| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
To choose between "global" (default) and "tls" (new)
for -fstack-protector, -fstack-protector-all, and
-fstack-protector-strong (GCC 4.6+).
Note that this alone doesn't enable any -fstack-protector*
For NDK: The default "global" generates code backward
compatible with older bionic
For AOSP: build may add "-mstack-protector-guard=tls" to
build platform code with new bionic (*1)
Related CL:
https://android-review.googlesource.com/#/c/45416 (*1)
https://android-review.googlesource.com/#/c/45784
Change-Id: Iedf5b7ae5148572db2e35f0add93bc3d13511304
|
|
|
|
|
|
|
|
|
| |
After https://android-review.googlesource.com/#/c/45416 bionic provides
stack-protector random value per each thread at %gs:20. Therefore return
compiler back to %gs:20 code gen, same as for glibc.
Change-Id: I76c68f0c99846d247f34e0ea781a7f1c305659b9
Signed-off-by: Pavel Chupin <pavel.v.chupin@intel.com>
|
|\ |
|
| |
| |
| |
| |
| |
| |
| | |
Used to be local NDK patch at $NDK/build/tools/toolchain-patches/
gcc/0004-Enable-x86-gcc-defaults.patch
Change-Id: I6cb6ba8b29b7ba4f242f788a57bf0460289f0cbd
|
|/
|
|
|
|
|
| |
Used to be local NDK patch at $NDK/build/tools/toolchain-patches/
gcc/0009-Enable-assembler-linker-default-for-security.patch
Change-Id: I0211ee770e9d4db036361390fcb5892d4e39356f
|
|
|
|
|
|
|
|
| |
Backport the following: r152030, r152242, r152408, and r153858
Related issue:
http://code.google.com/p/android/issues/detail?id=34613
Change-Id: I44563f618220fbe9e01915962fe411ac2f385bbb
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
2012-07-25 Sergey Melnikov <sergey.melnikov@intel.com>
* config/i386/i386.md (stack_protect_set): Disable the pattern
for Android since Android libc (bionic) does not provide random
value for stack protection guard at gs:0x14. Guard value
will be provided from external symbol (default implementation).
(stack_protect_set_<mode>): Likewise.
(stack_protect_test): Likewise.
(stack_protect_test_<mode>): Likewise.
* gcc/defaults.h: Define macro TARGET_HAS_BIONIC to 0 - target
* does
not have Bionic by default
* config/linux.h: Redefine macro TARGET_HAS_BIONIC to
* (OPTION_BIONIC)
Macro OPTION_BIONIC is defined in this file and provides Bionic
accessibility status
2012-05-16 Igor Zamyatin <igor.zamyatin@intel.com>
* configure.ac: Stack protector enabling for Android targets.
* configure: Regenerate.
Change-Id: I878562dd0bed8069011246c29c1ac6ce1c353644
Signed-off-by: Pavel Chupin <pavel.v.chupin@intel.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Changes:
-x86 security patch (for ChromeOS)
-Fix bug in inlining.
-Fix freestanding C++ library build:
http://gcc.gnu.org/viewcvs?view=revision&revision=173220
-Fix out-of-range branches in Thumb-2 mode.
-Fix gcda file corruption problem.
-Hanlde LDFLAGS_FOR_TARGETS in configure. This is a backport of upstrem
patch r173558.
-Backport upstream fix for Atom performance at r164379.
Change-Id: Id5a6cfb8949cbd390a0bb3546d55d83383ee4f8c
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Backport upstream patches to support arm hardfp.
- Backport gcc-4.5 patches to support -march=atom. Now it is
able to build atom toolchain with glibc from this branch
- Develop a bunch of optimizations
- Fix a few arm dejagnu failures
To-do list:
- Support Android/atom
- Fix ia32 bootstrap failure
Change-Id: I5e10dcd21620d4d8ca984d1d1707a76067e61691
|
|
The source is based on fsf gcc-4.4.3 and contains local patches which
are recorded in gcc-4.4.3/README.google.
Change-Id: Id8c6d6927df274ae9749196a1cc24dbd9abc9887
|