Daniel Micay
b48ac93b03
current supported branch is android10-release
2019-11-06 03:33:28 -05:00
Daniel Micay
eff5037d64
add missing word to README
2019-11-06 03:33:28 -05:00
Daniel Micay
97ea85f55d
README: add Compatibility to TOC
2019-10-11 09:06:40 -04:00
Daniel Micay
6f4de3971e
document OpenSSH compatibility fix
2019-10-09 23:27:25 -04:00
Daniel Micay
cb73bccf35
add GitHub sponsors metadata
2019-09-26 18:53:46 -04:00
Daniel Micay
74eb614f16
inherit base CXXFLAGS from the environment too
2019-09-26 14:50:58 -04:00
Daniel Micay
a28da3c65a
use prefix for extended mallinfo functions
2019-09-07 18:33:24 -04:00
Daniel Micay
fb9f5d630b
use cc_library instead of cc_library_static
2019-09-07 18:00:42 -04:00
Daniel Micay
8d648e2b25
make it available in recovery for Android 10
2019-09-07 17:38:43 -04:00
Daniel Micay
6d78dec42a
clarify malloc_info format is a bit different
2019-08-20 15:57:59 -04:00
Daniel Micay
2e4ab73fb6
basic design -> core design
2019-08-19 06:11:10 -04:00
Daniel Micay
0e4ea0090b
expand design documentation further
2019-08-19 06:10:40 -04:00
Daniel Micay
5b3d59ec7d
Makefile: split long line for SHARED_FLAGS
2019-08-18 08:41:12 -04:00
Daniel Micay
7c455c3956
update libdivide to 2.0
2019-08-18 06:56:52 -04:00
Daniel Micay
efda950994
fix width of cell in memory tagging section
2019-08-18 06:52:09 -04:00
Daniel Micay
40be77003e
fix OS integration header level
2019-08-18 06:48:03 -04:00
Daniel Micay
0af33616f0
cleaner wording in introduction
2019-08-18 06:47:25 -04:00
Daniel Micay
c66cf10894
clarify malloc_object_size state further
2019-08-18 06:45:53 -04:00
Daniel Micay
0129d8e470
move point about delayed free for slab allocations
2019-08-18 06:44:35 -04:00
Daniel Micay
5eefcd39b4
the design / implementation is fairly complete now
2019-08-18 06:24:21 -04:00
Daniel Micay
2288b3a754
add information on stats
2019-08-18 06:21:39 -04:00
Daniel Micay
f4afedb137
add links to size class section from configuration
2019-08-18 05:48:29 -04:00
Daniel Micay
ac70e2c250
use full sentences to describe compile options
2019-08-18 05:47:13 -04:00
Daniel Micay
d0b466beb8
elaborate on the cost of GUARD_SLABS_INTERVAL
2019-08-18 05:46:20 -04:00
Daniel Micay
7a8c57d0f5
stop marking MPK support 'extremely experimental'
2019-08-18 05:37:42 -04:00
Daniel Micay
c4fc025fde
clarify ZERO_ON_FREE / WRITE_AFTER_FREE_CHECK
2019-08-18 05:35:48 -04:00
Daniel Micay
58b56f10ea
avoid -shared-libgcc due to old Clang versions
2019-08-18 04:53:51 -04:00
Daniel Micay
125efe99db
fix wording in note about malloc_object_size
2019-08-18 02:51:32 -04:00
Daniel Micay
77b242ea3f
enable misc tidy checks
2019-08-18 02:43:49 -04:00
Daniel Micay
d37657e125
enable llvm-include-order tidy check
2019-08-18 02:39:55 -04:00
Daniel Micay
3c67708c3a
reorder clang-tidy checks parameters
2019-08-18 02:34:51 -04:00
Daniel Micay
2ad74515b1
enable -Werror for Android build system
2019-08-18 02:31:05 -04:00
Daniel Micay
abece7656b
add enabled-by-default option to use -Werror
2019-08-18 02:28:23 -04:00
Daniel Micay
c70745ab15
Makefile: add check target depending on tidy
2019-08-18 02:20:06 -04:00
Daniel Micay
7d4d2ef0fb
treat clang-tidy warnings as errors for automation
2019-08-18 02:18:04 -04:00
Daniel Micay
8133444f43
move clang-tidy configuration to .clang-tidy
2019-08-18 02:12:18 -04:00
Daniel Micay
8f9f2521a0
disable sanitizer recovery in UBSan debug builds
...
This makes it harder to miss that an error occurred and avoids spamming
output. There should never be a single error, so it doesn't make sense
to gather as many errors as possible when a single error is already a
serious issue that would need to be fixed.
2019-08-18 02:00:13 -04:00
Daniel Micay
d8ebdea05f
handle CONFIG_SEAL_METADATA option like the others
2019-08-18 01:56:20 -04:00
Daniel Micay
defd55f302
provide link to Bionic integration commit
2019-08-18 01:44:40 -04:00
Daniel Micay
04f69d9f0d
update supported Android branches
2019-08-18 01:41:56 -04:00
Daniel Micay
995d0580d1
remove extra spaces inserted by vim joinspaces
2019-08-18 01:39:22 -04:00
Daniel Micay
8d2df1deb8
use CC as CXX to make sure LTO is compatible
2019-08-18 01:28:59 -04:00
Daniel Micay
1bc201c4c1
use -Wcast-align if -Wcast-align=strict is missing
2019-08-18 01:15:54 -04:00
Daniel Micay
cc8c4459e1
make safe_flag treat unknown warnings as missing
2019-08-18 01:15:54 -04:00
Daniel Micay
b6b910f032
add table of contents to README
2019-08-18 01:15:54 -04:00
Daniel Micay
24de5aab05
still need to finish up initial malloc_object_size
2019-08-18 01:15:54 -04:00
Daniel Micay
71e4577367
fix some inconsistencies in the tagging examples
2019-08-13 21:44:16 -04:00
Patrick Schleizer
75e86914aa
respect existing CFLAGS, CPPFLAGS and LDFLAGS
2019-07-29 13:52:55 -04:00
Daniel Micay
90d12fb340
override local default to -fstack-protector-strong
...
This is a no-op on a toolchain compiled with the basic mitigations
enabled by default, so this is generally a no-op anywhere this project
is likely to be deployed. SSP has a very low performance cost so there's
little reason to avoid it, even though it also has zero value for this
code in practice. It would be great if one of the more modern approaches
was widely adopted, but unfortunately SSP is as good as it gets for
portable options. It doesn't provide any protection against external
writes to the stack data which is all that's really needed here.
ShadowCallStack is a great option for arm64, but it's substantially more
difficult to protect return addresses well on x86_64 due to the design of
the ISA and ABI.
2019-07-19 11:53:55 -04:00
Daniel Micay
77743e5a36
use -fstack-clash-protection for completeness
...
This is a no-op for the current code and will likely remain that way so
there's no benefit but also no performance cost.
2019-07-19 11:18:49 -04:00