search for: b640201fcff7

Displaying 8 results from an estimated 8 matches for "b640201fcff7".

2017 Oct 12
2
[PATCH v1 15/27] compiler: Option to default to hidden symbols
...ATA_ELIMINATION ? > +#else > +#define __default_visibility > +#endif > + > /* > * Generic compiler-dependent macros required for kernel > * build go below this comment. Actual compiler/compiler version > diff --git a/init/Kconfig b/init/Kconfig > index ccb1d8daf241..b640201fcff7 100644 > --- a/init/Kconfig > +++ b/init/Kconfig > @@ -1649,6 +1649,13 @@ config PROFILING > config TRACEPOINTS > bool > > +# > +# Default to hidden visibility for all symbols. > +# Useful for Position Independent Code to reduce global references. > +# > +confi...
2017 Oct 12
2
[PATCH v1 15/27] compiler: Option to default to hidden symbols
...ATA_ELIMINATION ? > +#else > +#define __default_visibility > +#endif > + > /* > * Generic compiler-dependent macros required for kernel > * build go below this comment. Actual compiler/compiler version > diff --git a/init/Kconfig b/init/Kconfig > index ccb1d8daf241..b640201fcff7 100644 > --- a/init/Kconfig > +++ b/init/Kconfig > @@ -1649,6 +1649,13 @@ config PROFILING > config TRACEPOINTS > bool > > +# > +# Default to hidden visibility for all symbols. > +# Useful for Position Independent Code to reduce global references. > +# > +confi...
2017 Oct 18
0
[PATCH v1 15/27] compiler: Option to default to hidden symbols
...gt;> +#define __default_visibility >> +#endif >> + >> /* >> * Generic compiler-dependent macros required for kernel >> * build go below this comment. Actual compiler/compiler version >> diff --git a/init/Kconfig b/init/Kconfig >> index ccb1d8daf241..b640201fcff7 100644 >> --- a/init/Kconfig >> +++ b/init/Kconfig >> @@ -1649,6 +1649,13 @@ config PROFILING >> config TRACEPOINTS >> bool >> >> +# >> +# Default to hidden visibility for all symbols. >> +# Useful for Position Independent Code to reduce...
2017 Oct 11
0
[PATCH v1 15/27] compiler: Option to default to hidden symbols
...t_visibility __attribute__((visibility ("default"))) +#else +#define __default_visibility +#endif + /* * Generic compiler-dependent macros required for kernel * build go below this comment. Actual compiler/compiler version diff --git a/init/Kconfig b/init/Kconfig index ccb1d8daf241..b640201fcff7 100644 --- a/init/Kconfig +++ b/init/Kconfig @@ -1649,6 +1649,13 @@ config PROFILING config TRACEPOINTS bool +# +# Default to hidden visibility for all symbols. +# Useful for Position Independent Code to reduce global references. +# +config DEFAULT_HIDDEN + bool + source "arch/Kconfig&qu...
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to