Bug#544145: 32bit binaries on x86_64/Xen segfaults in syscall-vdso
- To: Jeremy Fitzhardinge <jeremy@goop.org>
- Cc: linux-kernel@vger.kernel.org, xen-devel@lists.xensource.com, 544145@bugs.debian.org, Keir Fraser <keir.fraser@eu.citrix.com>
- Subject: Bug#544145: 32bit binaries on x86_64/Xen segfaults in syscall-vdso
- From: Bastian Blank <waldi@debian.org>
- Date: Fri, 4 Sep 2009 18:20:04 +0200
- Message-id: <[🔎] 20090904162003.GA6147@wavehammer.waldi.eu.org>
- Mail-followup-to: Bastian Blank <waldi@debian.org>, Jeremy Fitzhardinge <jeremy@goop.org>, linux-kernel@vger.kernel.org, xen-devel@lists.xensource.com, 544145@bugs.debian.org, Keir Fraser <keir.fraser@eu.citrix.com>
- Reply-to: Bastian Blank <waldi@debian.org>, 544145@bugs.debian.org
- In-reply-to: <[🔎] 4AA13B4B.7020101@goop.org>
- References: <20090830181637.GA7155@wavehammer.waldi.eu.org> <[🔎] 4AA02C57.30106@goop.org> <[🔎] 20090903220252.GA19309@wavehammer.waldi.eu.org> <[🔎] 4AA03DE8.40706@goop.org> <[🔎] 20090903223603.GA19945@wavehammer.waldi.eu.org> <[🔎] 4AA13B4B.7020101@goop.org>
On Fri, Sep 04, 2009 at 09:07:39AM -0700, Jeremy Fitzhardinge wrote:
> But for some reason that's triggering a failsafe callback, which invokes
> a GP.
Hmm, not in my tests. It always returned to userspace correctly and died
some operations later, usually the "ret". This then produced either a
segfault (unreadable address), sigill (if it managed to reach the ELF
header of the ld.so) or a GPF.
Bastian
--
You! What PLANET is this!
-- McCoy, "The City on the Edge of Forever", stardate 3134.0
Reply to: