__count;
479 GL(dl_load_lock).mutex.__data.__count = 0;
480 while (rtld_lock_count-- > 0)
4d17e683 481 __pthread_mutex_lock (&GL(dl_load_lock).mutex);
54ee14b3
UD
482
483 GL(dl_make_stack_executable_hook) = &__make_stacks_executable;
b1531183
UD
484#endif
485
adc12574
UD
486 GL(dl_init_static_tls) = &__pthread_init_static_tls;
487
7adefea8
UD
488 GL(dl_wait_lookup_done) = &__wait_lookup_done;
489
76a50749 490 /* Register the fork generation counter with the libc. */
5a03acfe
UD
491#ifndef TLS_MULTIPLE_THREADS_IN_TCB
492 __libc_multiple_threads_ptr =
493#endif
494 __libc_pthread_init (&__fork_generation, __reclaim_stacks,
495 ptr_pthread_functions);
2c0b891a
UD
496
497 /* Determine whether the machine is SMP or not. */
498 __is_smp = is_smp_system ();
76a50749 499}
2ae920ed
UD
500strong_alias (__pthread_initialize_minimal_internal,
501 __pthread_initialize_minimal)
2c1094bd
UD
502
503
504size_t
505__pthread_get_minstack (const pthread_attr_t *attr)
506{
507 struct pthread_attr *iattr = (struct pthread_attr *) attr;
508
509 return (GLRO(dl_pagesize) + __static_tls_size + PTHREAD_STACK_MIN
510 + iattr->guardsize);
511}