aboutsummaryrefslogtreecommitdiff
path: root/sysdeps/loongarch/fpu/s_scalbn.c
diff options
context:
space:
mode:
authorSergey Bugaev <bugaevc@gmail.com>2023-03-19 18:10:10 +0300
committerSamuel Thibault <samuel.thibault@ens-lyon.org>2023-04-11 00:24:40 +0200
commitcd019ddd892e182277fadd6aedccc57fa3923c8d (patch)
treecfcc71948e40bd484e00e3105153ec305e6b19a8 /sysdeps/loongarch/fpu/s_scalbn.c
parent747812349d42427c835aeac987aa67641d84f1ad (diff)
downloadglibc-cd019ddd892e182277fadd6aedccc57fa3923c8d.tar
glibc-cd019ddd892e182277fadd6aedccc57fa3923c8d.tar.gz
glibc-cd019ddd892e182277fadd6aedccc57fa3923c8d.tar.bz2
glibc-cd019ddd892e182277fadd6aedccc57fa3923c8d.zip
hurd: Don't leak __hurd_reply_port0
Previously, once we set up TLS, we would implicitly switch from using __hurd_reply_port0 to reply_port inside the TCB, leaving the former unused. But we never deallocated it, so it got leaked. Instead, migrate the port into the new TCB's reply_port slot. This avoids both the port leak and an extra syscall to create a new reply port for the TCB. Signed-off-by: Sergey Bugaev <bugaevc@gmail.com> Message-Id: <20230319151017.531737-28-bugaevc@gmail.com>
Diffstat (limited to 'sysdeps/loongarch/fpu/s_scalbn.c')
0 files changed, 0 insertions, 0 deletions