From b201169eeae76a7697f4f207dd583d40a2f07f66 Mon Sep 17 00:00:00 2001 From: Bill Schwartz Date: Wed, 10 Oct 2012 10:36:29 -0500 Subject: Memory Leak task_end Change-Id: Idb7a2d8d72a55f644efd0b2548eca5df5d062e6d RTC: 47491 Reviewed-on: http://gfw160.austin.ibm.com:8080/gerrit/2011 Tested-by: Jenkins Server Reviewed-by: A. Patrick Williams III --- src/lib/syscall_task.C | 48 ++++++++++++++++++++++++------------------------ 1 file changed, 24 insertions(+), 24 deletions(-) (limited to 'src/lib/syscall_task.C') diff --git a/src/lib/syscall_task.C b/src/lib/syscall_task.C index d40136a21..846163c8b 100644 --- a/src/lib/syscall_task.C +++ b/src/lib/syscall_task.C @@ -1,25 +1,25 @@ -// IBM_PROLOG_BEGIN_TAG -// This is an automatically generated prolog. -// -// $Source: src/lib/syscall_task.C $ -// -// IBM CONFIDENTIAL -// -// COPYRIGHT International Business Machines Corp. 2010 - 2011 -// -// p1 -// -// Object Code Only (OCO) source materials -// Licensed Internal Code Source Materials -// IBM HostBoot Licensed Internal Code -// -// The source code for this program is not published or other- -// wise divested of its trade secrets, irrespective of what has -// been deposited with the U.S. Copyright Office. -// -// Origin: 30 -// -// IBM_PROLOG_END +/* IBM_PROLOG_BEGIN_TAG */ +/* This is an automatically generated prolog. */ +/* */ +/* $Source: src/lib/syscall_task.C $ */ +/* */ +/* IBM CONFIDENTIAL */ +/* */ +/* COPYRIGHT International Business Machines Corp. 2010,2012 */ +/* */ +/* p1 */ +/* */ +/* Object Code Only (OCO) source materials */ +/* Licensed Internal Code Source Materials */ +/* IBM HostBoot Licensed Internal Code */ +/* */ +/* The source code for this program is not published or otherwise */ +/* divested of its trade secrets, irrespective of what has been */ +/* deposited with the U.S. Copyright Office. */ +/* */ +/* Origin: 30 */ +/* */ +/* IBM_PROLOG_END_TAG */ #include #include #include @@ -37,7 +37,7 @@ void task_yield() return; } -tid_t task_create(void(*fn)(void*), void* ptr) +tid_t task_create(void*(*fn)(void*), void* ptr) { // Verify we have (memory) permissions to load the function pointer so // we don't load bad memory from kernel space. @@ -105,7 +105,7 @@ tid_t task_exec(const char* file, void* ptr) } else { - child = task_create(reinterpret_cast(msg->data[0]), + child = task_create(reinterpret_cast(msg->data[0]), ptr); } } -- cgit v1.2.1