bitkeeper revision 1.1407 (42851a62m3iGb_ScYjvXzomQNk1N4Q)
authorcl349@firebug.cl.cam.ac.uk <cl349@firebug.cl.cam.ac.uk>
Fri, 13 May 2005 21:21:38 +0000 (21:21 +0000)
committercl349@firebug.cl.cam.ac.uk <cl349@firebug.cl.cam.ac.uk>
Fri, 13 May 2005 21:21:38 +0000 (21:21 +0000)
commitadf9605d5e69fb689eb8505205359c4f805b4e18
tree3725276fdad907710352fb8ad1c31a493c5eabfe
parentac5c91b586e9ab0109ddd819b06c1f50fdcb63bd
bitkeeper revision 1.1407 (42851a62m3iGb_ScYjvXzomQNk1N4Q)

desc.h, process.c:
  [PATCH] Fixing TLS handling in x86-64 xenlinux
  Some LTP testcases (pthreads) have exposed this bug (kill the kernel),
  and the attached fixes the problem. With this, pth_str0? run fine, for
  example. We'll continue to run LTP on x86-64 xenlinux to get all of them
  pass.
Signed-off-by: Jun Nakajima <jun.nakajima@intel.com>
Signed-off-by: Christian Limpach <Christian.Limpach@cl.cam.ac.uk>
linux-2.6.11-xen-sparse/arch/xen/x86_64/kernel/process.c
linux-2.6.11-xen-sparse/include/asm-xen/asm-x86_64/desc.h