| /OK3568_Linux_fs/kernel/tools/lib/traceevent/plugins/ |
| H A D | plugin_function.c | 16 } *fstack; variable 92 ptr = realloc(fstack, sizeof(*fstack) * (cpu + 1)); in add_and_get_index() 98 fstack = ptr; in add_and_get_index() 102 memset(&fstack[i], 0, sizeof(fstack[i])); in add_and_get_index() 106 for (i = 0; i < fstack[cpu].size && fstack[cpu].stack[i]; i++) { in add_and_get_index() 107 if (strcmp(parent, fstack[cpu].stack[i]) == 0) { in add_and_get_index() 108 add_child(&fstack[cpu], child, i+1); in add_and_get_index() 114 add_child(&fstack[cpu], parent, 0); in add_and_get_index() 115 add_child(&fstack[cpu], child, 1); in add_and_get_index() 272 for (x = 0; x < fstack[i].size && fstack[i].stack[x]; x++) in TEP_PLUGIN_UNLOADER() [all …]
|
| /OK3568_Linux_fs/kernel/arch/xtensa/boot/lib/ |
| H A D | Makefile | 20 CFLAGS_REMOVE_inflate.o += -fstack-protector -fstack-protector-strong 21 CFLAGS_REMOVE_zmem.o += -fstack-protector -fstack-protector-strong 22 CFLAGS_REMOVE_inftrees.o += -fstack-protector -fstack-protector-strong 23 CFLAGS_REMOVE_inffast.o += -fstack-protector -fstack-protector-strong
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/gcc/gcc/ |
| H A D | 0020-Add-ssp_nonshared-to-link-commandline-for-musl-targe.patch | 6 when -fstack-protector options are enabled we need to 35 +#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \ 36 + "|fstack-protector-strong|fstack-protector-explicit" \ 55 +#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \ 56 + "|fstack-protector-strong|fstack-protector-explicit" \ 76 +#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \ 77 + "|fstack-protector-strong|fstack-protector-explicit" \
|
| /OK3568_Linux_fs/buildroot/package/libopenh264/ |
| H A D | 0001-Add-USE_STACK_PROTECTOR-option.patch | 6 -fstack-protector-all is not supported on all linux toolchains so add an 42 -CFLAGS += -DANDROID_NDK -fpic --sysroot=$(SYSROOT) -MMD -MP -fstack-protector-all 45 +CFLAGS +=-fstack-protector-all 58 -CFLAGS += -fPIC -fstack-protector-all 61 +CFLAGS += -fstack-protector-all 74 -CFLAGS += -Wall -fPIC -MMD -MP -fstack-protector-all 77 +CFLAGS += -fstack-protector-all 90 -CFLAGS += -Wall -fno-strict-aliasing -fPIC -MMD -MP -fstack-protector-all 93 +CFLAGS += -fstack-protector-all
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/ssiapi/ssiapi/ |
| H A D | 0004-Do-not-override-flags-coming-from-build-environment.patch | 22 -CPPFLAGS="-g3 -gdwarf-2 -Wall -Werror -fvisibility=hidden -D_GNU_SOURCE -O3 -fstack-protector -D_F… 23 -CFLAGS="-std=gnu99 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC" 24 -CXXFLAGS="-std=gnu++98 -fvisibility-inlines-hidden -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wfor… 25 +#CPPFLAGS="-g3 -gdwarf-2 -Wall -Werror -fvisibility=hidden -D_GNU_SOURCE -O3 -fstack-protector -D_… 26 +#CFLAGS="-std=gnu99 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC" 27 +#CXXFLAGS="-std=gnu++98 -fvisibility-inlines-hidden -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wfo…
|
| /OK3568_Linux_fs/buildroot/package/vte/ |
| H A D | 0002-build-Fix-check-for-fstack-protector-compiler-support.patch | 4 Subject: [PATCH] build: Fix check for -fstack-protector* compiler support 25 - '-fstack-protector', 26 - '-fstack-protector-strong', 36 + ['-fstack-protector', false], 37 + ['-fstack-protector-strong', false],
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0133-kern-efi-Add-initial-stack-protector-implementation.patch | 35 -dnl Check if the C compiler supports `-fstack-protector'. 41 AC_MSG_CHECKING([whether `$CC' accepts `-fstack-protector']) 49 +AC_MSG_CHECKING([whether `$CC' accepts `-fstack-protector-strong']) 56 +if eval "$ac_compile -S -fstack-protector-strong -o conftest.s" 2> /dev/null; then] 73 +if eval "$ac_compile -S -fstack-protector -mstack-protector-guard=global -o conftest.s" 2> /dev/nu… 115 { $as_echo "$as_me:${as_lineno-$LINENO}: checking whether \`$CC' accepts \`-fstack-protector'" >&5 116 $as_echo_n "checking whether \`$CC' accepts \`-fstack-protector'... " >&6; } 123 +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking whether \`$CC' accepts \`-fstack-protector-stron… 124 +$as_echo_n "checking whether \`$CC' accepts \`-fstack-protector-strong'... " >&6; } 130 -# `-fstack-protector' in the default specs. [all …]
|
| /OK3568_Linux_fs/buildroot/package/intel-mediadriver/ |
| H A D | 0001-Add-MEDIA-BUILD-HARDENING-option.patch | 29 -set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} ${CPP_STANDARD_OPTION} -fPIC -fpermissive -fstack-protecto… 34 -set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${CPP_STANDARD_OPTION} -fPIC -fpermissive -fstack-protector-al… 40 + set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} ${CMAKE_CXX_FLAGS} -fstack-protector-all") 42 + set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${CMAKE_C_FLAGS} -fstack-protector-all") 56 - -fstack-protector 67 + -fstack-protector) 95 …OPERTIES LINK_FLAGS "-Wl,--no-as-needed -Wl,--gc-sections -z relro -z now -fstack-protector -fPIC") 99 + set(MEDIA_LINK_FLAGS "${MEDIA_LINK_FLAGS} -fstack-protector")
|
| /OK3568_Linux_fs/buildroot/package/powertop/ |
| H A D | 0001-dont-force-stack-smashing-protection.patch | 1 Do not pass -fstack-protector unconditionally 3 Using -fstack-protector only works when the toolchain has SSP support. 15 - -fstack-protector \
|
| /OK3568_Linux_fs/buildroot/package/davfs2/ |
| H A D | 0001-src-Makefile.am-do-not-hardcode-fstack-protector-str.patch | 4 Subject: [PATCH] src/Makefile.am: do not hardcode -fstack-protector-strong 6 davfs2 does not truly require -fstack-protector-strong, so do not hardcode 24 - -fstack-protector-strong --param=ssp-buffer-size=4 38 - -fstack-protector-strong --param=ssp-buffer-size=4
|
| /OK3568_Linux_fs/external/camera_engine_rkaiq/rkaiq/cmake/ |
| H A D | CompileOptions.cmake | 47 set(CMAKE_CXX_FLAGS_RELEASE "${CMAKE_CXX_FLAGS_RELEASE} -fstack-protector-strong") 48 set(CMAKE_CXX_FLAGS_RELEASE "${CMAKE_CXX_FLAGS_RELEASE} -fstack-clash-protection") 49 set(CMAKE_CXX_FLAGS_MINSIZEREL "${CMAKE_CXX_FLAGS_MINSIZEREL} -fstack-protector-strong") 50 set(CMAKE_CXX_FLAGS_MINSIZEREL "${CMAKE_CXX_FLAGS_MINSIZEREL} -fstack-clash-protection") 64 set(CMAKE_CXX_FLAGS_RELEASE "${CMAKE_CXX_FLAGS_RELEASE} -fstack-protector-strong") 65 set(CMAKE_CXX_FLAGS_MINSIZEREL "${CMAKE_CXX_FLAGS_MINSIZEREL} -fstack-protector-strong")
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/multipath-tools/files/ |
| H A D | 0024-RH-use-rpm-optflags-if-present.patch | 34 -STACKPROT := $(call TEST_CC_OPTION,-fstack-protector-strong,-fstack-protector) 38 + STACKPROT := $(call TEST_CC_OPTION,-fstack-protector-strong,-fstack-protector)
|
| /OK3568_Linux_fs/buildroot/package/intel-mediasdk/ |
| H A D | 0001-Don-t-force-fstack-protector.patch | 4 Subject: [PATCH] Don't force -fstack-protector 25 …,now,-z,noexecstack -Wl,--version-script=${CMAKE_CURRENT_SOURCE_DIR}/libmfx.map -fstack-protector") 38 - append_property( ${ARGV0} LINK_FLAGS "${link_flags_list} ${MFX_LDFLAGS} -fstack-protector" ) 47 …S "${SCOPE_LINKFLAGS} -Wl,--no-undefined,-z,relro,-z,now,-z,noexecstack -fstack-protector" PARENT_…
|
| /OK3568_Linux_fs/kernel/kernel/entry/ |
| H A D | Makefile | 9 CFLAGS_REMOVE_common.o = -fstack-protector -fstack-protector-strong
|
| /OK3568_Linux_fs/buildroot/package/sox/ |
| H A D | 0002-configure.ac-put-back-disable-stack-protector.patch | 33 -AX_APPEND_COMPILE_FLAGS([-fstack-protector-strong]) 35 + AS_HELP_STRING([--disable-stack-protector], [Disable -fstack-protector-strong]), 38 + [AX_APPEND_COMPILE_FLAGS([-fstack-protector-strong])])
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/opensaf/opensaf/ |
| H A D | 0001-configure-Pass-linker-specific-options-with-Wl.patch | 23 - OSAF_HARDEN_FLAGS="${OSAF_HARDEN_FLAGS} -fstack-protector --param ssp-buffer-size=4 -fPIE -pie -z… 24 + OSAF_HARDEN_FLAGS="${OSAF_HARDEN_FLAGS} -fstack-protector --param ssp-buffer-size=4 -fPIE -pie -W…
|
| /OK3568_Linux_fs/buildroot/package/jitterentropy-library/ |
| H A D | 0003-Makefile-allow-the-user-to-disable-stack-protector.patch | 28 -CFLAGS +=-fstack-protector-all -fwrapv --param ssp-buffer-size=4 29 +CFLAGS ?=-fstack-protector-all --param ssp-buffer-size=4
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/libtool/libtool/ |
| H A D | 0001-ltmain.in-Parse-additional-clang-options.patch | 24 - -O*|-g*|-flto*|-fwhopr*|-fuse-linker-plugin|-fstack-protector*|-stdlib=*| \ 25 + -O*|-g*|-flto*|-fwhopr*|-fuse-linker-plugin|-fstack-protector*|-stdlib=*|-rtlib=*|--unwindli…
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/exiv2/exiv2/ |
| H A D | 0001-Use-compiler-fcf-protection-only-if-compiler-arch-su.patch | 28 - add_compile_options(-fstack-clash-protection -fcf-protection) 34 + add_compile_options(-fstack-clash-protection)
|
| /OK3568_Linux_fs/kernel/arch/x86/purgatory/ |
| H A D | Makefile | 47 PURGATORY_CFLAGS_REMOVE += -fstack-protector 51 PURGATORY_CFLAGS_REMOVE += -fstack-protector-strong
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/libatasmart/files/ |
| H A D | 0001-Makefile.am-add-CFLAGS-and-LDFLAGS-definiton.patch | 15 …em../build/tmp/sysroots/x86_64-linux/usr/include -O2 -pipe -O2 -pipe -g -fstack-protector-strong -… 16 | gcc: error: unrecognized command line option ‘-fstack-protector-strong’
|
| /OK3568_Linux_fs/buildroot/package/usbredir/ |
| H A D | 0002-meson-add-stack_protector-option.patch | 32 - '-fstack-protector', 36 + '-fstack-protector',
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-devtools/grpc/grpc/ |
| H A D | 0001-Revert-Changed-GRPCPP_ABSEIL_SYNC-to-GPR_ABSEIL_SYNC.patch | 13 …/x86_64-oe-linux-g++ -m64 -march=core2 -mtune=core2 -msse3 -mfpmath=sse -fstack-protector-strong … 16 …lity-inlines-hidden -m64 -march=core2 -mtune=core2 -msse3 -mfpmath=sse -fstack-protector-strong … 17 …t-aliasing -DNDEBUG -m64 -march=core2 -mtune=core2 -msse3 -mfpmath=sse -fstack-protector-strong … 20 …lity-inlines-hidden -m64 -march=core2 -mtune=core2 -msse3 -mfpmath=sse -fstack-protector-strong …
|
| /OK3568_Linux_fs/buildroot/package/exiv2/ |
| H A D | 0001-add-BUILD_WITH_STACK_PROTECTOR-option.patch | 11 Indeed, support for -fstack-protector-strong can't be detected through 49 add_compile_options(-fstack-protector-strong)
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/libselinux/ |
| H A D | 0001-libselinux-Do-not-define-gettid-if-glibc-2.30-is-use.patch | 13 …fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -spec…
|