[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#328183: marked as done (permit user-level-controlled TLS)



Your message dated Tue, 09 Jan 2007 00:50:50 +0100
with message-id <45A2D8DA.50502@aurel32.net>
and subject line Bug#328183: permit user-level-controlled TLS
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: libc6
Version: 2.3.5-6
Severity: wishlist


It would be nice to some how include the following in libc6. This would
currently be arch specific to x68 and x68_64.


See http://wiki.xensource.com/xenwiki/XenSpecificGlibc

  Xen uses segmentation to provide protection of the memory used for the
  hypervisor. This results in some performance issues since wrap-around
  segments as used by glibc need expensive extra handling.

  It is possible to rebuild glibc so that it only uses segments such
  that there is no performance penalty. To do this, you need to apply
  the patch below to the glibc sources and then rebuild glibc with the
  -mno-tls-direct-seg-refs option.

Patch attached to wiki page above.



-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-xenU
Locale: LANG=en_NZ, LC_CTYPE=en_NZ (charmap=ISO-8859-1)

-- no debconf information


--- End Message ---
--- Begin Message ---
Aurelien Jarno a écrit :
> tag 328183 + help
> thanks
> 
> Samuel Thibault a écrit :
>> reopen 328183
>> thanks
>>
>> Aurelien Jarno, le Tue 11 Apr 2006 11:57:41 +0200, a écrit :
>>> Starting with version 2.3.6-6, the glibc build a libc6-xen. This closes
>>> this bug.
>> There are still direct gs:offset references in the libc6-xen binaries,
>> because of missing #ifdef NO_TLS_DIRECT_SEG_REFS here and there.
> 
> I am not competent to do the changes in the glibc, and they are not 
> present neither in the glibc CVS, nor on the xen wiki, contrary to what 
> has been said previously in the bug report.
> 
> Note however that I found strange that the xen wiki does not describe 
> the changes you are wanted to be implemented, nor says that the patch 
> they propose is incomplete. Moreover the fedora packages they propose 
> also does not contain much fix than in the Debian glibc. So maybe it is 
> not possible to do better than what is already done?
> 
> I may be wrong, in that case, it would be nice if somebody could write a 
> patch and send it to the glibc and/or xen upstreams, hence the help tag.
> 

The patch we use is the correct one. It is the one from Xen, it is used
by all distributions and is now included in upstream glibc.


-- 
  .''`.  Aurelien Jarno	            | GPG: 1024D/F1BCDB73
 : :' :  Debian developer           | Electrical Engineer
 `. `'   aurel32@debian.org         | aurelien@aurel32.net
   `-    people.debian.org/~aurel32 | www.aurel32.net

--- End Message ---

Reply to: