public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-commits] proj/hardened-gccpatchset:master commit in: gcc-4.8.0/piepatch/
@ 2013-03-06 14:09 Magnus Granberg
  0 siblings, 0 replies; 5+ messages in thread
From: Magnus Granberg @ 2013-03-06 14:09 UTC (permalink / raw
  To: gentoo-commits

commit:     fc55d1faffb779b88195c3c2468b0834f6a9281d
Author:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
AuthorDate: Wed Mar  6 14:08:25 2013 +0000
Commit:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
CommitDate: Wed Mar  6 14:08:25 2013 +0000
URL:        http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-gccpatchset.git;a=commit;h=fc55d1fa

Add gcc 4.8.0 piepatchset

---
 gcc-4.8.0/piepatch/01_all_gcc48_configure.patch    |  158 +++++++++
 gcc-4.8.0/piepatch/02_all_gcc48_config.in.patch    |   32 ++
 gcc-4.8.0/piepatch/03_all_gcc48_Makefile.in.patch  |  130 +++++++
 gcc-4.8.0/piepatch/05_all_gcc47_gcc.c.patch        |   70 ++++
 .../piepatch/15_all_gcc44_decl-tls-model.patch     |   20 ++
 gcc-4.8.0/piepatch/16_all_gcc47_nopie_option.patch |   16 +
 .../piepatch/20_all_gcc46_config_crtbeginp.patch   |   36 ++
 gcc-4.8.0/piepatch/24_all_gcc44_invoke.texi.patch  |   44 +++
 .../33_all_gcc46_config_rs6000_linux64.h.patch     |   16 +
 .../34_all_gcc48_config_i386_gnu-user.patch        |   15 +
 gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch   |  135 ++++++++
 gcc-4.8.0/piepatch/README                          |   18 +
 gcc-4.8.0/piepatch/README.Changelog                |  359 ++++++++++++++++++++
 gcc-4.8.0/piepatch/README.Gentoo.patches           |   28 ++
 gcc-4.8.0/piepatch/README.history                  |  297 ++++++++++++++++
 15 files changed, 1374 insertions(+), 0 deletions(-)

diff --git a/gcc-4.8.0/piepatch/01_all_gcc48_configure.patch b/gcc-4.8.0/piepatch/01_all_gcc48_configure.patch
new file mode 100644
index 0000000..47a1a05
--- /dev/null
+++ b/gcc-4.8.0/piepatch/01_all_gcc48_configure.patch
@@ -0,0 +1,158 @@
+--- a/configure	2013-02-05 23:36:20.000000000 +0100
++++ b/configure	2013-02-12 01:59:04.000000000 +0100
+@@ -670,6 +670,7 @@
+ CFLAGS
+ CC
+ EXTRA_CONFIGARGS_LIBJAVA
++enable_esp
+ target_subdir
+ host_subdir
+ build_subdir
+@@ -748,6 +749,7 @@
+ enable_libquadmath
+ enable_libquadmath_support
+ enable_libada
++enable_esp
+ enable_libssp
+ enable_libstdcxx
+ enable_static_libjava
+@@ -1464,6 +1466,11 @@
+   --disable-libquadmath-support
+                           disable libquadmath support for Fortran
+   --enable-libada         build libada directory
++  --enable-esp            Enable Stack protector and Position independent
++                          executable as default if we have suppot for it when
++                          compiling and link with -z relro and -z now as
++                          default. Linux targets supported i*86, x86_64, x32,
++                          powerpc, powerpc64, ia64 and arm.
+   --enable-libssp         build libssp directory
+   --disable-libstdcxx     do not build libstdc++-v3 directory
+   --enable-static-libjava[=ARG]
+@@ -3068,6 +3075,24 @@
+   noconfigdirs="$noconfigdirs gnattools"
+ fi
+ 
++# Check whether --enable-esp was given and target have the support.
++# Check whether --enable-esp was given.
++if test "${enable_esp+set}" = set; then :
++  enableval=$enable_esp;
++  case $target in
++    i?86*-*-linux* | x86_64-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
++      enable_esp=yes
++      ;;
++    *)
++      { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: *** --enable-esp is not supported on this $target target." >&5
++$as_echo "$as_me: WARNING: *** --enable-esp is not supported on this $target target." >&2;}
++      ;;
++  esac
++
++fi
++
++
++
+ # Check whether --enable-libssp was given.
+ if test "${enable_libssp+set}" = set; then :
+   enableval=$enable_libssp; ENABLE_LIBSSP=$enableval
+@@ -14453,6 +14478,11 @@
+     esac ;;
+ esac
+ 
++# Disable -fstack-protector on stage1
++if test x$enable_esp = xyes; then
++  stage1_cflags="$stage1_cflags -fno-stack-protector"
++fi
++
+ 
+ 
+ # Enable --enable-checking in stage1 of the compiler.
+--- a/gcc/configure	2013-02-01 21:26:24.000000000 +0100
++++ b/gcc/configure	2013-02-12 01:59:20.000000000 +0100
+@@ -600,6 +600,8 @@
+ 
+ ac_subst_vars='LTLIBOBJS
+ LIBOBJS
++enable_crtbeginP
++enable_esp
+ enable_plugin
+ pluginlibs
+ CLOOGINC
+@@ -920,6 +922,7 @@
+ enable_plugin
+ enable_libquadmath_support
+ with_linker_hash_style
++enable_esp
+ '
+       ac_precious_vars='build_alias
+ host_alias
+@@ -1633,6 +1636,11 @@
+   --enable-plugin         enable plugin support
+   --disable-libquadmath-support
+                           disable libquadmath support for Fortran
++  --enable-esp            Enable Stack protector and Position independent
++                          executable as default if we have suppot for it when
++                          compiling and link with -z relro and -z now as
++                          default. Linux targets supported i*86, x86_64, x32,
++                          powerpc, powerpc64, ia64 and arm.
+ 
+ Optional Packages:
+   --with-PACKAGE[=ARG]    use PACKAGE [ARG=yes]
+@@ -27419,6 +27427,59 @@
+ 
+ fi
+ 
++# --------------
++# Esp checks
++# --------------
++
++# Check whether --enable-esp was given and target have the support.
++# Check whether --enable-esp was given.
++if test "${enable_esp+set}" = set; then :
++  enableval=$enable_esp; enable_esp=$enableval
++else
++  enable_esp=no
++fi
++
++if test $enable_esp = yes ; then
++  { $as_echo "$as_me:${as_lineno-$LINENO}: checking if $target support esp" >&5
++$as_echo_n "checking if $target support esp... " >&6; }
++  case "$target" in
++    i?86*-*-linux* | x86_64-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
++      enable_esp=yes
++
++$as_echo "#define ENABLE_ESP 1" >>confdefs.h
++
++      ;;
++    *)
++      enable_esp=no
++      ;;
++  esac
++{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $enable_esp" >&5
++$as_echo "$enable_esp" >&6; }
++fi
++
++if test $enable_esp = yes ; then
++  { $as_echo "$as_me:${as_lineno-$LINENO}: checking checking for crtbeginP.o support" >&5
++$as_echo_n "checking checking for crtbeginP.o support... " >&6; }
++    if test x$enable_esp = xyes ; then
++      case "$target" in
++        ia64*-*-linux*)
++          enable_crtbeginP=no ;;
++        *-*-linux*)
++          if test x$gcc_cv_ld_pie = xyes && test x$lt_cv_prog_compiler_static_works = xyes; then
++            enable_crtbeginP=yes
++
++$as_echo "#define ENABLE_CRTBEGINP 1" >>confdefs.h
++
++          fi
++          ;;
++        *) enable_crtbeginP=no ;;
++      esac
++    fi
++  { $as_echo "$as_me:${as_lineno-$LINENO}: result: $enable_crtbeginP" >&5
++$as_echo "$enable_crtbeginP" >&6; }
++fi
++
++
+ # Configure the subdirectories
+ # AC_CONFIG_SUBDIRS($subdirs)
+ 

diff --git a/gcc-4.8.0/piepatch/02_all_gcc48_config.in.patch b/gcc-4.8.0/piepatch/02_all_gcc48_config.in.patch
new file mode 100644
index 0000000..3b4747b
--- /dev/null
+++ b/gcc-4.8.0/piepatch/02_all_gcc48_config.in.patch
@@ -0,0 +1,32 @@
+2013-02-13	Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/config.in	Add ENABLE_CRTBEGINP, ENABLE_ESP
+
+--- gcc/config.in	2009-04-21 11:08:08.000000000 +0200
++++ gcc/config.in	2009-05-12 00:10:08.000000000 +0200
+@@ -46,6 +46,12 @@
+ #endif
+ 
+ 
++/* Define to 1 to enable crtbeginP.o. */
++#ifndef USED_FOR_TARGET
++#undef ENABLE_CRTBEGINP
++#endif
++
++
+ /* Define to 1 to specify that we are using the BID decimal floating point
+    format instead of DPD */
+ #ifndef USED_FOR_TARGET
+@@ -65,6 +65,12 @@
+ #endif
+ 
+ 
++/* Define to 1 to enable esp. */
++#ifndef USED_FOR_TARGET
++#undef ENABLE_ESP
++#endif
++
++
+ /* Define to 1 to enable fixed-point arithmetic extension to C. */
+ #ifndef USED_FOR_TARGET
+ #undef ENABLE_FIXED_POINT

diff --git a/gcc-4.8.0/piepatch/03_all_gcc48_Makefile.in.patch b/gcc-4.8.0/piepatch/03_all_gcc48_Makefile.in.patch
new file mode 100644
index 0000000..9f6c520
--- /dev/null
+++ b/gcc-4.8.0/piepatch/03_all_gcc48_Makefile.in.patch
@@ -0,0 +1,130 @@
+2012-01-17	Magnus Granberg		<zorry@gentoo.org>
+
+		* Makefile.in	We add -fno-stack-protector to BOOT_CFLAGS, LIBCFLAGS and
+			LIBCXXFLAGS if enable_esp yes.
+		* gcc/Makefile.in	Add -fno-PIE. to ALL_CFLAGS and
+			ALL_CXXFLAGS if enable_esp yes.
+			Echo enable_esp and enable_crtbeginP to tmp-libgcc.mvars.
+		* libgcc/Makefile.in	Add crtbeginP.o to EXTRA_PARTS if enable_crtbeginP yes
+			We add new file crtbeginP.o if enable_crtbeginP yes
+			Add -fno-PIE. to CRTSTUFF_CFLAGS.
+
+--- a/Makefile.in	2010-01-22 08:35:38.000000000 -0500
++++ b/Makefile.in	2010-02-07 15:10:59.000000000 -0500
+@@ -350,9 +350,17 @@
+ BUILD_PREFIX = @BUILD_PREFIX@
+ BUILD_PREFIX_1 = @BUILD_PREFIX_1@
+ 
++# Some stuff don't compile with SSP
++enable_esp = @enable_esp@
++ifeq ($(enable_esp),yes)
++ESP_NOSSP_CFLAGS = -fno-stack-protector
++else
++ESP_NOSSP_CFLAGS=
++endif
++
+ # Flags to pass to stage2 and later makes.  They are defined
+ # here so that they can be overridden by Makefile fragments.
+-BOOT_CFLAGS= -g -O2
++BOOT_CFLAGS= -g -O2 $(ESP_NOSSP_CFLAGS)
+ BOOT_LDFLAGS=
+ BOOT_ADAFLAGS=-gnatpg -gnata
+ 
+@@ -403,9 +403,9 @@
+ 
+ CFLAGS = @CFLAGS@
+ LDFLAGS = @LDFLAGS@
+-LIBCFLAGS = $(CFLAGS)
++LIBCFLAGS = $(CFLAGS) $(ESP_NOSSP_CFLAGS)
+ CXXFLAGS = @CXXFLAGS@
+-LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates
++LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates $(ESP_NOSSP_CFLAGS)
+ GOCFLAGS = $(CFLAGS)
+ 
+ TFLAGS =
+--- a/gcc/Makefile.in	2011-11-09 02:20:14.000000000 +0100
++++ b/gcc/Makefile.in	2011-12-24 22:28:08.864804375 +0100
+@@ -247,6 +247,14 @@ LINKER_FLAGS = $(CFLAGS)
+ endif
+ endif
+ 
++# We don't want to compile the compiler with -fPIE, it make PCH fail.
++enable_esp = @enable_esp@
++ifeq ($(enable_esp),yes)
++ESP_NOPIE_CFLAGS = -fno-PIE
++else
++ESP_NOPIE_CFLAGS=
++endif
++
+ # -------------------------------------------
+ # Programs which operate on the build machine
+ # -------------------------------------------
+@@ -974,12 +982,13 @@ INTERNAL_CFLAGS = -DIN_GCC @CROSS@
+ 
+ # This is the variable actually used when we compile. If you change this,
+ # you probably want to update BUILD_CFLAGS in configure.ac
+-ALL_CFLAGS = $(T_CFLAGS) $(CFLAGS-$@) \
++ALL_CFLAGS = $(ESP_NOPIE_CFLAGS) $(T_CFLAGS) $(CFLAGS-$@) \
+   $(CFLAGS) $(INTERNAL_CFLAGS) $(COVERAGE_FLAGS) $(WARN_CFLAGS) @DEFS@
+ 
+ # The C++ version.
+-ALL_CXXFLAGS = $(T_CFLAGS) $(CFLAGS-$@) $(CXXFLAGS) $(INTERNAL_CFLAGS) \
+-  $(COVERAGE_FLAGS) $(NOEXCEPTION_FLAGS) $(WARN_CXXFLAGS) @DEFS@
++ALL_CXXFLAGS = $(ESP_NOPIE_CFLAGS) $(T_CFLAGS) $(CFLAGS-$@) $(CXXFLAGS) \
++  $(INTERNAL_CFLAGS) $(COVERAGE_FLAGS) $(NOEXCEPTION_FLAGS) \
++  $(WARN_CXXFLAGS) @DEFS@
+ 
+ # Likewise.  Put INCLUDES at the beginning: this way, if some autoconf macro
+ # puts -I options in CPPFLAGS, our include files in the srcdir will always
+@@ -1814,6 +1823,8 @@ libgcc.mvars: config.status Makefile spe
+ 	echo GCC_CFLAGS = '$(GCC_CFLAGS)' >> tmp-libgcc.mvars
+ 	echo INHIBIT_LIBC_CFLAGS = '$(INHIBIT_LIBC_CFLAGS)' >> tmp-libgcc.mvars
+ 	echo TARGET_SYSTEM_ROOT = '$(TARGET_SYSTEM_ROOT)' >> tmp-libgcc.mvars
++	echo enable_esp = '$(enable_esp)' >> tmp-libgcc.mvars
++	echo enable_crtbeginP = '@enable_crtbeginP@' >> tmp-libgcc.mvars
+ 
+ 	mv tmp-libgcc.mvars libgcc.mvars
+ 
+--- a/libgcc/Makefile.in	2011-11-22 04:01:02.000000000 +0100
++++ b/libgcc/Makefile.in	2011-12-25 15:18:22.449610631 +0100
+@@ -219,6 +219,17 @@ else
+ DECNUMINC =
+ endif
+ 
++ifeq ($(enable_esp),yes)
++ESP_NOPIE_CFLAGS = -fno-PIE
++else
++ESP_NOPIE_CFLAGS=
++endif
++
++# We add crtbeginP.o to the EXTRA_PARTS list if enable_crtbeginP = yes
++ifeq ($(enable_crtbeginP),yes)
++EXTRA_PARTS += crtbeginP.o
++endif
++
+ # Options to use when compiling libgcc2.a.
+ #
+ LIBGCC2_DEBUG_CFLAGS = -g
+@@ -279,7 +290,7 @@ INTERNAL_CFLAGS = $(CFLAGS) $(LIBGCC2_CF
+ CRTSTUFF_CFLAGS = -O2 $(GCC_CFLAGS) $(INCLUDES) $(MULTILIB_CFLAGS) -g0 \
+   -finhibit-size-directive -fno-inline -fno-exceptions \
+   -fno-zero-initialized-in-bss -fno-toplevel-reorder -fno-tree-vectorize \
+-  -fno-stack-protector \
++  -fno-stack-protector $(ESP_NOPIE_CFLAGS) \
+   $(INHIBIT_LIBC_CFLAGS)
+ 
+ # Extra flags to use when compiling crt{begin,end}.o.
+@@ -966,6 +977,13 @@ crtendS$(objext): $(srcdir)/crtstuff.c
+ # This is a version of crtbegin for -static links.
+ crtbeginT$(objext): $(srcdir)/crtstuff.c
+ 	$(crt_compile) $(CRTSTUFF_T_CFLAGS) -c $< -DCRT_BEGIN -DCRTSTUFFT_O
++
++# This is a version of crtbegin for -static -fPIE links.
++ifeq ($(enable_crtbeginP),yes)
++crtbeginP$(objext): $(srcdir)/crtstuff.c
++	$(crt_compile) $(CRTSTUFF_T_CFLAGS_S) \
++	  -c $< -DCRT_BEGIN -DCRTSTUFFT_O -DCRTSTUFFS_O
++endif
+ endif
+ 
+ ifeq ($(CUSTOM_CRTIN),)

diff --git a/gcc-4.8.0/piepatch/05_all_gcc47_gcc.c.patch b/gcc-4.8.0/piepatch/05_all_gcc47_gcc.c.patch
new file mode 100644
index 0000000..7f5a5d4
--- /dev/null
+++ b/gcc-4.8.0/piepatch/05_all_gcc47_gcc.c.patch
@@ -0,0 +1,70 @@
+2012-06-22	Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/gcc.c								include esp.h
+		static const char *cc1_spec 			We set that in esp.h if ENABLE_ESP.
+		#ifdef EXTRA_SPECS:						Add ESP_EXTRA_SPECS
+
+--- gcc/gcc.c	2010-01-21 10:29:30.000000000 -0500
++++ gcc/gcc.c	2010-01-29 23:29:16.000000000 -0500
+@@ -44,6 +44,7 @@
+ #include "opts.h"
+ #include "params.h"
+ #include "vec.h"
++#include "config/esp.h" /* for --enable-esp support */
+ #include "filenames.h"
+ 
+ /* By default there is no special suffix for target executables.  */
+@@ -822,7 +823,9 @@
+ 
+ static const char *asm_debug;
+ static const char *cpp_spec = CPP_SPEC;
++#ifndef ENABLE_ESP
+ static const char *cc1_spec = CC1_SPEC;
++#endif
+ static const char *cc1plus_spec = CC1PLUS_SPEC;
+ static const char *link_gcc_c_sequence_spec = LINK_GCC_C_SEQUENCE_SPEC;
+ static const char *link_ssp_spec = LINK_SSP_SPEC;
+@@ -1699,18 +1705,23 @@
+   INIT_STATIC_SPEC ("sysroot_hdrs_suffix_spec",	&sysroot_hdrs_suffix_spec),
+ };
+ 
+-#ifdef EXTRA_SPECS		/* additional specs needed */
++/* EXTRA_SPECS needs to be defined  */
++#ifndef EXTRA_SPECS
++#define EXTRA_SPECS
++#endif
++
++/* EXTRA_SPECS and ESP_EXTRA_SPECS add additional specs */
+ /* Structure to keep track of just the first two args of a spec_list.
+-   That is all that the EXTRA_SPECS macro gives us.  */
++   That is all that the EXTRA_SPECS and ESP_EXTRA_SPECS macro gives us.  */
+ struct spec_list_1
+ {
+   const char *const name;
+   const char *const ptr;
+ };
+ 
+-static const struct spec_list_1 extra_specs_1[] = { EXTRA_SPECS };
++/* ESP_EXTRA_SPECS before EXTRA_SPECS  */
++static const struct spec_list_1 extra_specs_1[] = { ESP_EXTRA_SPECS, EXTRA_SPECS };
+ static struct spec_list *extra_specs = (struct spec_list *) 0;
+-#endif
+ 
+ /* List of dynamically allocates specs that have been defined so far.  */
+ 
+@@ -1798,7 +1809,6 @@
+   if (verbose_flag)
+     notice ("Using built-in specs.\n");
+ 
+-#ifdef EXTRA_SPECS
+   extra_specs = XCNEWVEC (struct spec_list, ARRAY_SIZE (extra_specs_1));
+ 
+   for (i = ARRAY_SIZE (extra_specs_1) - 1; i >= 0; i--)
+@@ -1811,7 +1821,6 @@
+       sl->ptr_spec = &sl->ptr;
+       next = sl;
+     }
+-#endif
+ 
+   for (i = ARRAY_SIZE (static_specs) - 1; i >= 0; i--)
+     {

diff --git a/gcc-4.8.0/piepatch/15_all_gcc44_decl-tls-model.patch b/gcc-4.8.0/piepatch/15_all_gcc44_decl-tls-model.patch
new file mode 100644
index 0000000..09438a0
--- /dev/null
+++ b/gcc-4.8.0/piepatch/15_all_gcc44_decl-tls-model.patch
@@ -0,0 +1,20 @@
+2009-06-13	Magnus Granberg		<zorry@ume.nu>
+		
+		b.g.o #232601
+		* gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib.
+
+--- gcc/varasm.c	2009-03-17 21:18:21.000000000 +0100
++++ gcc/varasm.c	2009-04-29 03:10:09.000000000 +0200
+@@ -5607,7 +5607,11 @@
+   bool is_local;
+ 
+   is_local = targetm.binds_local_p (decl);
+-  if (!flag_shlib)
++  #ifdef ENABLE_ESP
++    if (!flag_pic)
++  #else
++    if (!flag_shlib)
++  #endif
+     {
+       if (is_local)
+ 	kind = TLS_MODEL_LOCAL_EXEC;

diff --git a/gcc-4.8.0/piepatch/16_all_gcc47_nopie_option.patch b/gcc-4.8.0/piepatch/16_all_gcc47_nopie_option.patch
new file mode 100644
index 0000000..ed9a961
--- /dev/null
+++ b/gcc-4.8.0/piepatch/16_all_gcc47_nopie_option.patch
@@ -0,0 +1,16 @@
+2012-01-24	Magnus Granberg	<zorry@gentoo.org>
+
+		* gcc/common.opt		Add -nopie
+
+--- a/gcc/common.opt	2011-11-23 19:51:17.000000000 +0100
++++ b//gcc/common.opt	2012-01-24 16:56:24.302224357 +0100
+@@ -2280,6 +2280,9 @@ Driver
+ nodefaultlibs
+ Driver
+ 
++nopie
++Driver
++
+ nostartfiles
+ Driver
+ 

diff --git a/gcc-4.8.0/piepatch/20_all_gcc46_config_crtbeginp.patch b/gcc-4.8.0/piepatch/20_all_gcc46_config_crtbeginp.patch
new file mode 100644
index 0000000..0e716b0
--- /dev/null
+++ b/gcc-4.8.0/piepatch/20_all_gcc46_config_crtbeginp.patch
@@ -0,0 +1,36 @@
+2011-03-05		Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/config/gnu-user.h			If ENABLE_CRTBEGINP, -static and -pie use crtbegineP.o.
+		* gcc/config/rs6000/sysv4.h		If ENABLE_CRTBEGINP, -static and -pie use crtbegineP.o.
+
+--- gcc/config/gnu-user.h	2009-04-10 01:23:07.000000000 +0200
++++ gcc/config/gnu-user.h	2009-09-08 04:08:06.000000000 +0200
+@@ -39,7 +39,11 @@
+    provides part of the support for getting C++ file-scope static
+    object constructed before entering `main'.  */
+    
+-#if defined HAVE_LD_PIE
++#if defined (HAVE_LD_PIE) && defined (ENABLE_CRTBEGINP)
++#define GNU_USER_TARGET_STARTFILE_SPEC \
++  "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} crti.o%s \
++   %{static:%{pie:crtbeginP.o%s;:crtbeginT.o%s}} %{!static:%{shared|pie:crtbeginS.o%s;:crtbegin.o%s}}"
++#elif defined (HAVE_LD_PIE) && ! defined (ENABLE_CRTBEGINP)
+ #define GNU_USER_TARGET_STARTFILE_SPEC \
+   "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
+    crti.o%s %{static:crtbeginT.o%s;shared|pie:crtbeginS.o%s;:crtbegin.o%s}"
+--- gcc/config/rs6000/sysv4.h	2009-04-10 01:23:07.000000000 +0200
++++ gcc/config/rs6000/sysv4.h	2009-09-08 04:41:50.000000000 +0200
+@@ -883,7 +883,12 @@
+ %{!mnewlib: %{pthread:-lpthread} %{shared:-lc} \
+ %{!shared: %{profile:-lc_p} %{!profile:-lc}}}"
+ 
+-#ifdef HAVE_LD_PIE
++#if defined (HAVE_LD_PIE) && defined (ENABLE_CRTBEGINP)
++#define STARTFILE_LINUX_SPEC "\
++%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
++%{mnewlib:ecrti.o%s;:crti.o%s} \
++%{static:%{pie:crtbeginP.o%s;:crtbeginT.o%s}} %{!static:%{shared|pie:crtbeginS.o%s;:crtbegin.o%s}}"
++#elif defined (HAVE_LD_PIE) && ! defined (ENABLE_CRTBEGINP)
+ #define	STARTFILE_LINUX_SPEC "\
+ %{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
+ %{mnewlib:ecrti.o%s;:crti.o%s} \

diff --git a/gcc-4.8.0/piepatch/24_all_gcc44_invoke.texi.patch b/gcc-4.8.0/piepatch/24_all_gcc44_invoke.texi.patch
new file mode 100644
index 0000000..15b3417
--- /dev/null
+++ b/gcc-4.8.0/piepatch/24_all_gcc44_invoke.texi.patch
@@ -0,0 +1,44 @@
+2009-09-11		Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/doc/invoke.texi	Add NOTES about -fstack-protector-all, -pie and
+		-fPIE/-fpie when --enable-esp is enable, this options is on by default.
+
+--- gcc/doc/invoke.texi	2009-04-01 09:18:47.000000000 +0200
++++ gcc/doc/invoke.texi	2009-06-18 14:08:38.000000000 +0200
+@@ -7134,6 +7134,11 @@
+ @opindex fstack-protector-all
+ Like @option{-fstack-protector} except that all functions are protected.
+ 
++NOTE: When --enable-esp this option is enabled by default 
++for C, C++, ObjC, ObjC++, if neither @option{-fno-stack-protector}
++or @option{-nostdlib} or @option{-nodefaultlibs} or 
++@option{-fstack-protector} are found.
++
+ @item -fsection-anchors
+ @opindex fsection-anchors
+ Try to reduce the number of symbolic address calculations by using
+@@ -7960,6 +7965,12 @@
+ that were used to generate code (@option{-fpie}, @option{-fPIE},
+ or model suboptions) when you specify this option.
+ 
++NOTE: When --enable-esp this option is enabled by default
++for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE}
++or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or
++@option{-nostartfiles} or @option{-shared} or @option{-pg} or @option{-p}
++are found.
++
+ @item -rdynamic
+ @opindex rdynamic
+ Pass the flag @option{-export-dynamic} to the ELF linker, on targets
+@@ -15889,6 +15910,11 @@
+ @code{__pie__} and @code{__PIE__}.  The macros have the value 1
+ for @option{-fpie} and 2 for @option{-fPIE}.
+ 
++NOTE: When --enable-esp this option is enabled by default
++for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE}
++or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or
++@option{-nostartfiles} or @option{-shared} are found.
++
+ @item -fno-jump-tables
+ @opindex fno-jump-tables
+ Do not use jump tables for switch statements even where it would be

diff --git a/gcc-4.8.0/piepatch/33_all_gcc46_config_rs6000_linux64.h.patch b/gcc-4.8.0/piepatch/33_all_gcc46_config_rs6000_linux64.h.patch
new file mode 100644
index 0000000..bfd7b75
--- /dev/null
+++ b/gcc-4.8.0/piepatch/33_all_gcc46_config_rs6000_linux64.h.patch
@@ -0,0 +1,16 @@
+2011-03-05		Peter S. Mazinger	<ps.m@gmx.net>, Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/config/rs6000/linux64.h	ASM_SPEC32 Change %{fpic:-K PIC} %{fPIC:-K PIC}
+		to %{fpic|fPIC|fpie|fPIE:-K PIC}
+
+--- gcc/config/rs6000/linux64.h.psm	2009-04-10 01:23:07.000000000 +0200
++++ gcc/config/rs6000/linux64.h	2009-09-23 12:34:26.000000000 +0200
+@@ -162,7 +162,7 @@
+ #endif
+ 
+ #define ASM_SPEC32 "-a32 \
+-%{mrelocatable} %{mrelocatable-lib} %{fpic:-K PIC} %{fPIC:-K PIC} \
++%{mrelocatable} %{mrelocatable-lib} %{fpic|fPIC|fpie|fPIE:-K PIC} \
+ %{memb} %{!memb: %{msdata=eabi: -memb}} \
+ %{!mlittle: %{!mlittle-endian: %{!mbig: %{!mbig-endian: \
+     %{mcall-freebsd: -mbig} \

diff --git a/gcc-4.8.0/piepatch/34_all_gcc48_config_i386_gnu-user.patch b/gcc-4.8.0/piepatch/34_all_gcc48_config_i386_gnu-user.patch
new file mode 100644
index 0000000..b7cdfd4
--- /dev/null
+++ b/gcc-4.8.0/piepatch/34_all_gcc48_config_i386_gnu-user.patch
@@ -0,0 +1,15 @@
+2013-02-13  Magnus Granberg <zorry@gentoo.org>
+
+	* gcc/config/i386/gnu-user. Add ESP_DRIVER_SELF_SPEC
+	to DRIVER_SELF_SPECS if ENABLE_ESP defined.
+
+--- a/gcc/config/i386/gnu-user-common.h	2013-01-10 21:38:27.000000000 +0100
++++ b/gcc/config/i386/gnu-user-common.h	2013-02-14 00:51:44.689637605 +0100
+@@ -70,3 +70,7 @@ along with GCC; see the file COPYING3.
+
+ /* Static stack checking is supported by means of probes.  */
+ #define STACK_CHECK_STATIC_BUILTIN 1
++
++#ifdef ENABLE_ESP
++#define DRIVER_SELF_SPECS ESP_DRIVER_SELF_SPEC
++#endif

diff --git a/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch b/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch
new file mode 100644
index 0000000..cbb594e
--- /dev/null
+++ b/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch
@@ -0,0 +1,135 @@
+2013-02-14  Magnus Granberg  <zorry@gentoo.org>
+
+	* gcc/esp.h	New file to support --enable-esp
+	Version 20120214.1
+
+--- gcc/config/esp.h	2010-04-09 16:14:00.000000000 +0200
++++ gcc/config/esp.h	2012-06-23 01:00:31.248348491 +0200
+@@ -0,0 +1,127 @@
++/* License terms see GNU GENERAL PUBLIC LICENSE Version 3.
++ * Version 20130214.1
++ * Magnus Granberg (Zorry) <zorry@gentoo.org>  */
++#ifndef GCC_ESP_H
++#define GCC_ESP_H
++
++/*	This file will add -fstack-protector-all, -fPIE, -pie and -z now 
++	as default if the defines and the spec allow it.
++	Added a hack for gcc-specs-* in toolchain-funcs.eclass and _filter-hardened in flag-o-matic.eclass
++	to support older hardened GCC patches and we don't need to change the code on gcc-specs-* and _filter-hardened.
++	This will add some unsupported upstream commands options as -nopie and -nonow.
++	-D__KERNEL__ is added so we don't have -fPIE, -pie and -fstack-protector-all when building kernels.
++	ESP_CC1_SPEC is added to CC1_SPEC.
++	ESP_CC1_STRICT_OVERFLOW_SPEC is added so we don't disable the strict-overflow check.
++	ESP_LINK_PIE_CHECK_SPEC check for -pie, -p, -pg, -profile and -static.
++	ENABLE_CRTBEGINP add support for crtbeginP.o, build -static with -fPIE or -fpie.
++*/
++#ifdef ENABLE_ESP
++	
++	/* Hack to support gcc-specs-* in toolchain-funcs.eclass and _filter-hardened in flag-o-matic.eclass  */
++	#define ESP_CC1_SPEC " %(esp_cc1_ssp) %(esp_cc1_pie) %(esp_cc1_strict_overflow)"
++	#if defined ( EFAULT_SSP ) || defined ( EFAULT_PIE_SSP )
++		#define ESP_CC1_SSP_SPEC "%{!fno-stack-protector: %{!fno-stack-protector-all: }}"
++	#else
++		#define ESP_CC1_SSP_SPEC ""
++	#endif
++	#if defined ( EFAULT_PIE ) || defined ( EFAULT_PIE_SSP )
++		#define ESP_CC1_PIE_SPEC "%{!nopie: }"
++	#else
++		#define ESP_CC1_PIE_SPEC ""
++	#endif
++	#define ESP_CC1_STRICT_OVERFLOW_SPEC "%{!fstrict-overflow:%{!fno-strict-overflow: -fno-strict-overflow}}"
++
++	/*	ESP_LINK_SPEC is added to LINK_PIE_SPEC if esp is enable
++		-z now will be added if we don't have -vanilla spec. We do a -pie incompatible check
++		Don't remove the specs in the end  */
++	#define ESP_LINK_SPEC "%(esp_link_now) %(esp_link_pie_check) "
++	#define ESP_LINK_NOW_SPEC "%{!nonow:-z now}"
++
++	/*	We use ESP_ESP_DRIVER_SELF_SPEC to add pie and ssp command-line options.  */
++	#define ESP_DRIVER_SELF_SPEC "%{D__KERNEL__:;:%{!nopie:%(esp_options_pie) \
++		%(esp_link_pie)} %(esp_options_ssp) }"
++	
++	/*  This will add -fstack-protector-all if we don't have -nostdlib -nodefaultlibs -fno-stack-protector -fstack-protector
++		-fstack-protector-all and we have EFAULT_SSP or EFAULT_PIE_SSP defined.  */
++	#if defined ( EFAULT_SSP ) || defined ( EFAULT_PIE_SSP )
++		#define ESP_OPTIONS_SSP_SPEC \
++			"%{nostdlib|nodefaultlibs|fno-stack-protector| \
++			fstack-protector|fstack-protector-all:;:-fstack-protector-all}"
++	#else
++		#define ESP_OPTIONS_SSP_SPEC ""
++	#endif
++
++	/* If EFAULT_PIE or EFAULT_PIE_SSP is defined we will add -fPIE -pie  */
++	#if defined ( EFAULT_PIE ) || defined ( EFAULT_PIE_SSP )
++
++		/*  This will add -fPIE if we don't have -pie -fpic -fPIC -fpie -fPIE -fno-pic -fno-PIC -fno-pie -fno-PIE -shared -static
++			-nostdlib -nostartfiles.  */
++		/*  With ENABLE_CRTBEGINP we don't need to check for -static  */
++		#ifdef ENABLE_CRTBEGINP
++			#define ESP_OPTIONS_PIE_SPEC \
++				"%{!pie: %{!fpic:%{!fPIC:%{!fpie:%{!fPIE: %{!fno-pic:%{!fno-PIC:%{!fno-pie:%{!fno-PIE: \
++				%{!shared: %{!nostdlib: %{!nostartfiles:-fPIE}} } }}}} }}}} }"
++		#else
++			#define ESP_OPTIONS_PIE_SPEC \
++				"%{!pie: %{!fpic:%{!fPIC:%{!fpie:%{!fPIE: %{!fno-pic:%{!fno-PIC:%{!fno-pie:%{!fno-PIE: \
++				%{!shared: %{!static: %{!nostdlib: %{!nostartfiles:-fPIE}} } }}}} }}}} }}"
++		#endif
++
++		/*  This will add -pie if we don't have -pie -A -fno-pic -fno-PIC -fno-pie -fno-PIE -shared -static -r -nostdlib 
++			-nostartfiles  */
++		/*  With ENABLE_CRTBEGINP we don't need to check for -static
++			and we add -pie only to get the start and endfiles. -pie will not go to the linker. */
++		#ifdef ENABLE_CRTBEGINP
++			#define ESP_LINK_PIE_SPEC \
++				"%{!pie:%{!A:%{!fno-pie:%{!fno-PIE:%{!fno-pic:%{!fno-PIC:%{!shared:%{!r: \
++				%{!nostdlib:%{!nostartfiles:-pie}}}}}}}}}}"
++		#else
++			#define ESP_LINK_PIE_SPEC \
++				"%{!pie:%{!A:%{!fno-pie:%{!fno-PIE:%{!fno-pic:%{!fno-PIC:%{!shared:%{!static:%{!r: \
++				%{!nostdlib:%{!nostartfiles:-pie}}}}}}}}}}}"
++		#endif
++		
++		/*  This will check if -pie is set when (-static) -pg -p -profile. If set it will make gcc print out
++			"-pie and (static)|pg|p|profile are incompatible when linking"  */
++		/*  With ENABLE_CRTBEGINP we don't need to check for -static  */
++		#ifdef ENABLE_CRTBEGINP
++			#define ESP_LINK_PIE_CHECK_SPEC \
++				"%{pie:%{pg|p|profile:%e-pie and -pg|p|profile are incompatible when linking}}"
++		#else
++			#define ESP_LINK_PIE_CHECK_SPEC \
++				"%{pie:%{static|pg|p|profile:%e-pie and -static|pg|p|profile are incompatible when linking}}"
++		#endif
++
++		/*  We don't pass -pie to the linker when -static.  */
++		#ifdef ENABLE_CRTBEGINP
++			#define LINK_PIE_SPEC "%{!static:%{pie:-pie}} %(esp_link)"
++		#else
++			#define LINK_PIE_SPEC "%{pie:-pie} %(esp_link)"
++		#endif
++
++	#else
++		#define ESP_OPTIONS_PIE_SPEC ""
++		#define ESP_LINK_PIE_CHECK_SPEC ""
++		#define ESP_LINK_PIE_SPEC ""
++		#define LINK_PIE_SPEC "%{pie:-pie} %(esp_link)"
++	#endif
++
++	/*  We add extra spec name's to the EXTRA_SPECS list  */
++	#define ESP_EXTRA_SPECS \
++		{ "esp_cc1",								ESP_CC1_SPEC },					\
++		{ "esp_cc1_pie",							ESP_CC1_PIE_SPEC },				\
++		{ "esp_cc1_ssp",							ESP_CC1_SSP_SPEC },				\
++		{ "esp_cc1_strict_overflow",					ESP_CC1_STRICT_OVERFLOW_SPEC },	\
++		{ "esp_link",								ESP_LINK_SPEC },				\
++		{ "esp_link_now",							ESP_LINK_NOW_SPEC },			\
++		{ "esp_link_pie",							ESP_LINK_PIE_SPEC },			\
++		{ "esp_link_pie_check",						ESP_LINK_PIE_CHECK_SPEC },		\
++		{ "esp_driver_self",							ESP_DRIVER_SELF_SPEC },		\
++		{ "esp_options_pie",						ESP_OPTIONS_PIE_SPEC },			\
++		{ "esp_options_ssp",						ESP_OPTIONS_SSP_SPEC }
++
++	static const char *esp_driver_self_spec = ESP_DRIVER_SELF_SPEC;
++	static const char *cc1_spec = CC1_SPEC ESP_CC1_SPEC;
++
++#endif
++#endif /* End GCC_ESP_H */

diff --git a/gcc-4.8.0/piepatch/README b/gcc-4.8.0/piepatch/README
new file mode 100644
index 0000000..f322ab8
--- /dev/null
+++ b/gcc-4.8.0/piepatch/README
@@ -0,0 +1,18 @@
+This work started with bugs #94325 #100689 #106222 #149292 #149649 and the overlay on http://overlays.gentoo.org/dev/kevquinn.
+By Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY and mentor.
+
+The work stalled. Some threads on the Gentoo forum started to do their own fixes to get it working.
+Xake started the thread where most of the new work is done: "How long until hardened and toolchain will produce a hardened gcc4?"
+http://forums.gentoo.org/viewtopic-t-668885.html. I joined the thread and started to code.
+
+We started with the pieworld code from kevquinn's overlay. The PIE and minispecs part hit the tree later on.
+With GCC 4.4.0 I was willing to do some code cleanup, use built-in specs and add it as --enable-esp in the
+configure command line.
+
+Thank you all:
+Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY, Xake, Dwokfur,
+KernelOfTruth, SteveL, nixnut, Hopeless, forsaken1, XioXous, obrut<-, mv, qjim, Tommy[D], Genewb, radegand,
+unk, neuron, alexxy, hellboi64, likewhoa, g0rg0n, costel78, polsas, 7v5w7go9ub0o, uberpinguin, Naib, cilly,
+bonsaikitten, kerframil, agaffney, Gordon Malm, blueness, Matthias Klose, Kees Cook, mentor, Anarchy,
+devurandom and everyone else for helping to test, suggestions, fixes and anything else we have missed.
+/2009-00-09 Magnus Grenberg (Zorry) <zorry@ume.nu>

diff --git a/gcc-4.8.0/piepatch/README.Changelog b/gcc-4.8.0/piepatch/README.Changelog
new file mode 100644
index 0000000..009e128
--- /dev/null
+++ b/gcc-4.8.0/piepatch/README.Changelog
@@ -0,0 +1,359 @@
+0.5.4 Magnus Granberg		<zorry@gentoo.org>
+
+		#436924
+		* configure.ac			Add --enable-esp.  Add -fno-stack-protector
+		to stage1_cflags.
+		* gcc/configure.ac		Add --enable-esp and check if SSP works.
+		Define ENABLE_ESP ENABLE_ESP_SSP.
+		Check if we support crtbeginP and define ENABLE_CRTBEGINP.
+		* gcc/configure			Fix a typo
+		
+0.5.3 Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/configure			Clean up the checks and added
+			check for uclibc ssp support.
+		* gcc/config.in				Add define for ENABLE_ESP_SSP
+		* gcc/esp.h				Check for ENABLE_ESP_SSP
+
+0.5.2 Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/common.opt 			Add -nopie
+
+0.5.1 Magnus Granberg		<zorry@gentoo.org>
+
+		* configure				Bumped for 4.7.0 release
+		* gcc/configure			Bumped for 4.7.0 release and
+			added some checks.
+		* gcc/Makefile				Bumped for 4.7.0 release
+		* gcc/gcc.c				Bumped for 4.7.0 release
+		* libgcc/Makefile			Bumped for 4.7.0 release
+
+0.5.0 Magnus Granberg		<zorry@gentoo.org>
+
+		#393321
+		* gcc/Makefile.in			Rename crtbeginTS.o to crtbeginP.o
+		* gcc/config/gnu-user.h		Rename crtbeginTS.o to crtbeginP.o
+		* gcc/config/rs6000/sysv4.h	Rename crtbeginTS.o to crtbeginP.o
+		* gcc/esp.h				Rename crtbeginTS.o to crtbeginP.o
+		* gcc/configure			Rename crtbeginTS.o to crtbeginP.o
+		* gcc/config.in				Rename crtbeginTS.o to crtbeginP.o
+		* libgcc/Makefile.in			Rename crtbeginTS.o to crtbeginP.o
+
+0.4.9 Magnus Granberg		<zorry@gentoo.org>
+
+		#380823
+		* gcc/Makefile.in			added ESP_NOPIE_CFLAGS to ALL_CXXFLAGS
+
+0.4.8 Magnus Granberg		<zorry@gentoo.org>
+	      
+	      * gcc/objc/lang-specs.h		Bumped for gcc 4.6.0 release
+	      * gcc/objcp/lang-specs.h		Bumped for gcc 4.6.0 release
+	      * gcc/cp/lang-specs.h			Bumped for gcc 4.6.0 release
+
+0.4.7	Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/gcc.c					Add %(esp_options) and %(esp_cpp_options)
+		* gcc/esp.h					Use the esp.h patch from gcc-4.4 patchset
+		* gcc/config/rs6000/linux64.h	Bumed for >2011-02-26 snapshot
+		* gcc/objc/lang-specs.h		Add %(esp_options)
+		* gcc/objcp/lang-specs.h		Add %(esp_options)
+		* gcc/cp/lang-specs.h			Add %(esp_options)
+		* gcc/config/gnu-user.h		Add crtbeginTS.o support
+	      
+0.4.6	Magnus Granberg		<zorry@gentoo.org>
+
+		* Makefile.in				Bumped for gcc 4.6
+		* gcc/Makefile.in			Bumped for gcc 4.6
+		added ESP_NOPIE_CFLAGS to ALL_CFLAGS
+		remove any ESP_NOSSP_CFLAGS
+		remove any ESP_NOPIE_CFLAGS from crt* when not needed
+		* gcc/gcc.c				Bumped for gcc 4.6
+		moved espf_options_ssp  to espf_command_options_spec
+		* gcc/esp.h				Added espf_options_ssp to espf_cc1_command_spec
+		* gcc/config/rs6000/linux64.h	Bumped for gcc 4.6
+		* gcc/config/linux.h			Bumped for gcc 4.6
+
+0.4.5	Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/config/rs6000/sysv4.h		Fix a typo in the static spec rules
+
+0.4.4	Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/esp.h			Renamed ESP_CC1_STRICT_SPEC to  ESP_CC1_STRICT_OVERFLOW_SPEC
+		Renamed	ESP_OPTIONS_PIE_CHECK_SPEC to ESP_LINK_PIE_CHECK_SPEC
+
+0.4.3	Magnus Granberg		<zorry@gentoo.org>
+
+		#299061 b.g.o
+		* gcc/gcc.c			removed the pie incompatible specs rule call
+		* gcc/esp.h			Move the -pie incompatible check to esp_link
+		remove the -shared incompatible check
+
+0.4.2	Magnus granberg		<zorry@gentoo.org>
+
+		* configure			remove the changes from 0.4.1
+		* Makefile.in		remove the changes from 0.4.1 remove -fstack-protector check.
+		* gcc/configure		remove the changes from 0.4.1
+		* gcc/config.in		remove the changes from 0.4.1 remove HAVE_GCC_SSP
+		* gcc/Makefile		remove the changes from 0.4.1
+		* gcc/esp.h			change HAVE_GCC_LD_PIE to (EFAULT_PIE || EFAULT_PIE_SSP)
+		change HAVE_GCC_SSP to (EFAULT_SSP || EFAULT_PIE_SSP)
+		* libmudflap/Makefiles.in remove the changes from 0.4.1
+
+0.4.1	Magnus Granberg		<zorry@gentoo.org>
+
+		*configure						removed check for --enable-esp removed enable_esp
+		added check for --enable-esp=(no|all|nopie|nossp). added enable_esp_set
+		*Makefile.in					renamed enable_esp to enable_esp_set
+		*gcc/configure					removed check for --enable-esp removed enable_esp
+		added check for --enable-esp=(no|all|nopie|nossp). added enable_esp_set
+		added a -fPIE -pie check. change AC_COMPILE_IFELSE to AC_LINK_IFELSE in the
+		-fstack-protector check.
+		* gcc/config.in					Added HAVE_GCC_LD_PIE
+		*gcc/Makefile.in				renamed enable_esp to enable_esp_set
+		*gcc/esp.h						Renamed HAVE_LD_PIE to HAVE_GCC_LD_PIE
+		Added HAVE_GCC_LD_PIE to #define ESP_CC1_PIE_SPEC. Move ESP_COMMAND_OPTIONS_SPEC
+		* libmudflap/Makefiles.in		In enable_esp change ifeq to ifdef.
+
+		#293843 b.g.o
+		*gcc/esp.h						Added -nonow to the -z now specs.
+		
+0.4.0	Anthony G. Basile	<basile@opensource.dyc.edu>
+
+		rename espf to esp and change espf-patchset to piepatchset
+
+0.3.9	Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/configure					Added check for TLS on the target in the SSP check.
+
+		#149292 b.g.o
+		* gcc/config/i386/linux.h		Removed uclibc don't support TLS on stack-protector
+		* gcc/config/i386/linux64.h		Removed uclibc don't support TLS on stack-protector
+		* gcc/config/rs6000/linux.h		Removed uclibc don't support TLS on stack-protector
+		* gcc/config/i386/linux.h		Removed uclibc don't support TLS on stack-protector
+		* gcc/config/sparc/linux.h		Removed uclibc don't support TLS on stack-protector
+		* gcc/config/sparc/linux64.h	Removed uclibc don't support TLS on stack-protector
+
+0.3.8	Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/configure					Redone the -fstack-protector check.
+		* gcc/config.in					Added HAVE_GCC_SSP
+		* gcc/gcc.c						Removed code for espf_link_spec in X
+		* gcc/espf.h					Added ifdef HAVE_GCC_SSP, change code for espf_link_spec and link_pie_spec
+
+0.3.7_beta	Anthony G. Basile	<basile@opensource.dyc.edu>
+
+		* gcc/configure					Check if -fstack-protector is supported by gcc on ARCH
+		Updated AC_SUBST enable_espf
+		* gcc/Makefile.in				Remove the fix for $(out_object_file): ix86_split_to_parts() stack smashing attack b.g.o #149292.
+		* gcc/gcc.c						Updaded the .c .cc compiler specs.
+
+0.3.6	Magnus Granberg		<zorry@ume.nu>
+
+		* configure						Check --enable-espf change ppc* to powerpc*, powerpc64 and add ia64.
+		* gcc/configure					Don't check for -z,relro on ia64. Disable crtbeginTS for ia64.
+		* gcc/espf.h					ia64 don't support -fstack-protector*
+
+0.3.5	Maguns Granberg		<zorry@ume.nu>
+
+		* gcc/espf.h					Change the specs for crtbegin.TS.o.
+		* gcc/gcc.c						Rename espf_cc1_options to espf_options_pie_check.
+		* gcc/config/linux.h			Fix typos ENABLE_CRTBEGINS to ENABLE_CRTBEGINTS
+		* gcc/config/rs6000/linux64.h	ASM_SPEC32: %{fpic:-K PIC} %{fPIC:-K PIC} to
+		%{fpic|fPIC|fpie|fPIE:-K PIC}
+
+0.3.4	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/configure					Add crtbeginTS.o support.
+		* gcc/Makefile.in				Add crtbeginTS.o support.
+		* gcc/gcc.c						Add espf_cc1_options.
+		* gcc/espf.h					Added espf_cc1_options, crtbeginTS.o support,
+		espf_cc1_options and espf_cc1_strictoverflow.
+		* gcc/config.in					Add crtbeginTS.o support.
+		* gcc/config/linux.h			Add crtbeginTS.o support.
+		* gcc/config/rs6000/sysv4.h		Add crtbeginTS.o support.
+		* gcc/doc/invoke.texi			Add NOTES about -fstack-protector-all,
+		-pie and -fPIE.
+		* libgcc/Makefile.in			Add crtbeginTS.o support.
+
+0.3.3	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/opts.c		change #ifdef ENABLE_ESPF to #ifndef ENABLE_ESPF
+
+0.3.2	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/opts.c		disable flag_delete_null_pointer_checks >= -O2
+		* gcc/espf.h		add ESPF_CC1_SSP_SPEC and ESPF_CC1_PIE_SPEC to fix bugs on -vanilla spec
+
+		#149292 b.g.o
+		* gcc/config/i386/linux.h		uclibc don't support TLS on stack-protector
+		* gcc/config/i386/linux64.h		uclibc don't support TLS on stack-protector
+		* gcc/config/rs6000/linux.h		uclibc don't support TLS on stack-protector
+		* gcc/config/i386/linux.h		uclibc don't support TLS on stack-protector
+		* gcc/config/sparc/linux.h		uclibc don't support TLS on stack-protector
+		* gcc/config/sparc/linux64.h	uclibc don't support TLS on stack-protector
+
+0.3.1	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/cp/Make-lang.in	cc1plus: pch test fail when cc1plus is compile with -fPIE.
+		* gcc/configure			fix --enable-espf when USE"-hardened"
+
+4.4.1-espf-0.3.0	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/espf.h	add ESPF_LINK_SPEC ESPF_LINK_NOW_SPEC
+		* gcc/gcc.c		move	do_self_spec (espf_command_options_spec)
+		do_spec_1()		add espf_link_spec
+
+0.3.0	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/objc/lang-specs.h		Add %(espf_options)
+		* gcc/objcp/lang-specs.h	Add %(espf_options)
+		* gcc/cp/lang-specs.h		Add %(espf_options)
+		* gcc/config.in				removed ENABLE_LIBSSP
+		* Makefile.in	We add -fno-stack-protector to
+		BOOT_CFLAGS, LIBCFLAGS and LIBCXXFLAGS
+		cc1: pch.exp test fail when cc1 is compile with -fPIE
+		* libmudflap/Makefiles.in	Add -fno-stack-protector -U_FORTIFY_SOURCE
+		to AM_CFLAGS
+		* configure		add --enable-espf
+		add -fno-stack-protector to stage1_cflags
+		add targes ppc* arm sparc*
+		* gcc/configure		change code for check --enable-espf
+		* libmudflap/configure add enable_espf
+		* gcc/espf.h	ESPF_CC1_OPTIONS_SPEC renamed to ESPF_OPTIONS_SPEC
+		add ESPF_CPP_OPTIONS_SPEC ESPF_COMMAND_OPTIONS_SPEC
+		ESPF_CC1_OPTIONS_SSP_SPEC renamed to ESPF_OPTIONS_SSP_SPEC
+		ESPF_COMPILER_COMMAND_PIE_SPEC renamed to ESPF_OPTIONS_PIE_SPEC
+		ESPF_LINK_COMMAND_PIE_SPEC renamed to ESPF_LINK_PIE_SPEC
+		add !p !pg to ESPF_LINK_PIE_SPEC
+		removed ESPF_LINK_SPEC ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC
+		* gcc/gcc.c		cpp_options		add %(espf_cpp_options)
+		compiler spec	add %(espf_options)
+		change code for ESPF_EXTRA_SPECS
+		process_command():			Check for lazy, or now
+		do_spec_1():				Add -z now and -z relro
+		main()						add do_self_spec (espf_command_options_spec)
+		removed do_self_spec (espf_cc1_command_spec) do_self_spec (espf_link_command_spec)
+
+0.2.9	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/espf.h		add ESPF_COMPILER_COMMAND_PIE_SPEC
+		add ESPF_LINK_COMMAND_PIE_SPEC
+		change ESPF_COMPILER_COMMAND_SPEC ESPF_LINK_COMMAND_SPEC
+
+0.2.8	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/configure				removed check crtbeginTS.o
+		* gcc/espf.h	added notes
+		add ESPF_CC1_SPEC
+		removed ESPF_CPP_UNIQUE_OPTIONS espf_override_options()
+		* gcc/gcc.c					cc1_spec	Set it to CC1_SPEC if ! ENABLE_ESPF
+		* gcc/toplev.c				removed ESPF_OVERRIDE_OPTIONS
+
+0.2.7	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/opts.c	(decode_options):		Remove flag_strict_overflow as opt2
+		* gcc/config.in				removed HAVE_CRTBEGINTS
+		* gcc/Makefile				removed crtbeginTS.o
+		* libgcc/Makefile.in		removed crtbeginTS.o
+		* gcc/config/i386/i386.h	removed espf_override_options ESPF_EXTRA_SPECS
+		* gcc/config/linux.h		remoevd crtbeginTS.o
+		* gcc/espf.h		ESPF_CC1_OPTIONS_PIE_SPEC renamed to ESPF_CC1_COMMAND_SPEC
+		* gcc/gcc.c					add ESPF_EXTRA_SPECS
+		main()			add do_self_spec (espf_cc1_command_spec)
+
+0.2.6	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/config/i386/i386.h	add espf_override_options() to OVERRIDE_OPTIONS
+		* gcc/espf.h				add espf_override_options()
+		* gcc/toplev.c				add ESPF_OVERRIDE_OPTIONS
+
+0.2.5	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/config/i386/i386.h	removed espf_cc1
+		* gcc/config/i386/linux.h	removed espf_cc1 %(crtend_gen)
+		* gcc/config/i386/x86-64.h  removed espf_cc1 %(crtend_gen)
+		* gcc/config/linux.h  		removed espf_cc1 %(crtfile_gen) 
+		%(crtbegin_t_gen) %(crtend_gen)
+		add crtbeginTS.o
+		* gcc/config.in				removed TARGET_LIBC_PROVIDES_PIE
+		add HAVE_CRTBEGINTS
+		* gcc/Makefile.in	add ESPF_NOPIE_CFLAGS ESPF_NOSSP_CFLAGS to
+		CRTSTUFF_T_CFLAGS 
+		add ESPF_NOSSP_CFLAGS to CRTSTUFF_T_CFLAGS_S
+		* espf.h	ESPF_CC1_SPEC renamed to ESPF_CC1_OPTIONS_SPEC
+		add ESPF_LINK_SPEC
+		ESPF_CC1_SSP_SPEC renamed to ESPF_CC1_OPTIONS_SSP_SPEC
+		ESPF_CC1_PIE_SPEC renamed to ESPF_CC1_OPTIONS_PIE_SPEC
+		ESPF_CC1_OPTIONS_SPEC renamed to ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC
+		LINK_PIE_SPEC renamed to ESPF_LINK_COMMAND_SPEC
+		removed ESPF_CC1_STRICT_SPEC CRTFILE_GEN_SPEC CRTBEGIN_GEN_SPEC
+		CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC
+		* gcc/configure 	remove TARGET_LIBC_PROVIDES_PIE
+		define HAVE_CRTBEGINTS
+		* gcc/gcc.c			LINK_COMMAND_SPEC add %(espf_link)
+		main()			add do_self_spec (espf_link_command_spec)
+
+0.2.4	Magnus Granberg		<zorry@ume.nu>
+
+		libgcc/Makefile.in clean specs
+
+0.2.3	Magnus Granberg		<zorry@ume.nu>
+
+		*gcc/espf.h			add ESPF_CC1_STRICT_SPEC
+
+0.2.2	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/config/i386/i386.h 	Add espf_cc1
+		Add ESPF_EXTRA_SPECS
+		* gcc/config/i386/linux.h	Add espf_cc1
+		* gcc/config/i386/x86-64.h  Add espf_cc1
+		* gcc/config/linux.h  Add espf_cc1
+		* gcc/Makefile.in	add crtbeginTS.o to EXTRA_PARTS list
+		* libgcc/Makefile.in	add crtbeginTS.o to EXTRA_PARTS list
+		* gcc/configure 	add define ENABLE_LIBSSP
+		* gcc/gcc.c  %(fortify_default) renamed to %(espf_cpp_unique_options)
+		%(pie_incompatible) renamed to %(espf_cc1_options)
+		removed ESPF_EXTRA_SPECS
+		* gcc/espf.h	ESPF_DEFAULT_SPEC renamed to ESPF_CC1_SPEC
+		SSP_DEFAULT_SPEC renamed to ESPF_CC1_SSP_SPEC
+		FORTIFY_DEFAULT_SPEC renamed to ESPF_CPP_UNIQUE_OPTIONS
+		PIE_DEFAULT_SPEC renamed to ESPF_CC1_PIE_SPEC
+		PIE_INCOMPATIBLE_SPEC renamed to ESPF_CC1_OPTIONS_SPEC
+		add new CRTFILE_GEN_SPEC CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC if !
+		TARGET_LIBC_PROVIDES_PIE
+
+4.4.0-espf-0.2.1	Magnus Granberg		<zorry@ume.nu>
+
+		* gcc/gcc.c		include:	espf.h
+		cc1_spec 	= CC1_SPEC if not ENABLE_ESPF
+		cpp_unique_options			add %(fortify_default)
+		cc1_options					add %(pie_incompatible)
+		EXTRA_SPECS					add ESPF_EXTRA_SPECS
+		* libgcc/Makefile.in		add crtbeginTs.o
+		gcc/Makefile.in				add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS
+		LIBGCC2_CFLAGS				add ESPF_NOSSP_CFLAGS
+		CRTSTUFF_CFLAGS				add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS
+		crtbegin*					add crtbeginTS
+		$(out_object_file): ix86_split_to_parts() stack smashing attack b.g.o #149292
+		* libgcc/configure			add enable_espf
+		* gcc/config/linux.h		add %(crtfile_gen) %(crtbegin_t_gen) %(crtend_gen)
+		* gcc/config/i386/linux.h	add %(crtend_gen)
+		* gcc/config/i386/linux64.h	add %(crtend_gen)
+		* gcc/config.gcc	extra_parts		add crtbeginTS.o
+		* libgcc/config.host	extra_parts		add crtbeginTS.o
+		* gcc/configure		check -z relro
+		check -z now
+		check FORTIFY_SOURCES level 2
+		check Scrt1.o
+		check --enable-espf
+		check crtbeginTS.o
+		* gcc/espf.h			new file
+		* gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib
+		* gcc/config.in				add ENABLE_LIBSSP
+		add ENABLE_ESPF
+		add TARGET_LIBC_PROVIDES_FORTIFY2
+		add TARGET_LIBC_PROVIDES_PIE
+		* configure		define ENABLE_LIBSSP
+
+gcc-4.3.3-piepatches-v10.2.1

diff --git a/gcc-4.8.0/piepatch/README.Gentoo.patches b/gcc-4.8.0/piepatch/README.Gentoo.patches
new file mode 100644
index 0000000..db43079
--- /dev/null
+++ b/gcc-4.8.0/piepatch/README.Gentoo.patches
@@ -0,0 +1,28 @@
+ ================
+ === W[hat]TF ===
+ ================
+
+Gentoo patchsets that have grown too large to keep on the rsync mirrors have 
+been moved to our git tree.  From there, we bundle up all the whee little 
+patches into a tarball and distribute it via our public mirroring system.
+
+If you want specific info about a patch (like wtf it does or whose great idea 
+it was to change the code), read the patch !  We try to fill out the top of 
+them with useful info such as what it does, why it's needed, bug reports, 
+original creators, etc...  For simple patches, we reserve the right to assume 
+your IQ is greater than absolute 0 and figure out what it does w/out an 
+explanation.  If, by some miracle of science, it falls below the absolute 0 
+mark, you should help mankind by finding some scientists and letting them 
+probe you with their ... erm ... probes.
+
+ =================
+ === W[here]TF ===
+ =================
+
+For those with git access
+git://git.overlays.gentoo.org/proj/hardened-gccpatchset.git
+
+For those w/out git access, this URL should help you:
+http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-gccpatchset.git;a=summary
+
+It should be pretty easy to find your way around, you're a big boy after all.

diff --git a/gcc-4.8.0/piepatch/README.history b/gcc-4.8.0/piepatch/README.history
new file mode 100644
index 0000000..82b2ee3
--- /dev/null
+++ b/gcc-4.8.0/piepatch/README.history
@@ -0,0 +1,297 @@
+0.5.4		02 Oct 2012
+		U 01_all_gcc47_configure.patch
+		+  01_all_gcc47_configure.ac.patch
+0.5.3		06 Apr 2012
+		U 01_all_gcc47_configure.patch
+		+ 02_all_gcc47_config.in.patch
+		- 02_all_gcc45_config.in.patch
+		+ 06_all_gcc46_esp.h.patch
+		- 06_all_gcc45_esp.h.patch
+0.5.2		24 Jan 2012
+		+ 16_all_gcc47_nopie_option.patch
+0.5.1		17 Jan 2012
+		+ 01_all_gcc47_configure.patch
+		- 10_all_gcc45_configure.patch
+		+ 03_all_gcc47_Makefile.in.patch
+		- 12_all_gcc46_Makefile.in.patch
+		+ 02_all_gcc45_config.in.patch
+		- 11_all_gcc45_config.in.patch
+		+ 05_all_gcc46_gcc.c.patch
+		- 20_all_gcc46_gcc.c.patch
+		+ 06_all_gcc45_esp.h.patch
+		- 30_all_gcc45_esp.h.patch
+		+ 10_all_gcc46_default-ssp.patch
+		- 22_all_gcc46-default-ssp.patch
+		+ 15_all_gcc44_decl-tls-model.patch
+		- 21_all_gcc44_decl-tls-model.patch
+		+ 20_all_gcc46_config_crtbeginp.patch
+		- 35_all_gcc46_config_crtbegints.patch
+		+ 24_all_gcc44_invoke.texi.patch
+		+ 60_all_gcc44_invoke.texi.patch
+0.5.0		07 Dec 2011
+		+ 35_all_gcc46_config_crtbeginp.patch
+		- 35_all_gcc46_config_crtbegints.patch
+		U 10_all_gcc45_configure.patch
+		U 12_all_gcc46_Makefile.in.patch
+		+ 11_all_gcc45_config.in.patch
+		- 11_all_gcc44_config.in.patch
+		+ 30_all_gcc45_esp.h.patch
+		- 30_all_gcc44_esp.h.patch
+0.4.9		09 Nov 2011
+		U 12_all_gcc46_Makefile.in.patch
+0.4.8		26 Mar 2011
+		U 22_all_gcc46-default-ssp.patch
+0.4.7		05 Mar 2011
+		U 20_all_gcc46_gcc.c.patch
+		+ 22_all_gcc46-default-ssp.patch
+		- 30_all_gcc46_esp.h.patch
+		+ 30_all_gcc44_esp.h.patch
+		U 33_all_gcc46_config_rs6000_linux64.h.patch
+		U 35_all_gcc46_config_crtbegints.patch
+0.4.6		07 Jan 2011
+		+ 12_all_gcc46_Makefile.in.patch
+		- 12_all_gcc44_Makefile.in.patch
+		+ 20_all_gcc46_gcc.c.patch
+		- 20_all_gcc44_gcc.c.patch
+		+ 30_all_gcc46_esp.h.patch
+		- 30_all_gcc44_esp.h.patch
+		+ 33_all_gcc46_config_rs6000_linux64.h.patch
+		- 33_all_gcc45_config_rs6000_linux64.h.patch
+		+ 35_all_gcc46_config_crtbegints.patch
+		- 35_all_gcc44_config_crtbegints.patch
+		- 40_all_gcc44_obj_lang-specs.h.patch
+		- 40_all_gcc44_objp_lang-specs.h.patch
+		- 40_all_gcc44_cp_lang-specs.h.patch
+0.4.5		18 Jun 2010
+		U 35_all_gcc44_config_crtbegints.patch
+0.4.4		26 May 2010
+		U 30_all_gcc44_esp.h.patch
+0.4.3		26 May 2010
+		U 20_all_gcc44_gcc.c.patch
+		U 30_all_gcc44_esp.h.patch
+0.4.2		24 May 2010
+		U 10_all_gcc44_configure.patch
+		U 12_all_gcc44_Makefile.in.patch
+		U 11_all_gcc44_config.in.patch
+		U 30_all_gcc44_esp.h.patch
+0.4.1		29 Apr 2010
+		U 10_all_gcc45_configure.patch
+		U 12_all_gcc45_Makefile.in.patch
+		U 11_all_gcc44_config.in.patch
+		U 30_all_gcc44_esp.h.patch
+
+0.4.0		19 Apr 2010
+		U 10_all_gcc45_configure.patch
+		U 12_all_gcc45_Makefile.in.patch
+		U 11_all_gcc44_config.in.patch
+		U 20_all_gcc45_gcc.c.patch
+		- 30_all_gcc44_espf.h.patch
+		+ 30_all_gcc44_esp.h.patch
+
+0.3.9	14 Apr 2010
+		U 10_all_gcc45_configure.patch
+		- 50_all_gcc44_no_ssp_tls_uclibc.patch
+		U 33_all_gcc45_config_rs6000_linux64.h.patch
+
+0.3.8	10 Apr 2010
+		10_all_gcc44_configure.patch
+		11_all_gcc44_config.in.patch
+		20_all_gcc44_gcc.c.patch
+		30_all_gcc44_espf.h.patch
+
+0.3.7	10 Feb 2010
+		20_all_gcc44_gcc.c.patch
+		30_all_gcc44_espf.h.patch
+		10_all_gcc44_configure.patch
+
+0.3.6		23 Dec 2009
+		- 10_all_gcc44_configure.patch
+		+ 10_all_gcc44_configure.patch
+		- 30_all_gcc44_espf.h.patch
+		+ 30_all_gcc44_espf.h.patch
+		- README.Changelog
+		+ README.Changelog
+		- README.history
+		+ README.history
+		- README
+		+ README
+
+0.3.5		24 Sep 2009
+		- 30_all_gcc44_espf.h.patch
+		+ 30_all_gcc44_espf.h.patch
+		- 35_all_gcc44_config_crtbegints.patch
+		+ 35_all_gcc44_config_crtbegints.patch
+		+ 33_all_gcc44_config_rs6000_linux64.h.patch
+		- README.Changelog
+		+ README.Changelog
+		- README.history
+		+ README.history
+		+ README.Gentoo.patches
+
+0.3.4		11 Sep 2009
+		- 10_all_gcc44_configure.patch
+		+ 10_all_gcc44_configure.patch
+		- 11_all_gcc44_config.in.patch
+		+ 11_all_gcc44_config.in.patch
+		- 12_all_gcc44_Makefile.in.patch
+		+ 12_all_gcc44_Makefile.in.patch
+		- 20_all_gcc44_gcc.c.patch
+		+ 20_all_gcc44_gcc.c.patch
+		- 23_all_gcc44_opts.c.patch
+		- 30_all_gcc44_espf.h.patch
+		+ 30_all_gcc44_espf.h.patch
+		+ 35_all_gcc44_config_crtbegints.patch
+		+ 60_all_gcc44_invoke.texi.patch
+		- README.Changelog
+		+ README.Changelog
+		- README.history
+		+ README.history
+		- README
+		+ README
+		
+0.3.3		14 Aug 2009
+		- 23_all_gcc44_opts.c.patch
+		+ 23_all_gcc44_opts.c.patch
+
+0.3.2		09 Aug 2009
+		+ 50_all_gcc44_no_ssp_tls_uclibc.patch
+		+ README.Changelog
+		+ README.history
+		- 23_all_gcc44_opts.c.patch
+		+ 23_all_gcc44_opts.c.patch
+		- 30_all_gcc44-espf.h.patch
+		+ 30_all_gcc44-espf.h.patch
+
+0.3.1		23 Jul 2009
+		- 10_all_gcc44_configure.patch
+		+ 10_all_gcc44_configure.patch
+
+0.3.0		23 Jul 2009
+		- 10_all_gcc44_configure.patch
+		+ 10_all_gcc44_configure.patch
+		- 11_all_gcc44_config.in.patch
+		+ 11_all_gcc44_config.in.patch
+		- 12_all_gcc44_Makefile.in.patch
+		+ 12_all_gcc44_Makefile.in.patch
+		- 20_all_gcc44_gcc.c.patch
+		+ 20_all_gcc44_gcc.c.patch
+		+ 40_all_gcc44_obj_lang-specs.h.patch
+		+ 40_all_gcc44_objp_lang-specs.h.patch
+		+ 40_all_gcc44_cp_lang-specs.h.patch
+		- 50_all_gcc44_gentoo_v20090614.1.patch
+		- 30_all_gcc44-espf.h.patch
+		+ 30_all_gcc44-espf.h.patch
+
+0.2.9		14 Jun 2009
+		- 12_all_gcc44_Makefile.in.patch
+		+ 12_all_gcc44_Makefile.in.patch
+		- 30_all_gcc44-espf.h.patch
+		+ 30_all_gcc44-espf.h.patch
+		- 50_all_gcc44_gentoo_v20090612.2.patch
+		+ 50_all_gcc44_gentoo_v20090614.1.patch
+
+0.2.8		12 Jun 2009
+		- 10_all_gcc44_configure.patch
+		+ 10_all_gcc44_configure.patch
+		- 11_all_gcc44_config.in.patch
+		+ 11_all_gcc44_config.in.patch
+		- 12_all_gcc44_Makefile.in.patch
+		+ 12_all_gcc44_Makefile.in.patch
+		- 22_all_gcc44-toplev.c.patch
+		- 25_all_gcc44-espf.h.patch
+		+ 30_all_gcc44-espf.h.patch
+		+ 50_all_gcc44_gentoo_v20090612.2.patch
+
+0.2.7		29 May 2009
+		- 11_all_gcc44_config.in.patch
+		+ 11_all_gcc44_config.in.patch
+		- 12_all_gcc44_Makefile.in.patch
+		+ 12_all_gcc44_Makefile.in.patch
+		- 20_all_gcc44_gcc.c.patch
+		+ 20_all_gcc44_gcc.c.patch
+		+ 23_all_gcc44_opts.c.patch
+		- 25_all_gcc44-espf.h.patch
+		+ 25_all_gcc44-espf.h.patch
+		- 30_all_gcc44-config-defaul-linux.patch
+
+0.2.6		28 May 2009
+		+ 22_all_gcc44-toplev.c.patch
+		- 25_all_gcc44-espf.h.patch
+		+ 25_all_gcc44-espf.h.patch
+		- 30_all_gcc44-config-defaul-linux.patch
+		+ 30_all_gcc44-config-defaul-linux.patch
+
+0.2.5		27 May 2009
+		- 10_all_gcc44_configure.patch
+		+ 10_all_gcc44_configure.patch
+		- 12_all_gcc44_Makefile.in.patch
+		+ 12_all_gcc44_Makefile.in.patch
+		- 20_all_gcc44_gcc.c.patch
+		+ 20_all_gcc44_gcc.c.patch
+		- 25_all_gcc44-espf.h.patch
+		+ 25_all_gcc44-espf.h.patch
+		- 30_all_gcc44-config-defaul-linux.patch
+		+ 30_all_gcc44-config-defaul-linux.patch
+		- 40_all_gcc44-gentoo.patch
+
+0.2.4		08 May 2009
+		- 12_all_gcc44_Makefile.in.patch
+		+ 12_all_gcc44_Makefile.in.patch
+
+0.2.3		08 May 2009
+		- 20_all_gcc44_gcc.c.patch
+		+ 20_all_gcc44_gcc.c.patch
+		- 40_all_gcc44-gentoo.patch
+		+ 40_all_gcc44-gentoo.patch
+
+0.2.2		04 May 2009
+		+ 10_all_gcc44_configure.patch
+		+ 11_all_gcc44_config.in.patch
+		+ 12_all_gcc44_Makefile.in.patch
+		+ 20_all_gcc44_gcc.c.patch
+		+ 21_all_gcc44_decl-tls-model.patch
+		+ 25_all_gcc44-espf.h.patch
+		+ 30_all_gcc44-config-defaul-linux.patch
+		+ 40_all_gcc44-gentoo.patch
+		- 01_all_gcc44-configure.patch
+		- 10_all_gcc44-gcc_configure.patch
+		- 11_all_gcc44-gcc_config.in.patch
+		- 12_all_gcc44-gcc_config.gcc.patch
+		- 13_all_gcc44-gcc_Makefile.in.patch
+		- 15_all_gcc44-libgcc_config.host.patch
+		- 16_all_gcc44-libgcc_configure.patch
+		- 17_all_gcc44-libgcc_Makefile.in.patch
+		- 21_all_gcc44-gcc_espf.h.patch
+		- 22_all_gcc44-gcc_gcc.c.patch
+		- 23_all_gcc44-gcc_varasm.c.patch
+		- 30_all_gcc44-add-crt-start-endfiles-linux.patch
+
+0.2.1		28 Apr 2009
+		+ 01_all_gcc44-configure.patch
+		+ 10_all_gcc44-gcc_configure.patch
+		+ 11_all_gcc44-gcc_config.in.patch
+		+ 12_all_gcc44-gcc_config.gcc.patch
+		+ 13_all_gcc44-gcc_Makefile.in.patch
+		+ 15_all_gcc44-libgcc_config.host.patch
+		+ 16_all_gcc44-libgcc_configure.patch
+		+ 17_all_gcc44-libgcc_Makefile.in.patch
+		+ 21_all_gcc44-gcc_espf.h.patch
+		+ 22_all_gcc44-gcc_gcc.c.patch
+		+ 23_all_gcc44-gcc_varasm.c.patch
+		+ 30_all_gcc44-add-crt-start-endfiles-linux.patch
+		- 00_all_gcc4.4-cvs-incompat.patch
+		- 05_all_gcc4.4-compile-no-ssp.patch
+		- 10_all_gcc4.4-hardened-minispecs-support.patch
+		- 11_all_gcc4.4-decl-tls-model.patch
+		- 12_all_gcc4.4-fortify-minispecs-support.patch
+		- 20-all_gcc4.4-default-crt-start-endfile.patch
+		- 30-all_gcc4.4-crtbeginTS-fno-PIE.patch
+
+0.1.0		16 Apr 2009
+		+ 00_all_gcc4.4-cvs-incompat.patch
+		+ 05_all_gcc4.4-compile-no-ssp.patch
+		+ 10_all_gcc4.4-hardened-minispecs-support.patch
+		+ 11_all_gcc4.4-decl-tls-model.patch
+		+ 12_all_gcc4.4-fortify-minispecs-support.patch
+		+ 20-all_gcc4.4-default-crt-start-endfile.patch
+		+ 30-all_gcc4.4-crtbeginTS-fno-PIE.patch


^ permalink raw reply related	[flat|nested] 5+ messages in thread

* [gentoo-commits] proj/hardened-gccpatchset:master commit in: gcc-4.8.0/piepatch/
@ 2013-03-10 22:07 Magnus Granberg
  0 siblings, 0 replies; 5+ messages in thread
From: Magnus Granberg @ 2013-03-10 22:07 UTC (permalink / raw
  To: gentoo-commits

commit:     f058f56f572212bf0d9016b4a256081a68eb8c20
Author:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
AuthorDate: Sun Mar 10 22:07:04 2013 +0000
Commit:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
CommitDate: Sun Mar 10 22:07:04 2013 +0000
URL:        http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-gccpatchset.git;a=commit;h=f058f56f

add mips support for gcc 4.8

---
 gcc-4.8.0/piepatch/36_all_gcc48_config_mips.patch |   38 +++++++++++++++++++++
 1 files changed, 38 insertions(+), 0 deletions(-)

diff --git a/gcc-4.8.0/piepatch/36_all_gcc48_config_mips.patch b/gcc-4.8.0/piepatch/36_all_gcc48_config_mips.patch
new file mode 100644
index 0000000..74b856a
--- /dev/null
+++ b/gcc-4.8.0/piepatch/36_all_gcc48_config_mips.patch
@@ -0,0 +1,38 @@
+--- a/gcc/config/mips/gnu-user.h	2013-01-10 21:38:27.000000000 +0100
++++ b/gcc/config/mips/gnu-user.h	2013-03-10 22:37:33.743176388 +0100
+@@ -125,9 +125,16 @@ extern const char *host_detect_local_cpu
+   "%{mabi=64:%{!msym32:%<mplt}}"
+ 
+ #undef DRIVER_SELF_SPECS
++#ifdef ENABLE_ESP
+ #define DRIVER_SELF_SPECS \
+   BASE_DRIVER_SELF_SPECS, \
++  ESP_DRIVER_SELF_SPEC, \
+   LINUX_DRIVER_SELF_SPECS
++# else
++#define DRIVER_SELF_SPECS \
++  BASE_DRIVER_SELF_SPECS, \
++  LINUX_DRIVER_SELF_SPECS
++#endif
+ 
+ /* Similar to standard Linux, but adding -ffast-math support.  */
+ #undef	GNU_USER_TARGET_MATHFILE_SPEC
+--- a/gcc/config/mips/gnu-user64.h	2013-01-10 21:38:27.000000000 +0100
++++ b/gcc/config/mips/gnu-user64.h	2013-03-10 22:32:11.209166777 +0100
+@@ -26,9 +26,16 @@ along with GCC; see the file COPYING3.
+   " %{!mabi=*: -" MULTILIB_ABI_DEFAULT "}"
+ 
+ #undef DRIVER_SELF_SPECS
++#ifdef ENABLE_ESP
+ #define DRIVER_SELF_SPECS \
+   BASE_DRIVER_SELF_SPECS, \
++  ESP_DRIVER_SELF_SPEC, \
+   LINUX64_DRIVER_SELF_SPECS
++# else
++#define DRIVER_SELF_SPECS \
++  BASE_DRIVER_SELF_SPECS, \
++  LINUX64_DRIVER_SELF_SPECS
++#endif
+ 
+ #undef GNU_USER_TARGET_LINK_SPEC
+ #define GNU_USER_TARGET_LINK_SPEC "\


^ permalink raw reply related	[flat|nested] 5+ messages in thread

* [gentoo-commits] proj/hardened-gccpatchset:master commit in: gcc-4.8.0/piepatch/
@ 2013-04-01  0:06 Magnus Granberg
  0 siblings, 0 replies; 5+ messages in thread
From: Magnus Granberg @ 2013-04-01  0:06 UTC (permalink / raw
  To: gentoo-commits

commit:     6f5e4b98cc380044417dec3a4c5aa461e92d2a47
Author:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
AuthorDate: Mon Apr  1 00:05:18 2013 +0000
Commit:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
CommitDate: Mon Apr  1 00:05:18 2013 +0000
URL:        http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-gccpatchset.git;a=commit;h=6f5e4b98

commit what gose in to gcc 4.8 piepatchset 0.5.5 in tree

---
 gcc-4.8.0/piepatch/01_all_gcc48_configure.patch    |  124 ++++++++++++++++++--
 gcc-4.8.0/piepatch/05_all_gcc48_gcc.c.patch        |   25 ++++
 .../piepatch/33_all_gcc48_config_rs6000.patch      |   47 ++++++++
 gcc-4.8.0/piepatch/34_all_gcc48_config_i386.patch  |   56 +++++++++
 gcc-4.8.0/piepatch/35_all_gcc48_config_arm.patch   |   34 ++++++
 gcc-4.8.0/piepatch/36_all_gcc48_config_mips.patch  |   23 ++++
 gcc-4.8.0/piepatch/37_all_gcc48_config_ia64.patch  |   30 +++++
 gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch   |    2 +-
 gcc-4.8.0/piepatch/README                          |    4 +-
 gcc-4.8.0/piepatch/README.Changelog                |   24 ++++
 gcc-4.8.0/piepatch/README.history                  |   19 +++
 11 files changed, 377 insertions(+), 11 deletions(-)

diff --git a/gcc-4.8.0/piepatch/01_all_gcc48_configure.patch b/gcc-4.8.0/piepatch/01_all_gcc48_configure.patch
index 47a1a05..1d3b429 100644
--- a/gcc-4.8.0/piepatch/01_all_gcc48_configure.patch
+++ b/gcc-4.8.0/piepatch/01_all_gcc48_configure.patch
@@ -1,3 +1,111 @@
+2013-04-01  Magnus Granberg <zorry@gentoo.org>
+
+	* configure.ac		Add --enable-esp.  Add -fno-stack-protector
+	to stage1_cflags.
+	* configure		Regenerated
+	* gcc/configure.ac		Add --enable-esp and define ENABLE_ESP.
+	Check if we support crtbeginP and define ENABLE_CRTBEGINP.
+	* gcc/configure	Regenerated
+
+--- a/configure.ac	2011-11-29 22:36:43.000000000 +0100
++++ b/configure.ac	2011-12-07 23:29:26.125712475 +0100
+@@ -419,6 +419,26 @@ if test "${ENABLE_LIBADA}" != "yes" ; th
+   noconfigdirs="$noconfigdirs gnattools"
+ fi
+ 
++# Check whether --enable-esp was given and target have the support.
++AC_ARG_ENABLE([esp],
++[AS_HELP_STRING([--enable-esp],
++               [Enable Stack protector and Position independent executable as
++                default if we have suppot for it when compiling
++                and link with -z relro and -z now as default.
++                Linux targets supported i*86, x86_64, x32,
++                powerpc, powerpc64, ia64, arm and mips.])],
++[
++  case $target in
++    i?86*-*-linux* | x86_64-*-linux* | powerpc*-*-linux* | mips-*-linux* | arm*-*-linux* | ia64-*-linux*)
++      enable_esp=yes
++      ;;
++    *)
++      AC_MSG_WARN([*** --enable-esp is not supported on this $target target.])
++      ;;
++  esac
++])
++AC_SUBST([enable_esp])
++
+ AC_ARG_ENABLE(libssp,
+ [AS_HELP_STRING([--enable-libssp], [build libssp directory])],
+ ENABLE_LIBSSP=$enableval,
+@@ -3211,6 +3230,11 @@ if test "$GCC" = yes -a "$ENABLE_BUILD_W
+   CFLAGS="$saved_CFLAGS"
+ fi
+ 
++# Disable -fstack-protector on stage1
++if test x$enable_esp = xyes; then
++  stage1_cflags="$stage1_cflags -fno-stack-protector"
++fi
++
+ AC_SUBST(stage1_cflags)
+ 
+ # Enable --enable-checking in stage1 of the compiler.
+--- a/gcc/configure.ac	2011-11-18 11:52:32.000000000 +0100
++++ b/gcc/configure.ac	2012-10-02 17:39:15.649526241 +0200
+@@ -5130,6 +5237,55 @@ if test x"${LINKER_HASH_STYLE}" != x; th
+                                          [The linker hash style])
+ fi
+ 
++# --------------
++# Esp checks
++# --------------
++
++# Check whether --enable-esp was given and target have the support.
++AC_ARG_ENABLE([esp],
++[AS_HELP_STRING([--enable-esp],
++               [Enable Stack protector and Position independent executable as
++                default if we have suppot for it when compiling
++                and link with -z now as default.
++                Linux targets supported i*86, x86_64, x32,
++                powerpc, powerpc64, ia64, arm and mips.])],
++  enable_esp=$enableval,
++  enable_esp=no)
++if test $enable_esp = yes ; then
++  AC_MSG_CHECKING(if $target support esp)
++  case "$target" in
++    i?86*-*-linux* | x86_64-*-linux* | powerpc*-*-linux* | mips-*-linux* | arm*-*-linux* | ia64-*-linux*)
++      enable_esp=yes
++      AC_DEFINE(ENABLE_ESP, 1,
++        [Define if your target support esp and you have enable it.])
++      ;;
++    *)
++      enable_esp=no
++      ;;
++  esac
++AC_MSG_RESULT($enable_esp)
++fi
++AC_SUBST([enable_esp])
++if test $enable_esp = yes ; then
++  AC_MSG_CHECKING(checking for crtbeginP.o support)
++    if test x$enable_esp = xyes ; then
++      case "$target" in
++        ia64*-*-linux*)
++          enable_crtbeginP=no ;;
++        *-*-linux*)
++          if test x$gcc_cv_ld_pie = xyes && test x$lt_cv_prog_compiler_static_works = xyes; then
++            enable_crtbeginP=yes
++            AC_DEFINE(ENABLE_CRTBEGINP, 1,
++              [Define if your compiler will support crtbeginP.])
++          fi
++          ;;
++        *) enable_crtbeginP=no ;;
++      esac
++    fi
++  AC_MSG_RESULT($enable_crtbeginP)
++fi
++AC_SUBST([enable_crtbeginP])
++
+ # Configure the subdirectories
+ # AC_CONFIG_SUBDIRS($subdirs)
+ 
 --- a/configure	2013-02-05 23:36:20.000000000 +0100
 +++ b/configure	2013-02-12 01:59:04.000000000 +0100
 @@ -670,6 +670,7 @@
@@ -22,9 +130,9 @@
    --enable-libada         build libada directory
 +  --enable-esp            Enable Stack protector and Position independent
 +                          executable as default if we have suppot for it when
-+                          compiling and link with -z relro and -z now as
-+                          default. Linux targets supported i*86, x86_64, x32,
-+                          powerpc, powerpc64, ia64 and arm.
++                          compiling and link with and -z now as default.
++                          Linux targets supported i*86, x86_64, x32,
++                          powerpc, powerpc64, ia64, arm and mips.
    --enable-libssp         build libssp directory
    --disable-libstdcxx     do not build libstdc++-v3 directory
    --enable-static-libjava[=ARG]
@@ -37,7 +145,7 @@
 +if test "${enable_esp+set}" = set; then :
 +  enableval=$enable_esp;
 +  case $target in
-+    i?86*-*-linux* | x86_64-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
++    i?86*-*-linux* | x86_64-*-linux* | powerpc*-*-linux* | mips*-*-linux* | arm*-*-linux* | ia64-*-linux*)
 +      enable_esp=yes
 +      ;;
 +    *)
@@ -90,9 +198,9 @@
                            disable libquadmath support for Fortran
 +  --enable-esp            Enable Stack protector and Position independent
 +                          executable as default if we have suppot for it when
-+                          compiling and link with -z relro and -z now as
-+                          default. Linux targets supported i*86, x86_64, x32,
-+                          powerpc, powerpc64, ia64 and arm.
++                          compiling and link with -z now as default.
++                          Linux targets supported i*86, x86_64, x32,
++                          powerpc, powerpc64, ia64, arm and mips.
  
  Optional Packages:
    --with-PACKAGE[=ARG]    use PACKAGE [ARG=yes]
@@ -116,7 +224,7 @@
 +  { $as_echo "$as_me:${as_lineno-$LINENO}: checking if $target support esp" >&5
 +$as_echo_n "checking if $target support esp... " >&6; }
 +  case "$target" in
-+    i?86*-*-linux* | x86_64-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
++    i?86*-*-linux* | x86_64-*-linux* | powerpc*-*-linux* | mips*-*-linux* | arm*-*-linux* | ia64-*-linux*)
 +      enable_esp=yes
 +
 +$as_echo "#define ENABLE_ESP 1" >>confdefs.h

diff --git a/gcc-4.8.0/piepatch/05_all_gcc48_gcc.c.patch b/gcc-4.8.0/piepatch/05_all_gcc48_gcc.c.patch
new file mode 100644
index 0000000..b92607b
--- /dev/null
+++ b/gcc-4.8.0/piepatch/05_all_gcc48_gcc.c.patch
@@ -0,0 +1,25 @@
+2013-03-24	Magnus Granberg		<zorry@gentoo.org>
+
+		* gcc/gcc.c								include esp.h
+		static const char *cc1_spec 			We set that in esp.h if ENABLE_ESP.
+
+--- gcc/gcc.c	2010-01-21 10:29:30.000000000 -0500
++++ gcc/gcc.c	2010-01-29 23:29:16.000000000 -0500
+@@ -44,6 +44,7 @@
+ #include "opts.h"
+ #include "params.h"
+ #include "vec.h"
++#include "config/esp.h" /* for --enable-esp support */
+ #include "filenames.h"
+ 
+ /* By default there is no special suffix for target executables.  */
+@@ -822,7 +823,9 @@
+ 
+ static const char *asm_debug;
+ static const char *cpp_spec = CPP_SPEC;
++#ifndef ENABLE_ESP
+ static const char *cc1_spec = CC1_SPEC;
++#endif
+ static const char *cc1plus_spec = CC1PLUS_SPEC;
+ static const char *link_gcc_c_sequence_spec = LINK_GCC_C_SEQUENCE_SPEC;
+ static const char *link_ssp_spec = LINK_SSP_SPEC;

diff --git a/gcc-4.8.0/piepatch/33_all_gcc48_config_rs6000.patch b/gcc-4.8.0/piepatch/33_all_gcc48_config_rs6000.patch
new file mode 100644
index 0000000..25e704f
--- /dev/null
+++ b/gcc-4.8.0/piepatch/33_all_gcc48_config_rs6000.patch
@@ -0,0 +1,47 @@
+2013-03-26  Peter S. Mazinger	<ps.m@gmx.net>, Magnus Granberg <zorry@gentoo.org>
+
+	* gcc/config/rs6000/linux64.h (ASM_SPEC32): Change %{fpic:-K PIC} %{fPIC:-K PIC}
+	to %{fpic|fPIC|fpie|fPIE:-K PIC}
+	* gcc/config/rs6000/sysv4.h (DRIVER_SELF_SPECS): Add ESP_DRIVER_SELF_SPECS.
+	(SUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
+
+--- a/gcc/config/rs6000/linux64.h.psm	2009-04-10 01:23:07.000000000 +0200
++++ b/gcc/config/rs6000/linux64.h	2009-09-23 12:34:26.000000000 +0200
+@@ -162,7 +162,7 @@
+ #endif
+ 
+ #define ASM_SPEC32 "-a32 \
+-%{mrelocatable} %{mrelocatable-lib} %{fpic:-K PIC} %{fPIC:-K PIC} \
++%{mrelocatable} %{mrelocatable-lib} %{fpic|fPIC|fpie|fPIE:-K PIC} \
+ %{memb} %{!memb: %{msdata=eabi: -memb}} \
+ %{!mlittle: %{!mlittle-endian: %{!mbig: %{!mbig-endian: \
+     %{mcall-freebsd: -mbig} \
+--- a/gcc/config/rs6000/sysv4.h	2013-01-10 21:38:27.000000000 +0100
++++ b/gcc/config/rs6000/sysv4.h	2013-03-26 01:30:33.257003189 +0100
+@@ -627,8 +627,13 @@ extern int fixuplabelno;
+ 
+ #define LINK_OS_DEFAULT_SPEC ""
+ 
++#ifdef ENABLE_ESP
++#define DRIVER_SELF_SPECS "%{mfpu=none: %<mfpu=* \
++	%<msingle-float %<mdouble-float}", ESP_DRIVER_SELF_SPECS
++#else
+ #define DRIVER_SELF_SPECS "%{mfpu=none: %<mfpu=* \
+  	%<msingle-float %<mdouble-float}"
++#endif
+ 
+ /* Override rs6000.h definition.  */
+ #undef	CPP_SPEC
+@@ -933,7 +938,11 @@ ncrtn.o%s"
+   { "cpp_os_openbsd",		CPP_OS_OPENBSD_SPEC },			\
+   { "cpp_os_default",		CPP_OS_DEFAULT_SPEC },			\
+   { "fbsd_dynamic_linker",	FBSD_DYNAMIC_LINKER },			\
+-  SUBSUBTARGET_EXTRA_SPECS
++  SUBSUBTARGET_EXTRA_SPECS ESP_EXTRA_SPECS
++  
++#ifndef ENABLE_ESP
++#define ESP_EXTRA_SPECS
++#endif
+ 
+ #define	SUBSUBTARGET_EXTRA_SPECS
+ 

diff --git a/gcc-4.8.0/piepatch/34_all_gcc48_config_i386.patch b/gcc-4.8.0/piepatch/34_all_gcc48_config_i386.patch
new file mode 100644
index 0000000..9f0f7a3
--- /dev/null
+++ b/gcc-4.8.0/piepatch/34_all_gcc48_config_i386.patch
@@ -0,0 +1,56 @@
+2013-03-24  Magnus Granberg <zorry@gentoo.org>
+
+	* gcc/config/i386/gnu-user-common.h (DRIVER_SELF_SPECS): Add ESP_DRIVER_SELF_SPEC.
+	* gcc/config/i386/gnu-user.h (SUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
+	* gcc/config/i386/i386.h (SUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
+
+--- a/gcc/config/i386/gnu-user-common.h	2013-01-10 21:38:27.000000000 +0100
++++ b/gcc/config/i386/gnu-user-common.h	2013-02-14 00:51:44.689637605 +0100
+@@ -70,3 +70,7 @@ along with GCC; see the file COPYING3.
+
+ /* Static stack checking is supported by means of probes.  */
+ #define STACK_CHECK_STATIC_BUILTIN 1
++
++#ifdef ENABLE_ESP
++#define DRIVER_SELF_SPECS ESP_DRIVER_SELF_SPEC
++#endif
+--- a/gcc/config/i386/gnu-user.h	2011-05-05 14:32:50.000000000 +0200
++++ b/gcc/config/i386/gnu-user.h	2012-07-09 14:28:38.726289455 +0200
+@@ -93,9 +93,16 @@ along with GCC; see the file COPYING3.
+   "--32 %{!mno-sse2avx:%{mavx:-msse2avx}} %{msse2avx:%{!mavx:-msse2avx}}"
+ 
+ #undef  SUBTARGET_EXTRA_SPECS
++#ifdef ENABLE_ESP
+ #define SUBTARGET_EXTRA_SPECS \
+   { "link_emulation", GNU_USER_LINK_EMULATION },\
+-  { "dynamic_linker", GNU_USER_DYNAMIC_LINKER }
++  { "dynamic_linker", GNU_USER_DYNAMIC_LINKER }, \
++  ESP_EXTRA_SPECS
++#else
++#define SUBTARGET_EXTRA_SPECS \
++  { "link_emulation", GNU_USER_LINK_EMULATION },\
++  { "dynamic_linker", GNU_USER_DYNAMIC_LINKER }
++#endif
+ 
+ #undef	LINK_SPEC
+ #define LINK_SPEC "-m %(link_emulation) %{shared:-shared} \
+--- a/gcc/config/i386/i386.h	2011-11-24 23:11:12.000000000 +0100
++++ b/gcc/config/i386/i386.h	2012-07-09 14:21:24.575276517 +0200
+@@ -617,13 +617,16 @@ enum target_cpu_default
+    Do not define this macro if it does not need to do anything.  */
+ 
+ #ifndef SUBTARGET_EXTRA_SPECS
++#ifdef ENABLE_ESP
++#define SUBTARGET_EXTRA_SPECS ESP_EXTRA_SPECS
++#else
+ #define SUBTARGET_EXTRA_SPECS
+ #endif
++#endif
+ 
+ #define EXTRA_SPECS							\
+   { "cc1_cpu",  CC1_CPU_SPEC },						\
+   SUBTARGET_EXTRA_SPECS
+-\f
+ 
+ /* Set the value of FLT_EVAL_METHOD in float.h.  When using only the
+    FPU, assume that the fpcw is set to extended precision; when using

diff --git a/gcc-4.8.0/piepatch/35_all_gcc48_config_arm.patch b/gcc-4.8.0/piepatch/35_all_gcc48_config_arm.patch
new file mode 100644
index 0000000..e50e78e
--- /dev/null
+++ b/gcc-4.8.0/piepatch/35_all_gcc48_config_arm.patch
@@ -0,0 +1,34 @@
+2013-04-01  Magnus Granberg <zorry@gentoo.org>
+
+	* gcc/config/arm/arm.h (SUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
+	(DRIVER_SELF_SPECS): Add ESP_DRIVER_SELF_SPEC.
+
+--- a/gcc/config/arm/arm.h	2013-01-15 17:17:28.000000000 +0100
++++ b/gcc/config/arm/arm.h	2013-02-18 22:45:18.327284928 +0100
+@@ -226,8 +226,12 @@ extern void (*arm_lang_output_object_att
+   SUBTARGET_EXTRA_SPECS
+ 
+ #ifndef SUBTARGET_EXTRA_SPECS
++#ifdef ENABLE_ESP
++#define SUBTARGET_EXTRA_SPECS ESP_EXTRA_SPECS
++#else
+ #define SUBTARGET_EXTRA_SPECS
+ #endif
++#endif
+ 
+ #ifndef SUBTARGET_CPP_SPEC
+ #define SUBTARGET_CPP_SPEC      ""
+@@ -2326,6 +2326,11 @@ extern const char *host_detect_local_cpu
+ # define MCPU_MTUNE_NATIVE_SPECS ""
+ #endif
+ 
+-#define DRIVER_SELF_SPECS MCPU_MTUNE_NATIVE_SPECS
+-
++#ifdef ENABLE_ESP
++# define DRIVER_SELF_SPECS \
++  MCPU_MTUNE_NATIVE_SPECS, \
++  ESP_DRIVER_SELF_SPEC
++#else
++# define DRIVER_SELF_SPECS MCPU_MTUNE_NATIVE_SPECS
++#endif
+ #endif /* ! GCC_ARM_H */

diff --git a/gcc-4.8.0/piepatch/36_all_gcc48_config_mips.patch b/gcc-4.8.0/piepatch/36_all_gcc48_config_mips.patch
index 74b856a..a924f85 100644
--- a/gcc-4.8.0/piepatch/36_all_gcc48_config_mips.patch
+++ b/gcc-4.8.0/piepatch/36_all_gcc48_config_mips.patch
@@ -1,3 +1,9 @@
+2013-04-01  Magnus Granberg <zorry@gentoo.org>
+
+	* gcc/config/mips/gnu-user.h (DRIVER_SELF_SPECS): Add ESP_DRIVER_SELF_SPEC.
+	* gcc/config/mips/gnu-user64.h (DRIVER_SELF_SPECS): Add ESP_DRIVER_SELF_SPEC.
+	* gcc/config/mips/mips.h (SUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
+
 --- a/gcc/config/mips/gnu-user.h	2013-01-10 21:38:27.000000000 +0100
 +++ b/gcc/config/mips/gnu-user.h	2013-03-10 22:37:33.743176388 +0100
 @@ -125,9 +125,16 @@ extern const char *host_detect_local_cpu
@@ -36,3 +42,20 @@
  
  #undef GNU_USER_TARGET_LINK_SPEC
  #define GNU_USER_TARGET_LINK_SPEC "\
+--- a/gcc/config/mips/mips.h	2013-01-10 21:38:27.000000000 +0100
++++ b/gcc/config/mips/mips.h	2013-03-24 16:59:01.474513910 +0100
+@@ -1197,9 +1197,13 @@ struct mips_cpu_info {
+   SUBTARGET_EXTRA_SPECS
+ 
+ #ifndef SUBTARGET_EXTRA_SPECS
++#ifdef ENABLE_ESP
++#define SUBTARGET_EXTRA_SPECS ESP_EXTRA_SPECS
++#else
+ #define SUBTARGET_EXTRA_SPECS
+ #endif
+-\f
++#endif
++
+ #define DBX_DEBUGGING_INFO 1		/* generate stabs (OSF/rose) */
+ #define DWARF2_DEBUGGING_INFO 1         /* dwarf2 debugging info */
+ 

diff --git a/gcc-4.8.0/piepatch/37_all_gcc48_config_ia64.patch b/gcc-4.8.0/piepatch/37_all_gcc48_config_ia64.patch
new file mode 100644
index 0000000..bae8914
--- /dev/null
+++ b/gcc-4.8.0/piepatch/37_all_gcc48_config_ia64.patch
@@ -0,0 +1,30 @@
+2013-04-01  Magnus Granberg <zorry@gentoo.org>
+
+	* gcc/config/ia64/linux.h Define DRIVER_SELF_SPECS ESP_DRIVER_SELF_SPECS.
+	* gcc/config/ia64/ia64.h (SUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
+
+--- a/gcc/config/ia64/linux.h	2013-01-10 21:38:27.000000000 +0100
++++ b/gcc/config/ia64/linux.h	2013-03-16 22:50:10.363049291 +0100
+@@ -88,3 +88,7 @@ do {						\
+ 
+ /* Define this to be nonzero if static stack checking is supported.  */
+ #define STACK_CHECK_STATIC_BUILTIN 1
++
++#ifdef ENABLE_ESP
++#define DRIVER_SELF_SPECS ESP_DRIVER_SELF_SPECS
++#endif
+--- a/gcc/config/ia64/ia64.h	2013-01-10 21:38:27.000000000 +0100
++++ b/gcc/config/ia64/ia64.h	2013-03-26 02:03:21.052061828 +0100
+@@ -41,8 +41,12 @@ do {						\
+ } while (0)
+ 
+ #ifndef SUBTARGET_EXTRA_SPECS
++#ifdef ENABLE_ESP
++#define SUBTARGET_EXTRA_SPECS ESP_EXTRA_SPECS
++#else
+ #define SUBTARGET_EXTRA_SPECS
+ #endif
++#endif
+ 
+ #define EXTRA_SPECS \
+   { "asm_extra", ASM_EXTRA_SPEC }, \

diff --git a/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch b/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch
index cbb594e..83630f2 100644
--- a/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch
+++ b/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch
@@ -1,7 +1,7 @@
 2013-02-14  Magnus Granberg  <zorry@gentoo.org>
 
 	* gcc/esp.h	New file to support --enable-esp
-	Version 20120214.1
+	Version 20130214.1
 
 --- gcc/config/esp.h	2010-04-09 16:14:00.000000000 +0200
 +++ gcc/config/esp.h	2012-06-23 01:00:31.248348491 +0200

diff --git a/gcc-4.8.0/piepatch/README b/gcc-4.8.0/piepatch/README
index f322ab8..5d0bc13 100644
--- a/gcc-4.8.0/piepatch/README
+++ b/gcc-4.8.0/piepatch/README
@@ -7,7 +7,7 @@ http://forums.gentoo.org/viewtopic-t-668885.html. I joined the thread and starte
 
 We started with the pieworld code from kevquinn's overlay. The PIE and minispecs part hit the tree later on.
 With GCC 4.4.0 I was willing to do some code cleanup, use built-in specs and add it as --enable-esp in the
-configure command line.
+configure command line. On GCC 4.8.0 we use DRIVER_SELF_SPECS for the specs.
 
 Thank you all:
 Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY, Xake, Dwokfur,
@@ -15,4 +15,4 @@ KernelOfTruth, SteveL, nixnut, Hopeless, forsaken1, XioXous, obrut<-, mv, qjim,
 unk, neuron, alexxy, hellboi64, likewhoa, g0rg0n, costel78, polsas, 7v5w7go9ub0o, uberpinguin, Naib, cilly,
 bonsaikitten, kerframil, agaffney, Gordon Malm, blueness, Matthias Klose, Kees Cook, mentor, Anarchy,
 devurandom and everyone else for helping to test, suggestions, fixes and anything else we have missed.
-/2009-00-09 Magnus Grenberg (Zorry) <zorry@ume.nu>
+/2013-03-31 Magnus Grenberg (Zorry) <zorry@gentoo.org>

diff --git a/gcc-4.8.0/piepatch/README.Changelog b/gcc-4.8.0/piepatch/README.Changelog
index 009e128..b73e521 100644
--- a/gcc-4.8.0/piepatch/README.Changelog
+++ b/gcc-4.8.0/piepatch/README.Changelog
@@ -1,3 +1,27 @@
+0.5.5 Magnus Granberg  <zorry@gentoo.org>
+
+		* configure.ac			Add mips
+		* configure				Regenerated
+		* gcc/configure.ac		Clean up the checksand add mips.
+		* gcc/configure			Regenerated
+		* gcc/config.in			Remove ENABLE_ESP_SSP
+		* gcc/Makefile.in		Bumped for 4.8.0 release
+		* gcc/gcc.c				Remove ESP_EXTRA_SPECS and
+		ESP_COMMAND_OPTIONS_SPEC
+		* gcc/config/rs6000/sysv4.h		Add ESP_DRIVER_SELF_SPECS
+		and ESP_EXTRA_SPECS
+		* gcc/config/i386/gnu-user-common.h	Add ESP_DRIVER_SELF_SPECS
+		* gcc/config/i386/gnu-user.h	Add ESP_DRIVER_SELF_SPECS
+		* gcc/config/i386/i386.h	Add ESP_DRIVER_SELF_SPECS
+		* gcc/config/arm/arm.h		Add ESP_DRIVER_SELF_SPECS and
+		ESP_EXTRA_SPECS
+		* gcc/config/mips/gnu-user.h	Add ESP_DRIVER_SELF_SPECS
+		* gcc/config/mips/gnu-user64.h	Add ESP_DRIVER_SELF_SPECS
+		* gcc/config/mips/mips.h		Add ESP_EXTRA_SPECS
+		* gcc/config/ia64/linux.h		Add ESP_DRIVER_SELF_SPECS
+		* gcc/config/ia64/ia64.h		Add ESP_EXTRA_SPECS
+		* gcc/config/esp.h			Bump for ESP_DRIVER_SELF_SPECS support
+
 0.5.4 Magnus Granberg		<zorry@gentoo.org>
 
 		#436924

diff --git a/gcc-4.8.0/piepatch/README.history b/gcc-4.8.0/piepatch/README.history
index 82b2ee3..5a2a379 100644
--- a/gcc-4.8.0/piepatch/README.history
+++ b/gcc-4.8.0/piepatch/README.history
@@ -1,3 +1,22 @@
+0.5.5		31 Mar 2013
+		- 01_all_gcc47_configure.patch
+		+ 01_all_gcc48_configure.patch
+		- 02_all_gcc47_config.in.patch
+		+ 02_all_gcc48_config.in.patch
+		- 03_all_gcc47_Makefile.in.patch
+		+ 03_all_gcc48_Makefile.in.patch
+		- 05_all_gcc47_gcc.c.patch
+		- 05_all_gcc48_gcc.c.patch
+		- 33_all_gcc46_config_rs6000_linux64.h.patch
+		+ 33_all_gcc48_config_rs6000.patch
+		- 34_all_gcc47_config_all_gnu_user.patch
+		+ 34_all_gcc48_config_i386.patch
+		+ 35_all_gcc48_config_arm.patch
+		+ 36_all_gcc48_config_mips.patch
+		+ 37_all_gcc48_config_ia64.patch
+		- 35_all_gcc47_config_esp.h.patch
+		- 35_all_gcc48_config_esp.h.patch
+		U README
 0.5.4		02 Oct 2012
 		U 01_all_gcc47_configure.patch
 		+  01_all_gcc47_configure.ac.patch


^ permalink raw reply related	[flat|nested] 5+ messages in thread

* [gentoo-commits] proj/hardened-gccpatchset:master commit in: gcc-4.8.0/piepatch/
@ 2013-08-20 21:25 Magnus Granberg
  0 siblings, 0 replies; 5+ messages in thread
From: Magnus Granberg @ 2013-08-20 21:25 UTC (permalink / raw
  To: gentoo-commits

commit:     3c0da0c534af3033a0444baad7617d548c368759
Author:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
AuthorDate: Tue Aug 20 23:24:51 2013 +0000
Commit:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
CommitDate: Tue Aug 20 23:24:51 2013 +0000
URL:        http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-gccpatchset.git;a=commit;h=3c0da0c5

update gcc 4.8.X patchset

---
 gcc-4.8.0/piepatch/05_all_gcc47_gcc.c.patch        | 70 ----------------------
 .../piepatch/15_all_gcc44_decl-tls-model.patch     | 20 -------
 .../33_all_gcc46_config_rs6000_linux64.h.patch     | 16 -----
 .../34_all_gcc48_config_i386_gnu-user.patch        | 15 -----
 gcc-4.8.0/piepatch/35_all_gcc48_config_arm.patch   | 33 +++++-----
 gcc-4.8.0/piepatch/37_all_gcc48_config_ia64.patch  |  6 +-
 gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch   | 17 +++---
 gcc-4.8.0/piepatch/README.Changelog                | 25 +++++---
 gcc-4.8.0/piepatch/README.history                  |  6 ++
 9 files changed, 52 insertions(+), 156 deletions(-)

diff --git a/gcc-4.8.0/piepatch/05_all_gcc47_gcc.c.patch b/gcc-4.8.0/piepatch/05_all_gcc47_gcc.c.patch
deleted file mode 100644
index 7f5a5d4..0000000
--- a/gcc-4.8.0/piepatch/05_all_gcc47_gcc.c.patch
+++ /dev/null
@@ -1,70 +0,0 @@
-2012-06-22	Magnus Granberg		<zorry@gentoo.org>
-
-		* gcc/gcc.c								include esp.h
-		static const char *cc1_spec 			We set that in esp.h if ENABLE_ESP.
-		#ifdef EXTRA_SPECS:						Add ESP_EXTRA_SPECS
-
---- gcc/gcc.c	2010-01-21 10:29:30.000000000 -0500
-+++ gcc/gcc.c	2010-01-29 23:29:16.000000000 -0500
-@@ -44,6 +44,7 @@
- #include "opts.h"
- #include "params.h"
- #include "vec.h"
-+#include "config/esp.h" /* for --enable-esp support */
- #include "filenames.h"
- 
- /* By default there is no special suffix for target executables.  */
-@@ -822,7 +823,9 @@
- 
- static const char *asm_debug;
- static const char *cpp_spec = CPP_SPEC;
-+#ifndef ENABLE_ESP
- static const char *cc1_spec = CC1_SPEC;
-+#endif
- static const char *cc1plus_spec = CC1PLUS_SPEC;
- static const char *link_gcc_c_sequence_spec = LINK_GCC_C_SEQUENCE_SPEC;
- static const char *link_ssp_spec = LINK_SSP_SPEC;
-@@ -1699,18 +1705,23 @@
-   INIT_STATIC_SPEC ("sysroot_hdrs_suffix_spec",	&sysroot_hdrs_suffix_spec),
- };
- 
--#ifdef EXTRA_SPECS		/* additional specs needed */
-+/* EXTRA_SPECS needs to be defined  */
-+#ifndef EXTRA_SPECS
-+#define EXTRA_SPECS
-+#endif
-+
-+/* EXTRA_SPECS and ESP_EXTRA_SPECS add additional specs */
- /* Structure to keep track of just the first two args of a spec_list.
--   That is all that the EXTRA_SPECS macro gives us.  */
-+   That is all that the EXTRA_SPECS and ESP_EXTRA_SPECS macro gives us.  */
- struct spec_list_1
- {
-   const char *const name;
-   const char *const ptr;
- };
- 
--static const struct spec_list_1 extra_specs_1[] = { EXTRA_SPECS };
-+/* ESP_EXTRA_SPECS before EXTRA_SPECS  */
-+static const struct spec_list_1 extra_specs_1[] = { ESP_EXTRA_SPECS, EXTRA_SPECS };
- static struct spec_list *extra_specs = (struct spec_list *) 0;
--#endif
- 
- /* List of dynamically allocates specs that have been defined so far.  */
- 
-@@ -1798,7 +1809,6 @@
-   if (verbose_flag)
-     notice ("Using built-in specs.\n");
- 
--#ifdef EXTRA_SPECS
-   extra_specs = XCNEWVEC (struct spec_list, ARRAY_SIZE (extra_specs_1));
- 
-   for (i = ARRAY_SIZE (extra_specs_1) - 1; i >= 0; i--)
-@@ -1811,7 +1821,6 @@
-       sl->ptr_spec = &sl->ptr;
-       next = sl;
-     }
--#endif
- 
-   for (i = ARRAY_SIZE (static_specs) - 1; i >= 0; i--)
-     {

diff --git a/gcc-4.8.0/piepatch/15_all_gcc44_decl-tls-model.patch b/gcc-4.8.0/piepatch/15_all_gcc44_decl-tls-model.patch
deleted file mode 100644
index 09438a0..0000000
--- a/gcc-4.8.0/piepatch/15_all_gcc44_decl-tls-model.patch
+++ /dev/null
@@ -1,20 +0,0 @@
-2009-06-13	Magnus Granberg		<zorry@ume.nu>
-		
-		b.g.o #232601
-		* gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib.
-
---- gcc/varasm.c	2009-03-17 21:18:21.000000000 +0100
-+++ gcc/varasm.c	2009-04-29 03:10:09.000000000 +0200
-@@ -5607,7 +5607,11 @@
-   bool is_local;
- 
-   is_local = targetm.binds_local_p (decl);
--  if (!flag_shlib)
-+  #ifdef ENABLE_ESP
-+    if (!flag_pic)
-+  #else
-+    if (!flag_shlib)
-+  #endif
-     {
-       if (is_local)
- 	kind = TLS_MODEL_LOCAL_EXEC;

diff --git a/gcc-4.8.0/piepatch/33_all_gcc46_config_rs6000_linux64.h.patch b/gcc-4.8.0/piepatch/33_all_gcc46_config_rs6000_linux64.h.patch
deleted file mode 100644
index bfd7b75..0000000
--- a/gcc-4.8.0/piepatch/33_all_gcc46_config_rs6000_linux64.h.patch
+++ /dev/null
@@ -1,16 +0,0 @@
-2011-03-05		Peter S. Mazinger	<ps.m@gmx.net>, Magnus Granberg		<zorry@gentoo.org>
-
-		* gcc/config/rs6000/linux64.h	ASM_SPEC32 Change %{fpic:-K PIC} %{fPIC:-K PIC}
-		to %{fpic|fPIC|fpie|fPIE:-K PIC}
-
---- gcc/config/rs6000/linux64.h.psm	2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/rs6000/linux64.h	2009-09-23 12:34:26.000000000 +0200
-@@ -162,7 +162,7 @@
- #endif
- 
- #define ASM_SPEC32 "-a32 \
--%{mrelocatable} %{mrelocatable-lib} %{fpic:-K PIC} %{fPIC:-K PIC} \
-+%{mrelocatable} %{mrelocatable-lib} %{fpic|fPIC|fpie|fPIE:-K PIC} \
- %{memb} %{!memb: %{msdata=eabi: -memb}} \
- %{!mlittle: %{!mlittle-endian: %{!mbig: %{!mbig-endian: \
-     %{mcall-freebsd: -mbig} \

diff --git a/gcc-4.8.0/piepatch/34_all_gcc48_config_i386_gnu-user.patch b/gcc-4.8.0/piepatch/34_all_gcc48_config_i386_gnu-user.patch
deleted file mode 100644
index b7cdfd4..0000000
--- a/gcc-4.8.0/piepatch/34_all_gcc48_config_i386_gnu-user.patch
+++ /dev/null
@@ -1,15 +0,0 @@
-2013-02-13  Magnus Granberg <zorry@gentoo.org>
-
-	* gcc/config/i386/gnu-user. Add ESP_DRIVER_SELF_SPEC
-	to DRIVER_SELF_SPECS if ENABLE_ESP defined.
-
---- a/gcc/config/i386/gnu-user-common.h	2013-01-10 21:38:27.000000000 +0100
-+++ b/gcc/config/i386/gnu-user-common.h	2013-02-14 00:51:44.689637605 +0100
-@@ -70,3 +70,7 @@ along with GCC; see the file COPYING3.
-
- /* Static stack checking is supported by means of probes.  */
- #define STACK_CHECK_STATIC_BUILTIN 1
-+
-+#ifdef ENABLE_ESP
-+#define DRIVER_SELF_SPECS ESP_DRIVER_SELF_SPEC
-+#endif

diff --git a/gcc-4.8.0/piepatch/35_all_gcc48_config_arm.patch b/gcc-4.8.0/piepatch/35_all_gcc48_config_arm.patch
index e50e78e..5aecc6b 100644
--- a/gcc-4.8.0/piepatch/35_all_gcc48_config_arm.patch
+++ b/gcc-4.8.0/piepatch/35_all_gcc48_config_arm.patch
@@ -1,23 +1,10 @@
-2013-04-01  Magnus Granberg <zorry@gentoo.org>
+2013-06-03  Magnus Granberg  <zorry@gentoo.org>
 
-	* gcc/config/arm/arm.h (SUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
-	(DRIVER_SELF_SPECS): Add ESP_DRIVER_SELF_SPEC.
+	* gcc/config/arm/arm.h (DRIVER_SELF_SPECS): Add ESP_DRIVER_SELF_SPEC.
+	* gcc/config/arm/elf.h (SUBSUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
 
 --- a/gcc/config/arm/arm.h	2013-01-15 17:17:28.000000000 +0100
 +++ b/gcc/config/arm/arm.h	2013-02-18 22:45:18.327284928 +0100
-@@ -226,8 +226,12 @@ extern void (*arm_lang_output_object_att
-   SUBTARGET_EXTRA_SPECS
- 
- #ifndef SUBTARGET_EXTRA_SPECS
-+#ifdef ENABLE_ESP
-+#define SUBTARGET_EXTRA_SPECS ESP_EXTRA_SPECS
-+#else
- #define SUBTARGET_EXTRA_SPECS
- #endif
-+#endif
- 
- #ifndef SUBTARGET_CPP_SPEC
- #define SUBTARGET_CPP_SPEC      ""
 @@ -2326,6 +2326,11 @@ extern const char *host_detect_local_cpu
  # define MCPU_MTUNE_NATIVE_SPECS ""
  #endif
@@ -32,3 +19,17 @@
 +# define DRIVER_SELF_SPECS MCPU_MTUNE_NATIVE_SPECS
 +#endif
  #endif /* ! GCC_ARM_H */
+--- a/gcc/config/arm/elf.h	2013-01-10 21:38:27.000000000 +0100
++++ b/gcc/config/arm/elf.h	2013-05-19 02:15:49.595855825 +0200
+@@ -49,7 +49,11 @@
+ #endif
+ 
+ #undef SUBSUBTARGET_EXTRA_SPECS
++#ifdef ENABLE_ESP
++#define SUBSUBTARGET_EXTRA_SPECS ESP_EXTRA_SPECS
++#else
+ #define SUBSUBTARGET_EXTRA_SPECS
++#endif
+ 
+ #ifndef ASM_SPEC
+ #define ASM_SPEC "\

diff --git a/gcc-4.8.0/piepatch/37_all_gcc48_config_ia64.patch b/gcc-4.8.0/piepatch/37_all_gcc48_config_ia64.patch
index bae8914..ba71922 100644
--- a/gcc-4.8.0/piepatch/37_all_gcc48_config_ia64.patch
+++ b/gcc-4.8.0/piepatch/37_all_gcc48_config_ia64.patch
@@ -1,6 +1,6 @@
-2013-04-01  Magnus Granberg <zorry@gentoo.org>
+2013-06-03  Magnus Granberg <zorry@gentoo.org>
 
-	* gcc/config/ia64/linux.h Define DRIVER_SELF_SPECS ESP_DRIVER_SELF_SPECS.
+	* gcc/config/ia64/linux.h Define DRIVER_SELF_SPECS ESP_DRIVER_SELF_SPEC.
 	* gcc/config/ia64/ia64.h (SUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
 
 --- a/gcc/config/ia64/linux.h	2013-01-10 21:38:27.000000000 +0100
@@ -11,7 +11,7 @@
  #define STACK_CHECK_STATIC_BUILTIN 1
 +
 +#ifdef ENABLE_ESP
-+#define DRIVER_SELF_SPECS ESP_DRIVER_SELF_SPECS
++#define DRIVER_SELF_SPECS ESP_DRIVER_SELF_SPEC
 +#endif
 --- a/gcc/config/ia64/ia64.h	2013-01-10 21:38:27.000000000 +0100
 +++ b/gcc/config/ia64/ia64.h	2013-03-26 02:03:21.052061828 +0100

diff --git a/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch b/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch
index 83630f2..805cc2c 100644
--- a/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch
+++ b/gcc-4.8.0/piepatch/40_all_gcc48_config_esp.patch
@@ -1,23 +1,23 @@
-2013-02-14  Magnus Granberg  <zorry@gentoo.org>
+2013-08-10  Magnus Granberg  <zorry@gentoo.org>
 
 	* gcc/esp.h	New file to support --enable-esp
-	Version 20130214.1
+	Version 20130810.1
 
 --- gcc/config/esp.h	2010-04-09 16:14:00.000000000 +0200
 +++ gcc/config/esp.h	2012-06-23 01:00:31.248348491 +0200
-@@ -0,0 +1,127 @@
+@@ -0,0 +1,128 @@
 +/* License terms see GNU GENERAL PUBLIC LICENSE Version 3.
-+ * Version 20130214.1
++ * Version 20130810.1
 + * Magnus Granberg (Zorry) <zorry@gentoo.org>  */
 +#ifndef GCC_ESP_H
 +#define GCC_ESP_H
 +
-+/*	This file will add -fstack-protector-all, -fPIE, -pie and -z now 
++/*	This file will add -fstack-protector-all, -fstack-check, -fPIE, -pie and -z now 
 +	as default if the defines and the spec allow it.
 +	Added a hack for gcc-specs-* in toolchain-funcs.eclass and _filter-hardened in flag-o-matic.eclass
 +	to support older hardened GCC patches and we don't need to change the code on gcc-specs-* and _filter-hardened.
 +	This will add some unsupported upstream commands options as -nopie and -nonow.
-+	-D__KERNEL__ is added so we don't have -fPIE, -pie and -fstack-protector-all when building kernels.
++	-D__KERNEL__ is added so we don't have -fPIE, -pie and -fstack-protector-all and -fstack-check when building kernels.
 +	ESP_CC1_SPEC is added to CC1_SPEC.
 +	ESP_CC1_STRICT_OVERFLOW_SPEC is added so we don't disable the strict-overflow check.
 +	ESP_LINK_PIE_CHECK_SPEC check for -pie, -p, -pg, -profile and -static.
@@ -28,7 +28,7 @@
 +	/* Hack to support gcc-specs-* in toolchain-funcs.eclass and _filter-hardened in flag-o-matic.eclass  */
 +	#define ESP_CC1_SPEC " %(esp_cc1_ssp) %(esp_cc1_pie) %(esp_cc1_strict_overflow)"
 +	#if defined ( EFAULT_SSP ) || defined ( EFAULT_PIE_SSP )
-+		#define ESP_CC1_SSP_SPEC "%{!fno-stack-protector: %{!fno-stack-protector-all: }}"
++		#define ESP_CC1_SSP_SPEC "%{!fno-stack-protector: %{!fno-stack-protector-all: %{!fno-stack-check: }}}"
 +	#else
 +		#define ESP_CC1_SSP_SPEC ""
 +	#endif
@@ -54,7 +54,8 @@
 +	#if defined ( EFAULT_SSP ) || defined ( EFAULT_PIE_SSP )
 +		#define ESP_OPTIONS_SSP_SPEC \
 +			"%{nostdlib|nodefaultlibs|fno-stack-protector| \
-+			fstack-protector|fstack-protector-all:;:-fstack-protector-all}"
++			fstack-protector|fstack-protector-all:;:-fstack-protector-all} \
++			%{fstack-check|fstack-check=*:;: -fstack-check}"
 +	#else
 +		#define ESP_OPTIONS_SSP_SPEC ""
 +	#endif

diff --git a/gcc-4.8.0/piepatch/README.Changelog b/gcc-4.8.0/piepatch/README.Changelog
index b73e521..e3ec163 100644
--- a/gcc-4.8.0/piepatch/README.Changelog
+++ b/gcc-4.8.0/piepatch/README.Changelog
@@ -1,3 +1,12 @@
+0.5.7 Magnus Granberg  <zorry@gentoo.org>
+
+	* gcc/config/esp.h Add -fstack-check as default.
+
+0.5.6 Magnus Granberg  <zorry@gentoo.org>
+
+	* gcc/config/ia64/linux.h Change ESP_DRIVER_SELF_SPECS To ESP_DRIVER_SELF_SPEC
+	* gcc/config/arm/elf.h  (SUBSUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
+
 0.5.5 Magnus Granberg  <zorry@gentoo.org>
 
 		* configure.ac			Add mips
@@ -8,19 +17,19 @@
 		* gcc/Makefile.in		Bumped for 4.8.0 release
 		* gcc/gcc.c				Remove ESP_EXTRA_SPECS and
 		ESP_COMMAND_OPTIONS_SPEC
-		* gcc/config/rs6000/sysv4.h		Add ESP_DRIVER_SELF_SPECS
+		* gcc/config/rs6000/sysv4.h		Add ESP_DRIVER_SELF_SPEC
 		and ESP_EXTRA_SPECS
-		* gcc/config/i386/gnu-user-common.h	Add ESP_DRIVER_SELF_SPECS
-		* gcc/config/i386/gnu-user.h	Add ESP_DRIVER_SELF_SPECS
-		* gcc/config/i386/i386.h	Add ESP_DRIVER_SELF_SPECS
-		* gcc/config/arm/arm.h		Add ESP_DRIVER_SELF_SPECS and
+		* gcc/config/i386/gnu-user-common.h	Add ESP_DRIVER_SELF_SPEC
+		* gcc/config/i386/gnu-user.h	Add ESP_DRIVER_SELF_SPEC
+		* gcc/config/i386/i386.h	Add ESP_DRIVER_SELF_SPEC
+		* gcc/config/arm/arm.h		Add ESP_DRIVER_SELF_SPEC and
 		ESP_EXTRA_SPECS
-		* gcc/config/mips/gnu-user.h	Add ESP_DRIVER_SELF_SPECS
-		* gcc/config/mips/gnu-user64.h	Add ESP_DRIVER_SELF_SPECS
+		* gcc/config/mips/gnu-user.h	Add ESP_DRIVER_SELF_SPEC
+		* gcc/config/mips/gnu-user64.h	Add ESP_DRIVER_SELF_SPEC
 		* gcc/config/mips/mips.h		Add ESP_EXTRA_SPECS
 		* gcc/config/ia64/linux.h		Add ESP_DRIVER_SELF_SPECS
 		* gcc/config/ia64/ia64.h		Add ESP_EXTRA_SPECS
-		* gcc/config/esp.h			Bump for ESP_DRIVER_SELF_SPECS support
+		* gcc/config/esp.h			Bump for ESP_DRIVER_SELF_SPEC support
 
 0.5.4 Magnus Granberg		<zorry@gentoo.org>
 

diff --git a/gcc-4.8.0/piepatch/README.history b/gcc-4.8.0/piepatch/README.history
index 5a2a379..18bdd75 100644
--- a/gcc-4.8.0/piepatch/README.history
+++ b/gcc-4.8.0/piepatch/README.history
@@ -1,3 +1,9 @@
+0.5.7		10 Jul 2013
+		U 35_all_gcc48_config_esp.h.patches
+		- 15_all_gcc44_decl-tls-model.patch
+0.5.6		03 Jun 2013
+		U 35_all_gcc48_config_arm.patches
+		U 37_all_gcc48_config_ia64.patch
 0.5.5		31 Mar 2013
 		- 01_all_gcc47_configure.patch
 		+ 01_all_gcc48_configure.patch


^ permalink raw reply related	[flat|nested] 5+ messages in thread

* [gentoo-commits] proj/hardened-gccpatchset:master commit in: gcc-4.8.0/piepatch/
@ 2013-11-11 21:14 Magnus Granberg
  0 siblings, 0 replies; 5+ messages in thread
From: Magnus Granberg @ 2013-11-11 21:14 UTC (permalink / raw
  To: gentoo-commits

commit:     c5642265c507820f5bbd8a05e3ba09d2f78c1886
Author:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
AuthorDate: Mon Nov 11 21:14:03 2013 +0000
Commit:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
CommitDate: Mon Nov 11 21:14:03 2013 +0000
URL:        http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-gccpatchset.git;a=commit;h=c5642265

update patchset for gcc 4.8.2

---
 gcc-4.8.0/piepatch/33_all_gcc48_config_rs6000.patch | 15 +--------------
 gcc-4.8.0/piepatch/README.Changelog                 |  3 +++
 gcc-4.8.0/piepatch/README.history                   |  6 ++++--
 3 files changed, 8 insertions(+), 16 deletions(-)

diff --git a/gcc-4.8.0/piepatch/33_all_gcc48_config_rs6000.patch b/gcc-4.8.0/piepatch/33_all_gcc48_config_rs6000.patch
index 25e704f..6520ba5 100644
--- a/gcc-4.8.0/piepatch/33_all_gcc48_config_rs6000.patch
+++ b/gcc-4.8.0/piepatch/33_all_gcc48_config_rs6000.patch
@@ -1,21 +1,8 @@
-2013-03-26  Peter S. Mazinger	<ps.m@gmx.net>, Magnus Granberg <zorry@gentoo.org>
+2013-11-11  Magnus Granberg  <zorry@gentoo.org>
 
-	* gcc/config/rs6000/linux64.h (ASM_SPEC32): Change %{fpic:-K PIC} %{fPIC:-K PIC}
-	to %{fpic|fPIC|fpie|fPIE:-K PIC}
 	* gcc/config/rs6000/sysv4.h (DRIVER_SELF_SPECS): Add ESP_DRIVER_SELF_SPECS.
 	(SUBTARGET_EXTRA_SPECS): Add ESP_EXTRA_SPECS.
 
---- a/gcc/config/rs6000/linux64.h.psm	2009-04-10 01:23:07.000000000 +0200
-+++ b/gcc/config/rs6000/linux64.h	2009-09-23 12:34:26.000000000 +0200
-@@ -162,7 +162,7 @@
- #endif
- 
- #define ASM_SPEC32 "-a32 \
--%{mrelocatable} %{mrelocatable-lib} %{fpic:-K PIC} %{fPIC:-K PIC} \
-+%{mrelocatable} %{mrelocatable-lib} %{fpic|fPIC|fpie|fPIE:-K PIC} \
- %{memb} %{!memb: %{msdata=eabi: -memb}} \
- %{!mlittle: %{!mlittle-endian: %{!mbig: %{!mbig-endian: \
-     %{mcall-freebsd: -mbig} \
 --- a/gcc/config/rs6000/sysv4.h	2013-01-10 21:38:27.000000000 +0100
 +++ b/gcc/config/rs6000/sysv4.h	2013-03-26 01:30:33.257003189 +0100
 @@ -627,8 +627,13 @@ extern int fixuplabelno;

diff --git a/gcc-4.8.0/piepatch/README.Changelog b/gcc-4.8.0/piepatch/README.Changelog
index e3ec163..962ba41 100644
--- a/gcc-4.8.0/piepatch/README.Changelog
+++ b/gcc-4.8.0/piepatch/README.Changelog
@@ -1,3 +1,6 @@
+0.5.8 
+	* gcc/config/rs6000/linux64 (ASM_SPEC32): Allready applay.
+
 0.5.7 Magnus Granberg  <zorry@gentoo.org>
 
 	* gcc/config/esp.h Add -fstack-check as default.

diff --git a/gcc-4.8.0/piepatch/README.history b/gcc-4.8.0/piepatch/README.history
index 18bdd75..116a1ea 100644
--- a/gcc-4.8.0/piepatch/README.history
+++ b/gcc-4.8.0/piepatch/README.history
@@ -1,8 +1,10 @@
+0.5.8		11 Nov 2013
+		U 33_all_gcc48_config_rs6000.patch
 0.5.7		10 Jul 2013
-		U 35_all_gcc48_config_esp.h.patches
+		U 35_all_gcc48_config_esp.h.patch
 		- 15_all_gcc44_decl-tls-model.patch
 0.5.6		03 Jun 2013
-		U 35_all_gcc48_config_arm.patches
+		U 35_all_gcc48_config_arm.patch
 		U 37_all_gcc48_config_ia64.patch
 0.5.5		31 Mar 2013
 		- 01_all_gcc47_configure.patch


^ permalink raw reply related	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2013-11-11 21:14 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-03-06 14:09 [gentoo-commits] proj/hardened-gccpatchset:master commit in: gcc-4.8.0/piepatch/ Magnus Granberg
  -- strict thread matches above, loose matches on Subject: below --
2013-03-10 22:07 Magnus Granberg
2013-04-01  0:06 Magnus Granberg
2013-08-20 21:25 Magnus Granberg
2013-11-11 21:14 Magnus Granberg

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox