Displaying 19 results from an estimated 19 matches similar to: "[PATCH] ia64: Fix shared build"
2019 Jan 21
0
[klibc:master] ia64: Fix shared build
Commit-ID: 8418552770110e9864ab24d60d8481fac58d3a65
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=8418552770110e9864ab24d60d8481fac58d3a65
Author: James Clarke <jrtc27 at jrtc27.com>
AuthorDate: Mon, 21 Jan 2019 21:26:57 +0000
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Mon, 21 Jan 2019 22:51:27 +0000
[klibc] ia64: Fix shared build
We
2019 Jan 18
0
[klibc:master] mips: use -Ttext-segment when linking shared library
Commit-ID: 048bfb0df170d4a43142adcee8a2dffdfc2c1e9f
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=048bfb0df170d4a43142adcee8a2dffdfc2c1e9f
Author: James Cowgill <james.cowgill at mips.com>
AuthorDate: Fri, 2 Mar 2018 08:33:01 -0800
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Wed, 2 Jan 2019 03:08:04 +0000
[klibc] mips: use -Ttext-segment
2006 Jun 26
2
[klibc 28/43] mips support for klibc
The parts of klibc specific to the mips architecture.
Signed-off-by: H. Peter Anvin <hpa at zytor.com>
---
commit 8dc79563c06020d8844b9e9b821741828039b59e
tree b957c8fb1fddf486f5c26b1880726051d4f6aaad
parent bc9b363b31d301ab94c115cccc2e079c0d318498
author H. Peter Anvin <hpa at zytor.com> Sun, 25 Jun 2006 16:58:31 -0700
committer H. Peter Anvin <hpa at zytor.com> Sun, 25 Jun
2014 Mar 11
4
[PATCH] add mips64 support
From: Dejan Latinovic <Dejan.Latinovic at imgtec.com>
---
usr/include/arch/mips64/klibc/archconfig.h | 3 +
usr/include/arch/mips64/klibc/archsetjmp.h | 39 ++++++
usr/include/arch/mips64/machine/asm.h | 76 ++++++++++
usr/include/fcntl.h | 2 +-
usr/include/sys/md.h | 1 +
usr/include/sys/resource.h | 4 +-
2018 May 23
0
[PATCH v3 16/27] compiler: Option to add PROVIDE_HIDDEN replacement for weak symbols
Provide an option to have a PROVIDE_HIDDEN (linker script) entry for
each weak symbol. This option solve an error in x86_64 where the linker
optimizes pie generate code to be non-pie because --emit-relocs was used
instead of -pie (to reduce dynamic relocations).
Signed-off-by: Thomas Garnier <thgarnie at google.com>
---
init/Kconfig | 7 +++++++
scripts/link-vmlinux.sh | 14
2018 Mar 02
5
[PATCH 0/5] Various MIPS fixes
Hi,
I noticed that klibc started crashing on 64-bit MIPS and in my quest to fix the
bug I got a bit carried away and fixed a few other things as well. Here are
various miscellaneous MIPS patches, although the first patch is the important
one.
Thanks,
James
*** BLURB HERE ***
James Cowgill (5):
mips64: compile with -mno-abicalls
mips: use -Ttext-segment when linking shared library
2010 May 25
1
Need Help! Poor performance about randomForest for large data
Hi, dears,
I am processing some data with 60 columns, and 286,730 rows.
Most columns are numerical value, and some columns are categorical value.
It turns out that: when ntree sets to the default value (500), it says "can
not allocate a vector of 1.1 GB size"; And when I set ntree to be a very
small number like 10, it will run for hours.
I use the (x,y) rather than the (formula,data).
2016 Nov 08
2
[MC] Target-Independent Small Data Section Handling
Oh, one thing I forgot to mention:
ReadOnly objects are also counted as small data globals on PPC (on top of BSS, Data, Common). That's what the r2 base is for (.sdata2, defined to be constant data). 32-bit immediate loads take 2 ops minimum on PPC, so even constant loading benefits from small data.
It'd be handy to add a third argument containing what kind would normally be returned:
2020 Mar 27
2
[lld] RFC: Allow custom sections to be under GNU_RELRO
Peter,
Thanks for the great feedback!
> The first is the use of a custom suffix, all other linker conventions,
that I know of, use prefixes as these are much easier and faster to match
against names.
> This can be important in large programs compiled -ffunction-sections as
there can be millions of sections to match.
I understand the reason of having these conventions in linkers. On the
2018 May 29
1
[PATCH v4 00/27] x86: PIE support and option to extend KASLR randomization
Changes:
- patch v4:
- Simplify early boot by removing global variables.
- Modify the mcount location script for __mcount_loc intead of the address
read in the ftrace implementation.
- Edit commit description to explain better where the kernel can be located.
- Streamlined the testing done on each patch proposal. Always testing
hibernation, suspend, ftrace and kprobe to
2018 Jun 25
1
[PATCH v5 00/27] x86: PIE support and option to extend KASLR randomization
Changes:
- patch v5:
- Adapt new crypto modules for PIE.
- Improve per-cpu commit message.
- Fix xen 32-bit build error with .quad.
- Remove extra code for ftrace.
- patch v4:
- Simplify early boot by removing global variables.
- Modify the mcount location script for __mcount_loc intead of the address
read in the ftrace implementation.
- Edit commit description to
2020 Mar 26
2
[lld] RFC: Allow custom sections to be under GNU_RELRO
Hey,
We would like to propose an idea that would help security harden
applications that define custom sections.
Motivation and Background
In Chromium we have a garbage collector that implements some RTTI machinery
in the form of a table. This table is used by the collector to trace and
finalize garbage collected objects. We're thinking of using
__attribute__((section(...))) so that the table
2008 Oct 06
3
[Fwd: Re: Install CentOS-5.0 on HP-ComPaq DC7700 Dual Core]
---------------------------- Original Message ----------------------------
Subject: Re: [CentOS] Install CentOS-5.0 on HP-ComPaq DC7700 Dual Core
From: "James B. Byrne" <byrnejb at harte-lyne.ca>
Date: Mon, October 6, 2008 12:26
To: cenos at centos.org
Cc: "John Newbigin" <jnewbigin at ict.swin.edu.au>
2018 Jan 04
1
Linker Option support for ELF
We use .note descriptors with ELF on OpenVMS. We have self-describing
entries with tags and lengths. The compiler encodes stuff for the
linker such as compiler version, compilation date-time, module name,
final severity of the compilation, etc. The linker itself then
adds/modifies the .note entries to insert linker version, link
date/time, etc. We also use .notes to record floating point
2018 May 23
33
[PATCH v3 00/27] x86: PIE support and option to extend KASLR randomization
Changes:
- patch v3:
- Update on message to describe longer term PIE goal.
- Minor change on ftrace if condition.
- Changed code using xchgq.
- patch v2:
- Adapt patch to work post KPTI and compiler changes
- Redo all performance testing with latest configs and compilers
- Simplify mov macro on PIE (MOVABS now)
- Reduce GOT footprint
- patch v1:
- Simplify ftrace
2006 Jun 28
35
[klibc 00/31] klibc as a historyless patchset (updated and reorganized)
I have updated the klibc patchset based on feedback received. In
particular, the patchset has been reorganized so as not to break
git-bisect.
Additionally, this updates the patch base to 2.6.17-git12
(d38b69689c349f35502b92e20dafb30c62d49d63) and klibc 1.4.8; the main
difference on the klibc side is removal of obsolete code.
This is also available as a git tree at:
2016 Nov 08
3
[MC] Target-Independent Small Data Section Handling
I've prepared a preliminary patch with the intention of implementing
PPC-EABI subtarget features for applications that run in a standalone
embedded environment.
https://reviews.llvm.org/D26344
The most significant difference compared with the SVR4 ABI is the use of
SDA (small data area). This allows full-word constants and data to be
grouped into small-data sections accessed using relocated
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes:
- patch v2:
- Adapt patch to work post KPTI and compiler changes
- Redo all performance testing with latest configs and compilers
- Simplify mov macro on PIE (MOVABS now)
- Reduce GOT footprint
- patch v1:
- Simplify ftrace implementation.
- Use gcc mstack-protector-guard-reg=%gs with PIE when possible.
- rfc v3:
- Use --emit-relocs instead of -pie to reduce
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes:
- patch v2:
- Adapt patch to work post KPTI and compiler changes
- Redo all performance testing with latest configs and compilers
- Simplify mov macro on PIE (MOVABS now)
- Reduce GOT footprint
- patch v1:
- Simplify ftrace implementation.
- Use gcc mstack-protector-guard-reg=%gs with PIE when possible.
- rfc v3:
- Use --emit-relocs instead of -pie to reduce