Provided by: manpages-dev_3.54-1ubuntu1_all bug

NAME

       pthread_attr_setguardsize,  pthread_attr_getguardsize - set/get guard size attribute in thread attributes
       object

SYNOPSIS

       #include <pthread.h>

       int pthread_attr_setguardsize(pthread_attr_t *attr, size_t guardsize);
       int pthread_attr_getguardsize(pthread_attr_t *attr, size_t *guardsize);

       Compile and link with -pthread.

DESCRIPTION

       The pthread_attr_setguardsize() function sets the guard size attribute of the  thread  attributes  object
       referred to by attr to the value specified in guardsize.

       If  guardsize  is  greater  than  0,  then for each new thread created using attr the system allocates an
       additional region of at least guardsize bytes at the end of the thread's stack to act as the  guard  area
       for the stack (but see BUGS).

       If guardsize is 0, then new threads created with attr will not have a guard area.

       The default guard size is the same as the system page size.

       If   the   stack   address   attribute   has   been   set  in  attr  (using  pthread_attr_setstack(3)  or
       pthread_attr_setstackaddr(3)), meaning that the caller is allocating the thread's stack, then  the  guard
       size  attribute  is  ignored  (i.e.,  no  guard  area  is created by the system): it is the application's
       responsibility to handle stack overflow (perhaps by using mprotect(2) to manually define a guard area  at
       the end of the stack that it has allocated).

       The pthread_attr_getguardsize() function returns the guard size attribute of the thread attributes object
       referred to by attr in the buffer pointed to by guardsize.

RETURN VALUE

       On success, these functions return 0; on error, they return a nonzero error number.

ERRORS

       POSIX.1-2001 documents an EINVAL error if attr or guardsize is invalid.  On Linux these functions  always
       succeed (but portable and future-proof applications should nevertheless handle a possible error return).

VERSIONS

       These functions are provided by glibc since version 2.1.

CONFORMING TO

       POSIX.1-2001.

NOTES

       A  guard area consists of virtual memory pages that are protected to prevent read and write access.  If a
       thread overflows its stack into the guard area, then, on most hard architectures, it receives  a  SIGSEGV
       signal,  thus  notifying it of the overflow.  Guard areas start on page boundaries, and the guard size is
       internally  rounded  up  to  the   system   page   size   when   creating   a   thread.    (Nevertheless,
       pthread_attr_getguardsize() returns the guard size that was set by pthread_attr_setguardsize().)

       Setting  a  guard  size of 0 may be useful to save memory in an application that creates many threads and
       knows that stack overflow can never occur.

       Choosing a guard size larger than the default size may be necessary for detecting stack  overflows  if  a
       thread allocates large data structures on the stack.

BUGS

       As  at  glibc  2.8,  the  NPTL  threading  implementation  includes  the guard area within the stack size
       allocation, rather than allocating extra space at the end of the stack, as POSIX.1 requires.   (This  can
       result  in  an EINVAL error from pthread_create(3) if the guard size value is too large, leaving no space
       for the actual stack.)

       The obsolete LinuxThreads implementation did the right thing, allocating extra space at the  end  of  the
       stack for the guard area.

EXAMPLE

       See pthread_getattr_np(3).

SEE ALSO

       mmap(2),   mprotect(2),   pthread_attr_init(3),  pthread_attr_setstack(3),  pthread_attr_setstacksize(3),
       pthread_create(3), pthreads(7)

COLOPHON

       This page is part of release 3.54 of the Linux man-pages project.  A  description  of  the  project,  and
       information about reporting bugs, can be found at http://www.kernel.org/doc/man-pages/.