WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] [PATCH] Fixing TLS handling in x86-64 xenlinux

To: "xen-devel" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: [Xen-devel] [PATCH] Fixing TLS handling in x86-64 xenlinux
From: "Nakajima, Jun" <jun.nakajima@xxxxxxxxx>
Date: Fri, 13 May 2005 09:35:36 -0700
Delivery-date: Fri, 13 May 2005 16:35:15 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcVX2coYFnwkRjAMQ1mWJHsubk9keQ==
Thread-topic: [PATCH] Fixing TLS handling in x86-64 xenlinux
Some LTP testcases (pthreads) have exposed this bug (kill the kernel),
and the attached fixes the problem. With this, pth_str0? run fine, for
example. We'll continue to run LTP on x86-64 xenlinux to get all of them
pass.

Signed-off-by: Jun Nakajima <jun.nakajima@xxxxxxxxx>

Attachment: tls_fix.patch
Description: tls_fix.patch

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] [PATCH] Fixing TLS handling in x86-64 xenlinux, Nakajima, Jun <=