aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'espf-gcc-4.3.4/README.Changelog')
-rw-r--r--espf-gcc-4.3.4/README.Changelog232
1 files changed, 0 insertions, 232 deletions
diff --git a/espf-gcc-4.3.4/README.Changelog b/espf-gcc-4.3.4/README.Changelog
deleted file mode 100644
index 462ffe7..0000000
--- a/espf-gcc-4.3.4/README.Changelog
+++ /dev/null
@@ -1,232 +0,0 @@
-0.3.9 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/configure Added check for TLS on the target in the SSP check.
-
- #149292 b.g.o
- * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux64.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/rs6000/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux64.h Removed uclibc don't support TLS on stack-protector
-
-0.3.8 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/configure Added a -fstack-protector check.
- * gcc/config.in Added HAVE_GCC_SSP
- * gcc/gcc.c Removed code for espf_link_spec in do_spec_1() %X
- * gcc/espf.h Added ifdef HAVE_GCC_SSP, change code for espf_link_spec and link_pie_spec
-
-0.3.7 Magnus Granberg <zorry@ume.nu>
-
- * gcc/gcc.c Remove code for Wl,-z,now check
- * gcc/espf.h Change text for -z now
-
-0.3.6 Magnus Granberg <zorry@ume.nu>
-
- * configure Check --enable-espf change ppc* to powerpc*, powerpc64 and add ia64.
- * gcc/configure Don't check for -z,relro on ia64. Disable crtbeginTS for ia64.
- * gcc/espf.h ia64 don't support -fstack-protector*
-
-0.3.5 Maguns Granberg <zorry@ume.nu>
-
- * gcc/espf.h Change the specs for crtbegin.TS.o.
- * gcc/gcc.c Rename espf_cc1_options to espf_options_pie_check.
- * gcc/config/linux.h Fix typos ENABLE_CRTBEGINS to ENABLE_CRTBEGINTS
- * gcc/config/rs6000/linux64.h ASM_SPEC32: %{fpic:-K PIC} %{fPIC:-K PIC} to %{fpic|fPIC|fpie|fPIE:-K PIC}
-
-0.3.4 Magnus Granberg <zorry@ume.nu>
-
- * gcc/configure Add crtbeginTS.o support.
- * gcc/Makefile.in Add crtbeginTS.o support.
- * gcc/gcc.c Add espf_cc1_options.
- * gcc/espf.h Added espf_cc1_options, crtbeginTS.o support,
- espf_cc1_options and espf_cc1_strictoverflow.
- * gcc/config.in Add crtbeginTS.o support.
- * gcc/config/linux.h Add crtbeginTS.o support.
- * gcc/config/rs6000/sysv4.h Add crtbeginTS.o support.
- * gcc/doc/invoke.texi Add NOTES about -fstack-protector-all,
- -pie and -fPIE.
- * libgcc/Makefile.in Add crtbeginTS.o support.
-
-0.3.3 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c change #ifdef ENABLE_ESPF to #ifndef ENABLE_ESPF
-
-0.3.2 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c disable flag_delete_null_pointer_checks >= -O2
- * gcc/espf.h add ESPF_CC1_SSP_SPEC and ESPF_CC1_PIE_SPEC to fix bugs on -vanilla spec
-
- #149292 b.g.o
- * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux64.h uclibc don't support TLS on stack-protector
- * gcc/config/rs6000/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux64.h uclibc don't support TLS on stack-protector
-
-0.3.1 Magnus Granberg <zorry@ume.nu>
-
- * gcc/cp/Make-lang.in cc1plus: pch test fail when cc1plus is compile with -fPIE.
- * gcc/configure fix --enable-espf when USE"-hardened"
-
-4.4.1-espf-0.3.0 Magnus Granberg <zorry@ume.nu>
-
- * gcc/espf.h add ESPF_LINK_SPEC ESPF_LINK_NOW_SPEC
- * gcc/gcc.c move do_self_spec (espf_command_options_spec)
- do_spec_1() add espf_link_spec
-
-0.3.0 Magnus Granberg <zorry@ume.nu>
-
- * gcc/objc/lang-specs.h Add %(espf_options)
- * gcc/objcp/lang-specs.h Add %(espf_options)
- * gcc/cp/lang-specs.h Add %(espf_options)
- * gcc/config.in removed ENABLE_LIBSSP
- * Makefile.in We add -fno-stack-protector to
- BOOT_CFLAGS, LIBCFLAGS and LIBCXXFLAGS
- cc1: pch.exp test fail when cc1 is compile with -fPIE
- * libmudflap/Makefiles.in Add -fno-stack-protector -U_FORTIFY_SOURCE
- to AM_CFLAGS
- * configure add --enable-espf
- add -fno-stack-protector to stage1_cflags
- add targes ppc* arm sparc*
- * gcc/configure change code for check --enable-espf
- * libmudflap/configure add enable_espf
- * gcc/espf.h ESPF_CC1_OPTIONS_SPEC renamed to ESPF_OPTIONS_SPEC
- add ESPF_CPP_OPTIONS_SPEC ESPF_COMMAND_OPTIONS_SPEC
- ESPF_CC1_OPTIONS_SSP_SPEC renamed to ESPF_OPTIONS_SSP_SPEC
- ESPF_COMPILER_COMMAND_PIE_SPEC renamed to ESPF_OPTIONS_PIE_SPEC
- ESPF_LINK_COMMAND_PIE_SPEC renamed to ESPF_LINK_PIE_SPEC
- add !p !pg to ESPF_LINK_PIE_SPEC
- removed ESPF_LINK_SPEC ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC
- * gcc/gcc.c cpp_options add %(espf_cpp_options)
- compiler spec add %(espf_options)
- change code for ESPF_EXTRA_SPECS
- process_command(): Check for lazy, or now
- do_spec_1(): Add -z now and -z relro
- main() add do_self_spec (espf_command_options_spec)
- removed do_self_spec (espf_cc1_command_spec) do_self_spec (espf_link_command_spec)
-
-0.2.9 Magnus Granberg <zorry@ume.nu>
-
- * gcc/espf.h add ESPF_COMPILER_COMMAND_PIE_SPEC
- add ESPF_LINK_COMMAND_PIE_SPEC
- change ESPF_COMPILER_COMMAND_SPEC ESPF_LINK_COMMAND_SPEC
-
-0.2.8 Magnus Granberg <zorry@ume.nu>
-
- * gcc/configure removed check crtbeginTS.o
- * gcc/espf.h added notes
- add ESPF_CC1_SPEC
- removed ESPF_CPP_UNIQUE_OPTIONS espf_override_options()
- * gcc/gcc.c cc1_spec Set it to CC1_SPEC if ! ENABLE_ESPF
- * gcc/toplev.c removed ESPF_OVERRIDE_OPTIONS
-
-0.2.7 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c (decode_options): Remove flag_strict_overflow as opt2
- * gcc/config.in removed HAVE_CRTBEGINTS
- * gcc/Makefile removed crtbeginTS.o
- * libgcc/Makefile.in removed crtbeginTS.o
- * gcc/config/i386/i386.h removed espf_override_options ESPF_EXTRA_SPECS
- * gcc/config/linux.h remoevd crtbeginTS.o
- * gcc/espf.h ESPF_CC1_OPTIONS_PIE_SPEC renamed to ESPF_CC1_COMMAND_SPEC
- * gcc/gcc.c add ESPF_EXTRA_SPECS
- main() add do_self_spec (espf_cc1_command_spec)
-
-0.2.6 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h add espf_override_options() to OVERRIDE_OPTIONS
- * gcc/espf.h add espf_override_options()
- * gcc/toplev.c add ESPF_OVERRIDE_OPTIONS
-
-0.2.5 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h removed espf_cc1
- * gcc/config/i386/linux.h removed espf_cc1 %(crtend_gen)
- * gcc/config/i386/x86-64.h removed espf_cc1 %(crtend_gen)
- * gcc/config/linux.h removed espf_cc1 %(crtfile_gen)
- %(crtbegin_t_gen) %(crtend_gen)
- add crtbeginTS.o
- * gcc/config.in removed TARGET_LIBC_PROVIDES_PIE
- add HAVE_CRTBEGINTS
- * gcc/Makefile.in add ESPF_NOPIE_CFLAGS ESPF_NOSSP_CFLAGS to
- CRTSTUFF_T_CFLAGS
- add ESPF_NOSSP_CFLAGS to CRTSTUFF_T_CFLAGS_S
- * espf.h ESPF_CC1_SPEC renamed to ESPF_CC1_OPTIONS_SPEC
- add ESPF_LINK_SPEC
- ESPF_CC1_SSP_SPEC renamed to ESPF_CC1_OPTIONS_SSP_SPEC
- ESPF_CC1_PIE_SPEC renamed to ESPF_CC1_OPTIONS_PIE_SPEC
- ESPF_CC1_OPTIONS_SPEC renamed to ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC
- LINK_PIE_SPEC renamed to ESPF_LINK_COMMAND_SPEC
- removed ESPF_CC1_STRICT_SPEC CRTFILE_GEN_SPEC CRTBEGIN_GEN_SPEC
- CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC
- * gcc/configure remove TARGET_LIBC_PROVIDES_PIE
- define HAVE_CRTBEGINTS
- * gcc/gcc.c LINK_COMMAND_SPEC add %(espf_link)
- main() add do_self_spec (espf_link_command_spec)
-
-0.2.4 Magnus Granberg <zorry@ume.nu>
-
- libgcc/Makefile.in clean specs
-
-0.2.3 Magnus Granberg <zorry@ume.nu>
-
- *gcc/espf.h add ESPF_CC1_STRICT_SPEC
-
-0.2.2 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h Add espf_cc1
- Add ESPF_EXTRA_SPECS
- * gcc/config/i386/linux.h Add espf_cc1
- * gcc/config/i386/x86-64.h Add espf_cc1
- * gcc/config/linux.h Add espf_cc1
- * gcc/Makefile.in add crtbeginTS.o to EXTRA_PARTS list
- * libgcc/Makefile.in add crtbeginTS.o to EXTRA_PARTS list
- * gcc/configure add define ENABLE_LIBSSP
- * gcc/gcc.c %(fortify_default) renamed to %(espf_cpp_unique_options)
- %(pie_incompatible) renamed to %(espf_cc1_options)
- removed ESPF_EXTRA_SPECS
- * gcc/espf.h ESPF_DEFAULT_SPEC renamed to ESPF_CC1_SPEC
- SSP_DEFAULT_SPEC renamed to ESPF_CC1_SSP_SPEC
- FORTIFY_DEFAULT_SPEC renamed to ESPF_CPP_UNIQUE_OPTIONS
- PIE_DEFAULT_SPEC renamed to ESPF_CC1_PIE_SPEC
- PIE_INCOMPATIBLE_SPEC renamed to ESPF_CC1_OPTIONS_SPEC
- add new CRTFILE_GEN_SPEC CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC if !
- TARGET_LIBC_PROVIDES_PIE
-
-4.4.0-espf-0.2.1 Magnus Granberg <zorry@ume.nu>
-
- * gcc/gcc.c include: espf.h
- cc1_spec = CC1_SPEC if not ENABLE_ESPF
- cpp_unique_options add %(fortify_default)
- cc1_options add %(pie_incompatible)
- EXTRA_SPECS add ESPF_EXTRA_SPECS
- * libgcc/Makefile.in add crtbeginTs.o
- gcc/Makefile.in add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS
- LIBGCC2_CFLAGS add ESPF_NOSSP_CFLAGS
- CRTSTUFF_CFLAGS add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS
- crtbegin* add crtbeginTS
- $(out_object_file): ix86_split_to_parts() stack smashing attack b.g.o #149292
- * libgcc/configure add enable_espf
- * gcc/config/linux.h add %(crtfile_gen) %(crtbegin_t_gen) %(crtend_gen)
- * gcc/config/i386/linux.h add %(crtend_gen)
- * gcc/config/i386/linux64.h add %(crtend_gen)
- * gcc/config.gcc extra_parts add crtbeginTS.o
- * libgcc/config.host extra_parts add crtbeginTS.o
- * gcc/configure check -z relro
- check -z now
- check FORTIFY_SOURCES level 2
- check Scrt1.o
- check --enable-espf
- check crtbeginTS.o
- * gcc/espf.h new file
- * gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib
- * gcc/config.in add ENABLE_LIBSSP
- add ENABLE_ESPF
- add TARGET_LIBC_PROVIDES_FORTIFY2
- add TARGET_LIBC_PROVIDES_PIE
- * configure define ENABLE_LIBSSP
-
-gcc-4.3.3-piepatches-v10.2.1 \ No newline at end of file