fix extremely rare but dangerous race condition in robust mutexes
authorRich Felker <dalias@aerifal.cx>
Fri, 17 Aug 2012 21:13:53 +0000 (17:13 -0400)
committerRich Felker <dalias@aerifal.cx>
Fri, 17 Aug 2012 21:13:53 +0000 (17:13 -0400)
if new shared mappings of files/devices/shared memory can be made
between the time a robust mutex is unlocked and its subsequent removal
from the pending slot in the robustlist header, the kernel can
inadvertently corrupt data in the newly-mapped pages when the process
terminates. i am fixing the bug by using the same global vm lock
mechanism that was used to fix the race condition with unmapping
barriers after pthread_barrier_wait returns.


No differences found