Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752042AbWCOE0i (ORCPT ); Tue, 14 Mar 2006 23:26:38 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752073AbWCOE0i (ORCPT ); Tue, 14 Mar 2006 23:26:38 -0500 Received: from 216-99-217-87.dsl.aracnet.com ([216.99.217.87]:28033 "EHLO sorel.sous-sol.org") by vger.kernel.org with ESMTP id S1752042AbWCOE0i (ORCPT ); Tue, 14 Mar 2006 23:26:38 -0500 Date: Tue, 14 Mar 2006 20:31:08 -0800 From: Chris Wright To: Zachary Amsden Cc: Chris Wright , Linus Torvalds , Linux Kernel Mailing List , Virtualization Mailing List , Xen-devel , Andrew Morton , Dan Hecht , Dan Arai , Anne Holler , Pratap Subrahmanyam , Christopher Li , Joshua LeVasseur , Rik Van Riel , Jyothy Reddy , Jack Lo , Kip Macy , Jan Beulich , Ky Srinivasan , Wim Coekaerts , Leendert van Doorn , Gerd Hoffmann Subject: Re: [RFC, PATCH 7/24] i386 Vmi memory hole Message-ID: <20060315043108.GP12807@sorel.sous-sol.org> References: <200603131804.k2DI4N6s005678@zach-dev.vmware.com> <20060314064107.GK12807@sorel.sous-sol.org> <44166D6B.4090701@vmware.com> <20060314215616.GM12807@sorel.sous-sol.org> <4417454F.2080908@vmware.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4417454F.2080908@vmware.com> User-Agent: Mutt/1.4.2.1i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1565 Lines: 39 * Zachary Amsden (zach@vmware.com) wrote: > Chris Wright wrote: > >* Zachary Amsden (zach@vmware.com) wrote: > > > >>Allow creation of an compile time hole at the top of linear address space. > >> > >>Extended to allow a dynamic hole in linear address space, 7/2005. This > >>required some serious hacking to get everything perfect, but the end > >>result > >>appears to function quite nicely. Everyone can now share the appreciation > >>of pseudo-undocumented ELF OS fields, which means core dumps, debuggers > >>and even broken or obsolete linkers may continue to work. > >> > > > >Thanks. Gerd did something similar (although I believe it's simpler, > >don't recall the relocation magic) for Xen. Either way, it's useful > >from Xen perspective. > > I believe Xen disables sysenter. Yes, so vsyscall page has int80 implementation. > The complications in my patch come > from the fact that the vsyscall page has to be relocated dynamically, > requiring, basically run time linking on the page and some tweaks to get > sysenter to work. If you don't use vsyscall (say, non-TLS glibc), then > you don't need that complexity. But I think it might be needed now, > even for Xen. I believe both Xen and execshield move vsyscall out of fixmap, and then map into userspace as normal vma. thanks, -chris - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/