[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] NPTL/TLS segment flipping code problem



I don't think that would get us all the way. It would stop ld.so
linking to TLS glibc after booting, but:
 1. GCC can now emit -ve offset accesses directly in application
    binaries. So the problem may not be entirely solvable at
    link-time. 
 2. Still need to deal with linking of 'init' process, which is run
    before you get a chance to set LD_ASSUME_KERNEL. 

Maybe there's a workaround for 2 less invasive than deleting /lib/tls,
but I don't know what it is.

 -- Keir

> 
> Hi!
> 
> Ian Pratt wrote:
> 
> [..]
> 
> > We really need to look into producing a suitably patched glibc
> > rpm. Likewise, we need to prevent gcc from generating -ve offsets
> > for tls as the default.
> 
> You can workaround that in userspace with:
> LD_ASSUME_KERNEL=2.4.9
> 
> Set it in /etc/environment or in your kernel command line. The later 
> depends on your setup: IMMV.
> 
> Regards,
> Nuno Silva
> 
> 
> 
> -------------------------------------------------------
> The SF.Net email is sponsored by: Beat the post-holiday blues
> Get a FREE limited edition SourceForge.net t-shirt from ThinkGeek.
> It's fun and FREE -- well, almost....http://www.thinkgeek.com/sfshirt
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxxxx
> https://lists.sourceforge.net/lists/listinfo/xen-devel



-------------------------------------------------------
The SF.Net email is sponsored by: Beat the post-holiday blues
Get a FREE limited edition SourceForge.net t-shirt from ThinkGeek.
It's fun and FREE -- well, almost....http://www.thinkgeek.com/sfshirt
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.