summaryrefslogtreecommitdiffstats
path: root/sys/boot/Makefile.inc
Commit message (Collapse)AuthorAgeFilesLines
* Similar to r293384 and r293426, for sys/boot, also use the new -mno-movtdim2016-02-111-1/+7
| | | | flag with clang >= 3.8.0 targeting arm.
* Stop clang from generating movt/movw sequences. These don't get relocatedandrew2016-02-091-0/+8
| | | | | | | | | | so will access data from an unrelocated address. This is only needed for self relocating code on ARMv7, however this is true for both ubldr and loader.efi, the only two loaders we support on ARMv7. While here also force the fpu to be none as is done in libstand. Sponsored by: ABT Systems Ltd
* Fix build when WITH_SSP is set explicitly.ru2009-02-211-1/+1
| | | | Submitted by: Jeremie Le Hen
* Enable GCC stack protection (aka Propolice) for userland:ru2008-06-251-0/+3
- It is opt-out for now so as to give it maximum testing, but it may be turned opt-in for stable branches depending on the consensus. You can turn it off with WITHOUT_SSP. - WITHOUT_SSP was previously used to disable the build of GNU libssp. It is harmless to steal the knob as SSP symbols have been provided by libc for a long time, GNU libssp should not have been much used. - SSP is disabled in a few corners such as system bootstrap programs (sys/boot), process bootstrap code (rtld, csu) and SSP symbols themselves. - It should be safe to use -fstack-protector-all to build world, however libc will be automatically downgraded to -fstack-protector because it breaks rtld otherwise. - This option is unavailable on ia64. Enable GCC stack protection (aka Propolice) for kernel: - It is opt-out for now so as to give it maximum testing. - Do not compile your kernel with -fstack-protector-all, it won't work. Submitted by: Jeremie Le Hen <jeremie@le-hen.org>
OpenPOWER on IntegriCloud