--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: libc6: Xen and TLS. Patch avaliable
- From: nic <nic@plumtree.co.nz>
- Date: Wed, 14 Sep 2005 12:13:51 +1200
- Message-id: <E1EFKut-0000mi-00@spohr.debian.org>
Package: libc6
Version: 2.3.5-6
Severity: wishlist
It would be nice to some how include the following in libc6. This would
currently be arch specific to x68 and x68_64.
See http://wiki.xensource.com/xenwiki/XenSpecificGlibc
Xen uses segmentation to provide protection of the memory used for the
hypervisor. This results in some performance issues since wrap-around
segments as used by glibc need expensive extra handling.
It is possible to rebuild glibc so that it only uses segments such
that there is no performance penalty. To do this, you need to apply
the patch below to the glibc sources and then rebuild glibc with the
-mno-tls-direct-seg-refs option.
Patch attached to wiki page above.
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-xenU
Locale: LANG=en_NZ, LC_CTYPE=en_NZ (charmap=ISO-8859-1)
-- no debconf information
--- End Message ---
--- Begin Message ---
- To: Aurelien Jarno <aurelien@aurel32.net>, 328183-done@bugs.debian.org
- Subject: Re: Bug#328183: permit user-level-controlled TLS
- From: Aurelien Jarno <aurelien@aurel32.net>
- Date: Tue, 09 Jan 2007 00:50:50 +0100
- Message-id: <45A2D8DA.50502@aurel32.net>
- In-reply-to: <44ECBDCE.8000803@aurel32.net>
- References: <20060411095741.GA30599@bode.aurel32.net> <20060626123141.GC4466@implementation.labri.fr> <44ECBDCE.8000803@aurel32.net>
Aurelien Jarno a écrit :
> tag 328183 + help
> thanks
>
> Samuel Thibault a écrit :
>> reopen 328183
>> thanks
>>
>> Aurelien Jarno, le Tue 11 Apr 2006 11:57:41 +0200, a écrit :
>>> Starting with version 2.3.6-6, the glibc build a libc6-xen. This closes
>>> this bug.
>> There are still direct gs:offset references in the libc6-xen binaries,
>> because of missing #ifdef NO_TLS_DIRECT_SEG_REFS here and there.
>
> I am not competent to do the changes in the glibc, and they are not
> present neither in the glibc CVS, nor on the xen wiki, contrary to what
> has been said previously in the bug report.
>
> Note however that I found strange that the xen wiki does not describe
> the changes you are wanted to be implemented, nor says that the patch
> they propose is incomplete. Moreover the fedora packages they propose
> also does not contain much fix than in the Debian glibc. So maybe it is
> not possible to do better than what is already done?
>
> I may be wrong, in that case, it would be nice if somebody could write a
> patch and send it to the glibc and/or xen upstreams, hence the help tag.
>
The patch we use is the correct one. It is the one from Xen, it is used
by all distributions and is now included in upstream glibc.
--
.''`. Aurelien Jarno | GPG: 1024D/F1BCDB73
: :' : Debian developer | Electrical Engineer
`. `' aurel32@debian.org | aurelien@aurel32.net
`- people.debian.org/~aurel32 | www.aurel32.net
--- End Message ---