[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] NPTL/TLS segment flipping code problem
I don't think that would get us all the way. It would stop ld.so linking to TLS glibc after booting, but: 1. GCC can now emit -ve offset accesses directly in application binaries. So the problem may not be entirely solvable at link-time. 2. Still need to deal with linking of 'init' process, which is run before you get a chance to set LD_ASSUME_KERNEL. Maybe there's a workaround for 2 less invasive than deleting /lib/tls, but I don't know what it is. -- Keir > > Hi! > > Ian Pratt wrote: > > [..] > > > We really need to look into producing a suitably patched glibc > > rpm. Likewise, we need to prevent gcc from generating -ve offsets > > for tls as the default. > > You can workaround that in userspace with: > LD_ASSUME_KERNEL=2.4.9 > > Set it in /etc/environment or in your kernel command line. The later > depends on your setup: IMMV. > > Regards, > Nuno Silva > > > > ------------------------------------------------------- > The SF.Net email is sponsored by: Beat the post-holiday blues > Get a FREE limited edition SourceForge.net t-shirt from ThinkGeek. > It's fun and FREE -- well, almost....http://www.thinkgeek.com/sfshirt > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxxxxxxxxxx > https://lists.sourceforge.net/lists/listinfo/xen-devel ------------------------------------------------------- The SF.Net email is sponsored by: Beat the post-holiday blues Get a FREE limited edition SourceForge.net t-shirt from ThinkGeek. It's fun and FREE -- well, almost....http://www.thinkgeek.com/sfshirt _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.sourceforge.net/lists/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |