aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMagnus Granberg (Zorry) <zorry@gentoo.org>2010-04-15 14:59:59 +0200
committerMagnus Granberg (Zorry) <zorry@gentoo.org>2010-04-15 14:59:59 +0200
commite1527394ed680748aba833752130e87ef72cd258 (patch)
tree768b9a3d90377cef671805a866c1f2b9d66e1040
parentFix th gcc/configure file in gcc 4.4.3 (diff)
downloadhardened-gccpatchset-e1527394ed680748aba833752130e87ef72cd258.tar.gz
hardened-gccpatchset-e1527394ed680748aba833752130e87ef72cd258.tar.bz2
hardened-gccpatchset-e1527394ed680748aba833752130e87ef72cd258.zip
Updated all to 0.3.9
-rw-r--r--espf-gcc-4.3.4/10_all_gcc43_configure.patch22
-rw-r--r--espf-gcc-4.3.4/README.Changelog12
-rw-r--r--espf-gcc-4.3.4/README.history4
-rw-r--r--espf-gcc-4.5.0/10_all_gcc45_configure.patch30
-rw-r--r--espf-gcc-4.5.0/README.Changelog12
-rw-r--r--espf-gcc-4.5.0/README.history14
6 files changed, 82 insertions, 12 deletions
diff --git a/espf-gcc-4.3.4/10_all_gcc43_configure.patch b/espf-gcc-4.3.4/10_all_gcc43_configure.patch
index 382b1fe..ff6556b 100644
--- a/espf-gcc-4.3.4/10_all_gcc43_configure.patch
+++ b/espf-gcc-4.3.4/10_all_gcc43_configure.patch
@@ -1,9 +1,10 @@
-2010-04-10 Magnus Granberg <zorry@gentoo.org>
+2010-04-14 Magnus Granberg <zorry@gentoo.org>
* configure Add --enable-espf. Add-fno-stack-protector
to stage1_cflags.
* gcc/configure Check -z now and -z relro.
- Check if we support FORTIFY_SOURCES level 2.
+ Check if the compiler support -fstack-protector and define HAVE_GCC_SSP.
+ Check if we support FORTIFY_SOURCES.
Define ENABLE_ESPF.
* libmudflap/configure Add AC_SUBST enable_espf.
@@ -142,7 +143,7 @@
echo "$as_me:$LINENO: checking linker --sysroot support" >&5
echo $ECHO_N "checking linker --sysroot support... $ECHO_C" >&6
if test "${gcc_cv_ld_sysroot+set}" = set; then
-@@ -24411,6 +23737,133 @@
+@@ -24411,6 +23737,146 @@
fi
@@ -183,7 +184,20 @@
+ ac_status=$?
+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
+ (exit $ac_status); }; }; then
-+ gcc_cv_cc_stack_protector=yes
++
++ case $target in
++ i?86*-*-linux* | x86_64*-*-linux* | powerpc-*-linux* | powerpc64-*-linux*)
++ if test x$set_have_as_tls = xyes; then
++ gcc_cv_cc_stack_protector=yes
++ else
++ gcc_cv_cc_stack_protector=no
++ fi
++ ;;
++ *)
++ cc_cv_cc_stack_protector=yes
++ ;;
++ esac
++
+else
+ echo "$as_me: failed program was:" >&5
+sed 's/^/| /' conftest.$ac_ext >&5
diff --git a/espf-gcc-4.3.4/README.Changelog b/espf-gcc-4.3.4/README.Changelog
index 70ea74b..462ffe7 100644
--- a/espf-gcc-4.3.4/README.Changelog
+++ b/espf-gcc-4.3.4/README.Changelog
@@ -1,3 +1,15 @@
+0.3.9 Magnus Granberg <zorry@gentoo.org>
+
+ * gcc/configure Added check for TLS on the target in the SSP check.
+
+ #149292 b.g.o
+ * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
+ * gcc/config/i386/linux64.h Removed uclibc don't support TLS on stack-protector
+ * gcc/config/rs6000/linux.h Removed uclibc don't support TLS on stack-protector
+ * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
+ * gcc/config/sparc/linux.h Removed uclibc don't support TLS on stack-protector
+ * gcc/config/sparc/linux64.h Removed uclibc don't support TLS on stack-protector
+
0.3.8 Magnus Granberg <zorry@gentoo.org>
* gcc/configure Added a -fstack-protector check.
diff --git a/espf-gcc-4.3.4/README.history b/espf-gcc-4.3.4/README.history
index e8750e7..cbe1b32 100644
--- a/espf-gcc-4.3.4/README.history
+++ b/espf-gcc-4.3.4/README.history
@@ -1,3 +1,7 @@
+0.3.9 14-04-2010
+ 10_all_gcc44_configure.patch
+ - 50_all_gcc44_no_ssp_tls_uclibc.patch
+
0.3.8 10-04-2010
10_all_gcc44_configure.patch
11_all_gcc44_config.in.patch
diff --git a/espf-gcc-4.5.0/10_all_gcc45_configure.patch b/espf-gcc-4.5.0/10_all_gcc45_configure.patch
index 8e91410..a157a99 100644
--- a/espf-gcc-4.5.0/10_all_gcc45_configure.patch
+++ b/espf-gcc-4.5.0/10_all_gcc45_configure.patch
@@ -1,17 +1,18 @@
-2010-04-10 Magnus Granberg <zorry@gentoo.org>, Anthony G. Basile <basile@opensource.dyc.edu>
+2010-04-15 Magnus Granberg <zorry@gentoo.org>, Anthony G. Basile <basile@opensource.dyc.edu>
* configure Add --enable-espf. Add-fno-stack-protector
- to stage1_cflags. Add AC_SUBST enable_espf.
+ to stage1_cflags.
* gcc/configure Check -z now and -z relro.
- Check if we support FORTIFY_SOURCES level 2.
- Define ENABLE_ESPF.
Check if the compiler support -fstack-protector and define HAVE_GCC_SSP.
- Check if we support crtbeginTS and define ENABLE_CRTBEGINTS.
- Add AC_SUBST enable_espf and enable_crtbeginTS.
+ Check if we support FORTIFY_SOURCES.
+ Define ENABLE_ESPF.
* libmudflap/configure Add AC_SUBST enable_espf.
On Gentoo
* gcc/configure We don't need to check for FORTIFY_SOURCES support.
+ Check if the compiler support -fstack-protector and define HAVE_GCC_SSP.
+ Check if we support crtbeginTS and define ENABLE_CRTBEGINTS.
+ Add AC_SUBST enable_crtbeginTS.
--- configure 2010-01-31 13:12:21.000000000 -0500
+++ configure 2010-02-07 14:29:51.000000000 -0500
@@ -132,7 +133,7 @@
{ $as_echo "$as_me:${as_lineno-$LINENO}: checking linker --build-id support" >&5
$as_echo_n "checking linker --build-id support... " >&6; }
if test "${gcc_cv_ld_buildid+set}" = set; then :
-@@ -24411,6 +23737,133 @@
+@@ -24411,6 +23737,146 @@
fi
@@ -173,7 +174,20 @@
+ ac_status=$?
+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
+ (exit $ac_status); }; }; then
-+ gcc_cv_cc_stack_protector=yes
++
++ case $target in
++ i?86*-*-linux* | x86_64*-*-linux* | powerpc-*-linux* | powerpc64-*-linux*)
++ if test x$set_have_as_tls = xyes; then
++ gcc_cv_cc_stack_protector=yes
++ else
++ gcc_cv_cc_stack_protector=no
++ fi
++ ;;
++ *)
++ cc_cv_cc_stack_protector=yes
++ ;;
++ esac
++
+else
+ echo "$as_me: failed program was:" >&5
+sed 's/^/| /' conftest.$ac_ext >&5
diff --git a/espf-gcc-4.5.0/README.Changelog b/espf-gcc-4.5.0/README.Changelog
index 93d41a0..822797e 100644
--- a/espf-gcc-4.5.0/README.Changelog
+++ b/espf-gcc-4.5.0/README.Changelog
@@ -1,3 +1,15 @@
+0.3.9 Magnus Granberg <zorry@gentoo.org>
+
+ * gcc/configure Added check for TLS on the target in the SSP check.
+
+ #149292 b.g.o
+ * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
+ * gcc/config/i386/linux64.h Removed uclibc don't support TLS on stack-protector
+ * gcc/config/rs6000/linux.h Removed uclibc don't support TLS on stack-protector
+ * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
+ * gcc/config/sparc/linux.h Removed uclibc don't support TLS on stack-protector
+ * gcc/config/sparc/linux64.h Removed uclibc don't support TLS on stack-protector
+
0.3.8 Magnus Granberg <zorry@gentoo.org>
* gcc/configure Redone the -fstack-protector check.
diff --git a/espf-gcc-4.5.0/README.history b/espf-gcc-4.5.0/README.history
index 0acdc40..0aac21b 100644
--- a/espf-gcc-4.5.0/README.history
+++ b/espf-gcc-4.5.0/README.history
@@ -1,3 +1,17 @@
+0.3.9 14-04-2010
+ 10_all_gcc44_configure.patch
+ - 50_all_gcc44_no_ssp_tls_uclibc.patch
+0.3.8 10-04-2010
+ 10_all_gcc44_configure.patch
+ 11_all_gcc44_config.in.patch
+ 20_all_gcc44_gcc.c.patch
+ 30_all_gcc44_espf.h.patch
+
+0.3.7 10-02-2010
+ 20_all_gcc44_gcc.c.patch
+ 30_all_gcc44_espf.h.patch
+ 10_all_gcc44_configure.patch
+
0.3.6 23-12-2009
- 10_all_gcc44_configure.patch
+ 10_all_gcc44_configure.patch