Gentoo Archives: gentoo-commits

From: "Magnus Granberg (zorry)" <zorry@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in src/patchsets/gcc/4.8.2/pie: 01_all_gcc48_configure.patch 03_all_gcc48_Makefile.in.patch 05_all_gcc48_gcc.c.patch 24_all_gcc44_invoke.texi.patch 24_all_gcc48_invoke.texi.patch 40_all_gcc48_config_esp.patch README README.Changelog README.history
Date: Sat, 04 Jan 2014 13:29:20
Message-Id: 20140104132917.A51EB2004C@flycatcher.gentoo.org
1 zorry 14/01/04 13:29:17
2
3 Modified: 01_all_gcc48_configure.patch
4 03_all_gcc48_Makefile.in.patch
5 05_all_gcc48_gcc.c.patch
6 40_all_gcc48_config_esp.patch README
7 README.Changelog README.history
8 Added: 24_all_gcc48_invoke.texi.patch
9 Removed: 24_all_gcc44_invoke.texi.patch
10 Log:
11 updated gcc 4.8.2 piepatchsets to 0.5.9 for support of ssp as default
12
13 Revision Changes Path
14 1.2 src/patchsets/gcc/4.8.2/pie/01_all_gcc48_configure.patch
15
16 file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/01_all_gcc48_configure.patch?rev=1.2&view=markup
17 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/01_all_gcc48_configure.patch?rev=1.2&content-type=text/plain
18 diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/01_all_gcc48_configure.patch?r1=1.1&r2=1.2
19
20 Index: 01_all_gcc48_configure.patch
21 ===================================================================
22 RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/01_all_gcc48_configure.patch,v
23 retrieving revision 1.1
24 retrieving revision 1.2
25 diff -u -r1.1 -r1.2
26 --- 01_all_gcc48_configure.patch 10 Nov 2013 20:05:25 -0000 1.1
27 +++ 01_all_gcc48_configure.patch 4 Jan 2014 13:29:17 -0000 1.2
28 @@ -1,53 +1,10 @@
29 -2013-04-01 Magnus Granberg <zorry@g.o>
30 +2013-12-30 Magnus Granberg <zorry@g.o>
31
32 - * configure.ac Add --enable-esp. Add -fno-stack-protector
33 - to stage1_cflags.
34 - * configure Regenerated
35 * gcc/configure.ac Add --enable-esp and define ENABLE_ESP.
36 Check if we support crtbeginP and define ENABLE_CRTBEGINP.
37 * gcc/configure Regenerated
38
39 ---- a/configure.ac 2011-11-29 22:36:43.000000000 +0100
40 -+++ b/configure.ac 2011-12-07 23:29:26.125712475 +0100
41 -@@ -419,6 +419,26 @@ if test "${ENABLE_LIBADA}" != "yes" ; th
42 - noconfigdirs="$noconfigdirs gnattools"
43 - fi
44 -
45 -+# Check whether --enable-esp was given and target have the support.
46 -+AC_ARG_ENABLE([esp],
47 -+[AS_HELP_STRING([--enable-esp],
48 -+ [Enable Stack protector and Position independent executable as
49 -+ default if we have suppot for it when compiling
50 -+ and link with -z relro and -z now as default.
51 -+ Linux targets supported i*86, x86_64, x32,
52 -+ powerpc, powerpc64, ia64, arm and mips.])],
53 -+[
54 -+ case $target in
55 -+ i?86*-*-linux* | x86_64-*-linux* | powerpc*-*-linux* | mips-*-linux* | arm*-*-linux* | ia64-*-linux*)
56 -+ enable_esp=yes
57 -+ ;;
58 -+ *)
59 -+ AC_MSG_WARN([*** --enable-esp is not supported on this $target target.])
60 -+ ;;
61 -+ esac
62 -+])
63 -+AC_SUBST([enable_esp])
64 -+
65 - AC_ARG_ENABLE(libssp,
66 - [AS_HELP_STRING([--enable-libssp], [build libssp directory])],
67 - ENABLE_LIBSSP=$enableval,
68 -@@ -3211,6 +3230,11 @@ if test "$GCC" = yes -a "$ENABLE_BUILD_W
69 - CFLAGS="$saved_CFLAGS"
70 - fi
71 -
72 -+# Disable -fstack-protector on stage1
73 -+if test x$enable_esp = xyes; then
74 -+ stage1_cflags="$stage1_cflags -fno-stack-protector"
75 -+fi
76 -+
77 - AC_SUBST(stage1_cflags)
78 -
79 - # Enable --enable-checking in stage1 of the compiler.
80 +
81 --- a/gcc/configure.ac 2011-11-18 11:52:32.000000000 +0100
82 +++ b/gcc/configure.ac 2012-10-02 17:39:15.649526241 +0200
83 @@ -5130,6 +5237,55 @@ if test x"${LINKER_HASH_STYLE}" != x; th
84 @@ -106,73 +63,6 @@
85 # Configure the subdirectories
86 # AC_CONFIG_SUBDIRS($subdirs)
87
88 ---- a/configure 2013-02-05 23:36:20.000000000 +0100
89 -+++ b/configure 2013-02-12 01:59:04.000000000 +0100
90 -@@ -670,6 +670,7 @@
91 - CFLAGS
92 - CC
93 - EXTRA_CONFIGARGS_LIBJAVA
94 -+enable_esp
95 - target_subdir
96 - host_subdir
97 - build_subdir
98 -@@ -748,6 +749,7 @@
99 - enable_libquadmath
100 - enable_libquadmath_support
101 - enable_libada
102 -+enable_esp
103 - enable_libssp
104 - enable_libstdcxx
105 - enable_static_libjava
106 -@@ -1464,6 +1466,11 @@
107 - --disable-libquadmath-support
108 - disable libquadmath support for Fortran
109 - --enable-libada build libada directory
110 -+ --enable-esp Enable Stack protector and Position independent
111 -+ executable as default if we have suppot for it when
112 -+ compiling and link with and -z now as default.
113 -+ Linux targets supported i*86, x86_64, x32,
114 -+ powerpc, powerpc64, ia64, arm and mips.
115 - --enable-libssp build libssp directory
116 - --disable-libstdcxx do not build libstdc++-v3 directory
117 - --enable-static-libjava[=ARG]
118 -@@ -3068,6 +3075,24 @@
119 - noconfigdirs="$noconfigdirs gnattools"
120 - fi
121 -
122 -+# Check whether --enable-esp was given and target have the support.
123 -+# Check whether --enable-esp was given.
124 -+if test "${enable_esp+set}" = set; then :
125 -+ enableval=$enable_esp;
126 -+ case $target in
127 -+ i?86*-*-linux* | x86_64-*-linux* | powerpc*-*-linux* | mips*-*-linux* | arm*-*-linux* | ia64-*-linux*)
128 -+ enable_esp=yes
129 -+ ;;
130 -+ *)
131 -+ { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: *** --enable-esp is not supported on this $target target." >&5
132 -+$as_echo "$as_me: WARNING: *** --enable-esp is not supported on this $target target." >&2;}
133 -+ ;;
134 -+ esac
135 -+
136 -+fi
137 -+
138 -+
139 -+
140 - # Check whether --enable-libssp was given.
141 - if test "${enable_libssp+set}" = set; then :
142 - enableval=$enable_libssp; ENABLE_LIBSSP=$enableval
143 -@@ -14453,6 +14478,11 @@
144 - esac ;;
145 - esac
146 -
147 -+# Disable -fstack-protector on stage1
148 -+if test x$enable_esp = xyes; then
149 -+ stage1_cflags="$stage1_cflags -fno-stack-protector"
150 -+fi
151 -+
152 -
153 -
154 - # Enable --enable-checking in stage1 of the compiler.
155 --- a/gcc/configure 2013-02-01 21:26:24.000000000 +0100
156 +++ b/gcc/configure 2013-02-12 01:59:20.000000000 +0100
157 @@ -600,6 +600,8 @@
158
159
160
161 1.2 src/patchsets/gcc/4.8.2/pie/03_all_gcc48_Makefile.in.patch
162
163 file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/03_all_gcc48_Makefile.in.patch?rev=1.2&view=markup
164 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/03_all_gcc48_Makefile.in.patch?rev=1.2&content-type=text/plain
165 diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/03_all_gcc48_Makefile.in.patch?r1=1.1&r2=1.2
166
167 Index: 03_all_gcc48_Makefile.in.patch
168 ===================================================================
169 RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/03_all_gcc48_Makefile.in.patch,v
170 retrieving revision 1.1
171 retrieving revision 1.2
172 diff -u -r1.1 -r1.2
173 --- 03_all_gcc48_Makefile.in.patch 10 Nov 2013 20:05:25 -0000 1.1
174 +++ 03_all_gcc48_Makefile.in.patch 4 Jan 2014 13:29:17 -0000 1.2
175 @@ -1,7 +1,5 @@
176 2012-01-17 Magnus Granberg <zorry@g.o>
177
178 - * Makefile.in We add -fno-stack-protector to BOOT_CFLAGS, LIBCFLAGS and
179 - LIBCXXFLAGS if enable_esp yes.
180 * gcc/Makefile.in Add -fno-PIE. to ALL_CFLAGS and
181 ALL_CXXFLAGS if enable_esp yes.
182 Echo enable_esp and enable_crtbeginP to tmp-libgcc.mvars.
183 @@ -9,39 +7,6 @@
184 We add new file crtbeginP.o if enable_crtbeginP yes
185 Add -fno-PIE. to CRTSTUFF_CFLAGS.
186
187 ---- a/Makefile.in 2010-01-22 08:35:38.000000000 -0500
188 -+++ b/Makefile.in 2010-02-07 15:10:59.000000000 -0500
189 -@@ -350,9 +350,17 @@
190 - BUILD_PREFIX = @BUILD_PREFIX@
191 - BUILD_PREFIX_1 = @BUILD_PREFIX_1@
192 -
193 -+# Some stuff don't compile with SSP
194 -+enable_esp = @enable_esp@
195 -+ifeq ($(enable_esp),yes)
196 -+ESP_NOSSP_CFLAGS = -fno-stack-protector
197 -+else
198 -+ESP_NOSSP_CFLAGS=
199 -+endif
200 -+
201 - # Flags to pass to stage2 and later makes. They are defined
202 - # here so that they can be overridden by Makefile fragments.
203 --BOOT_CFLAGS= -g -O2
204 -+BOOT_CFLAGS= -g -O2 $(ESP_NOSSP_CFLAGS)
205 - BOOT_LDFLAGS=
206 - BOOT_ADAFLAGS=-gnatpg -gnata
207 -
208 -@@ -403,9 +403,9 @@
209 -
210 - CFLAGS = @CFLAGS@
211 - LDFLAGS = @LDFLAGS@
212 --LIBCFLAGS = $(CFLAGS)
213 -+LIBCFLAGS = $(CFLAGS) $(ESP_NOSSP_CFLAGS)
214 - CXXFLAGS = @CXXFLAGS@
215 --LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates
216 -+LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates $(ESP_NOSSP_CFLAGS)
217 - GOCFLAGS = $(CFLAGS)
218 -
219 - TFLAGS =
220 --- a/gcc/Makefile.in 2011-11-09 02:20:14.000000000 +0100
221 +++ b/gcc/Makefile.in 2011-12-24 22:28:08.864804375 +0100
222 @@ -247,6 +247,14 @@ LINKER_FLAGS = $(CFLAGS)
223
224
225
226 1.2 src/patchsets/gcc/4.8.2/pie/05_all_gcc48_gcc.c.patch
227
228 file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/05_all_gcc48_gcc.c.patch?rev=1.2&view=markup
229 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/05_all_gcc48_gcc.c.patch?rev=1.2&content-type=text/plain
230 diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/05_all_gcc48_gcc.c.patch?r1=1.1&r2=1.2
231
232 Index: 05_all_gcc48_gcc.c.patch
233 ===================================================================
234 RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/05_all_gcc48_gcc.c.patch,v
235 retrieving revision 1.1
236 retrieving revision 1.2
237 diff -u -r1.1 -r1.2
238 --- 05_all_gcc48_gcc.c.patch 10 Nov 2013 20:05:25 -0000 1.1
239 +++ 05_all_gcc48_gcc.c.patch 4 Jan 2014 13:29:17 -0000 1.2
240 @@ -1,4 +1,4 @@
241 -2013-03-24 Magnus Granberg <zorry@g.o>
242 +2014-01-01 Magnus Granberg <zorry@g.o>
243
244 * gcc/gcc.c include esp.h
245 static const char *cc1_spec We set that in esp.h if ENABLE_ESP.
246 @@ -18,7 +18,7 @@
247 static const char *asm_debug;
248 static const char *cpp_spec = CPP_SPEC;
249 +#ifndef ENABLE_ESP
250 - static const char *cc1_spec = CC1_SPEC;
251 + static const char *cc1_spec = CC1_SPEC CC1_SSP_DEFAULT_SPEC;
252 +#endif
253 static const char *cc1plus_spec = CC1PLUS_SPEC;
254 static const char *link_gcc_c_sequence_spec = LINK_GCC_C_SEQUENCE_SPEC;
255
256
257
258 1.2 src/patchsets/gcc/4.8.2/pie/40_all_gcc48_config_esp.patch
259
260 file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/40_all_gcc48_config_esp.patch?rev=1.2&view=markup
261 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/40_all_gcc48_config_esp.patch?rev=1.2&content-type=text/plain
262 diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/40_all_gcc48_config_esp.patch?r1=1.1&r2=1.2
263
264 Index: 40_all_gcc48_config_esp.patch
265 ===================================================================
266 RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/40_all_gcc48_config_esp.patch,v
267 retrieving revision 1.1
268 retrieving revision 1.2
269 diff -u -r1.1 -r1.2
270 --- 40_all_gcc48_config_esp.patch 10 Nov 2013 20:05:25 -0000 1.1
271 +++ 40_all_gcc48_config_esp.patch 4 Jan 2014 13:29:17 -0000 1.2
272 @@ -1,13 +1,13 @@
273 -2013-08-10 Magnus Granberg <zorry@g.o>
274 +2014-01-04 Magnus Granberg <zorry@g.o>
275
276 * gcc/esp.h New file to support --enable-esp
277 - Version 20130810.1
278 + Version 20140104.1
279
280 --- gcc/config/esp.h 2010-04-09 16:14:00.000000000 +0200
281 +++ gcc/config/esp.h 2012-06-23 01:00:31.248348491 +0200
282 @@ -0,0 +1,128 @@
283 +/* License terms see GNU GENERAL PUBLIC LICENSE Version 3.
284 -+ * Version 20130810.1
285 ++ * Version 20140104.1
286 + * Magnus Granberg (Zorry) <zorry@g.o> */
287 +#ifndef GCC_ESP_H
288 +#define GCC_ESP_H
289 @@ -53,7 +53,7 @@
290 + -fstack-protector-all and we have EFAULT_SSP or EFAULT_PIE_SSP defined. */
291 + #if defined ( EFAULT_SSP ) || defined ( EFAULT_PIE_SSP )
292 + #define ESP_OPTIONS_SSP_SPEC \
293 -+ "%{nostdlib|nodefaultlibs|fno-stack-protector| \
294 ++ "%{nostdlib|nodefaultlibs|ffreestanding|fno-stack-protector| \
295 + fstack-protector|fstack-protector-all:;:-fstack-protector-all} \
296 + %{fstack-check|fstack-check=*:;: -fstack-check}"
297 + #else
298
299
300
301 1.2 src/patchsets/gcc/4.8.2/pie/README
302
303 file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README?rev=1.2&view=markup
304 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README?rev=1.2&content-type=text/plain
305 diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README?r1=1.1&r2=1.2
306
307 Index: README
308 ===================================================================
309 RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/README,v
310 retrieving revision 1.1
311 retrieving revision 1.2
312 diff -u -r1.1 -r1.2
313 --- README 10 Nov 2013 20:05:25 -0000 1.1
314 +++ README 4 Jan 2014 13:29:17 -0000 1.2
315 @@ -8,6 +8,7 @@
316 We started with the pieworld code from kevquinn's overlay. The PIE and minispecs part hit the tree later on.
317 With GCC 4.4.0 I was willing to do some code cleanup, use built-in specs and add it as --enable-esp in the
318 configure command line. On GCC 4.8.0 we use DRIVER_SELF_SPECS for the specs.
319 +From gcc 4.8.2-r1 it will have -fstack-protector on as default.
320
321 Thank you all:
322 Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY, Xake, Dwokfur,
323 @@ -15,4 +16,4 @@
324 unk, neuron, alexxy, hellboi64, likewhoa, g0rg0n, costel78, polsas, 7v5w7go9ub0o, uberpinguin, Naib, cilly,
325 bonsaikitten, kerframil, agaffney, Gordon Malm, blueness, Matthias Klose, Kees Cook, mentor, Anarchy,
326 devurandom and everyone else for helping to test, suggestions, fixes and anything else we have missed.
327 -/2013-03-31 Magnus Grenberg (Zorry) <zorry@g.o>
328 +/2013-12-30 Magnus Grenberg (Zorry) <zorry@g.o>
329
330
331
332 1.3 src/patchsets/gcc/4.8.2/pie/README.Changelog
333
334 file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.Changelog?rev=1.3&view=markup
335 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.Changelog?rev=1.3&content-type=text/plain
336 diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.Changelog?r1=1.2&r2=1.3
337
338 Index: README.Changelog
339 ===================================================================
340 RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/README.Changelog,v
341 retrieving revision 1.2
342 retrieving revision 1.3
343 diff -u -r1.2 -r1.3
344 --- README.Changelog 11 Nov 2013 21:28:42 -0000 1.2
345 +++ README.Changelog 4 Jan 2014 13:29:17 -0000 1.3
346 @@ -1,3 +1,9 @@
347 +0.5.9
348 + * configure.ac Remove
349 + * configure Remove
350 + * Makefile.in -fno-stack-protector moved to gentoo gcc patchset.
351 + * gcc/gcc.c Update cc1_spec define
352 + * gcc/doc/invoke.texi And note on ssp-all for --enable-esp and -ffreestanding
353 0.5.8
354 * gcc/config/rs6000/linux64 (ASM_SPEC32): Allready applay.
355
356
357
358
359 1.3 src/patchsets/gcc/4.8.2/pie/README.history
360
361 file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.history?rev=1.3&view=markup
362 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.history?rev=1.3&content-type=text/plain
363 diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/README.history?r1=1.2&r2=1.3
364
365 Index: README.history
366 ===================================================================
367 RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.8.2/pie/README.history,v
368 retrieving revision 1.2
369 retrieving revision 1.3
370 diff -u -r1.2 -r1.3
371 --- README.history 11 Nov 2013 21:28:42 -0000 1.2
372 +++ README.history 4 Jan 2014 13:29:17 -0000 1.3
373 @@ -1,3 +1,10 @@
374 +0.5.9 4 Jan 2014
375 + U 01_all_gcc48_configure.patch
376 + U 03_all_gcc48_Makefile.in.patch
377 + U 05_all_gcc48_gcc.c.patch
378 + - 24_all_gcc44_invoke.texi.patch
379 + + 24_all_gcc48_invoke.texi.patch
380 + U README
381 0.5.8 11 Nov 2013
382 U 33_all_gcc48_config_rs6000.patch
383 0.5.7 10 Jul 2013
384 @@ -14,7 +21,7 @@
385 - 03_all_gcc47_Makefile.in.patch
386 + 03_all_gcc48_Makefile.in.patch
387 - 05_all_gcc47_gcc.c.patch
388 - - 05_all_gcc48_gcc.c.patch
389 + + 05_all_gcc48_gcc.c.patch
390 - 33_all_gcc46_config_rs6000_linux64.h.patch
391 + 33_all_gcc48_config_rs6000.patch
392 - 34_all_gcc47_config_all_gnu_user.patch
393
394
395
396 1.1 src/patchsets/gcc/4.8.2/pie/24_all_gcc48_invoke.texi.patch
397
398 file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/24_all_gcc48_invoke.texi.patch?rev=1.1&view=markup
399 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.8.2/pie/24_all_gcc48_invoke.texi.patch?rev=1.1&content-type=text/plain
400
401 Index: 24_all_gcc48_invoke.texi.patch
402 ===================================================================
403 2014-01-04 Magnus Granberg <zorry@g.o>
404
405 * gcc/doc/invoke.texi Add NOTES about -fstack-protector-all, -pie and
406 -fPIE/-fpie when --enable-esp is enable, this options is on by default.
407
408 --- gcc/doc/invoke.texi 2009-04-01 09:18:47.000000000 +0200
409 +++ gcc/doc/invoke.texi 2009-06-18 14:08:38.000000000 +0200
410 @@ -7134,6 +7134,11 @@
411 @opindex fstack-protector-all
412 Like @option{-fstack-protector} except that all functions are protected.
413
414 +NOTE: When --enable-esp this option is enabled by default
415 +for C, C++, ObjC, ObjC++, if neither @option{-fno-stack-protector}
416 +or @option{-nostdlib} or @option{-nodefaultlibs} or
417 +@option{@-ffreestanding} or @option{-fstack-protector} are found.
418 +
419 @item -fsection-anchors
420 @opindex fsection-anchors
421 Try to reduce the number of symbolic address calculations by using
422 @@ -7960,6 +7965,12 @@
423 that were used to generate code (@option{-fpie}, @option{-fPIE},
424 or model suboptions) when you specify this option.
425
426 +NOTE: When --enable-esp this option is enabled by default
427 +for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE}
428 +or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or
429 +@option{-nostartfiles} or @option{-shared} or @option{-pg} or @option{-p}
430 +are found.
431 +
432 @item -rdynamic
433 @opindex rdynamic
434 Pass the flag @option{-export-dynamic} to the ELF linker, on targets
435 @@ -15889,6 +15910,11 @@
436 @code{__pie__} and @code{__PIE__}. The macros have the value 1
437 for @option{-fpie} and 2 for @option{-fPIE}.
438
439 +NOTE: When --enable-esp this option is enabled by default
440 +for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE}
441 +or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or
442 +@option{-nostartfiles} or @option{-shared} are found.
443 +
444 @item -fno-jump-tables
445 @opindex fno-jump-tables
446 Do not use jump tables for switch statements even where it would be