|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] NPTL/TLS segment flipping code problem
I don't think that would get us all the way. It would stop ld.so
linking to TLS glibc after booting, but:
1. GCC can now emit -ve offset accesses directly in application
binaries. So the problem may not be entirely solvable at
link-time.
2. Still need to deal with linking of 'init' process, which is run
before you get a chance to set LD_ASSUME_KERNEL.
Maybe there's a workaround for 2 less invasive than deleting /lib/tls,
but I don't know what it is.
-- Keir
>
> Hi!
>
> Ian Pratt wrote:
>
> [..]
>
> > We really need to look into producing a suitably patched glibc
> > rpm. Likewise, we need to prevent gcc from generating -ve offsets
> > for tls as the default.
>
> You can workaround that in userspace with:
> LD_ASSUME_KERNEL=2.4.9
>
> Set it in /etc/environment or in your kernel command line. The later
> depends on your setup: IMMV.
>
> Regards,
> Nuno Silva
>
>
>
> -------------------------------------------------------
> The SF.Net email is sponsored by: Beat the post-holiday blues
> Get a FREE limited edition SourceForge.net t-shirt from ThinkGeek.
> It's fun and FREE -- well, almost....http://www.thinkgeek.com/sfshirt
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxxxx
> https://lists.sourceforge.net/lists/listinfo/xen-devel
-------------------------------------------------------
The SF.Net email is sponsored by: Beat the post-holiday blues
Get a FREE limited edition SourceForge.net t-shirt from ThinkGeek.
It's fun and FREE -- well, almost....http://www.thinkgeek.com/sfshirt
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel
|
|
|
|
|