[GCC] Commit retpoline patch code, for fixing security issues.

This applies the Intel GCC code patches, to allow compiling
with appropriate flags for mitigating the indirect branch variant of
the speculative execution security flaw.

Bug: None
Test: This is already in place in ChromeOS and has been tested on
the ChromeOS kernels.

Change-Id: Ideffb433b697f1fe7e4ca2c1eaa968160abfcc8b
62 files changed
tree: 9a2c42ca86130fa98e61c5d7bfb7e890f501a066
  1. gcc-4.8.3/
  2. gcc-4.9/
  3. build-gcc.sh
  4. build.py
  5. compiler_wrapper
  6. OWNERS
  7. README.md
  8. README.version
  9. update-prebuilts.py
README.md

Building GCC for Android

The following process is used to build the GCC that is used by both the Android platfrom and the NDK.

Both Linux and Windows toolchains are built on Linux machines. Windows host binaries are built with mingw. Building binaries for Mac OS X should be built using 10.8 to ensure compatibility with Android's minimum supported hosts.

Prerequisites

  • Android GCC Repository

    • Check out the branch gcc

      repo init -u https://android.googlesource.com/platform/manifest -b gcc
      
      # Googlers, use
      repo init -u \
          persistent-https://android.git.corp.google.com/platform/manifest \
          -b gcc
      
  • Additional Linux Dependencies (available from apt):

    • texinfo
    • gcc-mingw32
    • bison
    • flex
    • libtool
  • Mac OS X also requires Xcode.

Host/Target prebuilts

For Linux or Darwin:

# Additional options and toolchain names will be show with --help.
$ python build.py --toolchain TOOLCHAIN_NAME

For Windows, from Linux:

$ python build.py --system windows TOOLCHAIN_NAME