On 2019-02-13 00:08, Rosen Penev wrote:
On Sat, Feb 9, 2019 at 12:16 AM Daniel Engberg
wrote:
Hi,
After my attempt getting Linux 4.19 working for the Octeon target
I started to look at the generic configuration for 4.19 and it
seems that there are quite a bit of target specific options
On 2019-02-13 23:15, Hauke Mehrtens wrote:
> This will build all executable as Position Independent Executables (PIE)
> by default. PIE executable can make full use of Address Space Layout
> Randomization (ASLR) because all sections can be placed at random
> offsets of the executed program. This
Hi,
PIE adds overhead (it can be quite a bit) both to binary size and
performance during execution. There are usually discussions about
kilobytes and this is well beyond that and space is still quite
precious on 8/16Mbyte flash devices. Most target platforms are
"slow" and have limited space to
setup:
iperf3 -s #on lantiq
./run.sh testX #on host
everything_interrupts.log #cat /proc/interrupts (you may change
the SMP
affinity)
running on experimental 1000Hz build, not much change in speed
As illustrated in vanilla.log, the default xrx200
On Wed, Jan 9, 2019 at 8:31 PM Joseph Tingiris
wrote:
>
> This is a significant revision of /etc/init.d/mdadm. It adds new
> features, support for new configuration options, safer error
> handling, (configurable) verbose output, and contains multiple bug
> fixes.
>
> Most notably, mdadm was
The sender domain has a DMARC Reject/Quarantine policy which disallows
sending mailing list messages using the original "From" header.
To mitigate this problem, the original message has been wrapped
automatically by the mailing list software.--- Begin Message ---
Hi,
Did you know that
On Wed, Feb 13, 2019 at 4:01 AM Daniel Engberg
wrote:
>
> On 2019-02-13 00:08, Rosen Penev wrote:
> > On Sat, Feb 9, 2019 at 12:16 AM Daniel Engberg
> > wrote:
> >>
> >> Hi,
> >>
> >> After my attempt getting Linux 4.19 working for the Octeon target
> >> I started to look at the generic
This will build all executable as Position Independent Executables (PIE)
by default. PIE executable can make full use of Address Space Layout
Randomization (ASLR) because all sections can be placed at random
offsets of the executed program. This makes it harder to exploit bugs
in our binaries.
Hi,
anyone willing to review/commit this diff?
http://lists.infradead.org/pipermail/openwrt-devel/2019-January/015445.html
http://lists.infradead.org/pipermail/openwrt-devel/2019-January/015444.html
Thank you.
Best regards,
Ingo
___
openwrt-devel
Hi,
The package libpcrecpp fails to build if pcre is fist built without it,
and thereafter adding libpcrecpp to the config. It can be fixed by either:
1: Adding PKG_CONFIG_DEPENDS:=CONFIG_PACKAGE_libpcrecpp to the package
makefile
2: Always have --enable-cpp in CONFIGURE_ARGS
I would prefer 2.
10 matches
Mail list logo