search for: symtyp

Displaying 15 results from an estimated 15 matches for "symtyp".

Did you mean: symtype
2018 Apr 04
1
LLVM PPC JIT Error
Hi Ulrich, and any other llvm PowerPC/JIT users, It looks like the Numba maintainers have run in to an issue with RuntimeDyldELF's PowerPC support (See https://github.com/numba/numba/issues/2451#issuecomment-377739948 and later comments) Due to a recent change to weak symbol handling, we now always resolve to the first copy of a function that is emitted (discarding redundant weak/odr
2007 Apr 11
0
Problem installing xen on Opensuse10.2
...initrd-2.6.18.8-0.1-default lrwxrwxrwx 1 root root 32 12. Apr 17:10 initrd-2.6-xen.img -> initrd-2.6.16.33-xen_3.0.4.1.img -rw-r--r-- 1 root root 385536 12. Apr 11:54 message -rw-r--r-- 1 root root 87770 6. Mär 17:08 symsets-2.6.18.8-0.1-default.tar.gz -rw-r--r-- 1 root root 344114 6. Mär 17:08 symtypes-2.6.18.8-0.1-default.gz -rw-r--r-- 1 root root 100632 6. Mär 17:08 symvers-2.6.18.8-0.1-default.gz -rw-r--r-- 1 root root 696724 5. Jan 13:51 System.map-2.6.16.33-xen_3.0.4.1 -rw-r--r-- 1 root root 744466 6. Mär 17:03 System.map-2.6.18.8-0.1-default -rwxr-xr-x 1 root root 1762171 6. Mär 17:07 vml...
2018 Mar 26
0
Interest in integrating a linux perf JITEventListener?
...ions in the object. > + for (const std::pair<SymbolRef, uint64_t> &P : computeSymbolSizes(DebugObj)) { > + SymbolRef Sym = P.first; > + std::vector<LLVMPerfJitDebugEntry> LineInfo; > + std::string SourceFileName; > + > + Expected<SymbolRef::Type> SymTypeOrErr = Sym.getType(); > + if (!SymTypeOrErr) { > + // TODO: Actually report errors helpfully. > + consumeError(SymTypeOrErr.takeError()); > + continue; > + } > + SymbolRef::Type SymType = *SymTypeOrErr; > + if (SymType != SymbolRef::ST_Function) >...
2014 Apr 13
1
[Bug 915] New: segfault in error case : expr_evaluate_payload not checking payload->payload.desc being null
...lumn = 24, last_column = 31}, {nle = 0x18}}}, refcnt = 1, flags = 0, dtype = 0x42df60 <integer_type>, byteorder = BYTEORDER_INVALID, len = 4, ops = 0x433f00 <payload_expr_ops>, op = OP_INVALID, {{scope = 0x0, identifier = 0x42fcf0 <proto_unknown_template> "\332\374B", symtype = SYMBOL_SET}, { verdict = 0, chain = 0x42fcf0 <proto_unknown_template> "\332\374B"}, {value = {{_mp_alloc = 0, _mp_size = 0, _mp_d = 0x42fcf0 <proto_unknown_template>}}}, {prefix = 0x0, prefix_len = 4390128}, {expressions = {next = 0x0, prev = 0x42fcf0 <pro...
2016 Dec 29
1
Interest in integrating a linux perf JITEventListener?
Having something like this available in tree would definitely be useful. For simplicity, why don't we start with support for the second style? This is the long term useful one and would be a good starting point for getting the code in tree. Can you give a pointer to the patch so that I can assess the rough complexity? If it's simple enough, I'd be happy to help get it reviewed
2017 Feb 02
0
Interest in integrating a linux perf JITEventListener?
Hi, On 2016-12-29 13:17:50 -0800, Philip Reames wrote: > Having something like this available in tree would definitely be > useful. Cool. > For simplicity, why don't we start with support for the second style? This > is the long term useful one and would be a good starting point for getting > the code in tree. Works for me. > Can you give a pointer to the patch so that
2015 Jan 26
2
[LLVMdev] [llvm] r188726 - Adding PIC support for ELF on x86_64 platforms
...dELF::processRelocationRe gsi = GlobalSymbolTable.find(TargetName.data()); if (gsi != GlobalSymbolTable.end()) { Value.SectionID = gsi->second.first; + Value.Offset = gsi->second.second; Value.Addend = gsi->second.second + Addend; } else { switch (SymType) { @@ -860,6 +890,7 @@ void RuntimeDyldELF::processRelocationRe Value.Addend = Addend; break; } + case SymbolRef::ST_Data: case SymbolRef::ST_Unknown: { Value.SymbolName = TargetName.data(); Value.Addend = Addend; @@ -1150,8 +118...
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2018 May 23
33
[PATCH v3 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v3: - Update on message to describe longer term PIE goal. - Minor change on ftrace if condition. - Changed code using xchgq. - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends
2006 Jun 28
35
[klibc 00/31] klibc as a historyless patchset (updated and reorganized)
I have updated the klibc patchset based on feedback received. In particular, the patchset has been reorganized so as not to break git-bisect. Additionally, this updates the patch base to 2.6.17-git12 (d38b69689c349f35502b92e20dafb30c62d49d63) and klibc 1.4.8; the main difference on the klibc side is removal of obsolete code. This is also available as a git tree at: