search for: __chk_io_ptr

Displaying 10 results from an estimated 10 matches for "__chk_io_ptr".

2017 Oct 12
2
[PATCH v1 15/27] compiler: Option to default to hidden symbols
...gt; > extern __visible const void __nosave_begin, __nosave_end; > > diff --git a/include/linux/compiler.h b/include/linux/compiler.h > index e95a2631e545..6997716f73bf 100644 > --- a/include/linux/compiler.h > +++ b/include/linux/compiler.h > @@ -78,6 +78,14 @@ extern void __chk_io_ptr(const volatile void __iomem *); > #include <linux/compiler-clang.h> > #endif > > +/* Useful for Position Independent Code to reduce global references */ > +#ifdef CONFIG_DEFAULT_HIDDEN > +#pragma GCC visibility push(hidden) > +#define __default_visibility __attribute...
2017 Oct 12
2
[PATCH v1 15/27] compiler: Option to default to hidden symbols
...gt; > extern __visible const void __nosave_begin, __nosave_end; > > diff --git a/include/linux/compiler.h b/include/linux/compiler.h > index e95a2631e545..6997716f73bf 100644 > --- a/include/linux/compiler.h > +++ b/include/linux/compiler.h > @@ -78,6 +78,14 @@ extern void __chk_io_ptr(const volatile void __iomem *); > #include <linux/compiler-clang.h> > #endif > > +/* Useful for Position Independent Code to reduce global references */ > +#ifdef CONFIG_DEFAULT_HIDDEN > +#pragma GCC visibility push(hidden) > +#define __default_visibility __attribute...
2020 Jan 08
1
[RFT 00/13] iomap: Constify ioreadX() iomem argument
...return *(const volatile u32 __force *)addr; > } SuperH is another example: 1. ioread8_rep(void __iomem *addr, void *dst, unsigned long count) calls mmio_insb() 2. static inline void mmio_insb(void __iomem *addr, u8 *dst, int count) calls __raw_readb() 3. #define __raw_readb(a) (__chk_io_ptr(a), *(volatile u8 __force *)(a)) Even if interface was not marked as volatile, in fact its implementation was casting to volatile. > The __force-cast that removes the __iomem here also means that > the 'volatile' keyword could be dropped from the argument list, > as it has no re...
2017 Oct 18
0
[PATCH v1 15/27] compiler: Option to default to hidden symbols
...isible const void __nosave_begin, __nosave_end; >> >> diff --git a/include/linux/compiler.h b/include/linux/compiler.h >> index e95a2631e545..6997716f73bf 100644 >> --- a/include/linux/compiler.h >> +++ b/include/linux/compiler.h >> @@ -78,6 +78,14 @@ extern void __chk_io_ptr(const volatile void __iomem *); >> #include <linux/compiler-clang.h> >> #endif >> >> +/* Useful for Position Independent Code to reduce global references */ >> +#ifdef CONFIG_DEFAULT_HIDDEN >> +#pragma GCC visibility push(hidden) >> +#define __defau...
2017 Oct 11
0
[PATCH v1 15/27] compiler: Option to default to hidden symbols
...EN +#pragma GCC visibility pop +#endif extern __visible const void __nosave_begin, __nosave_end; diff --git a/include/linux/compiler.h b/include/linux/compiler.h index e95a2631e545..6997716f73bf 100644 --- a/include/linux/compiler.h +++ b/include/linux/compiler.h @@ -78,6 +78,14 @@ extern void __chk_io_ptr(const volatile void __iomem *); #include <linux/compiler-clang.h> #endif +/* Useful for Position Independent Code to reduce global references */ +#ifdef CONFIG_DEFAULT_HIDDEN +#pragma GCC visibility push(hidden) +#define __default_visibility __attribute__((visibility ("default"...
2020 Jan 08
4
[RFT 00/13] iomap: Constify ioreadX() iomem argument
Le 08/01/2020 ? 09:18, Krzysztof Kozlowski a ?crit?: > On Wed, 8 Jan 2020 at 09:13, Geert Uytterhoeven <geert at linux-m68k.org> wrote: >> >> Hi Krzysztof, >> >> On Wed, Jan 8, 2020 at 9:07 AM Geert Uytterhoeven <geert at linux-m68k.org> wrote: >>> On Tue, Jan 7, 2020 at 5:53 PM Krzysztof Kozlowski <krzk at kernel.org> wrote: >>>>
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to