similar to: [LLVMdev] Compiling user mode linux with LLVM

Displaying 20 results from an estimated 3000 matches similar to: "[LLVMdev] Compiling user mode linux with LLVM"

2009 May 07
1
[LLVMdev] Compiling user mode linux with LLVM
Hello, I've recently started working on compiling UML with LLVM: the goal is to produce a bitcode version of vmlinux. With some tweaks to the build process, I can use: make ARCH=um CROSS_COMPILE=llvm- CFLAGS="-emit-llvm" to produce vmlinux bitcode. The question is with respect linker script support. Since llvm-ld does not support linker scripts--please correct me if I'm
2009 Aug 09
2
[LLVMdev] Signals: interpreter vs. JIT
Sam, Nick, thank you both for your reply--that was what I thought but wanted to check. The JIT compiler for x86 is pretty robust. Are you aware of any comprehensive list of the most "significant" functional differences between the interpreter and the JIT for x86, i.e. a TODO list? grep -I todo * ? I've just got a rather large project here (user-mode Linux) which works with the
2009 Aug 09
0
[LLVMdev] Signals: interpreter vs. JIT
Hello Matt, The interpreter doesn't support external functions at all. This includes the printf function from the glibc library. That's why the signal causes a segfault. If you're interested in bringing the interpreter up-to-date with the JIT compiler, I would welcome it since JIT compilation isn't supported on all platforms. --Sam ----- Original Message ---- > From:
2007 Apr 18
0
[RFC, PATCH 6/24] i386 Vmi magic fixes
Linker changes to add the VMI MACH_TEXT area into the kernel text section. This area layout is heavily influenced by magic to overlap exactly with the 32-byte VMI ROM entry points, allowing the kernel to copy the VMI ROM over the native section. As use of magic is on the decline, this approach is being phased out in favor of the more modern approach of the inline implementation. The translation
2007 Apr 18
0
[RFC, PATCH 6/24] i386 Vmi magic fixes
Linker changes to add the VMI MACH_TEXT area into the kernel text section. This area layout is heavily influenced by magic to overlap exactly with the 32-byte VMI ROM entry points, allowing the kernel to copy the VMI ROM over the native section. As use of magic is on the decline, this approach is being phased out in favor of the more modern approach of the inline implementation. The translation
2010 Jun 01
1
strange pvops problem
I compiled the pvops kernel like this : [root@localhost xen-4.0.0]# ls buildconfigs config Config.mk.orig dist extras install.sh Makefile README tools xen build-linux-2.6-pvops_x86_32 Config.mk COPYING docs file linux-2.6-pvops.git messages stubdom unmodified_drivers [root@localhost build-linux-2.6-pvops_x86_32]# make -j2 bzImage
2010 Jun 01
1
strange pvops problem
I compiled the pvops kernel like this : [root@localhost xen-4.0.0]# ls buildconfigs config Config.mk.orig dist extras install.sh Makefile README tools xen build-linux-2.6-pvops_x86_32 Config.mk COPYING docs file linux-2.6-pvops.git messages stubdom unmodified_drivers [root@localhost build-linux-2.6-pvops_x86_32]# make -j2 bzImage
2008 Sep 28
1
[LLVMdev] linker script
Hi, I'm trying to compile linux kernel with llvm to generate llvm ir (bitcode). It seems like llvm-ld doesn't accept any linker scripts. How do I deal with vmlinux.lds in such a case? How did people who have compiled linux kernel with llvm deal with this in the past? Thanks, Ashish
2007 Jun 01
2
another RFC patch: bzImage with ELF payload
OK, here's another go-around. This patch leaves the bzImage itself unmodified, but it changes the payload into an ELF file. That is, the 32-bit decompression/relocation+compressed kernel is now a properly formed ELF file. One thing that fell out of this is that code32_start end up being a pointer to the ELF header rather than an entrypoint. Rather than reproducing Vivek's (?) hack of
2007 Jun 01
2
another RFC patch: bzImage with ELF payload
OK, here's another go-around. This patch leaves the bzImage itself unmodified, but it changes the payload into an ELF file. That is, the 32-bit decompression/relocation+compressed kernel is now a properly formed ELF file. One thing that fell out of this is that code32_start end up being a pointer to the ELF header rather than an entrypoint. Rather than reproducing Vivek's (?) hack of
2007 Apr 18
3
[PATCH 1 of 1] x86_64: Put .note.* sections into a PT_NOTE segment in vmlinux
This patch updates x86_64 linker script to pack any .note.* sections into a PT_NOTE segment in the output file. To do this, we tell ld that we need a PT_NOTE segment. This requires us to start explicitly mapping sections to segments, so we also need to explicitly create PT_LOAD segments for text and data, and map the sections to them appropriately. Fortunately, each section will default to its
2010 Mar 15
1
host cross-compile patch
I tend to use the same tool-chain across various hosts so I made this very simple patch that allows you to pass the cross-compiler name to make ( e.g. make CROSS_COMPILE=i686-nptl-linux-gnu-). I'm not sure if patches should be attached or just pasted inline so I did both this time. BTW, it's relative to syslinux 4 but the same changes work with syslinux 3 although the patch won't
2017 Oct 11
0
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
On 10/11/2017 3:30 PM, Thomas Garnier wrote: > Changes: > - patch v1: > - Simplify ftrace implementation. > - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. > - rfc v3: > - Use --emit-relocs instead of -pie to reduce dynamic relocation space on > mapped memory. It also simplifies the relocation process. > - Move the start the module
2013 Nov 20
0
[PATCH -tip v3 02/23] kprobes: Introduce NOKPROBE_SYMBOL() macro for blacklist
Introduce NOKPROBE_SYMBOL() macro which builds a kprobe blacklist in build time. The usage of this macro is similar to the EXPORT_SYMBOL, put the NOKPROBE_SYMBOL(function); just after the function definition. If CONFIG_KPROBES=y, the macro is expanded to the definition of a static data structure of kprobe_blackpoint which is initialized for the function and put the address of the data structure
2007 Apr 18
1
[PATCH] lguest: clean up some l"references .init.text" warnings
Thanks to Andrew for pointing these out. This patch moves the parvirtprobe section into .init.data: it's only used in very very early boot, and for similar reasons, puts lguest_maybe_init and lguest_memory_setup in init.text. As well as fixing some warnings, this frees up a tiny bit more memory. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au> diff -r ecec388180b2
2007 Apr 18
1
[PATCH] lguest: clean up some l"references .init.text" warnings
Thanks to Andrew for pointing these out. This patch moves the parvirtprobe section into .init.data: it's only used in very very early boot, and for similar reasons, puts lguest_maybe_init and lguest_memory_setup in init.text. As well as fixing some warnings, this frees up a tiny bit more memory. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au> diff -r ecec388180b2
2017 Oct 12
0
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
On 10/12/2017 10:34 AM, Thomas Garnier wrote: > On Wed, Oct 11, 2017 at 2:34 PM, Tom Lendacky <thomas.lendacky at amd.com> wrote: >> On 10/11/2017 3:30 PM, Thomas Garnier wrote: >>> Changes: >>> - patch v1: >>> - Simplify ftrace implementation. >>> - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. >>> - rfc
2020 Jul 14
0
[PATCH v4 13/75] x86/boot/compressed/64: Rename kaslr_64.c to ident_map_64.c
From: Joerg Roedel <jroedel at suse.de> The file contains only code related to identity mapped page-tables. Rename the file and compile it always in. Signed-off-by: Joerg Roedel <jroedel at suse.de> --- arch/x86/boot/compressed/Makefile | 2 +- arch/x86/boot/compressed/{kaslr_64.c => ident_map_64.c} | 9 +++++++++ arch/x86/boot/compressed/kaslr.c
2007 Mar 22
1
[PATCH] use CC for defining CPP
Since CPP is being used with CFLAGS, it should be in lock-step with CC, to avoid having to specify both CC and CPP for the build. Signed-off-by: Jan Beulich <jbeulich@novell.com> Index: 2007-03-19/config/StdGNU.mk =================================================================== --- 2007-03-19.orig/config/StdGNU.mk 2007-03-08 09:37:32.000000000 +0100 +++ 2007-03-19/config/StdGNU.mk
2017 Oct 04
1
[PATCH 11/13] x86/paravirt: Add paravirt alternatives infrastructure
With CONFIG_PARAVIRT, the kernel .text is littered with a bunch of calls to pv_irq_ops function pointers, like: callq *0xffffffff81e3a400 (pv_irq_ops.save_fl) In non-Xen paravirt environments -- including native, KVM, Hyper-V, and VMware -- the above code gets patched by native_patch() to look like this instead: pushfq pop %rax nopl 0x0(%rax,%rax,1) So in most scenarios,