diff options
author | Caroline Tice <cmtice@google.com> | 2018-01-08 10:25:12 -0800 |
---|---|---|
committer | Caroline Tice <cmtice@google.com> | 2018-01-08 10:25:12 -0800 |
commit | deec799746e92ab0487eca489499ade08a2610bf (patch) | |
tree | 9a2c42ca86130fa98e61c5d7bfb7e890f501a066 /gcc-4.9/gcc/testsuite/gcc.target/i386/patch-functions-8.c | |
parent | dca601e5d2b032ac5cca1df90ac56077ccf5d665 (diff) | |
download | toolchain_gcc-deec799746e92ab0487eca489499ade08a2610bf.tar.gz toolchain_gcc-deec799746e92ab0487eca489499ade08a2610bf.tar.bz2 toolchain_gcc-deec799746e92ab0487eca489499ade08a2610bf.zip |
[GCC] Commit retpoline patch code, for fixing security issues.
This applies the Intel GCC code patches, to allow compiling
with appropriate flags for mitigating the indirect branch variant of
the speculative execution security flaw.
Bug: None
Test: This is already in place in ChromeOS and has been tested on
the ChromeOS kernels.
Change-Id: Ideffb433b697f1fe7e4ca2c1eaa968160abfcc8b
Diffstat (limited to 'gcc-4.9/gcc/testsuite/gcc.target/i386/patch-functions-8.c')
-rw-r--r-- | gcc-4.9/gcc/testsuite/gcc.target/i386/patch-functions-8.c | 29 |
1 files changed, 0 insertions, 29 deletions
diff --git a/gcc-4.9/gcc/testsuite/gcc.target/i386/patch-functions-8.c b/gcc-4.9/gcc/testsuite/gcc.target/i386/patch-functions-8.c deleted file mode 100644 index 436379cb2..000000000 --- a/gcc-4.9/gcc/testsuite/gcc.target/i386/patch-functions-8.c +++ /dev/null @@ -1,29 +0,0 @@ -/* Verify -mpatch-functions-for-instrumentation works. */ -/* { dg-do run } */ -/* { dg-require-effective-target lp64 } */ - -/* -O2 forces a sibling call for foo from bar. */ -/* { dg-options "-O2 -mpatch-functions-for-instrumentation --param function-patch-min-instructions=0" } */ - -__attribute__ ((noinline)) -int foo() -{ - /* Dummy loop. */ - int x = 10; - int y = 100; - while (--x) - ++y; - return y; -} - -__attribute__ ((noinline)) -int bar() -{ - return foo(); -} - -int main() -{ - bar(); - return 0; -} |