search for: elf_addr

Displaying 11 results from an estimated 11 matches for "elf_addr".

2012 Jul 06
1
[LLVMdev] Elf_Dyn_Impl Question
Should Elf_Dyn_Impl in Object/ELF.h also have a 32bit version. getTag/getVal/getPtr all return 64bit types however Elf_Addr etc will not always be 32bit?
2013 Dec 01
0
[PATCH v2 4/4] efi: PE file size differ from in-memory size
...S __bss_dwords = (__bss_len + 3) >> 2; . = ALIGN(128); - + /* Very large objects which don't need to be zeroed */ .hugebss : { diff --git a/efi/wrapper.c b/efi/wrapper.c index 4839e52..1988124 100644 --- a/efi/wrapper.c +++ b/efi/wrapper.c @@ -35,7 +35,7 @@ typedef Elf64_Addr Elf_Addr; #endif /* - * 'so_size' is the file size of the ELF shared object. + * 'so_memsz' is the size of the ELF shared object once loaded. * 'data_size' is the size of initialised data in the shared object. * 'class' dictates how the header is written * For 32b...
2013 Nov 27
0
[PATCH 4/4] efi: PE file size differ from in-memory size
...S __bss_dwords = (__bss_len + 3) >> 2; . = ALIGN(128); - + /* Very large objects which don't need to be zeroed */ .hugebss : { diff --git a/efi/wrapper.c b/efi/wrapper.c index 9652368..a5247ae 100644 --- a/efi/wrapper.c +++ b/efi/wrapper.c @@ -35,7 +35,7 @@ typedef Elf64_Addr Elf_Addr; #endif /* - * 'so_size' is the file size of the ELF shared object. + * 'so_memsz' is the size of the ELF shared object once loaded. * 'data_size' is the size of initialised data in the shared object. * 'class' dictates how the header is written * For 32b...
2013 Nov 27
20
[PATCH 0/4] efi: PE header generation fix
The PE headers of the generated efi file were quite buggy. And since OVMF perform a few consistency checks, syslinux was unable to run on it. I don't pretend to have a thorough understanding of the PE+ headers, some bugs may remain. :) Celelibi (4): efi: Fix PE header field rva_and_sizes_nr efi: Location, size and alignment of .text section efi: Useless relocations in PE file efi: PE
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2018 May 23
33
[PATCH v3 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v3: - Update on message to describe longer term PIE goal. - Minor change on ftrace if condition. - Changed code using xchgq. - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends