public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Magnus Granberg" <zorry@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] proj/hardened-gccpatchset:master commit in: upstream/
Date: Fri, 24 Jun 2011 09:36:21 +0000 (UTC)	[thread overview]
Message-ID: <20165346ace9b21623b4ceda5c27fa6600ce783c.zorry@gentoo> (raw)

commit:     20165346ace9b21623b4ceda5c27fa6600ce783c
Author:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
AuthorDate: Fri Jun 24 09:35:37 2011 +0000
Commit:     Magnus Granberg <zorry <AT> gentoo <DOT> org>
CommitDate: Fri Jun 24 09:35:37 2011 +0000
URL:        http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-gccpatchset.git;a=commit;h=20165346

Updated the configure.ac patch for upstream rev 4

---
 upstream/configure.ac.patch |   27 +++++++++++----------------
 1 files changed, 11 insertions(+), 16 deletions(-)

diff --git a/upstream/configure.ac.patch b/upstream/configure.ac.patch
index a0918cd..396cd0e 100644
--- a/upstream/configure.ac.patch
+++ b/upstream/configure.ac.patch
@@ -1,4 +1,4 @@
-2011-06-23	Magnus Granberg		<zorry@gentoo.org>
+2011-06-24	Magnus Granberg		<zorry@gentoo.org>
 
 		* configure		Add --enable-espf.  Add -fno-stack-protector
 		to stage1_cflags.
@@ -44,8 +44,8 @@
  if test "$GCC" = yes -a "$ENABLE_BUILD_WITH_CXX" != yes; then
    saved_CFLAGS="$CFLAGS"
 --- a/gcc/configure.ac	2011-04-13 19:12:53.000000000 +0200
-+++ b/gcc/configure.ac	2011-06-23 20:07:06.952639786 +0200
-@@ -4515,6 +4515,150 @@
++++ b/gcc/configure.ac	2011-06-24 03:17:07.448179335 +0200
+@@ -4515,6 +4515,145 @@
  AC_SUBST(MAINT)dnl
  
  # --------------
@@ -59,12 +59,8 @@
 +		 Fortify_sources as default if we have suppot for it when compiling
 +		 and link with -z relro and -z now as default.
 +		 Linux targets supported x86_64])],
-+ [case $espf in
-+    yes | no) ;;
-+    *) AC_MSG_ERROR(['$espf' is an invalid value for --enable-espf.
-+Valid choices are 'yes' and 'no'.]) ;;
-+  esac],
-+ [set_espf_enable="$espf"])
++	set_enable_espf=$enableval,
++	set_enable_espf=no)
 +if test $set_enable_espf = yes ; then
 +  AC_MSG_CHECKING(if $target support espf)
 +if test $set_enable_espf = yes ; then
@@ -124,15 +120,14 @@
 +      [gcc_cv_libc_provides_fortify=no
 +    case "$target" in
 +       *-*-linux*)
-+      [# glibc 2.4 and later provides __stack_chk_fail and
-+      # either __stack_chk_guard, or TLS access to stack guard canary.
++      [# glibc 2.8 and later provides _FORTIFY_SOURCES.
 +      if test -f $target_header_dir/features.h; then
 +        if $EGREP '^[ 	]*#[ 	]*define[ 	]+__GLIBC__[ 	]+2' \
 +	     $target_header_dir/features.h > /dev/null \
-+	     && $EGREP '^[ 	]*#[ 	]*define[ 	]+__GLIBC_MINOR__[ 	]+([1-9][0-9]|[4-9])' \
++	     && $EGREP '^[ 	]*#[ 	]*define[ 	]+__GLIBC_MINOR__[ 	]+([1-9][0-9]|[8-9])' \
 +	     $target_header_dir/features.h > /dev/null; then
 +	  gcc_cv_libc_provides_fortify=yes
-+        elif $EGREP '^[ 	]*#[ 	]*define[ 	]+__UCLIBC__[ 	]+1' \
++        elif $EGREP '^[ 	]*#[ 	]*define[ 	]+__UCLIBC__[ 	]' \
 +	     $target_header_dir/features.h > /dev/null ; then
 +             gcc_cv_libc_provides_fortify=no
 +	fi
@@ -153,11 +148,11 @@
 +AC_MSG_CHECKING(if the compiler default to use -fstack-protector)
 +  if test $set_enable_espf = yes && test x$gcc_cv_libc_provides_ssp = xyes \
 +  && test $set_have_as_tls = yes ; then
-+    enable_espf_pie=yes
++    enable_espf_ssp=yes
 +    AC_DEFINE(ENABLE_ESPF_SSP, 1,
 +      [Define if your compiler will default to use -fstack-protector.])
 +  else
-+    enable_espf_pie=no
++    enable_espf_ssp=no
 +  fi
 +  AC_MSG_RESULT($enable_espf_ssp)
 +
@@ -195,4 +190,4 @@
 +# --------------
  # Language hooks
  # --------------
- 
\ No newline at end of file
+ 



             reply	other threads:[~2011-06-24  9:36 UTC|newest]

Thread overview: 22+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-06-24  9:36 Magnus Granberg [this message]
  -- strict thread matches above, loose matches on Subject: below --
2013-11-13 21:13 [gentoo-commits] proj/hardened-gccpatchset:master commit in: upstream/ Magnus Granberg
2013-11-13 21:00 Magnus Granberg
2013-11-10 10:23 Magnus Granberg
2012-10-07 16:54 Magnus Granberg
2012-10-07 16:50 Magnus Granberg
2012-08-27 23:34 Magnus Granberg
2012-08-22 19:19 Magnus Granberg
2012-08-21 20:10 Magnus Granberg
2012-08-08 16:05 Magnus Granberg
2012-08-01 18:35 Magnus Granberg
2012-07-30 21:05 Magnus Granberg
2012-07-25 15:09 Magnus Granberg
2012-04-08 13:00 Magnus Granberg
2012-04-08 12:36 Magnus Granberg
2011-06-24 14:45 Magnus Granberg
2011-06-24 14:32 Magnus Granberg
2011-06-24 14:15 Magnus Granberg
2011-06-24 13:51 Magnus Granberg
2011-06-23 18:15 Magnus Granberg
2011-06-22  0:27 Magnus Granberg
2011-04-27 11:12 Magnus Granberg

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20165346ace9b21623b4ceda5c27fa6600ce783c.zorry@gentoo \
    --to=zorry@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox