[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] Elf loader fixes



I'm afraid this won't work for 64-bits, because of the way the vsyscall page 
gets set up there. If you dump the program
headers you'll see that the respective segment is at an address close to the 
top of the address space, which would make
the image appear to need nearly 2 Gb of memory (making the load fail if there's 
less than that available to the
domain).

Also, I'm unclear why you need to make persistent the physical address 
information for the dom0 case, and hence why the
bug compatibility hack is needed there.

Jan

>>> Gerd Hoffmann <kraxel@xxxxxxx> 22.02.06 12:37:26 >>>
Hi folks,

The Xen ELF kernel loader is quite quirky wrt. physical and virtual
addresses, probably for historical reasons, linux got that wrong too
until very recently (kexec merge in 2.6.14 or so).  The patch below
fixes that.

Changes:
  * Fix linux kernel ELF entry point (also submitted to lkml)
  * Drop LOAD_OFFSET re-#define hack in xen headers.
  * Fix both dom0 and libxc elf loaders.
  * add quick mode so loading old linux kernels doesn't break.

Linux-wise everything should be OK with that, but it might break other
OS'es which also use the ELF loader (in case they create bug-compatible
ELF headers with broken paddr entries ...).

please apply,

  Gerd


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.