From 4da82e58a19be2e49847f135f9f25697773a57ae Mon Sep 17 00:00:00 2001 From: akr Date: Sat, 9 Jun 2012 01:40:22 +0000 Subject: update async-signal-safe comments. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@35981 b2dd03c8-39d4-4d8f-98ff-823fe69b080e --- process.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/process.c b/process.c index 36f854b308..477dd4383c 100644 --- a/process.c +++ b/process.c @@ -1062,7 +1062,7 @@ exec_with_sh(const char *prog, char **argv, char **envp) #define try_with_sh(prog, argv, envp) (void)0 #endif -/* This function should be async-signal-safe. Actually it isn't because after_exec(). */ +/* This function should be async-signal-safe. Actually it is. */ static int proc_exec_cmd(const char *prog, VALUE argv_str, VALUE envp_str) { @@ -1127,7 +1127,7 @@ proc_exec_cmd(const char *prog, VALUE argv_str, VALUE envp_str) #endif } -/* This function should be async-signal-safe. Actually it isn't because after_exec(). */ +/* This function should be async-signal-safe. Actually it is. */ static int proc_exec_sh(const char *str, VALUE envp_str) { @@ -2600,13 +2600,13 @@ rb_exec_err(const struct rb_exec_arg *e, char *errmsg, size_t errmsg_buflen) } if (e->use_shell) { - proc_exec_sh(RSTRING_PTR(e->invoke.sh.shell_script), e->envp_str); /* not async-signal-safe because after_exec. */ + proc_exec_sh(RSTRING_PTR(e->invoke.sh.shell_script), e->envp_str); /* async-signal-safe */ } else { char *abspath = NULL; if (!NIL_P(e->invoke.cmd.command_abspath)) abspath = RSTRING_PTR(e->invoke.cmd.command_abspath); - proc_exec_cmd(abspath, e->invoke.cmd.argv_str, e->envp_str); /* not async-signal-safe because after_exec. */ + proc_exec_cmd(abspath, e->invoke.cmd.argv_str, e->envp_str); /* async-signal-safe */ } #if !defined(HAVE_FORK) preserving_errno(rb_run_exec_options_err(sargp, NULL, errmsg, errmsg_buflen)); -- cgit v1.2.3