|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-changelog
[Xen-changelog] Improve the tls warning message to mention that the	best 
| # HG changeset patch
# User iap10@xxxxxxxxxxxxxxxxxxxxx
# Node ID 82f61375cd742d3e944b319f63a7b1e87797c2d6
# Parent  28ce48573771c0f7b07a931dcc35011c7c942af7
Improve the tls warning message to mention that the best soloution is to 
install a 'xen-friendly' glibc.
Signed-off-by: ian@xxxxxxxxxxxxx
diff -r 28ce48573771 -r 82f61375cd74 
linux-2.6-xen-sparse/arch/xen/i386/kernel/fixup.c
--- a/linux-2.6-xen-sparse/arch/xen/i386/kernel/fixup.c Wed Nov 30 19:55:08 2005
+++ b/linux-2.6-xen-sparse/arch/xen/i386/kernel/fixup.c Thu Dec  1 01:36:46 2005
@@ -56,9 +56,11 @@
        DP("***************************************************************");
        DP("***************************************************************");
        DP("** WARNING: Currently emulating unsupported memory accesses  **");
-       DP("**          in /lib/tls libraries. The emulation is very     **");
+       DP("**          in /lib/tls glibc libraries. The emulation is    **");
        DP("**          slow. To ensure full performance you should      **");
-       DP("**          execute the following as root:                   **");
+       DP("**          install a 'xen-friendly' (nosegneg) version of   **");
+       DP("**          the library, or disable tls support by executing **");
+       DP("**          the following as root:                           **");
        DP("**          mv /lib/tls /lib/tls.disabled                    **");
        DP("** Offending process: %-38.38s **", info);
        DP("***************************************************************");
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog
 | 
 
| <Prev in Thread] | Current Thread | [Next in Thread> |  | 
[Xen-changelog] Improve the tls warning message to mention that the	best soloution is to install a 'xen-friendly' glibc.,
Xen patchbot -unstable <=
 |  
| Next by Date: | [Xen-changelog] Add a new /proc/xen file called 'capabilities'.	Currently, when read in dom0 it will return 'control_d',	and be empty when read in a guest. This provides a convenient way to	allow the root user to detect whether they're running in a	guest or dom0, and e.g. gate whether to start xend. In future,	when we add more fine grained capabilities we will add other details	into this file., Xen patchbot -unstable |  
| Next by Thread: | [Xen-changelog] Add a new /proc/xen file called 'capabilities'.	Currently, when read in dom0 it will return 'control_d',	and be empty when read in a guest. This provides a convenient way to	allow the root user to detect whether they're running in a	guest or dom0, and e.g. gate whether to start xend. In future,	when we add more fine grained capabilities we will add other details	into this file., Xen patchbot -unstable |  
| Indexes: | [Date]
[Thread]
[Top]
[All Lists] |  |  | 
  
    |  |  |