search for: rkm

Displaying 13 results from an estimated 13 matches for "rkm".

Did you mean: ram
2017 Oct 11
1
[PATCH v1 01/27] x86/crypto: Adapt assembly for PIE support
...\ vpxor kr(CTX), RKR, RKR; \ - vpshufb .Lbswap128_mask, RKR, RKR; + vpshufb .Lbswap128_mask(%rip), RKR, RKR; #define transpose_2x4(x0, x1, t0, t1) \ vpunpckldq x1, x0, t0; \ @@ -251,9 +255,9 @@ __cast5_enc_blk16: movq %rdi, CTX; - vmovdqa .Lbswap_mask, RKM; - vmovd .Lfirst_mask, R1ST; - vmovd .L32_mask, R32; + vmovdqa .Lbswap_mask(%rip), RKM; + vmovd .Lfirst_mask(%rip), R1ST; + vmovd .L32_mask(%rip), R32; enc_preload_rkr(); inpack_blocks(RL1, RR1, RTMP, RX, RKM); @@ -287,7 +291,7 @@ __cast5_enc_blk16: popq %rbx; popq %r15; - vmovdqa .Lbsw...
2005 Nov 15
1
nut driver for Belkin OmniGuard F6C230 - RKM
Hallo, i'v bought a Belkin F6C230. The CD which is shiped with this UPS has a totally useless installation part for linux. So I'v tried to use nut instead of the Belkin software. I've tried both belkin drivers (belkin and belkinunv) and also the generic driver (genericups) with all available upstypes. None of these drivers did actually work. Has anybody experiences with this UPS
2006 Nov 16
0
[LLVMdev] Question about functions/bytecodes: external linkage
...he lines of "Hello World!" Here is the llvm for it:<br> <br> ; ModuleID = 'hello.bc'<br> target endian = little<br> target pointersize = 32<br> target triple = "i686-pc-linux-gnu"<br> %str = internal constant [18 x sbyte] c"Hello RKM world!\0A\00" ; <[18 x sbyte]*> [#uses=1]<br> <br> implementation ; Functions:<br> <br> int %main() {<br> entry:<br> %tmp = call int (sbyte*, ...)* %printf( sbyte* getelementptr ([18 x sbyte]* %str, int 0, uint 0) ) ; &lt...
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2018 May 23
33
[PATCH v3 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v3: - Update on message to describe longer term PIE goal. - Minor change on ftrace if condition. - Changed code using xchgq. - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends
2006 Oct 25
2
[LLVMdev] Some basic questions about LLVM version 1.8 bytecode format
...none<br> 00<br> <br> ***********************************************************<br> <br> Module constant pool ID = 0x03 and size = 0x01f<br> e3 03 00 00<br> <br> Module constant pool<br> <br> One constant string sbyte[18] = "Hello RKM world!\n" ????? <--- see question #4<br> 01 00 0e 48 |ux-gnu.........H|<br> 00000050 65 6c 6c 6f 20 52 4b 4d 20 77 6f 72 6c 64 21 0a |ello RKM world!.|<br> 00000060 00<br> <br> One constant sbyte*????? <--- see question #5<br> 01 12 04 1a<br&...
2006 Oct 26
0
[LLVMdev] Some basic questions about LLVM version 1.8 bytecode format
...d the question here. > > Inline asm block: none > 00 > > *********************************************************** > > Module constant pool ID = 0x03 and size = 0x01f > e3 03 00 00 > > Module constant pool > > One constant string sbyte[18] = "Hello RKM world!\n" ????? <--- see > question #4 > 01 00 0e 48 |ux-gnu.........H| > 00000050 65 6c 6c 6f 20 52 4b 4d 20 77 6f 72 6c 64 21 0a |ello RKM > world!.| > 00000060 00 Yes, this is the value of the sbyte[18]. > > One constant sbyte*????? <--- see question #5 &g...
2009 Jul 23
1
[PATCH server] changes required for fedora rawhide inclusion.
...UR*qNJ6$&a)!H3z;H8L!xJhME zSo-XXrIH0z5%kJm%R!YSEU5UClcaTu%Mt-LSt49ve~?*9nO#~t1(&Rud4LybOw~+O zr71^wwgQ{6498BgscY}0w3-3#BvjP^ZIfO}fZ6e;r>!{JS0`LeZ_PIQ6&AVfxuu!4 zRctoZE%o7Iltv9E{~grSq*kD^7=_bhjSxgrI(FhH#3m^UQAzY?*lX6&5G`vR2x6 at z zT`01d5n85f3fP~(x&@RXEz)1zSEZB{^huac+IxLq!X92eKRkMJ&-N7e`hsj|!QQiM znuwO<Zh%0;C|x;VNmpUtEF$b%Ssgz+wJ<e1RhlYKot}Ec)NNDqQ;Sopd3&gXkOXNM z3BkAoizbo=uoJD`Q7$jy5;1$i8&-m&c%Q|4p6!n~ClGEB>nTg?aWWJDN9b+NZjv0l zOWWD0(&AYGuNRhP%Okb+Zra=R6c<GJk<owy#fAvDWM^Py17L!)OThaP*wkT0H^SvJ z%Ye*;nMW2`DKF2LX37yE_yOTLK)X(d;8CucO?MShIcGu)x...