diff options
author | Magnus Granberg (Zorry) <zorry@gentoo.org> | 2010-04-15 14:59:59 +0200 |
---|---|---|
committer | Magnus Granberg (Zorry) <zorry@gentoo.org> | 2010-04-15 14:59:59 +0200 |
commit | e1527394ed680748aba833752130e87ef72cd258 (patch) | |
tree | 768b9a3d90377cef671805a866c1f2b9d66e1040 | |
parent | Fix th gcc/configure file in gcc 4.4.3 (diff) | |
download | hardened-gccpatchset-e1527394ed680748aba833752130e87ef72cd258.tar.gz hardened-gccpatchset-e1527394ed680748aba833752130e87ef72cd258.tar.bz2 hardened-gccpatchset-e1527394ed680748aba833752130e87ef72cd258.zip |
Updated all to 0.3.9
-rw-r--r-- | espf-gcc-4.3.4/10_all_gcc43_configure.patch | 22 | ||||
-rw-r--r-- | espf-gcc-4.3.4/README.Changelog | 12 | ||||
-rw-r--r-- | espf-gcc-4.3.4/README.history | 4 | ||||
-rw-r--r-- | espf-gcc-4.5.0/10_all_gcc45_configure.patch | 30 | ||||
-rw-r--r-- | espf-gcc-4.5.0/README.Changelog | 12 | ||||
-rw-r--r-- | espf-gcc-4.5.0/README.history | 14 |
6 files changed, 82 insertions, 12 deletions
diff --git a/espf-gcc-4.3.4/10_all_gcc43_configure.patch b/espf-gcc-4.3.4/10_all_gcc43_configure.patch index 382b1fe..ff6556b 100644 --- a/espf-gcc-4.3.4/10_all_gcc43_configure.patch +++ b/espf-gcc-4.3.4/10_all_gcc43_configure.patch @@ -1,9 +1,10 @@ -2010-04-10 Magnus Granberg <zorry@gentoo.org> +2010-04-14 Magnus Granberg <zorry@gentoo.org> * configure Add --enable-espf. Add-fno-stack-protector to stage1_cflags. * gcc/configure Check -z now and -z relro. - Check if we support FORTIFY_SOURCES level 2. + Check if the compiler support -fstack-protector and define HAVE_GCC_SSP. + Check if we support FORTIFY_SOURCES. Define ENABLE_ESPF. * libmudflap/configure Add AC_SUBST enable_espf. @@ -142,7 +143,7 @@ echo "$as_me:$LINENO: checking linker --sysroot support" >&5 echo $ECHO_N "checking linker --sysroot support... $ECHO_C" >&6 if test "${gcc_cv_ld_sysroot+set}" = set; then -@@ -24411,6 +23737,133 @@ +@@ -24411,6 +23737,146 @@ fi @@ -183,7 +184,20 @@ + ac_status=$? + echo "$as_me:$LINENO: \$? = $ac_status" >&5 + (exit $ac_status); }; }; then -+ gcc_cv_cc_stack_protector=yes ++ ++ case $target in ++ i?86*-*-linux* | x86_64*-*-linux* | powerpc-*-linux* | powerpc64-*-linux*) ++ if test x$set_have_as_tls = xyes; then ++ gcc_cv_cc_stack_protector=yes ++ else ++ gcc_cv_cc_stack_protector=no ++ fi ++ ;; ++ *) ++ cc_cv_cc_stack_protector=yes ++ ;; ++ esac ++ +else + echo "$as_me: failed program was:" >&5 +sed 's/^/| /' conftest.$ac_ext >&5 diff --git a/espf-gcc-4.3.4/README.Changelog b/espf-gcc-4.3.4/README.Changelog index 70ea74b..462ffe7 100644 --- a/espf-gcc-4.3.4/README.Changelog +++ b/espf-gcc-4.3.4/README.Changelog @@ -1,3 +1,15 @@ +0.3.9 Magnus Granberg <zorry@gentoo.org> + + * gcc/configure Added check for TLS on the target in the SSP check. + + #149292 b.g.o + * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector + * gcc/config/i386/linux64.h Removed uclibc don't support TLS on stack-protector + * gcc/config/rs6000/linux.h Removed uclibc don't support TLS on stack-protector + * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector + * gcc/config/sparc/linux.h Removed uclibc don't support TLS on stack-protector + * gcc/config/sparc/linux64.h Removed uclibc don't support TLS on stack-protector + 0.3.8 Magnus Granberg <zorry@gentoo.org> * gcc/configure Added a -fstack-protector check. diff --git a/espf-gcc-4.3.4/README.history b/espf-gcc-4.3.4/README.history index e8750e7..cbe1b32 100644 --- a/espf-gcc-4.3.4/README.history +++ b/espf-gcc-4.3.4/README.history @@ -1,3 +1,7 @@ +0.3.9 14-04-2010 + 10_all_gcc44_configure.patch + - 50_all_gcc44_no_ssp_tls_uclibc.patch + 0.3.8 10-04-2010 10_all_gcc44_configure.patch 11_all_gcc44_config.in.patch diff --git a/espf-gcc-4.5.0/10_all_gcc45_configure.patch b/espf-gcc-4.5.0/10_all_gcc45_configure.patch index 8e91410..a157a99 100644 --- a/espf-gcc-4.5.0/10_all_gcc45_configure.patch +++ b/espf-gcc-4.5.0/10_all_gcc45_configure.patch @@ -1,17 +1,18 @@ -2010-04-10 Magnus Granberg <zorry@gentoo.org>, Anthony G. Basile <basile@opensource.dyc.edu> +2010-04-15 Magnus Granberg <zorry@gentoo.org>, Anthony G. Basile <basile@opensource.dyc.edu> * configure Add --enable-espf. Add-fno-stack-protector - to stage1_cflags. Add AC_SUBST enable_espf. + to stage1_cflags. * gcc/configure Check -z now and -z relro. - Check if we support FORTIFY_SOURCES level 2. - Define ENABLE_ESPF. Check if the compiler support -fstack-protector and define HAVE_GCC_SSP. - Check if we support crtbeginTS and define ENABLE_CRTBEGINTS. - Add AC_SUBST enable_espf and enable_crtbeginTS. + Check if we support FORTIFY_SOURCES. + Define ENABLE_ESPF. * libmudflap/configure Add AC_SUBST enable_espf. On Gentoo * gcc/configure We don't need to check for FORTIFY_SOURCES support. + Check if the compiler support -fstack-protector and define HAVE_GCC_SSP. + Check if we support crtbeginTS and define ENABLE_CRTBEGINTS. + Add AC_SUBST enable_crtbeginTS. --- configure 2010-01-31 13:12:21.000000000 -0500 +++ configure 2010-02-07 14:29:51.000000000 -0500 @@ -132,7 +133,7 @@ { $as_echo "$as_me:${as_lineno-$LINENO}: checking linker --build-id support" >&5 $as_echo_n "checking linker --build-id support... " >&6; } if test "${gcc_cv_ld_buildid+set}" = set; then : -@@ -24411,6 +23737,133 @@ +@@ -24411,6 +23737,146 @@ fi @@ -173,7 +174,20 @@ + ac_status=$? + echo "$as_me:$LINENO: \$? = $ac_status" >&5 + (exit $ac_status); }; }; then -+ gcc_cv_cc_stack_protector=yes ++ ++ case $target in ++ i?86*-*-linux* | x86_64*-*-linux* | powerpc-*-linux* | powerpc64-*-linux*) ++ if test x$set_have_as_tls = xyes; then ++ gcc_cv_cc_stack_protector=yes ++ else ++ gcc_cv_cc_stack_protector=no ++ fi ++ ;; ++ *) ++ cc_cv_cc_stack_protector=yes ++ ;; ++ esac ++ +else + echo "$as_me: failed program was:" >&5 +sed 's/^/| /' conftest.$ac_ext >&5 diff --git a/espf-gcc-4.5.0/README.Changelog b/espf-gcc-4.5.0/README.Changelog index 93d41a0..822797e 100644 --- a/espf-gcc-4.5.0/README.Changelog +++ b/espf-gcc-4.5.0/README.Changelog @@ -1,3 +1,15 @@ +0.3.9 Magnus Granberg <zorry@gentoo.org> + + * gcc/configure Added check for TLS on the target in the SSP check. + + #149292 b.g.o + * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector + * gcc/config/i386/linux64.h Removed uclibc don't support TLS on stack-protector + * gcc/config/rs6000/linux.h Removed uclibc don't support TLS on stack-protector + * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector + * gcc/config/sparc/linux.h Removed uclibc don't support TLS on stack-protector + * gcc/config/sparc/linux64.h Removed uclibc don't support TLS on stack-protector + 0.3.8 Magnus Granberg <zorry@gentoo.org> * gcc/configure Redone the -fstack-protector check. diff --git a/espf-gcc-4.5.0/README.history b/espf-gcc-4.5.0/README.history index 0acdc40..0aac21b 100644 --- a/espf-gcc-4.5.0/README.history +++ b/espf-gcc-4.5.0/README.history @@ -1,3 +1,17 @@ +0.3.9 14-04-2010 + 10_all_gcc44_configure.patch + - 50_all_gcc44_no_ssp_tls_uclibc.patch +0.3.8 10-04-2010 + 10_all_gcc44_configure.patch + 11_all_gcc44_config.in.patch + 20_all_gcc44_gcc.c.patch + 30_all_gcc44_espf.h.patch + +0.3.7 10-02-2010 + 20_all_gcc44_gcc.c.patch + 30_all_gcc44_espf.h.patch + 10_all_gcc44_configure.patch + 0.3.6 23-12-2009 - 10_all_gcc44_configure.patch + 10_all_gcc44_configure.patch |