public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-commits] gentoo commit in src/patchsets/gcc/4.7.2/pie: 01_all_gcc47_configure.ac.patch 01_all_gcc47_configure.patch README.Changelog README.history
@ 2012-10-03 13:38 Magnus Granberg (zorry)
  0 siblings, 0 replies; 2+ messages in thread
From: Magnus Granberg (zorry) @ 2012-10-03 13:38 UTC (permalink / raw
  To: gentoo-commits

zorry       12/10/03 13:38:24

  Modified:             01_all_gcc47_configure.patch README.Changelog
                        README.history
  Added:                01_all_gcc47_configure.ac.patch
  Log:
  fix bug 436924 and bump piepatch to 0.5.4

Revision  Changes    Path
1.2                  src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.patch

file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.patch?rev=1.2&view=markup
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.patch?rev=1.2&content-type=text/plain
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.patch?r1=1.1&r2=1.2

Index: 01_all_gcc47_configure.patch
===================================================================
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- 01_all_gcc47_configure.patch	29 Sep 2012 05:01:09 -0000	1.1
+++ 01_all_gcc47_configure.patch	3 Oct 2012 13:38:24 -0000	1.2
@@ -125,7 +125,7 @@
 +$as_echo_n "checking if $target support esp... " >&6; }
 +if test $set_enable_esp = yes ; then
 +  case "$target" in
-+    i?86*-*-linux* | x86_??*-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux* | mips*-*-linux*)
++    i?86*-*-linux* | x86_??*-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
 +      enable_esp=yes
 +
 +$as_echo "#define ENABLE_ESP 1" >>confdefs.h
@@ -147,7 +147,7 @@
 +  { $as_echo "$as_me:${as_lineno-$LINENO}: checking if we can default to use -fstack-protector" >&5
 +$as_echo_n "checking if we can default to use -fstack-protector... " >&6; }
 +  ssp_link_test=no
-+  if test x$gcc_cv_libc_provides_ssp = xyes && test x$set_have_as_tls = yes; then
++  if test x$gcc_cv_libc_provides_ssp = xyes && test x$set_have_as_tls = xyes; then
 +    if $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC__[ 	]+1' \
 +       $target_header_dir/features.h > /dev/null; then
 +      if test -f $target_header_dir/bits/uClibc_config.h && \



1.2                  src/patchsets/gcc/4.7.2/pie/README.Changelog

file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.Changelog?rev=1.2&view=markup
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.Changelog?rev=1.2&content-type=text/plain
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.Changelog?r1=1.1&r2=1.2

Index: README.Changelog
===================================================================
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.7.2/pie/README.Changelog,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- README.Changelog	29 Sep 2012 05:01:09 -0000	1.1
+++ README.Changelog	3 Oct 2012 13:38:24 -0000	1.2
@@ -1,3 +1,13 @@
+0.5.4 Magnus Granberg		<zorry@gentoo.org>
+
+		#436924
+		* configure.ac			Add --enable-esp.  Add -fno-stack-protector
+		to stage1_cflags.
+		* gcc/configure.ac		Add --enable-esp and check if SSP works.
+		Define ENABLE_ESP ENABLE_ESP_SSP.
+		Check if we support crtbeginP and define ENABLE_CRTBEGINP.
+		* gcc/configure			Fix a typo
+		
 0.5.3 Magnus Granberg		<zorry@gentoo.org>
 
 		* gcc/configure			Clean up the checks and added



1.2                  src/patchsets/gcc/4.7.2/pie/README.history

file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.history?rev=1.2&view=markup
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.history?rev=1.2&content-type=text/plain
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.history?r1=1.1&r2=1.2

Index: README.history
===================================================================
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.7.2/pie/README.history,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- README.history	29 Sep 2012 05:01:09 -0000	1.1
+++ README.history	3 Oct 2012 13:38:24 -0000	1.2
@@ -1,3 +1,6 @@
+0.5.4		02 Oct 2012
+		U 01_all_gcc47_configure.patch
+		+  01_all_gcc47_configure.ac.patch
 0.5.3		06 Apr 2012
 		U 01_all_gcc47_configure.patch
 		+ 02_all_gcc47_config.in.patch



1.1                  src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.ac.patch

file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.ac.patch?rev=1.1&view=markup
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.ac.patch?rev=1.1&content-type=text/plain

Index: 01_all_gcc47_configure.ac.patch
===================================================================
2011-04-27	Magnus Granberg		<zorry@gentoo.org>

		* configure.ac		Add --enable-esp.  Add -fno-stack-protector
		to stage1_cflags.
		* gcc/configure.ac		Add --enable-esp and check if SSP works.
		Define ENABLE_ESP ENABLE_ESP_SSP.
		Check if we support crtbeginP and define ENABLE_CRTBEGINP.

--- a/configure.ac	2011-11-29 22:36:43.000000000 +0100
+++ b/configure.ac	2011-12-07 23:29:26.125712475 +0100
@@ -419,6 +419,25 @@ if test "${ENABLE_LIBADA}" != "yes" ; th
   noconfigdirs="$noconfigdirs gnattools"
 fi
 
+# Check whether --enable-esp was given and target have the support.
+AC_ARG_ENABLE([esp],
+[AS_HELP_STRING([--enable-esp],
+		[Enable Stack protector, Position independent executable as 
+		 default if we have suppot for it when compiling
+		 and link with -z relro and -z now as default.
+		 Linux targets supported i*86, x86_64, x86_x32, powerpc, powerpc64, ia64 and arm.])],
+[
+  case $target in
+    i?86*-*-linux* | x86_??*-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
+      enable_espf=yes
+      ;;
+    *)
+      AC_MSG_WARN([*** --enable-esp is not supported on this $target target.])
+      ;;
+  esac
+])
+AC_SUBST([enable_esp])
+
 AC_ARG_ENABLE(libssp,
 [AS_HELP_STRING([--enable-libssp], [build libssp directory])],
 ENABLE_LIBSSP=$enableval,
@@ -3211,6 +3230,11 @@ if test "$GCC" = yes -a "$ENABLE_BUILD_W
   CFLAGS="$saved_CFLAGS"
 fi
 
+# Disable -fstack-protector on stage1
+if test x$enable_esp = xyes; then
+  stage1_cflags="$stage1_cflags -fno-stack-protector"
+fi
+
 AC_SUBST(stage1_cflags)
 
 # Enable --enable-checking in stage1 of the compiler.
--- a/gcc/configure.ac	2011-11-18 11:52:32.000000000 +0100
+++ b/gcc/configure.ac	2012-10-02 17:39:15.649526241 +0200
@@ -5130,6 +5237,88 @@ if test x"${LINKER_HASH_STYLE}" != x; th
                                          [The linker hash style])
 fi
 
+# --------------
+# Esp checks
+# --------------
+
+# Check whether --enable-esp was given and target have the support.
+AC_ARG_ENABLE([esp],
+[AS_HELP_STRING([--enable-esp],
+		[Enable Stack protector, Position independent executable and
+		 Fortify_sources as default if we have suppot for it when compiling
+		 and link -z now as default.
+		 Linux targets supported i*86, x86_64, x86_x32, powerpc, powerpc64, ia64 and arm])],
+	set_enable_espf=$enableval,
+	set_enable_espf=no)
+if test $set_enable_esp = yes ; then
+  AC_MSG_CHECKING(if $target support esp)
+if test $set_enable_esp = yes ; then
+  case "$target" in
+    i?86*-*-linux* | x86_??*-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
+      enable_esp=yes
+      AC_DEFINE(ENABLE_ESP, 1,
+        [Define if your target support esp and you have enable it.])
+      ;;
+    *)
+      enable_esp=no
+      ;;
+  esac
+else
+ enable_esp=no
+fi
+AC_MSG_RESULT($enable_esp)
+fi
+AC_SUBST([enable_esp])
+if test $enable_esp = yes ; then
+
+ AC_MSG_CHECKING(if we can default to use -fstack-protector-all)
+  ssp_link_test=no
+  if test x$gcc_cv_libc_provides_ssp = xyes && test x$set_have_as_tls = xyes; then
+    if $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC__[ 	]+1' \
+       $target_header_dir/features.h > /dev/null; then
+      if test -f $target_header_dir/bits/uClibc_config.h && \
+	 $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC_SUBLEVEL__[ 	]+([3-9][2-9]|[4-9][0-9])' \
+	 $target_header_dir/bits/uClibc_config.h > /dev/null && \
+	 $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC_HAS_TLS__[ 	]+1' \
+	 $target_header_dir/bits/uClibc_config.h > /dev/null; then
+	ssp_link_test=yes
+      fi
+    else
+      ssp_link_test=yes
+    fi
+  fi
+  if test x$ssp_link_test=xyes ; then
+    saved_CFLAGS="$CFLAGS"
+    CFLAGS="$CFLAGS -O2 -fstack-protector-all -Werror"
+    AC_TRY_LINK(,,
+      [AC_MSG_RESULT([yes]); enable_esp_ssp=yes],
+      [AC_MSG_RESULT([no]); enable_esp_ssp=no])
+    CFLAGS="$saved_CFLAGS"
+  else
+    [AC_MSG_RESULT([no]); enable_esp_ssp=no]
+  fi
+  if test $enable_esp_ssp = yes ; then
+    AC_DEFINE(ENABLE_ESP_SSP, 1,
+      [Define if your compiler will default to use -fstack-protector-all.])
+  fi
+  AC_MSG_CHECKING(checking for crtbeginP.o support)
+    if test x$enable_esp = xyes ; then
+      case "$target" in
+	ia64*-*-linux*)
+          enable_crtbeginP=no ;;
+        *-*-linux*)
+          if test x$gcc_cv_ld_pie = xyes && test x$lt_cv_prog_compiler_static_works = xyes; then
+            enable_crtbeginP=yes
+            AC_DEFINE(ENABLE_CRTBEGINP, 1,
+              [Define if your compiler will support crtbeginP.])
+     	  fi
+          ;;
+  	*) enable_crtbeginP=no ;;
+      esac
+    fi
+  AC_MSG_RESULT($enable_crtbeginP)
+fi
+
 # Configure the subdirectories
 # AC_CONFIG_SUBDIRS($subdirs)
 





^ permalink raw reply	[flat|nested] 2+ messages in thread

* [gentoo-commits] gentoo commit in src/patchsets/gcc/4.7.2/pie: 01_all_gcc47_configure.ac.patch 01_all_gcc47_configure.patch README.Changelog README.history
@ 2012-10-05 14:34 Magnus Granberg (zorry)
  0 siblings, 0 replies; 2+ messages in thread
From: Magnus Granberg (zorry) @ 2012-10-05 14:34 UTC (permalink / raw
  To: gentoo-commits

zorry       12/10/05 14:34:20

  Modified:             01_all_gcc47_configure.patch README.Changelog
                        README.history
  Removed:              01_all_gcc47_configure.ac.patch
  Log:
  update piepatchset to 0.5.5 for gcc 4.7.2

Revision  Changes    Path
1.3                  src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.patch

file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.patch?rev=1.3&view=markup
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.patch?rev=1.3&content-type=text/plain
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.patch?r1=1.2&r2=1.3

Index: 01_all_gcc47_configure.patch
===================================================================
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.7.2/pie/01_all_gcc47_configure.patch,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- 01_all_gcc47_configure.patch	3 Oct 2012 13:38:24 -0000	1.2
+++ 01_all_gcc47_configure.patch	5 Oct 2012 14:34:20 -0000	1.3
@@ -1,11 +1,53 @@
-2012-04-06	Magnus Granberg		<zorry@gentoo.org>
+2012-10-05	Magnus Granberg		<zorry@gentoo.org>
 
-		* configure		Add --enable-esp.  Add-fno-stack-protector
+		* configure.ac		Add --enable-esp.  Add -fno-stack-protector
 		to stage1_cflags.
-		* gcc/configure		Add --enable-esp and check if SSP works.
+		* configure		Likewise
+		* gcc/configure.ac		Add --enable-esp and check if SSP works.
 		Define ENABLE_ESP ENABLE_ESP_SSP.
 		Check if we support crtbeginP and define ENABLE_CRTBEGINP.
+		* gcc/configure	Likewise
 
+--- a/configure.ac	2011-11-29 22:36:43.000000000 +0100
++++ b/configure.ac	2011-12-07 23:29:26.125712475 +0100
+@@ -419,6 +419,25 @@ if test "${ENABLE_LIBADA}" != "yes" ; th
+   noconfigdirs="$noconfigdirs gnattools"
+ fi
+ 
++# Check whether --enable-esp was given and target have the support.
++AC_ARG_ENABLE([esp],
++[AS_HELP_STRING([--enable-esp],
++		[Enable Stack protector and Position independent executable as
++		 default if we have suppot for it when compiling
++		 and link with -z relro and -z now as default.
++		 Linux targets supported i*86, x86_64, x32, powerpc, powerpc64, ia64 and arm.])],
++[
++  case $target in
++    i?86*-*-linux* | x86_64-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
++      enable_espf=yes
++      ;;
++    *)
++      AC_MSG_WARN([*** --enable-esp is not supported on this $target target.])
++      ;;
++  esac
++])
++AC_SUBST([enable_esp])
++
+ AC_ARG_ENABLE(libssp,
+ [AS_HELP_STRING([--enable-libssp], [build libssp directory])],
+ ENABLE_LIBSSP=$enableval,
+@@ -3211,6 +3230,11 @@ if test "$GCC" = yes -a "$ENABLE_BUILD_W
+   CFLAGS="$saved_CFLAGS"
+ fi
+ 
++# Disable -fstack-protector on stage1
++if test x$enable_esp = xyes; then
++  stage1_cflags="$stage1_cflags -fno-stack-protector"
++fi
++
+ AC_SUBST(stage1_cflags)
+ 
+ # Enable --enable-checking in stage1 of the compiler.
 --- a/configure	2011-12-22 21:51:34.700589641 +0100
 +++ b/configure	2011-12-22 22:17:32.855636066 +0100
 @@ -671,6 +671,7 @@ LDFLAGS
@@ -28,11 +70,11 @@
    --disable-libquadmath-support
                            disable libquadmath support for Fortran
    --enable-libada         build libada directory
-+  --enable-esp           Enable Stack protector, Position independent
++  --enable-esp           Enable Stack protector and Position independent
 +                          executable as default if we have suppot for it when
 +                          compiling and link with -z relro and -z now as
-+                          default. Linux targets supported i*86, x86_64,
-+                          x86_x32, powerpc, powerpc64, ia64 and arm.
++                          default. Linux targets supported i*86, x86_64, x32,
++                          powerpc, powerpc64, ia64 and arm.
    --enable-libssp         build libssp directory
    --enable-static-libjava[=ARG]
                            build static libjava [default=no]
@@ -45,7 +87,7 @@
 +if test "${enable_esp+set}" = set; then :
 +  enableval=$enable_esp;
 +  case $target in
-+    i?86*-*-linux* | x86_??*-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
++    i?86*-*-linux* | x86_64-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
 +      enable_esp=yes
 +      ;;
 +    *)
@@ -73,14 +115,102 @@
  
  
  # Enable --enable-checking in stage1 of the compiler.
+--- a/gcc/configure.ac	2011-11-18 11:52:32.000000000 +0100
++++ b/gcc/configure.ac	2012-10-02 17:39:15.649526241 +0200
+@@ -5130,6 +5237,85 @@ if test x"${LINKER_HASH_STYLE}" != x; th
+                                          [The linker hash style])
+ fi
+ 
++# --------------
++# Esp checks
++# --------------
++
++# Check whether --enable-esp was given and target have the support.
++AC_ARG_ENABLE([esp],
++[AS_HELP_STRING([--enable-esp],
++		[Enable Stack protector and Position independent executable as
++		 default if we have suppot for it when compiling
++		 and link with -z relro and -z now as default.
++		 Linux targets supported i*86, x86_64, x32, powerpc, powerpc64, ia64 and arm.])],
++  enable_esp=$enableval,
++  enable_esp=no)
++if test $enable_esp = yes ; then
++  AC_MSG_CHECKING(if $target support esp)
++  case "$target" in
++    i?86*-*-linux* | x86_64-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
++      enable_esp=yes
++      AC_DEFINE(ENABLE_ESP, 1,
++        [Define if your target support esp and you have enable it.])
++      ;;
++    *)
++      enable_esp=no
++      ;;
++  esac
++AC_MSG_RESULT($enable_esp)
++fi
++AC_SUBST([enable_esp])
++if test $enable_esp = yes ; then
++ AC_MSG_CHECKING(if we can default to use -fstack-protector-all)
++  ssp_link_test=no
++  if test x$gcc_cv_libc_provides_ssp = xyes && test x$set_have_as_tls = xyes; then
++    if $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC__[ 	]+1' \
++       $target_header_dir/features.h > /dev/null; then
++      if test -f $target_header_dir/bits/uClibc_config.h && \
++         $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC_SUBLEVEL__[ 	]+([3-9][2-9]|[4-9][0-9])' \
++	 $target_header_dir/bits/uClibc_config.h > /dev/null && \
++	 $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC_HAS_TLS__[ 	]+1' \
++	 $target_header_dir/bits/uClibc_config.h > /dev/null; then
++	ssp_link_test=yes
++      fi
++    else
++      ssp_link_test=yes
++    fi
++  fi
++  if test x$ssp_link_test=xyes ; then
++    saved_CFLAGS="$CFLAGS"
++    CFLAGS="$CFLAGS -O2 -fstack-protector-all -Werror"
++    AC_TRY_LINK(,,
++      [AC_MSG_RESULT([yes]); enable_esp_ssp=yes],
++      [AC_MSG_RESULT([no]); enable_esp_ssp=no])
++    CFLAGS="$saved_CFLAGS"
++  else
++    enable_esp_ssp=no
++    AC_MSG_RESULT($enable_esp_ssp)
++  fi
++  if test $enable_esp_ssp = yes ; then
++    AC_DEFINE(ENABLE_ESP_SSP, 1,
++      [Define if your compiler will default to use -fstack-protector-all.])
++  fi
++  AC_MSG_CHECKING(checking for crtbeginP.o support)
++    if test x$enable_esp = xyes ; then
++      case "$target" in
++	ia64*-*-linux*)
++          enable_crtbeginP=no ;;
++        *-*-linux*)
++          if test x$gcc_cv_ld_pie = xyes && test x$lt_cv_prog_compiler_static_works = xyes; then
++            enable_crtbeginP=yes
++            AC_DEFINE(ENABLE_CRTBEGINP, 1,
++              [Define if your compiler will support crtbeginP.])
++     	  fi
++          ;;
++  	*) enable_crtbeginP=no ;;
++      esac
++    fi
++  AC_MSG_RESULT($enable_crtbeginP)
++fi
++AC_SUBST([enable_crtbeginP])
++
+ # Configure the subdirectories
+ # AC_CONFIG_SUBDIRS($subdirs)
+ 
 --- a/gcc/configure	2011-12-31 12:45:24.449810238 +0100
 +++ b/gcc/configure	2011-12-31 00:43:40.000000000 +0100
 @@ -600,6 +600,8 @@ ac_includes_default="\
  
  ac_subst_vars='LTLIBOBJS
  LIBOBJS
-+enable_esp
 +enable_crtbeginP
++enable_esp
  enable_plugin
  pluginlibs
  CLOOGINC
@@ -96,15 +226,15 @@
    --enable-plugin         enable plugin support
    --disable-libquadmath-support
                            disable libquadmath support for Fortran
-+  --enable-esp            Enable Stack protector, Position independent
++  --enable-esp            Enable Stack protector and Position independent
 +                          executable and Fortify_sources as default if we have
 +                          suppot for it when compiling and link -z now as
-+                          default. Linux targets supported i*86, x86_64,
-+                          x86_x32, powerpc, powerpc64, ia64, mips and arm
++                          default. Linux targets supported i*86, x86_64, x32,
++                          powerpc, powerpc64, ia64, mips and arm.
  
  Optional Packages:
    --with-PACKAGE[=ARG]    use PACKAGE [ARG=yes]
-@@ -27290,6 +27411,113 @@ _ACEOF
+@@ -27290,6 +27145,110 @@ _ACEOF
  
  fi
  
@@ -115,17 +245,16 @@
 +# Check whether --enable-esp was given and target have the support.
 +# Check whether --enable-esp was given.
 +if test "${enable_esp+set}" = set; then :
-+  enableval=$enable_esp; set_enable_esp=$enableval
++  enableval=$enable_esp; enable_esp=$enableval
 +else
-+  set_enable_esp=no
++  enable_esp=no
 +fi
 +
-+if test $set_enable_esp = yes ; then
++if test $enable_esp = yes ; then
 +  { $as_echo "$as_me:${as_lineno-$LINENO}: checking if $target support esp" >&5
 +$as_echo_n "checking if $target support esp... " >&6; }
-+if test $set_enable_esp = yes ; then
 +  case "$target" in
-+    i?86*-*-linux* | x86_??*-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
++    i?86*-*-linux* | x86_64-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
 +      enable_esp=yes
 +
 +$as_echo "#define ENABLE_ESP 1" >>confdefs.h
@@ -135,23 +264,19 @@
 +      enable_esp=no
 +      ;;
 +  esac
-+else
-+ enable_esp=no
-+fi
 +{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $enable_esp" >&5
 +$as_echo "$enable_esp" >&6; }
 +fi
 +
 +if test $enable_esp = yes ; then
-+
-+  { $as_echo "$as_me:${as_lineno-$LINENO}: checking if we can default to use -fstack-protector" >&5
-+$as_echo_n "checking if we can default to use -fstack-protector... " >&6; }
++ { $as_echo "$as_me:${as_lineno-$LINENO}: checking if we can default to use -fstack-protector-all" >&5
++$as_echo_n "checking if we can default to use -fstack-protector-all... " >&6; }
 +  ssp_link_test=no
 +  if test x$gcc_cv_libc_provides_ssp = xyes && test x$set_have_as_tls = xyes; then
 +    if $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC__[ 	]+1' \
 +       $target_header_dir/features.h > /dev/null; then
 +      if test -f $target_header_dir/bits/uClibc_config.h && \
-+	 $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC_SUBLEVEL__[ 	]+([3-9][2-9]|[4-9][0-9])' \
++         $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC_SUBLEVEL__[ 	]+([3-9][2-9]|[4-9][0-9])' \
 +	 $target_header_dir/bits/uClibc_config.h > /dev/null && \
 +	 $EGREP '^ 	*#[ 	]*define[ 	]+__UCLIBC_HAS_TLS__[ 	]+1' \
 +	 $target_header_dir/bits/uClibc_config.h > /dev/null; then
@@ -163,7 +288,7 @@
 +  fi
 +  if test x$ssp_link_test=xyes ; then
 +    saved_CFLAGS="$CFLAGS"
-+    CFLAGS="$CFLAGS -O2 -fstack-protector -Werror"
++    CFLAGS="$CFLAGS -O2 -fstack-protector-all -Werror"
 +    cat confdefs.h - <<_ACEOF >conftest.$ac_ext
 +/* end confdefs.h.  */
 +
@@ -186,16 +311,18 @@
 +    conftest$ac_exeext conftest.$ac_ext
 +    CFLAGS="$saved_CFLAGS"
 +  else
-+    { $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5
-+$as_echo "no" >&6; }
 +    enable_esp_ssp=no
++    { $as_echo "$as_me:${as_lineno-$LINENO}: result: $enable_esp_ssp" >&5
++$as_echo "$enable_esp_ssp" >&6; }
 +  fi
 +  if test $enable_esp_ssp = yes ; then
 +
 +$as_echo "#define ENABLE_ESP_SSP 1" >>confdefs.h
 +
++  fi
 +  { $as_echo "$as_me:${as_lineno-$LINENO}: checking checking for crtbeginP.o support" >&5
 +$as_echo_n "checking checking for crtbeginP.o support... " >&6; }
++    if test x$enable_esp = xyes ; then
 +      case "$target" in
 +	ia64*-*-linux*)
 +          enable_crtbeginP=no ;;
@@ -212,9 +339,9 @@
 +    fi
 +  { $as_echo "$as_me:${as_lineno-$LINENO}: result: $enable_crtbeginP" >&5
 +$as_echo "$enable_crtbeginP" >&6; }
-+
 +fi
 +
++
  # Configure the subdirectories
  # AC_CONFIG_SUBDIRS($subdirs)
  



1.3                  src/patchsets/gcc/4.7.2/pie/README.Changelog

file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.Changelog?rev=1.3&view=markup
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.Changelog?rev=1.3&content-type=text/plain
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.Changelog?r1=1.2&r2=1.3

Index: README.Changelog
===================================================================
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.7.2/pie/README.Changelog,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- README.Changelog	3 Oct 2012 13:38:24 -0000	1.2
+++ README.Changelog	5 Oct 2012 14:34:20 -0000	1.3
@@ -1,3 +1,11 @@
+0.5.5 Magnus Granberg		<zorry@gentoo.org>
+
+		#436924
+		* configure.ac			Fix --enable-esp text
+		* configure			Regenareted
+		* gcc/configure.ac		Fix crtbeginP, --enable-esp text and set_enable_esp
+		* gcc/configure		Regenareted
+
 0.5.4 Magnus Granberg		<zorry@gentoo.org>
 
 		#436924



1.3                  src/patchsets/gcc/4.7.2/pie/README.history

file : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.history?rev=1.3&view=markup
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.history?rev=1.3&content-type=text/plain
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/gcc/4.7.2/pie/README.history?r1=1.2&r2=1.3

Index: README.history
===================================================================
RCS file: /var/cvsroot/gentoo/src/patchsets/gcc/4.7.2/pie/README.history,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- README.history	3 Oct 2012 13:38:24 -0000	1.2
+++ README.history	5 Oct 2012 14:34:20 -0000	1.3
@@ -1,6 +1,9 @@
+0.5.5		04 Oct 2012
+		U 01_all_gcc47_configure.patch
+		- 01_all_gcc47_configure.ac.patch
 0.5.4		02 Oct 2012
 		U 01_all_gcc47_configure.patch
-		+  01_all_gcc47_configure.ac.patch
+		+ 01_all_gcc47_configure.ac.patch
 0.5.3		06 Apr 2012
 		U 01_all_gcc47_configure.patch
 		+ 02_all_gcc47_config.in.patch





^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2012-10-05 14:34 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-10-05 14:34 [gentoo-commits] gentoo commit in src/patchsets/gcc/4.7.2/pie: 01_all_gcc47_configure.ac.patch 01_all_gcc47_configure.patch README.Changelog README.history Magnus Granberg (zorry)
  -- strict thread matches above, loose matches on Subject: below --
2012-10-03 13:38 Magnus Granberg (zorry)

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox