diff options
author | Sergey Bugaev <bugaevc@gmail.com> | 2023-03-19 18:10:10 +0300 |
---|---|---|
committer | Samuel Thibault <samuel.thibault@ens-lyon.org> | 2023-04-11 00:24:40 +0200 |
commit | cd019ddd892e182277fadd6aedccc57fa3923c8d (patch) | |
tree | cfcc71948e40bd484e00e3105153ec305e6b19a8 /sysdeps/loongarch/fpu/s_scalbn.c | |
parent | 747812349d42427c835aeac987aa67641d84f1ad (diff) | |
download | glibc-cd019ddd892e182277fadd6aedccc57fa3923c8d.tar glibc-cd019ddd892e182277fadd6aedccc57fa3923c8d.tar.gz glibc-cd019ddd892e182277fadd6aedccc57fa3923c8d.tar.bz2 glibc-cd019ddd892e182277fadd6aedccc57fa3923c8d.zip |
hurd: Don't leak __hurd_reply_port0
Previously, once we set up TLS, we would implicitly switch from using
__hurd_reply_port0 to reply_port inside the TCB, leaving the former
unused. But we never deallocated it, so it got leaked.
Instead, migrate the port into the new TCB's reply_port slot. This
avoids both the port leak and an extra syscall to create a new reply
port for the TCB.
Signed-off-by: Sergey Bugaev <bugaevc@gmail.com>
Message-Id: <20230319151017.531737-28-bugaevc@gmail.com>
Diffstat (limited to 'sysdeps/loongarch/fpu/s_scalbn.c')
0 files changed, 0 insertions, 0 deletions