1 |
zorry 14/01/04 13:29:17 |
2 |
|
3 |
Modified: 01_all_gcc48_configure.patch |
4 |
03_all_gcc48_Makefile.in.patch |
5 |
05_all_gcc48_gcc.c.patch |
6 |
40_all_gcc48_config_esp.patch README |
7 |
README.Changelog README.history |
8 |
Added: 24_all_gcc48_invoke.texi.patch |
9 |
Removed: 24_all_gcc44_invoke.texi.patch |
10 |
Log: |
11 |
updated gcc 4.8.2 piepatchsets to 0.5.9 for support of ssp as default |
12 |
|
13 |
Revision Changes Path |
14 |
1.2 src/patchsets/gcc/4.8.2/pie/01_all_gcc48_configure.patch |
15 |
|
16 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/01_all_gcc48_configure.patch?rev=1.2&view=markup |
17 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/01_all_gcc48_configure.patch?rev=1.2&content-type=text/plain |
18 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/01_all_gcc48_configure.patch?r1=1.1&r2=1.2 |
19 |
|
20 |
Index: 01_all_gcc48_configure.patch |
21 |
=================================================================== |
22 |
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/01_all_gcc48_configure.patch,v |
23 |
retrieving revision 1.1 |
24 |
retrieving revision 1.2 |
25 |
diff -u -r1.1 -r1.2 |
26 |
--- 01_all_gcc48_configure.patch 10 Nov 2013 20:05:25 -0000 1.1 |
27 |
+++ 01_all_gcc48_configure.patch 4 Jan 2014 13:29:17 -0000 1.2 |
28 |
@@ -1,53 +1,10 @@ |
29 |
-2013-04-01 Magnus Granberg <zorry@g.o> |
30 |
+2013-12-30 Magnus Granberg <zorry@g.o> |
31 |
|
32 |
- * configure.ac Add --enable-esp. Add -fno-stack-protector |
33 |
- to stage1_cflags. |
34 |
- * configure Regenerated |
35 |
* gcc/configure.ac Add --enable-esp and define ENABLE_ESP. |
36 |
Check if we support crtbeginP and define ENABLE_CRTBEGINP. |
37 |
* gcc/configure Regenerated |
38 |
|
39 |
---- a/configure.ac 2011-11-29 22:36:43.000000000 +0100 |
40 |
-+++ b/configure.ac 2011-12-07 23:29:26.125712475 +0100 |
41 |
-@@ -419,6 +419,26 @@ if test "${ENABLE_LIBADA}" != "yes" ; th |
42 |
- noconfigdirs="$noconfigdirs gnattools" |
43 |
- fi |
44 |
- |
45 |
-+# Check whether --enable-esp was given and target have the support. |
46 |
-+AC_ARG_ENABLE([esp], |
47 |
-+[AS_HELP_STRING([--enable-esp], |
48 |
-+ [Enable Stack protector and Position independent executable as |
49 |
-+ default if we have suppot for it when compiling |
50 |
-+ and link with -z relro and -z now as default. |
51 |
-+ Linux targets supported i*86, x86_64, x32, |
52 |
-+ powerpc, powerpc64, ia64, arm and mips.])], |
53 |
-+[ |
54 |
-+ case $target in |
55 |
-+ i?86*-*-linux* | x86_64-*-linux* | powerpc*-*-linux* | mips-*-linux* | arm*-*-linux* | ia64-*-linux*) |
56 |
-+ enable_esp=yes |
57 |
-+ ;; |
58 |
-+ *) |
59 |
-+ AC_MSG_WARN([*** --enable-esp is not supported on this $target target.]) |
60 |
-+ ;; |
61 |
-+ esac |
62 |
-+]) |
63 |
-+AC_SUBST([enable_esp]) |
64 |
-+ |
65 |
- AC_ARG_ENABLE(libssp, |
66 |
- [AS_HELP_STRING([--enable-libssp], [build libssp directory])], |
67 |
- ENABLE_LIBSSP=$enableval, |
68 |
-@@ -3211,6 +3230,11 @@ if test "$GCC" = yes -a "$ENABLE_BUILD_W |
69 |
- CFLAGS="$saved_CFLAGS" |
70 |
- fi |
71 |
- |
72 |
-+# Disable -fstack-protector on stage1 |
73 |
-+if test x$enable_esp = xyes; then |
74 |
-+ stage1_cflags="$stage1_cflags -fno-stack-protector" |
75 |
-+fi |
76 |
-+ |
77 |
- AC_SUBST(stage1_cflags) |
78 |
- |
79 |
- # Enable --enable-checking in stage1 of the compiler. |
80 |
+ |
81 |
--- a/gcc/configure.ac 2011-11-18 11:52:32.000000000 +0100 |
82 |
+++ b/gcc/configure.ac 2012-10-02 17:39:15.649526241 +0200 |
83 |
@@ -5130,6 +5237,55 @@ if test x"${LINKER_HASH_STYLE}" != x; th |
84 |
@@ -106,73 +63,6 @@ |
85 |
# Configure the subdirectories |
86 |
# AC_CONFIG_SUBDIRS($subdirs) |
87 |
|
88 |
---- a/configure 2013-02-05 23:36:20.000000000 +0100 |
89 |
-+++ b/configure 2013-02-12 01:59:04.000000000 +0100 |
90 |
-@@ -670,6 +670,7 @@ |
91 |
- CFLAGS |
92 |
- CC |
93 |
- EXTRA_CONFIGARGS_LIBJAVA |
94 |
-+enable_esp |
95 |
- target_subdir |
96 |
- host_subdir |
97 |
- build_subdir |
98 |
-@@ -748,6 +749,7 @@ |
99 |
- enable_libquadmath |
100 |
- enable_libquadmath_support |
101 |
- enable_libada |
102 |
-+enable_esp |
103 |
- enable_libssp |
104 |
- enable_libstdcxx |
105 |
- enable_static_libjava |
106 |
-@@ -1464,6 +1466,11 @@ |
107 |
- --disable-libquadmath-support |
108 |
- disable libquadmath support for Fortran |
109 |
- --enable-libada build libada directory |
110 |
-+ --enable-esp Enable Stack protector and Position independent |
111 |
-+ executable as default if we have suppot for it when |
112 |
-+ compiling and link with and -z now as default. |
113 |
-+ Linux targets supported i*86, x86_64, x32, |
114 |
-+ powerpc, powerpc64, ia64, arm and mips. |
115 |
- --enable-libssp build libssp directory |
116 |
- --disable-libstdcxx do not build libstdc++-v3 directory |
117 |
- --enable-static-libjava[=ARG] |
118 |
-@@ -3068,6 +3075,24 @@ |
119 |
- noconfigdirs="$noconfigdirs gnattools" |
120 |
- fi |
121 |
- |
122 |
-+# Check whether --enable-esp was given and target have the support. |
123 |
-+# Check whether --enable-esp was given. |
124 |
-+if test "${enable_esp+set}" = set; then : |
125 |
-+ enableval=$enable_esp; |
126 |
-+ case $target in |
127 |
-+ i?86*-*-linux* | x86_64-*-linux* | powerpc*-*-linux* | mips*-*-linux* | arm*-*-linux* | ia64-*-linux*) |
128 |
-+ enable_esp=yes |
129 |
-+ ;; |
130 |
-+ *) |
131 |
-+ { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: *** --enable-esp is not supported on this $target target." >&5 |
132 |
-+$as_echo "$as_me: WARNING: *** --enable-esp is not supported on this $target target." >&2;} |
133 |
-+ ;; |
134 |
-+ esac |
135 |
-+ |
136 |
-+fi |
137 |
-+ |
138 |
-+ |
139 |
-+ |
140 |
- # Check whether --enable-libssp was given. |
141 |
- if test "${enable_libssp+set}" = set; then : |
142 |
- enableval=$enable_libssp; ENABLE_LIBSSP=$enableval |
143 |
-@@ -14453,6 +14478,11 @@ |
144 |
- esac ;; |
145 |
- esac |
146 |
- |
147 |
-+# Disable -fstack-protector on stage1 |
148 |
-+if test x$enable_esp = xyes; then |
149 |
-+ stage1_cflags="$stage1_cflags -fno-stack-protector" |
150 |
-+fi |
151 |
-+ |
152 |
- |
153 |
- |
154 |
- # Enable --enable-checking in stage1 of the compiler. |
155 |
--- a/gcc/configure 2013-02-01 21:26:24.000000000 +0100 |
156 |
+++ b/gcc/configure 2013-02-12 01:59:20.000000000 +0100 |
157 |
@@ -600,6 +600,8 @@ |
158 |
|
159 |
|
160 |
|
161 |
1.2 src/patchsets/gcc/4.8.2/pie/03_all_gcc48_Makefile.in.patch |
162 |
|
163 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/03_all_gcc48_Makefile.in.patch?rev=1.2&view=markup |
164 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/03_all_gcc48_Makefile.in.patch?rev=1.2&content-type=text/plain |
165 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/03_all_gcc48_Makefile.in.patch?r1=1.1&r2=1.2 |
166 |
|
167 |
Index: 03_all_gcc48_Makefile.in.patch |
168 |
=================================================================== |
169 |
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/03_all_gcc48_Makefile.in.patch,v |
170 |
retrieving revision 1.1 |
171 |
retrieving revision 1.2 |
172 |
diff -u -r1.1 -r1.2 |
173 |
--- 03_all_gcc48_Makefile.in.patch 10 Nov 2013 20:05:25 -0000 1.1 |
174 |
+++ 03_all_gcc48_Makefile.in.patch 4 Jan 2014 13:29:17 -0000 1.2 |
175 |
@@ -1,7 +1,5 @@ |
176 |
2012-01-17 Magnus Granberg <zorry@g.o> |
177 |
|
178 |
- * Makefile.in We add -fno-stack-protector to BOOT_CFLAGS, LIBCFLAGS and |
179 |
- LIBCXXFLAGS if enable_esp yes. |
180 |
* gcc/Makefile.in Add -fno-PIE. to ALL_CFLAGS and |
181 |
ALL_CXXFLAGS if enable_esp yes. |
182 |
Echo enable_esp and enable_crtbeginP to tmp-libgcc.mvars. |
183 |
@@ -9,39 +7,6 @@ |
184 |
We add new file crtbeginP.o if enable_crtbeginP yes |
185 |
Add -fno-PIE. to CRTSTUFF_CFLAGS. |
186 |
|
187 |
---- a/Makefile.in 2010-01-22 08:35:38.000000000 -0500 |
188 |
-+++ b/Makefile.in 2010-02-07 15:10:59.000000000 -0500 |
189 |
-@@ -350,9 +350,17 @@ |
190 |
- BUILD_PREFIX = @BUILD_PREFIX@ |
191 |
- BUILD_PREFIX_1 = @BUILD_PREFIX_1@ |
192 |
- |
193 |
-+# Some stuff don't compile with SSP |
194 |
-+enable_esp = @enable_esp@ |
195 |
-+ifeq ($(enable_esp),yes) |
196 |
-+ESP_NOSSP_CFLAGS = -fno-stack-protector |
197 |
-+else |
198 |
-+ESP_NOSSP_CFLAGS= |
199 |
-+endif |
200 |
-+ |
201 |
- # Flags to pass to stage2 and later makes. They are defined |
202 |
- # here so that they can be overridden by Makefile fragments. |
203 |
--BOOT_CFLAGS= -g -O2 |
204 |
-+BOOT_CFLAGS= -g -O2 $(ESP_NOSSP_CFLAGS) |
205 |
- BOOT_LDFLAGS= |
206 |
- BOOT_ADAFLAGS=-gnatpg -gnata |
207 |
- |
208 |
-@@ -403,9 +403,9 @@ |
209 |
- |
210 |
- CFLAGS = @CFLAGS@ |
211 |
- LDFLAGS = @LDFLAGS@ |
212 |
--LIBCFLAGS = $(CFLAGS) |
213 |
-+LIBCFLAGS = $(CFLAGS) $(ESP_NOSSP_CFLAGS) |
214 |
- CXXFLAGS = @CXXFLAGS@ |
215 |
--LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates |
216 |
-+LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates $(ESP_NOSSP_CFLAGS) |
217 |
- GOCFLAGS = $(CFLAGS) |
218 |
- |
219 |
- TFLAGS = |
220 |
--- a/gcc/Makefile.in 2011-11-09 02:20:14.000000000 +0100 |
221 |
+++ b/gcc/Makefile.in 2011-12-24 22:28:08.864804375 +0100 |
222 |
@@ -247,6 +247,14 @@ LINKER_FLAGS = $(CFLAGS) |
223 |
|
224 |
|
225 |
|
226 |
1.2 src/patchsets/gcc/4.8.2/pie/05_all_gcc48_gcc.c.patch |
227 |
|
228 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/05_all_gcc48_gcc.c.patch?rev=1.2&view=markup |
229 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/05_all_gcc48_gcc.c.patch?rev=1.2&content-type=text/plain |
230 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/05_all_gcc48_gcc.c.patch?r1=1.1&r2=1.2 |
231 |
|
232 |
Index: 05_all_gcc48_gcc.c.patch |
233 |
=================================================================== |
234 |
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/05_all_gcc48_gcc.c.patch,v |
235 |
retrieving revision 1.1 |
236 |
retrieving revision 1.2 |
237 |
diff -u -r1.1 -r1.2 |
238 |
--- 05_all_gcc48_gcc.c.patch 10 Nov 2013 20:05:25 -0000 1.1 |
239 |
+++ 05_all_gcc48_gcc.c.patch 4 Jan 2014 13:29:17 -0000 1.2 |
240 |
@@ -1,4 +1,4 @@ |
241 |
-2013-03-24 Magnus Granberg <zorry@g.o> |
242 |
+2014-01-01 Magnus Granberg <zorry@g.o> |
243 |
|
244 |
* gcc/gcc.c include esp.h |
245 |
static const char *cc1_spec We set that in esp.h if ENABLE_ESP. |
246 |
@@ -18,7 +18,7 @@ |
247 |
static const char *asm_debug; |
248 |
static const char *cpp_spec = CPP_SPEC; |
249 |
+#ifndef ENABLE_ESP |
250 |
- static const char *cc1_spec = CC1_SPEC; |
251 |
+ static const char *cc1_spec = CC1_SPEC CC1_SSP_DEFAULT_SPEC; |
252 |
+#endif |
253 |
static const char *cc1plus_spec = CC1PLUS_SPEC; |
254 |
static const char *link_gcc_c_sequence_spec = LINK_GCC_C_SEQUENCE_SPEC; |
255 |
|
256 |
|
257 |
|
258 |
1.2 src/patchsets/gcc/4.8.2/pie/40_all_gcc48_config_esp.patch |
259 |
|
260 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/40_all_gcc48_config_esp.patch?rev=1.2&view=markup |
261 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/40_all_gcc48_config_esp.patch?rev=1.2&content-type=text/plain |
262 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/40_all_gcc48_config_esp.patch?r1=1.1&r2=1.2 |
263 |
|
264 |
Index: 40_all_gcc48_config_esp.patch |
265 |
=================================================================== |
266 |
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/40_all_gcc48_config_esp.patch,v |
267 |
retrieving revision 1.1 |
268 |
retrieving revision 1.2 |
269 |
diff -u -r1.1 -r1.2 |
270 |
--- 40_all_gcc48_config_esp.patch 10 Nov 2013 20:05:25 -0000 1.1 |
271 |
+++ 40_all_gcc48_config_esp.patch 4 Jan 2014 13:29:17 -0000 1.2 |
272 |
@@ -1,13 +1,13 @@ |
273 |
-2013-08-10 Magnus Granberg <zorry@g.o> |
274 |
+2014-01-04 Magnus Granberg <zorry@g.o> |
275 |
|
276 |
* gcc/esp.h New file to support --enable-esp |
277 |
- Version 20130810.1 |
278 |
+ Version 20140104.1 |
279 |
|
280 |
--- gcc/config/esp.h 2010-04-09 16:14:00.000000000 +0200 |
281 |
+++ gcc/config/esp.h 2012-06-23 01:00:31.248348491 +0200 |
282 |
@@ -0,0 +1,128 @@ |
283 |
+/* License terms see GNU GENERAL PUBLIC LICENSE Version 3. |
284 |
-+ * Version 20130810.1 |
285 |
++ * Version 20140104.1 |
286 |
+ * Magnus Granberg (Zorry) <zorry@g.o> */ |
287 |
+#ifndef GCC_ESP_H |
288 |
+#define GCC_ESP_H |
289 |
@@ -53,7 +53,7 @@ |
290 |
+ -fstack-protector-all and we have EFAULT_SSP or EFAULT_PIE_SSP defined. */ |
291 |
+ #if defined ( EFAULT_SSP ) || defined ( EFAULT_PIE_SSP ) |
292 |
+ #define ESP_OPTIONS_SSP_SPEC \ |
293 |
-+ "%{nostdlib|nodefaultlibs|fno-stack-protector| \ |
294 |
++ "%{nostdlib|nodefaultlibs|ffreestanding|fno-stack-protector| \ |
295 |
+ fstack-protector|fstack-protector-all:;:-fstack-protector-all} \ |
296 |
+ %{fstack-check|fstack-check=*:;: -fstack-check}" |
297 |
+ #else |
298 |
|
299 |
|
300 |
|
301 |
1.2 src/patchsets/gcc/4.8.2/pie/README |
302 |
|
303 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README?rev=1.2&view=markup |
304 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README?rev=1.2&content-type=text/plain |
305 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README?r1=1.1&r2=1.2 |
306 |
|
307 |
Index: README |
308 |
=================================================================== |
309 |
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/README,v |
310 |
retrieving revision 1.1 |
311 |
retrieving revision 1.2 |
312 |
diff -u -r1.1 -r1.2 |
313 |
--- README 10 Nov 2013 20:05:25 -0000 1.1 |
314 |
+++ README 4 Jan 2014 13:29:17 -0000 1.2 |
315 |
@@ -8,6 +8,7 @@ |
316 |
We started with the pieworld code from kevquinn's overlay. The PIE and minispecs part hit the tree later on. |
317 |
With GCC 4.4.0 I was willing to do some code cleanup, use built-in specs and add it as --enable-esp in the |
318 |
configure command line. On GCC 4.8.0 we use DRIVER_SELF_SPECS for the specs. |
319 |
+From gcc 4.8.2-r1 it will have -fstack-protector on as default. |
320 |
|
321 |
Thank you all: |
322 |
Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY, Xake, Dwokfur, |
323 |
@@ -15,4 +16,4 @@ |
324 |
unk, neuron, alexxy, hellboi64, likewhoa, g0rg0n, costel78, polsas, 7v5w7go9ub0o, uberpinguin, Naib, cilly, |
325 |
bonsaikitten, kerframil, agaffney, Gordon Malm, blueness, Matthias Klose, Kees Cook, mentor, Anarchy, |
326 |
devurandom and everyone else for helping to test, suggestions, fixes and anything else we have missed. |
327 |
-/2013-03-31 Magnus Grenberg (Zorry) <zorry@g.o> |
328 |
+/2013-12-30 Magnus Grenberg (Zorry) <zorry@g.o> |
329 |
|
330 |
|
331 |
|
332 |
1.3 src/patchsets/gcc/4.8.2/pie/README.Changelog |
333 |
|
334 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.Changelog?rev=1.3&view=markup |
335 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.Changelog?rev=1.3&content-type=text/plain |
336 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.Changelog?r1=1.2&r2=1.3 |
337 |
|
338 |
Index: README.Changelog |
339 |
=================================================================== |
340 |
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/README.Changelog,v |
341 |
retrieving revision 1.2 |
342 |
retrieving revision 1.3 |
343 |
diff -u -r1.2 -r1.3 |
344 |
--- README.Changelog 11 Nov 2013 21:28:42 -0000 1.2 |
345 |
+++ README.Changelog 4 Jan 2014 13:29:17 -0000 1.3 |
346 |
@@ -1,3 +1,9 @@ |
347 |
+0.5.9 |
348 |
+ * configure.ac Remove |
349 |
+ * configure Remove |
350 |
+ * Makefile.in -fno-stack-protector moved to gentoo gcc patchset. |
351 |
+ * gcc/gcc.c Update cc1_spec define |
352 |
+ * gcc/doc/invoke.texi And note on ssp-all for --enable-esp and -ffreestanding |
353 |
0.5.8 |
354 |
* gcc/config/rs6000/linux64 (ASM_SPEC32): Allready applay. |
355 |
|
356 |
|
357 |
|
358 |
|
359 |
1.3 src/patchsets/gcc/4.8.2/pie/README.history |
360 |
|
361 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.history?rev=1.3&view=markup |
362 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.history?rev=1.3&content-type=text/plain |
363 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.history?r1=1.2&r2=1.3 |
364 |
|
365 |
Index: README.history |
366 |
=================================================================== |
367 |
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/README.history,v |
368 |
retrieving revision 1.2 |
369 |
retrieving revision 1.3 |
370 |
diff -u -r1.2 -r1.3 |
371 |
--- README.history 11 Nov 2013 21:28:42 -0000 1.2 |
372 |
+++ README.history 4 Jan 2014 13:29:17 -0000 1.3 |
373 |
@@ -1,3 +1,10 @@ |
374 |
+0.5.9 4 Jan 2014 |
375 |
+ U 01_all_gcc48_configure.patch |
376 |
+ U 03_all_gcc48_Makefile.in.patch |
377 |
+ U 05_all_gcc48_gcc.c.patch |
378 |
+ - 24_all_gcc44_invoke.texi.patch |
379 |
+ + 24_all_gcc48_invoke.texi.patch |
380 |
+ U README |
381 |
0.5.8 11 Nov 2013 |
382 |
U 33_all_gcc48_config_rs6000.patch |
383 |
0.5.7 10 Jul 2013 |
384 |
@@ -14,7 +21,7 @@ |
385 |
- 03_all_gcc47_Makefile.in.patch |
386 |
+ 03_all_gcc48_Makefile.in.patch |
387 |
- 05_all_gcc47_gcc.c.patch |
388 |
- - 05_all_gcc48_gcc.c.patch |
389 |
+ + 05_all_gcc48_gcc.c.patch |
390 |
- 33_all_gcc46_config_rs6000_linux64.h.patch |
391 |
+ 33_all_gcc48_config_rs6000.patch |
392 |
- 34_all_gcc47_config_all_gnu_user.patch |
393 |
|
394 |
|
395 |
|
396 |
1.1 src/patchsets/gcc/4.8.2/pie/24_all_gcc48_invoke.texi.patch |
397 |
|
398 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/24_all_gcc48_invoke.texi.patch?rev=1.1&view=markup |
399 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/24_all_gcc48_invoke.texi.patch?rev=1.1&content-type=text/plain |
400 |
|
401 |
Index: 24_all_gcc48_invoke.texi.patch |
402 |
=================================================================== |
403 |
2014-01-04 Magnus Granberg <zorry@g.o> |
404 |
|
405 |
* gcc/doc/invoke.texi Add NOTES about -fstack-protector-all, -pie and |
406 |
-fPIE/-fpie when --enable-esp is enable, this options is on by default. |
407 |
|
408 |
--- gcc/doc/invoke.texi 2009-04-01 09:18:47.000000000 +0200 |
409 |
+++ gcc/doc/invoke.texi 2009-06-18 14:08:38.000000000 +0200 |
410 |
@@ -7134,6 +7134,11 @@ |
411 |
@opindex fstack-protector-all |
412 |
Like @option{-fstack-protector} except that all functions are protected. |
413 |
|
414 |
+NOTE: When --enable-esp this option is enabled by default |
415 |
+for C, C++, ObjC, ObjC++, if neither @option{-fno-stack-protector} |
416 |
+or @option{-nostdlib} or @option{-nodefaultlibs} or |
417 |
+@option{@-ffreestanding} or @option{-fstack-protector} are found. |
418 |
+ |
419 |
@item -fsection-anchors |
420 |
@opindex fsection-anchors |
421 |
Try to reduce the number of symbolic address calculations by using |
422 |
@@ -7960,6 +7965,12 @@ |
423 |
that were used to generate code (@option{-fpie}, @option{-fPIE}, |
424 |
or model suboptions) when you specify this option. |
425 |
|
426 |
+NOTE: When --enable-esp this option is enabled by default |
427 |
+for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE} |
428 |
+or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or |
429 |
+@option{-nostartfiles} or @option{-shared} or @option{-pg} or @option{-p} |
430 |
+are found. |
431 |
+ |
432 |
@item -rdynamic |
433 |
@opindex rdynamic |
434 |
Pass the flag @option{-export-dynamic} to the ELF linker, on targets |
435 |
@@ -15889,6 +15910,11 @@ |
436 |
@code{__pie__} and @code{__PIE__}. The macros have the value 1 |
437 |
for @option{-fpie} and 2 for @option{-fPIE}. |
438 |
|
439 |
+NOTE: When --enable-esp this option is enabled by default |
440 |
+for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE} |
441 |
+or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or |
442 |
+@option{-nostartfiles} or @option{-shared} are found. |
443 |
+ |
444 |
@item -fno-jump-tables |
445 |
@opindex fno-jump-tables |
446 |
Do not use jump tables for switch statements even where it would be |