Displaying 10 results from an estimated 10 matches for "mtls".
Did you mean:
mtas
2019 Dec 10
2
aarch64 do not generate debug info for tls var
Hi Devs,
consider below testcase
$cat test.c
__thread int mtls=1;
void foo(){
mtls++;
}
it emits this debug info for mtls
0x0000002a: DW_TAG_variable
DW_AT_name ("mtls")
DW_AT_type (0x00000035 "int")
DW_AT_external (true)
DW_AT_decl_file ("test.c")...
2019 Dec 10
2
aarch64 do not generate debug info for tls var
...David Blaikie <dblaikie at gmail.com> wrote:
> What does GCC do?
>
> On Mon, Dec 9, 2019 at 10:25 PM kamlesh kumar via llvm-dev <
> llvm-dev at lists.llvm.org> wrote:
>
>> Hi Devs,
>>
>> consider below testcase
>> $cat test.c
>> __thread int mtls=1;
>> void foo(){
>> mtls++;
>> }
>>
>> it emits this debug info for mtls
>>
>> 0x0000002a: DW_TAG_variable
>> DW_AT_name ("mtls")
>> DW_AT_type (0x00000035 "int")
>>...
2024 Jul 24
2
NSD 4.10.1rc2 pre-release
...d process with limited privileges of the username 'nsd'
It would be better, if nsd read all tls-auth client-[cert|key] data before dropping privileges.
Then the files could be still limited to be readable by the root user.
next question:
now, the axfr request from secondary to primary is a mTLS connection. But what about notify messages
from primary to secondary? the zone-statement 'notify' does not mention a tls-auth-name
Are these notifies still plain, unencrypted, unauthenticated UDP packets?
next note:
I used an IPv6 network for my zone transfer tests and have the impression,...
2024 Jul 30
1
NSD 4.10.1rc2 pre-release
...f the username 'nsd'
> It would be better, if nsd read all tls-auth client-[cert|key] data
> before dropping privileges.
> Then the files could be still limited to be readable by the root
> user.
>
> next question:
> now, the axfr request from secondary to primary is a mTLS connection.
> But what about notify messages
> from primary to secondary? the zone-statement 'notify' does not
> mention a tls-auth-name
> Are these notifies still plain, unencrypted, unauthenticated UDP
> packets?
>
> next note:
> I used an IPv6 network for my zone...
2012 Jul 22
3
[LLVMdev] Setting up a cross-compiler for cortex-m3
...-std=c++11' '-I'
'/home/emitrax/programming/adok/build/include/private' '-I'
'/home/emitrax/programming/adok/include/private' '-c' '-o'
'source/porting/arch/arm/cortex-m3/stack.cpp.o' '-shared-libgcc'
'-march=armv5te' '-mtls-dialect=gnu' '-D'
'__CS_SOURCERYGXX_MAJ__=2012' '-D' '__CS_SOURCERYGXX_MIN__=3' '-D'
'__CS_SOURCERYGXX_REV__=57'
Any suggestions?
Regards,
S.
2012 Jul 18
0
[LLVMdev] Setting up a cross-compiler for cortex-m3
On Wed, Jul 18, 2012 at 5:45 PM, Renato Golin <rengolin at systemcall.org> wrote:
> On 18 July 2012 15:46, salvatore benedetto
> <salvatore.benedetto at gmail.com> wrote:
>> $ clang++ -ccc-host-triple thumbv7m-none-gnueabi noInclude.cpp -c
>> --sysroot=/home/emitrax/CodeSourcery/Sourcery_G++_Lite/arm-none-linux-gnueabi/libc/
>
> Try -ccc-gcc-name
2024 Jul 23
1
NSD 4.10.1rc2 pre-release
Hi,
NSD 4.10.1rc2 pre-release is available:
https://nlnetlabs.nl/downloads/nsd/nsd-4.10.1rc2.tar.gz
sha256 ce2e82bc673aeff3a71aeb422fa38fb8db0a591edb76c13b0e4dde83ec8253e9
pgp https://nlnetlabs.nl/downloads/nsd/nsd-4.10.1rc2.tar.gz.asc
Version 4.10.1 consists primarily of bug fixes.
@bilias implemented mutual TLS authentication for zone transfers.
Please consult the nsd.conf manual for details
2012 Jul 18
3
[LLVMdev] Setting up a cross-compiler for cortex-m3
On 18 July 2012 15:46, salvatore benedetto
<salvatore.benedetto at gmail.com> wrote:
> $ clang++ -ccc-host-triple thumbv7m-none-gnueabi noInclude.cpp -c
> --sysroot=/home/emitrax/CodeSourcery/Sourcery_G++_Lite/arm-none-linux-gnueabi/libc/
Try -ccc-gcc-name arm-none-linux-gnueabi-g++ -ccc-host-triple
thumbv7m-none-linux-gnueabi
Sometimes it's better than sysroot, as it finds it
2017 Nov 08
6
[RFC] lld: Dropping TLS relaxations in favor of TLSDESC
tl;dr: TLSDESC have solved most problems in formerly inefficient TLS access
models, so I think we can drop TLS relaxation support from lld.
lld's code to handle relocations is a mess; the code consists of a lot of
cascading "if"s and needs a lot of prior knowledge to understand what it is
doing. Honestly it is head-scratching and needs serious refactoring. I'm
trying to simplify
2017 Nov 08
2
[RFC] lld: Dropping TLS relaxations in favor of TLSDESC
...read the code, without sacrificing
> > performance of lld-generated files in practice.
> >
> > Thoughts?
>
> I don't think we can do it.
>
> The main thing we have to keep in mind is that not everyone is using
> TLSDESC. In fact, clang doesn't even support -mtls-dialect=gnu2.
>
Oh, okay, that is a surprise to me. There's no reason not to support that
and make it default, I wasn't even try that. We definitely should support
that.
If everyone switches to TLSDESC, then I am OK with dropping
> optimizations for the old model.
>
> But even...