aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMagnus Granberg (Zorry) <zorry@gentoo.org>2010-05-04 00:31:24 +0200
committerMagnus Granberg (Zorry) <zorry@gentoo.org>2010-05-04 00:31:24 +0200
commitc6586cc971280cdbb8aa8f9d385e07a14ae98ae1 (patch)
treee0f785824a06bd11bdabd14e6ee3166f6c6043cd
parentMove the warntrampolin patch to /upstream (diff)
downloadhardened-gccpatchset-c6586cc971280cdbb8aa8f9d385e07a14ae98ae1.tar.gz
hardened-gccpatchset-c6586cc971280cdbb8aa8f9d385e07a14ae98ae1.tar.bz2
hardened-gccpatchset-c6586cc971280cdbb8aa8f9d385e07a14ae98ae1.zip
Removed some files
-rw-r--r--README~2
-rw-r--r--Todo~6
-rw-r--r--espf-gcc-4.3.4/10_all_gcc43_configure.patch320
-rw-r--r--espf-gcc-4.3.4/11_all_gcc44_config.in.patch49
-rw-r--r--espf-gcc-4.3.4/12_all_gcc43_Makefile.in.patch208
-rw-r--r--espf-gcc-4.3.4/20_all_gcc43_gcc.c.patch146
-rw-r--r--espf-gcc-4.3.4/21_all_gcc44_decl-tls-model.patch20
-rw-r--r--espf-gcc-4.3.4/30_all_gcc44_espf.h.patch156
-rw-r--r--espf-gcc-4.3.4/33_all_gcc44_config_rs6000_linux64.h.patch16
-rw-r--r--espf-gcc-4.3.4/35_all_gcc44_config_crtbegints.patch36
-rw-r--r--espf-gcc-4.3.4/40_all_gcc44_cp_lang-specs.h.patch30
-rw-r--r--espf-gcc-4.3.4/41_all_gcc44_objc_lang-specs.h.patch37
-rw-r--r--espf-gcc-4.3.4/42_all_gcc44_objcp_lang-specs.h.patch35
-rw-r--r--espf-gcc-4.3.4/60_all_gcc44_invoke.texi.patch44
-rw-r--r--espf-gcc-4.3.4/README18
-rw-r--r--espf-gcc-4.3.4/README.Changelog232
-rw-r--r--espf-gcc-4.3.4/README.Gentoo.patches28
-rw-r--r--espf-gcc-4.3.4/README.history154
-rw-r--r--espf-gcc-4.4.3/10_all_gcc44_configure.patch320
-rw-r--r--espf-gcc-4.4.3/11_all_gcc44_config.in.patch50
-rw-r--r--espf-gcc-4.4.3/12_all_gcc44_Makefile.in.patch209
-rw-r--r--espf-gcc-4.4.3/20_all_gcc44_gcc.c.patch146
-rw-r--r--espf-gcc-4.4.3/21_all_gcc44_decl-tls-model.patch20
-rw-r--r--espf-gcc-4.4.3/30_all_gcc44_espf.h.patch156
-rw-r--r--espf-gcc-4.4.3/33_all_gcc44_config_rs6000_linux64.h.patch16
-rw-r--r--espf-gcc-4.4.3/35_all_gcc44_config_crtbegints.patch36
-rw-r--r--espf-gcc-4.4.3/40_all_gcc44_cp_lang-specs.h.patch30
-rw-r--r--espf-gcc-4.4.3/41_all_gcc44_objc_lang-specs.h.patch37
-rw-r--r--espf-gcc-4.4.3/42_all_gcc44_objcp_lang-specs.h.patch35
-rw-r--r--espf-gcc-4.4.3/60_all_gcc44_invoke.texi.patch44
-rw-r--r--espf-gcc-4.4.3/README18
-rw-r--r--espf-gcc-4.4.3/README.Changelog232
-rw-r--r--espf-gcc-4.4.3/README.Gentoo.patches28
-rw-r--r--espf-gcc-4.4.3/README.history154
-rw-r--r--espf-gcc-4.5.0/10_all_gcc45_configure.patch292
-rw-r--r--espf-gcc-4.5.0/11_all_gcc44_config.in.patch49
-rw-r--r--espf-gcc-4.5.0/12_all_gcc45_Makefile.in.patch200
-rw-r--r--espf-gcc-4.5.0/20_all_gcc45_gcc.c.patch146
-rw-r--r--espf-gcc-4.5.0/21_all_gcc44_decl-tls-model.patch20
-rw-r--r--espf-gcc-4.5.0/30_all_gcc44_espf.h.patch156
-rw-r--r--espf-gcc-4.5.0/33_all_gcc44_config_rs6000_linux64.h.patch16
-rw-r--r--espf-gcc-4.5.0/33_all_gcc45_config_rs6000_linux64.h.patch16
-rw-r--r--espf-gcc-4.5.0/35_all_gcc44_config_crtbegints.patch36
-rw-r--r--espf-gcc-4.5.0/40_all_gcc44_cp_lang-specs.h.patch30
-rw-r--r--espf-gcc-4.5.0/41_all_gcc44_objc_lang-specs.h.patch37
-rw-r--r--espf-gcc-4.5.0/42_all_gcc44_objcp_lang-specs.h.patch35
-rw-r--r--espf-gcc-4.5.0/50_all_gcc44_no_ssp_tls_uclibc.patch87
-rw-r--r--espf-gcc-4.5.0/60_all_gcc44_invoke.texi.patch44
-rw-r--r--espf-gcc-4.5.0/README18
-rw-r--r--espf-gcc-4.5.0/README.Changelog235
-rw-r--r--espf-gcc-4.5.0/README.Gentoo.patches28
-rw-r--r--espf-gcc-4.5.0/README.history207
-rw-r--r--gcc-4.5.0/piepatch/00_all_gcc45-trampolinewarn.patch33
-rw-r--r--gcc-4.5.0/piepatch/11_all_gcc45_config.in.patch52
-rw-r--r--gcc-4.5.0/piepatch/README.Changelog4
-rw-r--r--gcc-4.5.0/piepatch/README.history1
-rw-r--r--specs/README.Changelog85
-rw-r--r--specs/README.Gentoo.patches28
-rw-r--r--specs/README.history56
-rw-r--r--specs/hardenednopie.specs12
-rw-r--r--specs/hardenednossp.specs6
-rw-r--r--specs/vanilla.specs8
62 files changed, 0 insertions, 5005 deletions
diff --git a/README~ b/README~
deleted file mode 100644
index 6185ae4..0000000
--- a/README~
+++ /dev/null
@@ -1,2 +0,0 @@
-This overlay is for the Hardened GCC patchset.
-
diff --git a/Todo~ b/Todo~
deleted file mode 100644
index d91fe95..0000000
--- a/Todo~
+++ /dev/null
@@ -1,6 +0,0 @@
-espf-0.3.8
-Have added the SSP check and change some spec for espf_link
-so it need some testing
-Need to fix the -fno-strict-overflow spec so it done pass it on -vanilla.
-Berore marking it as 0.3.8 for gcc-4.4.3
-/Zorry
diff --git a/espf-gcc-4.3.4/10_all_gcc43_configure.patch b/espf-gcc-4.3.4/10_all_gcc43_configure.patch
deleted file mode 100644
index ff6556b..0000000
--- a/espf-gcc-4.3.4/10_all_gcc43_configure.patch
+++ /dev/null
@@ -1,320 +0,0 @@
-2010-04-14 Magnus Granberg <zorry@gentoo.org>
-
- * configure Add --enable-espf. Add-fno-stack-protector
- to stage1_cflags.
- * gcc/configure Check -z now and -z relro.
- Check if the compiler support -fstack-protector and define HAVE_GCC_SSP.
- Check if we support FORTIFY_SOURCES.
- Define ENABLE_ESPF.
- * libmudflap/configure Add AC_SUBST enable_espf.
-
- On Gentoo
- * gcc/configure We don't need to check for FORTIFY_SOURCES support.
- Check if the compiler support -fstack-protector and define HAVE_GCC_SSP.
- Check if we support crtbeginTS and define ENABLE_CRTBEGINTS.
- Add AC_SUBST enable_crtbeginTS.
-
---- configure 2009-04-29 01:16:59.000000000 +0200
-+++ configure 2009-07-21 18:45:41.000000000 +0200
-@@ -272,7 +272,7 @@
- PACKAGE_BUGREPORT=
-
- ac_unique_file="move-if-change"
--ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS build build_cpu build_vendor build_os build_noncanonical host_noncanonical target_noncanonical host host_cpu host_vendor host_os target target_cpu target_vendor target_os INSTALL_PROGRAM INSTALL_SCRIPT INSTALL_DATA LN LN_S TOPLEVEL_CONFIGURE_ARGUMENTS build_libsubdir build_subdir host_subdir target_subdir CC CFLAGS LDFLAGS CPPFLAGS ac_ct_CC EXEEXT OBJEXT CXX CXXFLAGS ac_ct_CXX GNATBIND ac_ct_GNATBIND GNATMAKE ac_ct_GNATMAKE do_compare gmplibs gmpinc extra_mpfr_configure_flags stage1_languages SYSROOT_CFLAGS_FOR_TARGET DEBUG_PREFIX_CFLAGS_FOR_TARGET RPATH_ENVVAR tooldir build_tooldir CONFIGURE_GDB_TK GDB_TK INSTALL_GDB_TK build_configargs build_configdirs host_configargs configdirs target_configargs AR_FOR_BUILD AS_FOR_BUILD CC_FOR_BUILD CFLAGS_FOR_BUILD CXXFLAGS_FOR_BUILD CXX_FOR_BUILD DLLTOOL_FOR_BUILD GCJ_FOR_BUILD GFORTRAN_FOR_BUILD LDFLAGS_FOR_BUILD LD_FOR_BUILD NM_FOR_BUILD RANLIB_FOR_BUILD WINDMC_FOR_BUILD WINDRES_FOR_BUILD config_shell YACC BISON M4 LEX FLEX MAKEINFO EXPECT RUNTEST AR AS DLLTOOL LD LIPO NM RANLIB STRIP WINDRES WINDMC OBJCOPY OBJDUMP CC_FOR_TARGET CXX_FOR_TARGET GCC_FOR_TARGET GCJ_FOR_TARGET GFORTRAN_FOR_TARGET AR_FOR_TARGET AS_FOR_TARGET DLLTOOL_FOR_TARGET LD_FOR_TARGET LIPO_FOR_TARGET NM_FOR_TARGET OBJDUMP_FOR_TARGET RANLIB_FOR_TARGET STRIP_FOR_TARGET WINDRES_FOR_TARGET WINDMC_FOR_TARGET RAW_CXX_FOR_TARGET FLAGS_FOR_TARGET COMPILER_AS_FOR_TARGET COMPILER_LD_FOR_TARGET COMPILER_NM_FOR_TARGET MAINTAINER_MODE_TRUE MAINTAINER_MODE_FALSE MAINT stage1_cflags stage1_checking stage2_werror_flag datarootdir docdir pdfdir htmldir LIBOBJS LTLIBOBJS'
-+ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS build build_cpu build_vendor build_os build_noncanonical host_noncanonical target_noncanonical host host_cpu host_vendor host_os target target_cpu target_vendor target_os INSTALL_PROGRAM INSTALL_SCRIPT INSTALL_DATA LN LN_S TOPLEVEL_CONFIGURE_ARGUMENTS build_libsubdir build_subdir host_subdir target_subdir enable_espf CC CFLAGS LDFLAGS CPPFLAGS ac_ct_CC EXEEXT OBJEXT CXX CXXFLAGS ac_ct_CXX GNATBIND ac_ct_GNATBIND GNATMAKE ac_ct_GNATMAKE do_compare gmplibs gmpinc extra_mpfr_configure_flags stage1_languages SYSROOT_CFLAGS_FOR_TARGET DEBUG_PREFIX_CFLAGS_FOR_TARGET RPATH_ENVVAR tooldir build_tooldir CONFIGURE_GDB_TK GDB_TK INSTALL_GDB_TK build_configargs build_configdirs host_configargs configdirs target_configargs AR_FOR_BUILD AS_FOR_BUILD CC_FOR_BUILD CFLAGS_FOR_BUILD CXXFLAGS_FOR_BUILD CXX_FOR_BUILD DLLTOOL_FOR_BUILD GCJ_FOR_BUILD GFORTRAN_FOR_BUILD LDFLAGS_FOR_BUILD LD_FOR_BUILD NM_FOR_BUILD RANLIB_FOR_BUILD WINDMC_FOR_BUILD WINDRES_FOR_BUILD config_shell YACC BISON M4 LEX FLEX MAKEINFO EXPECT RUNTEST AR AS DLLTOOL LD LIPO NM RANLIB STRIP WINDRES WINDMC OBJCOPY OBJDUMP CC_FOR_TARGET CXX_FOR_TARGET GCC_FOR_TARGET GCJ_FOR_TARGET GFORTRAN_FOR_TARGET AR_FOR_TARGET AS_FOR_TARGET DLLTOOL_FOR_TARGET LD_FOR_TARGET LIPO_FOR_TARGET NM_FOR_TARGET OBJDUMP_FOR_TARGET RANLIB_FOR_TARGET STRIP_FOR_TARGET WINDRES_FOR_TARGET WINDMC_FOR_TARGET RAW_CXX_FOR_TARGET FLAGS_FOR_TARGET COMPILER_AS_FOR_TARGET COMPILER_LD_FOR_TARGET COMPILER_NM_FOR_TARGET MAINTAINER_MODE_TRUE MAINTAINER_MODE_FALSE MAINT stage1_cflags stage1_checking stage2_werror_flag datarootdir docdir pdfdir htmldir LIBOBJS LTLIBOBJS'
- ac_subst_files='serialization_dependencies host_makefile_frag target_makefile_frag alphaieee_frag ospace_frag'
-
-
-@@ -934,6 +934,11 @@
- --enable-FEATURE[=ARG] include FEATURE [ARG=yes]
- --enable-gold use gold instead of ld
- --enable-libada build libada directory
-+ --enable-espf
-+ Enable Stack protector, Position independent executable and
-+ Fortify_sources as default if we have suppot for it when compiling
-+ and link with -z relro and -z now as default.
-+ Linux targets supported i*86, x86_64, powerpc*, ia64 and arm*
- --enable-libssp build libssp directory
- --disable-ppl-version-check disable check for PPL version
- --disable-cloog-version-check disable check for CLooG version
-@@ -2145,6 +2150,25 @@
- noconfigdirs="$noconfigdirs gnattools"
- fi
-
-+# Check whether --enable-espf was given and target have the support.
-+# Check whether --enable-espf or --disable-espf was given.
-+if test "${enable_espf+set}" = set; then
-+ enableval="$enable_espf"
-+
-+ case $target in
-+ i?86*-*-linux* | x86_64*-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
-+ enable_espf=yes
-+ ;;
-+ *)
-+ { { echo "$as_me:$LINENO: error: *** --enable-espf is not supported on this $target target." >&5
-+echo "$as_me: error: *** --enable-espf is not supported on this $target target." >&2;}
-+ { (exit 1); exit 1; }; }
-+ ;;
-+ esac
-+
-+fi;
-+
-+
- # Check whether --enable-libssp or --disable-libssp was given.
- if test "${enable_libssp+set}" = set; then
- enableval="$enable_libssp"
-@@ -12431,6 +12456,9 @@
- *) stage1_cflags="-g -J" ;;
- esac ;;
- esac
-+if test x$enable_espf = xyes; then
-+ stage1_cflags="$stage1_cflags -fno-stack-protector"
-+fi
-
- # This is aimed to mimic bootstrap with a non-GCC compiler to catch problems.
- if test "$GCC" = yes; then
-@@ -13234,6 +13262,7 @@
- s,@build_subdir@,$build_subdir,;t t
- s,@host_subdir@,$host_subdir,;t t
- s,@target_subdir@,$target_subdir,;t t
-+s,@enable_espf@,$enable_espf,;t t
- s,@CC@,$CC,;t t
- s,@CFLAGS@,$CFLAGS,;t t
- s,@LDFLAGS@,$LDFLAGS,;t t
---- gcc/configure 2009-04-29 01:16:54.000000000 +0200
-+++ gcc/configure 2009-06-08 01:03:01.000000000 +0200
-@@ -458,7 +458,7 @@
- # include <unistd.h>
- #endif"
-
--ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS build build_cpu build_vendor build_os host host_cpu host_vendor host_os target target_cpu target_vendor target_os target_noncanonical build_libsubdir build_subdir host_subdir target_subdir GENINSRC CC CFLAGS LDFLAGS CPPFLAGS ac_ct_CC EXEEXT OBJEXT NO_MINUS_C_MINUS_O OUTPUT_OPTION CPP EGREP loose_warn cxx_compat_warn strict_warn warn_cflags nocommon_flag TREEBROWSER valgrind_path valgrind_path_defines valgrind_command coverage_flags enable_multilib enable_decimal_float enable_fixed_point enable_shared TARGET_SYSTEM_ROOT TARGET_SYSTEM_ROOT_DEFINE CROSS_SYSTEM_HEADER_DIR onestep PKGVERSION REPORT_BUGS_TO REPORT_BUGS_TEXI datarootdir docdir htmldir SET_MAKE AWK LN_S LN RANLIB ac_ct_RANLIB ranlib_flags INSTALL INSTALL_PROGRAM INSTALL_DATA make_compare_target have_mktemp_command MAKEINFO BUILD_INFO GENERATED_MANPAGES FLEX BISON NM AR COLLECT2_LIBS GNAT_LIBEXC LDEXP_LIB TARGET_GETGROUPS_T LIBICONV LTLIBICONV LIBICONV_DEP manext objext gthread_flags extra_modes_file extra_opt_files USE_NLS LIBINTL LIBINTL_DEP INCINTL XGETTEXT GMSGFMT POSUB CATALOGS DATADIRNAME INSTOBJEXT GENCAT CATOBJEXT host_cc_for_libada CROSS ALL SYSTEM_HEADER_DIR inhibit_libc CC_FOR_BUILD BUILD_CFLAGS STMP_FIXINC STMP_FIXPROTO collect2 LIBTOOL SED FGREP GREP LD DUMPBIN ac_ct_DUMPBIN ac_ct_AR STRIP ac_ct_STRIP lt_ECHO objdir enable_fast_install gcc_cv_as ORIGINAL_AS_FOR_TARGET gcc_cv_ld ORIGINAL_LD_FOR_TARGET gcc_cv_nm ORIGINAL_NM_FOR_TARGET gcc_cv_objdump libgcc_visibility GGC zlibdir zlibinc MAINT gcc_tooldir dollar slibdir subdirs srcdir all_compilers all_gtfiles all_lang_makefrags all_lang_makefiles all_languages all_selected_languages build_exeext build_install_headers_dir build_xm_file_list build_xm_include_list build_xm_defines build_file_translate check_languages cpp_install_dir xmake_file tmake_file extra_gcc_objs extra_headers_list extra_objs extra_parts extra_passes extra_programs float_h_file gcc_config_arguments gcc_gxx_include_dir host_exeext host_xm_file_list host_xm_include_list host_xm_defines out_host_hook_obj install lang_opt_files lang_specs_files lang_tree_files local_prefix md_file objc_boehm_gc out_file out_object_file thread_file tm_file_list tm_include_list tm_defines tm_p_file_list tm_p_include_list xm_file_list xm_include_list xm_defines c_target_objs cxx_target_objs target_cpu_default GMPLIBS GMPINC LIBOBJS LTLIBOBJS'
-+ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS build build_cpu build_vendor build_os host host_cpu host_vendor host_os target target_cpu target_vendor target_os target_noncanonical build_libsubdir build_subdir host_subdir target_subdir GENINSRC CC CFLAGS LDFLAGS CPPFLAGS ac_ct_CC EXEEXT OBJEXT NO_MINUS_C_MINUS_O OUTPUT_OPTION CPP EGREP loose_warn cxx_compat_warn strict_warn warn_cflags nocommon_flag TREEBROWSER valgrind_path valgrind_path_defines valgrind_command coverage_flags enable_multilib enable_decimal_float enable_fixed_point enable_shared TARGET_SYSTEM_ROOT TARGET_SYSTEM_ROOT_DEFINE CROSS_SYSTEM_HEADER_DIR onestep PKGVERSION REPORT_BUGS_TO REPORT_BUGS_TEXI datarootdir docdir htmldir SET_MAKE AWK LN_S LN RANLIB ac_ct_RANLIB ranlib_flags INSTALL INSTALL_PROGRAM INSTALL_DATA make_compare_target have_mktemp_command MAKEINFO BUILD_INFO GENERATED_MANPAGES FLEX BISON NM AR COLLECT2_LIBS GNAT_LIBEXC LDEXP_LIB TARGET_GETGROUPS_T LIBICONV LTLIBICONV LIBICONV_DEP manext objext gthread_flags extra_modes_file extra_opt_files USE_NLS LIBINTL LIBINTL_DEP INCINTL XGETTEXT GMSGFMT POSUB CATALOGS DATADIRNAME INSTOBJEXT GENCAT CATOBJEXT host_cc_for_libada CROSS ALL SYSTEM_HEADER_DIR inhibit_libc CC_FOR_BUILD BUILD_CFLAGS STMP_FIXINC STMP_FIXPROTO collect2 LIBTOOL SED FGREP GREP LD DUMPBIN ac_ct_DUMPBIN ac_ct_AR STRIP ac_ct_STRIP lt_ECHO objdir enable_fast_install gcc_cv_as ORIGINAL_AS_FOR_TARGET gcc_cv_ld ORIGINAL_LD_FOR_TARGET gcc_cv_nm ORIGINAL_NM_FOR_TARGET gcc_cv_objdump libgcc_visibility enable_espf enable_crtbeginTS GGC zlibdir zlibinc MAINT gcc_tooldir dollar slibdir subdirs srcdir all_compilers all_gtfiles all_lang_makefrags all_lang_makefiles all_languages all_selected_languages build_exeext build_install_headers_dir build_xm_file_list build_xm_include_list build_xm_defines build_file_translate check_languages cpp_install_dir xmake_file tmake_file extra_gcc_objs extra_headers_list extra_objs extra_parts extra_passes extra_programs float_h_file gcc_config_arguments gcc_gxx_include_dir host_exeext host_xm_file_list host_xm_include_list host_xm_defines out_host_hook_obj install lang_opt_files lang_specs_files lang_tree_files local_prefix md_file objc_boehm_gc out_file out_object_file thread_file tm_file_list tm_include_list tm_defines tm_p_file_list tm_p_include_list xm_file_list xm_include_list xm_defines c_target_objs cxx_target_objs target_cpu_default GMPLIBS GMPINC LIBOBJS LTLIBOBJS'
- ac_subst_files='language_hooks'
-
- # Initialize some variables set by options.
-@@ -24177,6 +24182,50 @@
- ;;
- esac
-
-+echo "$as_me:$LINENO: checking linker -z now support" >&5
-+echo $ECHO_N "checking linker -z now support... $ECHO_C" >&6
-+if test "${gcc_cv_ld_now+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+ gcc_cv_ld_now=no
-+if test $in_tree_ld = yes ; then
-+ if test "$gcc_cv_gld_major_version" -eq 2 -a "$gcc_cv_gld_minor_version" -ge 16 -o "$gcc_cv_gld_major_version" -gt 2 \
-+ && test $in_tree_ld_is_elf = yes; then
-+ gcc_cv_ld_now=yes
-+ fi
-+elif test x$gcc_cv_ld != x; then
-+ # Check if linker supports -z now options
-+ if $gcc_cv_ld --help 2>/dev/null | grep now > /dev/null; then
-+ gcc_cv_ld_now=yes
-+ fi
-+fi
-+
-+fi
-+echo "$as_me:$LINENO: result: $gcc_cv_ld_now" >&5
-+echo "${ECHO_T}$gcc_cv_ld_now" >&6
-+
-+echo "$as_me:$LINENO: checking linker -z relro support" >&5
-+echo $ECHO_N "checking linker -z relro support... $ECHO_C" >&6
-+if test "${gcc_cv_ld_relro+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+ gcc_cv_ld_relro=no
-+if test $in_tree_ld = yes ; then
-+ if test "$gcc_cv_gld_major_version" -eq 2 -a "$gcc_cv_gld_minor_version" -ge 16 -o "$gcc_cv_gld_major_version" -gt 2 \
-+ && test $in_tree_ld_is_elf = yes; then
-+ gcc_cv_ld_relro=yes
-+ fi
-+elif test x$gcc_cv_ld != x; then
-+ # Check if linker supports -z relro and -z norelro options
-+ if $gcc_cv_ld --help 2>/dev/null | grep relro > /dev/null; then
-+ gcc_cv_ld_relro=yes
-+ fi
-+fi
-+
-+fi
-+echo "$as_me:$LINENO: result: $gcc_cv_ld_relro" >&5
-+echo "${ECHO_T}$gcc_cv_ld_relro" >&6
-+
- echo "$as_me:$LINENO: checking linker --sysroot support" >&5
- echo $ECHO_N "checking linker --sysroot support... $ECHO_C" >&6
- if test "${gcc_cv_ld_sysroot+set}" = set; then
-@@ -24411,6 +23737,146 @@
-
- fi
-
-+if test x$gcc_cv_libc_provides_ssp = xyes; then
-+ echo "$as_me:$LINENO: checking whether $CC support -fstack-protector" >&5
-+echo $ECHO_N "checking whether $CC support -fstack-protector... $ECHO_C" >&6
-+if test "${gcc_cv_cc_stack_protector+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+
-+ saved_CFLAGS="$CFLAGS"
-+ CFLAGS="$CFLAGS -fstack-protector"
-+ cat >conftest.$ac_ext <<_ACEOF
-+#ifndef __SSP__
-+#error
-+#endif
-+
-+_ACEOF
-+rm -f conftest.$ac_objext
-+if { (eval echo "$as_me:$LINENO: \"$ac_compile\"") >&5
-+ (eval $ac_compile) 2>conftest.er1
-+ ac_status=$?
-+ grep -v '^ *+' conftest.er1 >conftest.err
-+ rm -f conftest.er1
-+ cat conftest.err >&5
-+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
-+ (exit $ac_status); } &&
-+ { ac_try='test -z "$ac_c_werror_flag"
-+ || test ! -s conftest.err'
-+ { (eval echo "$as_me:$LINENO: \"$ac_try\"") >&5
-+ (eval $ac_try) 2>&5
-+ ac_status=$?
-+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
-+ (exit $ac_status); }; } &&
-+ { ac_try='test -s conftest.$ac_objext'
-+ { (eval echo "$as_me:$LINENO: \"$ac_try\"") >&5
-+ (eval $ac_try) 2>&5
-+ ac_status=$?
-+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
-+ (exit $ac_status); }; }; then
-+
-+ case $target in
-+ i?86*-*-linux* | x86_64*-*-linux* | powerpc-*-linux* | powerpc64-*-linux*)
-+ if test x$set_have_as_tls = xyes; then
-+ gcc_cv_cc_stack_protector=yes
-+ else
-+ gcc_cv_cc_stack_protector=no
-+ fi
-+ ;;
-+ *)
-+ cc_cv_cc_stack_protector=yes
-+ ;;
-+ esac
-+
-+else
-+ echo "$as_me: failed program was:" >&5
-+sed 's/^/| /' conftest.$ac_ext >&5
-+
-+gcc_cv_cc_stack_protector=no
-+fi
-+rm -f conftest.err conftest.$ac_objext conftest.$ac_ext
-+ CFLAGS="$saved_CFLAGS"
-+
-+fi
-+echo "$as_me:$LINENO: result: $gcc_cv_cc_stack_protector" >&5
-+echo "${ECHO_T}$gcc_cv_cc_stack_protector" >&6
-+fi
-+if test x$gcc_cv_cc_stack_protector = xyes; then
-+
-+cat >>confdefs.h <<\_ACEOF
-+#define HAVE_GCC_SSP 1
-+_ACEOF
-+
-+fi
-+
-+
-+if test x$enable_espf = xyes ; then
-+case $target in
-+ ia64*-*-linux*)
-+ if test x$gcc_cv_ld_now = xyes; then
-+ enable_espf_ld=yes
-+ else
-+ enable_espf_ld=no
-+ fi
-+ ;;
-+ *-*-linux*)
-+ if test x$gcc_cv_ld_relro = xyes && test x$gcc_cv_ld_now = xyes; then
-+ enable_espf_ld=yes
-+ else
-+ enable_espf_ld=no
-+ fi
-+ ;;
-+ *)
-+ enable_espf_ld=no
-+ ;;
-+ esac
-+else
-+ enable_espf_ld=no
-+fi
-+if test x$enable_espf_ld = xyes; then
-+
-+cat >>confdefs.h <<\_ACEOF
-+#define ENABLE_ESPF 1
-+_ACEOF
-+
-+fi
-+if test x$enable_espf = xyes && test x$enable_espf_ld = xno; then
-+ { { echo "$as_me:$LINENO: error: *** --enable-espf is not supported. You don't have -z,relro or -z,now support in the linker." >&5
-+echo "$as_me: error: *** --enable-espf is not supported. You don't have -z,relro or -z,now support in the linker." >&2;}
-+ { (exit 1); exit 1; }; }
-+fi
-+
-+echo "$as_me:$LINENO: checking for crtbeginTS.o support" >&5
-+echo $ECHO_N "checking for crtbeginTS.o support... $ECHO_C" >&6
-+if test "${enable_crtbeginTS+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+
-+if test x$enable_espf = xyes ; then
-+ case "$target" in
-+ ia64*-*-linux*)
-+ enable_crtbeginTS=no ;;
-+ *-*-linux*)
-+ if test x$gcc_cv_ld_pie = xyes && test x$lt_prog_compiler_static_works = xyes; then
-+ enable_crtbeginTS=yes
-+ fi
-+ ;;
-+ *) enable_crtbeginTS=no ;;
-+ esac
-+fi
-+
-+fi
-+echo "$as_me:$LINENO: result: $enable_crtbeginTS" >&5
-+echo "${ECHO_T}$enable_crtbeginTS" >&6
-+
-+if test x$enable_crtbeginTS = xyes; then
-+
-+cat >>confdefs.h <<\_ACEOF
-+#define ENABLE_CRTBEGINTS 1
-+_ACEOF
-+
-+fi
-+
- # Check if TFmode long double should be used by default or not.
- # Some glibc targets used DFmode long double, but with glibc 2.4
- # and later they can use TFmode.
-@@ -25581,6 +25704,8 @@
- s,@gcc_cv_objdump@,$gcc_cv_objdump,;t t
- s,@gcc_cv_readelf@,$gcc_cv_readelf,;t t
- s,@libgcc_visibility@,$libgcc_visibility,;t t
-+s,@enable_espf@,$enable_espf,;t t
-+s,@enable_crtbeginTS@,$enable_crtbeginTS,;t t
- s,@GGC@,$GGC,;t t
- s,@zlibdir@,$zlibdir,;t t
- s,@zlibinc@,$zlibinc,;t t
---- libmudflap/configure 2009-04-29 01:16:55.000000000 +0200
-+++ libmudflap/configure 2009-07-21 18:28:52.000000000 +0200
-@@ -458,7 +458,7 @@
- # include <unistd.h>
- #endif"
-
--ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS build build_cpu build_vendor build_os host host_cpu host_vendor host_os target target_cpu target_vendor target_os target_noncanonical INSTALL_PROGRAM INSTALL_SCRIPT INSTALL_DATA CYGPATH_W PACKAGE VERSION ACLOCAL AUTOCONF AUTOMAKE AUTOHEADER MAKEINFO install_sh STRIP ac_ct_STRIP INSTALL_STRIP_PROGRAM mkdir_p AWK SET_MAKE am__leading_dot AMTAR am__tar am__untar MAINTAINER_MODE_TRUE MAINTAINER_MODE_FALSE MAINT multi_basedir CC ac_ct_CC EXEEXT OBJEXT DEPDIR am__include am__quote AMDEP_TRUE AMDEP_FALSE AMDEPBACKSLASH CCDEPMODE am__fastdepCC_TRUE am__fastdepCC_FALSE CFLAGS CPP CPPFLAGS EGREP LIBTOOL SED FGREP GREP LD DUMPBIN ac_ct_DUMPBIN NM LN_S AR ac_ct_AR RANLIB ac_ct_RANLIB lt_ECHO enable_shared enable_static MF_HAVE_STDINT_H MF_HAVE_UINTPTR_T LIBMUDFLAPTH_TRUE LIBMUDFLAPTH_FALSE build_libmudflapth toolexecdir toolexeclibdir ac_ct_NM SECTION_FLAGS LIBOBJS LTLIBOBJS'
-+ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS build build_cpu build_vendor build_os host host_cpu host_vendor host_os target target_cpu target_vendor target_os target_noncanonical INSTALL_PROGRAM INSTALL_SCRIPT INSTALL_DATA CYGPATH_W PACKAGE VERSION ACLOCAL AUTOCONF AUTOMAKE AUTOHEADER MAKEINFO install_sh STRIP ac_ct_STRIP INSTALL_STRIP_PROGRAM mkdir_p AWK SET_MAKE am__leading_dot AMTAR am__tar am__untar enable_espf MAINTAINER_MODE_TRUE MAINTAINER_MODE_FALSE MAINT multi_basedir CC ac_ct_CC EXEEXT OBJEXT DEPDIR am__include am__quote AMDEP_TRUE AMDEP_FALSE AMDEPBACKSLASH CCDEPMODE am__fastdepCC_TRUE am__fastdepCC_FALSE CFLAGS CPP CPPFLAGS EGREP LIBTOOL SED FGREP GREP LD DUMPBIN ac_ct_DUMPBIN NM LN_S AR ac_ct_AR RANLIB ac_ct_RANLIB lt_ECHO enable_shared enable_static MF_HAVE_STDINT_H MF_HAVE_UINTPTR_T LIBMUDFLAPTH_TRUE LIBMUDFLAPTH_FALSE build_libmudflapth toolexecdir toolexeclibdir ac_ct_NM SECTION_FLAGS LIBOBJS LTLIBOBJS'
- ac_subst_files=''
-
- # Initialize some variables set by options.
-@@ -14017,6 +14019,7 @@
- s,@AMTAR@,$AMTAR,;t t
- s,@am__tar@,$am__tar,;t t
- s,@am__untar@,$am__untar,;t t
-+s,@enable_espf@,$enable_espf,;t t
- s,@MAINTAINER_MODE_TRUE@,$MAINTAINER_MODE_TRUE,;t t
- s,@MAINTAINER_MODE_FALSE@,$MAINTAINER_MODE_FALSE,;t t
- s,@MAINT@,$MAINT,;t t
diff --git a/espf-gcc-4.3.4/11_all_gcc44_config.in.patch b/espf-gcc-4.3.4/11_all_gcc44_config.in.patch
deleted file mode 100644
index c234e91..0000000
--- a/espf-gcc-4.3.4/11_all_gcc44_config.in.patch
+++ /dev/null
@@ -1,49 +0,0 @@
-2009-09-18 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config.in Add ENABLE_CRTBEGINTS, ENABLE_ESPF and
- TARGET_LIBC_PROVIDES_FORTIFY2.
-
- On Gentoo
- * gcc/config.in We don't need to add TARGET_LIBC_PROVIDES_FORTIFY2.
-
---- gcc/config.in 2009-04-21 11:08:08.000000000 +0200
-+++ gcc/config.in 2009-05-12 00:10:08.000000000 +0200
-@@ -46,6 +46,12 @@
- #endif
-
-
-+/* Define to 1 to enable crtbeginTS.o. */
-+#ifndef USED_FOR_TARGET
-+#undef ENABLE_CRTBEGINTS
-+#endif
-+
-+
- /* Define to 1 to specify that we are using the BID decimal floating point
- format instead of DPD */
- #ifndef USED_FOR_TARGET
-@@ -65,6 +65,12 @@
- #endif
-
-
-+/* Define to 1 to enable espf. */
-+#ifndef USED_FOR_TARGET
-+#undef ENABLE_ESPF
-+#endif
-+
-+
- /* Define to 1 to enable fixed-point arithmetic extension to C. */
- #ifndef USED_FOR_TARGET
- #undef ENABLE_FIXED_POINT
-@@ -912,6 +924,12 @@
- #endif
-
-
-+/* Define to 1 if your compiler supports -fstack-protector */
-+#ifndef USED_FOR_TARGET
-+#undef HAVE_GCC_SSP
-+#endif
-+
-+
- /* Define to 1 if you have the `getchar_unlocked' function. */
- #ifndef USED_FOR_TARGET
- #undef HAVE_GETCHAR_UNLOCKED
diff --git a/espf-gcc-4.3.4/12_all_gcc43_Makefile.in.patch b/espf-gcc-4.3.4/12_all_gcc43_Makefile.in.patch
deleted file mode 100644
index 9739e06..0000000
--- a/espf-gcc-4.3.4/12_all_gcc43_Makefile.in.patch
+++ /dev/null
@@ -1,208 +0,0 @@
-2009-09-20 Magnus Granberg <zorry@ume.nu>
-
- * Makefile.in We add -fno-stack-protector to
- BOOT_CFLAGS, LIBCFLAGS and LIBCXXFLAGS if enable_espf yes.
- * gcc/Makefile.in Add -fno-PIE and -fno-stack-protector.
- Libgcc2 doesn't compile with -fstack-protector.
- Crtstuff doesn't compile with -fPIE and -fstack-protector.
- $(out_object_file): ix86_split_to_parts() stack smashing attack b.g.o #149292.
- Add crtbeginTS.o to EXTRA_PARTS if enable_crtbeginTS yes
- We add new file crtbeginTS.o if enable_crtbeginTS yes
- * libgcc/Makefile.in Add crtbeginTS.o to EXTRA_PARTS if enable_crtbeginTS yes
- We add new file crtbeginTS.o if enable_crtbeginTS yes
-
-2009-07-21 Magnus Granberg <zorry@ume.nu>, Kees Cook <kees@outflux.net>
-
- LP #344502
- * libmudflap/Makefiles.in Add -fno-stack-protector -U_FORTIFY_SOURCE
- to AM_CFLAGS if enable_espf yes.
-
---- Makefile.in 2009-04-14 10:57:33.000000000 +0200
-+++ Makefile.in 2009-07-21 05:29:54.000000000 +0200
-@@ -305,9 +305,17 @@
- BUILD_PREFIX = @BUILD_PREFIX@
- BUILD_PREFIX_1 = @BUILD_PREFIX_1@
-
-+# Some stuff don't compile with SSP
-+enable_espf = @enable_espf@
-+ifeq ($(enable_espf),yes)
-+ESPF_NOSSP_CFLAGS = -fno-stack-protector
-+else
-+ESPF_NOSSP_CFLAGS=
-+endif
-+
- # Flags to pass to stage2 and later makes. They are defined
- # here so that they can be overridden by Makefile fragments.
--BOOT_CFLAGS= -g -O2
-+BOOT_CFLAGS= -g -O2 $(ESPF_NOSSP_CFLAGS)
- BOOT_LDFLAGS=
- BOOT_ADAFLAGS=-gnatpg -gnata
-
-@@ -317,9 +317,9 @@
-
- CFLAGS = @CFLAGS@
- LDFLAGS = @LDFLAGS@
--LIBCFLAGS = $(CFLAGS)
-+LIBCFLAGS = $(CFLAGS) $(ESPF_NOSSP_CFLAGS)
- CXXFLAGS = @CXXFLAGS@
--LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates
-+LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates $(ESPF_NOSSP_CFLAGS)
- PICFLAG =
-
- # Only build the C compiler for stage1, because that is the only one that
---- gcc/Makefile.in 2009-04-29 01:16:56.000000000 +0200
-+++ gcc/Makefile.in 2009-07-05 02:11:04.000000000 +0200
-@@ -580,13 +580,23 @@
- INHIBIT_LIBC_CFLAGS = -Dinhibit_libc
- endif
-
-+# Doesn't compile with PIE or SSP
-+enable_espf = @enable_espf@
-+ifeq ($(enable_espf),yes)
-+ESPF_NOPIE_CFLAGS = -fno-PIE
-+ESPF_NOSSP_CFLAGS = -fno-stack-protector
-+else
-+ESPF_NOPIE_CFLAGS=
-+ESPF_NOSSP_CFLAGS=
-+endif
-+
- # Options to use when compiling libgcc2.a.
- #
- LIBGCC2_DEBUG_CFLAGS = -g
- LIBGCC2_CFLAGS = -O2 $(LIBGCC2_INCLUDES) $(GCC_CFLAGS) $(TARGET_LIBGCC2_CFLAGS) \
- $(LIBGCC2_DEBUG_CFLAGS) $(GTHREAD_FLAGS) \
- -DIN_LIBGCC2 -D__GCC_FLOAT_NOT_NEEDED \
-- $(INHIBIT_LIBC_CFLAGS)
-+ $(INHIBIT_LIBC_CFLAGS) $(ESPF_NOSSP_CFLAGS)
-
- # Additional options to use when compiling libgcc2.a.
- # Some targets override this to -isystem include
-@@ -599,7 +610,7 @@
- CRTSTUFF_CFLAGS = -O2 $(GCC_CFLAGS) $(INCLUDES) $(MULTILIB_CFLAGS) -g0 \
- -finhibit-size-directive -fno-inline-functions -fno-exceptions \
- -fno-zero-initialized-in-bss -fno-toplevel-reorder -fno-tree-vectorize \
-- $(INHIBIT_LIBC_CFLAGS)
-+ $(INHIBIT_LIBC_CFLAGS) $(ESPF_NOSSP_CFLAGS)
-
- # Additional sources to handle exceptions; overridden by targets as needed.
- LIB2ADDEH = $(srcdir)/unwind-dw2.c $(srcdir)/unwind-dw2-fde.c \
-@@ -629,6 +640,12 @@
- # The rules for compiling them should be in the t-* file for the machine.
- EXTRA_PARTS = @extra_parts@
-
-+# We add crtbeginTS.o to the EXTRA_PARTS list if enable_crtbeginTS = yes
-+enable_crtbeginTS = @enable_crtbeginTS@
-+ifeq ($(enable_crtbeginTS),yes)
-+EXTRA_PARTS += crtbeginTS.o
-+endif
-+
- # List of extra object files that should be compiled and linked with
- # compiler proper (cc1, cc1obj, cc1plus).
- EXTRA_OBJS = @extra_objs@
-@@ -1719,8 +1736,9 @@
- echo LIBGCC_SYNC = '$(LIBGCC_SYNC)' >> tmp-libgcc.mvars
- echo LIBGCC_SYNC_CFLAGS = '$(LIBGCC_SYNC_CFLAGS)' >> tmp-libgcc.mvars
- echo CRTSTUFF_CFLAGS = '$(CRTSTUFF_CFLAGS)' >> tmp-libgcc.mvars
-- echo CRTSTUFF_T_CFLAGS = '$(CRTSTUFF_T_CFLAGS)' >> tmp-libgcc.mvars
-+ echo CRTSTUFF_T_CFLAGS = '$(CRTSTUFF_T_CFLAGS) $(ESPF_NOPIE_CFLAGS)' >> tmp-libgcc.mvars
- echo CRTSTUFF_T_CFLAGS_S = '$(CRTSTUFF_T_CFLAGS_S)' >> tmp-libgcc.mvars
-+ echo enable_crtbeginTS = '$(enable_crtbeginTS)' >> tmp-libgcc.mvars
-
- mv tmp-libgcc.mvars libgcc.mvars
-
-@@ -1754,12 +1771,14 @@
- $(T)crtbegin.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
- gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
- $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS) \
-+ $(ESPF_NOPIE_CFLAGS) \
- -c $(srcdir)/crtstuff.c -DCRT_BEGIN \
- -o $(T)crtbegin$(objext)
-
- $(T)crtend.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
- gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
- $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS) \
-+ $(ESPF_NOPIE_CFLAGS) \
- -c $(srcdir)/crtstuff.c -DCRT_END \
- -o $(T)crtend$(objext)
-
-@@ -1780,9 +1800,19 @@
- $(T)crtbeginT.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
- gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
- $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS) \
-+ $(ESPF_NOPIE_CFLAGS) \
- -c $(srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O \
- -o $(T)crtbeginT$(objext)
-
-+# This is a version of crtbegin for -static -pie links if espf is enable.
-+ifeq ($(enable_crtbeginTS),yes)
-+$(T)crtbeginTS.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
-+ gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
-+ $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS_S) \
-+ -c $(srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O -DCRTSTUFFS_O \
-+ -o $(T)crtbeginTS$(objext)
-+endif
-+
- # Compile the start modules crt0.o and mcrt0.o that are linked with
- # every program
- $(T)crt0.o: s-crt0 ; @true
-@@ -3057,7 +3083,7 @@
- output.h $(INSN_ATTR_H) $(SYSTEM_H) toplev.h $(TARGET_H) libfuncs.h \
- $(TARGET_DEF_H) $(FUNCTION_H) $(SCHED_INT_H) $(TM_P_H) $(EXPR_H) \
- langhooks.h $(GGC_H) $(OPTABS_H) $(REAL_H) tm-constrs.h
-- $(CC) -c $(ALL_CFLAGS) $(ALL_CPPFLAGS) \
-+ $(CC) -c $(ALL_CFLAGS) $(ALL_CPPFLAGS) $(ESPF_NOSSP_CFLAGS)\
- $(out_file) $(OUTPUT_OPTION)
-
- # Build auxiliary files that support ecoff format.
---- libgcc/Makefile.in 2009-04-10 01:23:07.000000000 +0200
-+++ libgcc/Makefile.in 2009-09-08 03:42:47.000000000 +0200
-@@ -280,6 +280,12 @@
- gen-hide-list = echo > \$@
- endif
-
-+# We add crtbeginTS.o to the EXTRA_PARTS list if enable_crtbeginTS = yes
-+enable_libgcc_crtbeginTS = $(enable_crtbeginTS)
-+ifeq ($(enable_libgcc_crtbeginTS),yes)
-+EXTRA_PARTS += crtbeginTS.o
-+endif
-+
- ifneq ($(EXTRA_PARTS),)
- extra-parts = libgcc-extra-parts
- INSTALL_PARTS = $(EXTRA_PARTS)
-@@ -831,6 +837,13 @@
- crtbeginT.o: $(gcc_srcdir)/crtstuff.c
- $(crt_compile) $(CRTSTUFF_T_CFLAGS) \
- -c $(gcc_srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O
-+
-+# This is a version of crtbegin for -static -pie links.
-+ifeq ($(enable_libgcc_crtbeginTS),yes)
-+crtbeginTS.o: $(gcc_srcdir)/crtstuff.c
-+ $(crt_compile) $(CRTSTUFF_T_CFLAGS_S) \
-+ -c $(gcc_srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O -DCRTSTUFFS_O
-+endif
- endif
-
- # Build extra startfiles in the libgcc directory.
---- libmudflap/Makefile.in 2009-04-29 01:16:56.000000000 +0200
-+++ libmudflap/Makefile.in 2009-07-21 05:41:56.000000000 +0200
-@@ -253,10 +253,18 @@
- MAINT_CHARSET = latin1
- SUBDIRS = testsuite
-
-+# Some stuff don't compile with PIE or SSP
-+enable_espf = @enable_espf@
-+ifeq ($(enable_espf),yes)
-+NO_ESPF_CFLAGS = -fno-stack-protector -U_FORTIFY_SOURCE
-+else
-+NO_ESPF_CFLAGS =
-+endif
-+
- # May be used by various substitution variables.
- gcc_version := $(shell cat $(top_srcdir)/../gcc/BASE-VER)
--AM_CFLAGS = -Wall $(SECTION_FLAGS)
--@LIBMUDFLAPTH_FALSE@libmudflapth =
-+AM_CFLAGS = -Wall $(SECTION_FLAGS) $(NO_ESPF_CFLAGS)
-+@LIBMUDFLAPTH_FALSE@libmudflapth =
- @LIBMUDFLAPTH_TRUE@libmudflapth = libmudflapth.la
- toolexeclib_LTLIBRARIES = libmudflap.la $(libmudflapth)
- libsubincludedir = $(libdir)/gcc/$(target_noncanonical)/$(gcc_version)/include
diff --git a/espf-gcc-4.3.4/20_all_gcc43_gcc.c.patch b/espf-gcc-4.3.4/20_all_gcc43_gcc.c.patch
deleted file mode 100644
index cd6cc75..0000000
--- a/espf-gcc-4.3.4/20_all_gcc43_gcc.c.patch
+++ /dev/null
@@ -1,146 +0,0 @@
-2010-02-10 Magnus Granberg <zorry@ume.nu>
-
- * gcc/gcc.c include: espf.h
- *cpp_unique_options Add espf_cpp_unique_options.
- #ifdef EXTRA_SPECS: Add ESPF_EXTRA_SPECS
- main(): Add do_self_spec espf_command_options_spec()
-
-2009-06-27 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/gcc.c *cpp_options Add %(espf_cpp_options)
-
- * gcc/gcc.c default_compilers[] Add %(espf_options)
- *cpp_unique_options Add %(espf_cpp_unique_options)
-
-2010-02-10 Magnus Granberg <zorry@ume.nu>
-
- *gcc/gcc.c Gentoo changes
- static const char *cc1_spec We set that in espf.h if ENABLE_ESPF.
- *cpp_unique_options Remove espf_cpp_unique_options. (-D_FORTIFY_SOURCE=2)
- *cc1_options Add espf_options_pie_check if ENABLE_ESPF.
-
---- gcc/gcc.c.zorry 2009-04-29 01:17:00.000000000 +0200
-+++ gcc/gcc.c 2009-07-22 20:18:10.000000000 +0200
-@@ -83,6 +83,7 @@
- #include "gcc.h"
- #include "flags.h"
- #include "opts.h"
-+#include "espf.h" /* for --enable-espf support */
-
- /* By default there is no special suffix for target executables. */
- /* FIXME: when autoconf is fixed, remove the host check - dj */
-@@ -758,7 +759,9 @@
-
- static const char *asm_debug;
- static const char *cpp_spec = CPP_SPEC;
-+#ifndef ENABLE_ESPF
- static const char *cc1_spec = CC1_SPEC;
-+#endif
- static const char *cc1plus_spec = CC1PLUS_SPEC;
- static const char *link_gcc_c_sequence_spec = LINK_GCC_C_SEQUENCE_SPEC;
- static const char *link_ssp_spec = LINK_SSP_SPEC;
-@@ -817,7 +818,7 @@
- static const char *cpp_options =
- "%(cpp_unique_options) %1 %{m*} %{std*&ansi&trigraphs} %{W*&pedantic*} %{w}\
- %{f*} %{g*:%{!g0:%{!fno-working-directory:-fworking-directory}}} %{O*}\
-- %{undef} %{save-temps:-fpch-preprocess}";
-+ %{undef} %{save-temps:-fpch-preprocess} %(espf_cpp_options)";
-
- /* This contains cpp options which are not passed when the preprocessor
- output will be used by another program. */
-@@ -825,6 +826,9 @@
-
- /* NB: This is shared amongst all front-ends, except for Ada. */
- static const char *cc1_options =
-+#ifdef ENABLE_ESPF
-+"%(espf_options_pie_check)"
-+#endif
- "%{pg:%{fomit-frame-pointer:%e-pg and -fomit-frame-pointer are incompatible}}\
- %1 %{!Q:-quiet} -dumpbase %B %{d*} %{m*} %{a*}\
- %{c|S:%{o*:-auxbase-strip %*}%{!o*:-auxbase %b}}%{!c:%{!S:-auxbase %b}}\
-@@ -999,15 +1000,15 @@
- %{save-temps|traditional-cpp|no-integrated-cpp:%(trad_capable_cpp) \
- %(cpp_options) -o %{save-temps:%b.i} %{!save-temps:%g.i} \n\
- cc1 -fpreprocessed %{save-temps:%b.i} %{!save-temps:%g.i} \
-- %(cc1_options)}\
-+ %(cc1_options) %(espf_options)}\
- %{!save-temps:%{!traditional-cpp:%{!no-integrated-cpp:\
-- cc1 %(cpp_unique_options) %(cc1_options)}}}\
-+ cc1 %(cpp_unique_options) %(cc1_options) %(espf_options)}}}\
- %{!fsyntax-only:%(invoke_as)}} \
- %{combine:\
- %{save-temps|traditional-cpp|no-integrated-cpp:%(trad_capable_cpp) \
- %(cpp_options) -o %{save-temps:%b.i} %{!save-temps:%g.i}}\
- %{!save-temps:%{!traditional-cpp:%{!no-integrated-cpp:\
-- cc1 %(cpp_unique_options) %(cc1_options)}}\
-+ cc1 %(cpp_unique_options) %(cc1_options) %(espf_options)}}\
- %{!fsyntax-only:%(invoke_as)}}}}}}", 0, 1, 1},
- {"-",
- "%{!E:%e-E or -x required when input is from standard input}\
-@@ -1030,7 +1031,7 @@
- %W{o*:--output-pch=%*}%V}}}}}}", 0, 0, 0},
- {".i", "@cpp-output", 0, 1, 0},
- {"@cpp-output",
-- "%{!M:%{!MM:%{!E:cc1 -fpreprocessed %i %(cc1_options) %{!fsyntax-only:%(invoke_as)}}}}", 0, 1, 0},
-+ "%{!M:%{!MM:%{!E:cc1 -fpreprocessed %i %(cc1_options) %(espf_options) %{!fsyntax-only:%(invoke_as)}}}}", 0, 1, 0},
- {".s", "@assembler", 0, 1, 0},
- {"@assembler",
- "%{!M:%{!MM:%{!E:%{!S:as %(asm_debug) %(asm_options) %i %A }}}}", 0, 1, 0},
-@@ -1619,18 +1620,23 @@
- INIT_STATIC_SPEC ("sysroot_hdrs_suffix_spec", &sysroot_hdrs_suffix_spec),
- };
-
--#ifdef EXTRA_SPECS /* additional specs needed */
-+/* EXTRA_SPECS needs to be defined */
-+#ifndef EXTRA_SPECS
-+#define EXTRA_SPECS
-+#endif
-+
-+/* EXTRA_SPECS and ESPF_EXTRA_SPECS add additional specs */
- /* Structure to keep track of just the first two args of a spec_list.
-- That is all that the EXTRA_SPECS macro gives us. */
-+ That is all that the EXTRA_SPECS and ESPF_EXTRA_SPECS macro gives us. */
- struct spec_list_1
- {
- const char *const name;
- const char *const ptr;
- };
-
--static const struct spec_list_1 extra_specs_1[] = { EXTRA_SPECS };
-+/* ESPF_EXTRA_SPECS before EXTRA_SPECS */
-+static const struct spec_list_1 extra_specs_1[] = { ESPF_EXTRA_SPECS, EXTRA_SPECS };
- static struct spec_list *extra_specs = (struct spec_list *) 0;
--#endif
-
- /* List of dynamically allocates specs that have been defined so far. */
-
-@@ -1703,7 +1703,6 @@
- if (verbose_flag)
- notice ("Using built-in specs.\n");
-
--#ifdef EXTRA_SPECS
- extra_specs = xcalloc (sizeof (struct spec_list),
- ARRAY_SIZE (extra_specs_1));
-
-@@ -1728,7 +1733,6 @@
- sl->ptr_spec = &sl->ptr;
- next = sl;
- }
--#endif
-
- for (i = ARRAY_SIZE (static_specs) - 1; i >= 0; i--)
- {
-@@ -6521,6 +6543,12 @@
- gcc_exec_prefix = concat (gcc_exec_prefix, spec_machine, dir_separator_str,
- spec_version, dir_separator_str, NULL);
-
-+#ifdef ENABLE_ESPF
-+ /* Process ESPF_COMMAND_OPTIONS_SPEC, adding any new options to the end
-+ of the command line. */
-+ do_self_spec (espf_command_options_spec);
-+#endif
-+
- /* Now we have the specs.
- Set the `valid' bits for switches that match anything in any spec. */
-
diff --git a/espf-gcc-4.3.4/21_all_gcc44_decl-tls-model.patch b/espf-gcc-4.3.4/21_all_gcc44_decl-tls-model.patch
deleted file mode 100644
index d40b3dc..0000000
--- a/espf-gcc-4.3.4/21_all_gcc44_decl-tls-model.patch
+++ /dev/null
@@ -1,20 +0,0 @@
-2009-06-13 Magnus Granberg <zorry@ume.nu>
-
- b.g.o #232601
- * gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib.
-
---- gcc/varasm.c 2009-03-17 21:18:21.000000000 +0100
-+++ gcc/varasm.c 2009-04-29 03:10:09.000000000 +0200
-@@ -5607,7 +5607,11 @@
- bool is_local;
-
- is_local = targetm.binds_local_p (decl);
-- if (!flag_shlib)
-+ #ifdef ENABLE_ESPF
-+ if (!flag_pic)
-+ #else
-+ if (!flag_shlib)
-+ #endif
- {
- if (is_local)
- kind = TLS_MODEL_LOCAL_EXEC;
diff --git a/espf-gcc-4.3.4/30_all_gcc44_espf.h.patch b/espf-gcc-4.3.4/30_all_gcc44_espf.h.patch
deleted file mode 100644
index 70ce8ff..0000000
--- a/espf-gcc-4.3.4/30_all_gcc44_espf.h.patch
+++ /dev/null
@@ -1,156 +0,0 @@
-2010-04-09 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/espf.h New file to support --enable-espf
- Version 20100409.1
-
---- gcc/espf.h 2010-04-09 16:14:00.000000000 +0200
-+++ gcc/espf.h 2010-04-09 16:24:01.000000000 +0200
-@@ -0,0 +1,148 @@
-+/* License terms see GNU GENERAL PUBLIC LICENSE Version 3.
-+ * Version 20100409.1
-+ * Magnus Granberg (Zorry) <zorry@gentoo.org> */
-+#ifndef GCC_ESPF_H
-+#define GCC_ESPF_H
-+
-+/* This file will add -fstack-protector, -fPIE, -pie -D_FORTIFY_SOURCES=2 -z,relro and -z,now
-+ as default if the defines and the spec allow it.
-+
-+ On Gentoo
-+ Added a hack for gcc-specs-* in toolchain-funcs.eclass and _filter-hardened in flag-o-matic.eclass
-+ to support older hardened GCC patches and we don't need to change the code on gcc-specs-* and _filter-hardened.
-+ We use -fstack-protector-all instead of -fstack-protector
-+ This will add some unsupported upstream commands options as -nopie.
-+ -D__KERNEL__ is added so we don't have -fPIE and -fstack-protector-all when building kernels.
-+ ESPF_CC1_SPEC is added to CC1_SPEC.
-+ -D_FORTIFY_SOURCES=2 is added with gentoo's patchset as default so no need to set it hear.
-+ ESPF_LINK_SPEC will not add -z,relro as it default on with binutils.
-+ ESPF_CC1_STRICT_SPEC is added so we don't use gcc/opts.c to disable it.
-+ ESPF_OPTIONS_PIE_CHECK_SPEC check for -pie, -p, -pg, -profile, -static and -shared.
-+ ENABLE_CRTBEGINTS add support for crtbeginTS.o, build -static with -fPIE or -fpie.
-+*/
-+#ifdef ENABLE_ESPF
-+
-+ /* Hack to support gcc-specs-* in toolchain-funcs.eclass and _filter-hardened in flag-o-matic.eclass */
-+ #define ESPF_CC1_SPEC " %(espf_cc1_ssp) %(espf_cc1_pie) %(espf_cc1_strict)"
-+ #ifdef HAVE_GCC_SSP
-+ #define ESPF_CC1_SSP_SPEC "%{!fno-stack-protector: %{!fno-stack-protector-all: }}"
-+ #else
-+ #define ESPF_CC1_SSP_SPEC ""
-+ #endif
-+ #define ESPF_CC1_PIE_SPEC "%{!nopie: }"
-+ #define ESPF_CC1_STRICT_SPEC "%{!fstrict-overflow:%{!fno-strict-overflow: -fno-strict-overflow}}"
-+
-+ /* ESPF_LINK_SPEC is added to LINK_PIE_SPEC if espf is enable
-+ -z now will be added if we don't have -vanilla spec */
-+ #define ESPF_LINK_SPEC "%(espf_link_now)"
-+ #define ESPF_LINK_NOW_SPEC "%{!now:-z now}"
-+
-+ /* ESPF_OPTIONS_SPEC is added to the compiler spec in gcc/gcc.c */
-+ #define ESPF_OPTIONS_SPEC "%(espf_options_ssp)"
-+
-+ /* ESPF_CPP_OPTIONS_SPEC is added to the cpp_options spec in gcc/gcc.c
-+ For precompiling headers. */
-+ #define ESPF_CPP_OPTIONS_SPEC "%(espf_options_ssp)"
-+
-+ /* This will add -fstack-protector-all if we don't have -nostdlib -nodefaultlibs -fno-stack-protector -fstack-protector
-+ -fstack-protector-all and we have TARGET_LIBC_PROVIDES_SSP and HAVE_GCC_SSP defined. */
-+ #ifdef HAVE_GCC_SSP
-+ #define ESPF_OPTIONS_SSP_SPEC \
-+ "%{!D__KERNEL__:%{!nostdlib:%{!nodefaultlibs: %{!fno-stack-protector: \
-+ %{!fstack-protector:%{!fstack-protector-all:-fstack-protector-all}}}}}}"
-+ #else
-+ #define ESPF_OPTIONS_SSP_SPEC ""
-+ #endif
-+
-+ /* If HAVE_LD_PIE not defined we will not add any -fPIE -pie */
-+ #ifdef HAVE_LD_PIE
-+
-+ /* We use ESPF_COMMAND_OPTIONS_SPEC to add pie command-line options. */
-+ #define ESPF_COMMAND_OPTIONS_SPEC "%{!D__KERNEL__:%{!nopie:%(espf_options_pie) %(espf_link_pie)}}"
-+
-+ /* This will add -fPIE if we don't have -pie -fpic -fPIC -fpie -fPIE -fno-pic -fno-PIC -fno-pie -fno-PIE -shared -static
-+ -nostdlib -nostartfiles. */
-+ /* With ENABLE_CRTBEGINTS we don't need to check for -static */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define ESPF_OPTIONS_PIE_SPEC \
-+ "%{!pie: %{!fpic:%{!fPIC:%{!fpie:%{!fPIE: %{!fno-pic:%{!fno-PIC:%{!fno-pie:%{!fno-PIE: \
-+ %{!shared: %{!nostdlib: %{!nostartfiles:-fPIE}} } }}}} }}}} }"
-+ #else
-+ #define ESPF_OPTIONS_PIE_SPEC \
-+ "%{!pie: %{!fpic:%{!fPIC:%{!fpie:%{!fPIE: %{!fno-pic:%{!fno-PIC:%{!fno-pie:%{!fno-PIE: \
-+ %{!shared: %{!static: %{!nostdlib: %{!nostartfiles:-fPIE}} } }}}} }}}} }}"
-+ #endif
-+
-+ /* This will add -pie if we don't have -pie -A -fno-pic -fno-PIC -fno-pie -fno-PIE -shared -static -r -nostdlib
-+ -nostartfiles */
-+ /* With ENABLE_CRTBEGINTS we don't need to check for -static
-+ and we add -pie only to get the start and endfiles. -pie will not go to the linker. */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define ESPF_LINK_PIE_SPEC \
-+ "%{!pie:%{!A:%{!fno-pie:%{!fno-PIE:%{!fno-pic:%{!fno-PIC:%{!shared:%{!r: \
-+ %{!nostdlib:%{!nostartfiles:-pie}}}}}}}}}}"
-+ #else
-+ #define ESPF_LINK_PIE_SPEC \
-+ "%{!pie:%{!A:%{!fno-pie:%{!fno-PIE:%{!fno-pic:%{!fno-PIC:%{!shared:%{!static:%{!r: \
-+ %{!nostdlib:%{!nostartfiles:-pie}}}}}}}}}}}"
-+ #endif
-+
-+ /* This will check if shared is set when -static -pie -fPIE -fpie -fno-PIC -fno-pic, -pie is set when -static -pg -p -profile.
-+ If set it will make gcc print out "-shared and -static|pie|fPIE|fpie|fno-PIC|fno-pic are incompatible" or
-+ "-pie and pg|p|profile are incompatible" */
-+ /* With ENABLE_CRTBEGINTS we don't need to check for -static */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define ESPF_OPTIONS_PIE_CHECK_SPEC \
-+ "%{shared:%{static|pie|fPIE|fpie|fno-PIC|fno-pic:%e-shared and -static|pie|fPIE|fpie|fno-PIC|fno-pic are incompatible}} \
-+ %{pie:%{pg|p|profile:%e-pie and -pg|p|profile are incompatible}}"
-+ #else
-+ #define ESPF_OPTIONS_PIE_CHECK_SPEC \
-+ "%{shared:%{static|pie|fPIE|fpie|fno-PIC|fno-pic:%e-shared and -static|pie|fPIE|fpie|fno-PIC|fno-pic are incompatible}} \
-+ %{pie:%{static|pg|p|profile:%e-pie and -static|pg|p|profile are incompatible}}"
-+ #endif
-+
-+ /* We don't pass -pie to the linker when -static */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define LINK_PIE_SPEC "%{!static:%{pie:-pie}} %(espf_link) "
-+ #else
-+ #define LINK_PIE_SPEC "%{pie:-pie} %(espf_link) "
-+ #endif
-+
-+ #else
-+ #define ESPF_OPTIONS_PIE_SPEC ""
-+ #define ESPF_OPTIONS_PIE_CHECK_SPEC ""
-+ #define ESPF_LINK_PIE_SPEC ""
-+ #define LINK_PIE_SPEC "%{pie:-pie} %(espf_link) "
-+ #endif
-+
-+ /* We add extra spec name's to the EXTRA_SPECS list */
-+ #define ESPF_EXTRA_SPECS \
-+ { "espf_cc1", ESPF_CC1_SPEC }, \
-+ { "espf_cc1_pie", ESPF_CC1_PIE_SPEC }, \
-+ { "espf_cc1_ssp", ESPF_CC1_SSP_SPEC }, \
-+ { "espf_cc1_strict", ESPF_CC1_STRICT_SPEC }, \
-+ { "espf_link", ESPF_LINK_SPEC }, \
-+ { "espf_link_now", ESPF_LINK_NOW_SPEC }, \
-+ { "espf_link_pie", ESPF_LINK_PIE_SPEC }, \
-+ { "espf_command_options", ESPF_COMMAND_OPTIONS_SPEC }, \
-+ { "espf_cpp_options", ESPF_CPP_OPTIONS_SPEC }, \
-+ { "espf_options", ESPF_OPTIONS_SPEC }, \
-+ { "espf_options_pie", ESPF_OPTIONS_PIE_SPEC }, \
-+ { "espf_options_pie_check", ESPF_OPTIONS_PIE_CHECK_SPEC }, \
-+ { "espf_options_ssp", ESPF_OPTIONS_SSP_SPEC }
-+
-+ static const char *espf_command_options_spec = ESPF_COMMAND_OPTIONS_SPEC;
-+ static const char *cc1_spec = CC1_SPEC ESPF_CC1_SPEC;
-+
-+#else /* If not ESPF_ENABLE defined do this. */
-+
-+ #define ESPF_OPTIONS_SPEC ""
-+ #define ESPF_CPP_OPTIONS_SPEC ""
-+
-+ /* We add extra spec name's to the EXTRA_SPECS list */
-+ #define ESPF_EXTRA_SPECS \
-+ { "espf_options", ESPF_OPTIONS_SPEC }, \
-+ { "espf_cpp_options", ESPF_CPP_OPTIONS_SPEC }
-+
-+#endif
-+#endif /* End GCC_ESPF_H */
diff --git a/espf-gcc-4.3.4/33_all_gcc44_config_rs6000_linux64.h.patch b/espf-gcc-4.3.4/33_all_gcc44_config_rs6000_linux64.h.patch
deleted file mode 100644
index b9fed34..0000000
--- a/espf-gcc-4.3.4/33_all_gcc44_config_rs6000_linux64.h.patch
+++ /dev/null
@@ -1,16 +0,0 @@
-2009-09-23 Peter S. Mazinger <ps.m@gmx.net>
-
- * gcc/config/rs6000/linux64.h ASM_SPEC32 Change %{fpic:-K PIC} %{fPIC:-K PIC}
- to %{fpic|fPIC|fpie|fPIE:-K PIC}
-
---- gcc/config/rs6000/linux64.h.psm 2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/rs6000/linux64.h 2009-09-23 12:34:26.000000000 +0200
-@@ -156,7 +156,7 @@
- #endif
-
- #define ASM_SPEC32 "-a32 %{n} %{T} %{Ym,*} %{Yd,*} \
--%{mrelocatable} %{mrelocatable-lib} %{fpic:-K PIC} %{fPIC:-K PIC} \
-+%{mrelocatable} %{mrelocatable-lib} %{fpic|fPIC|fpie|fPIE:-K PIC} \
- %{memb} %{!memb: %{msdata: -memb} %{msdata=eabi: -memb}} \
- %{!mlittle: %{!mlittle-endian: %{!mbig: %{!mbig-endian: \
- %{mcall-freebsd: -mbig} \
diff --git a/espf-gcc-4.3.4/35_all_gcc44_config_crtbegints.patch b/espf-gcc-4.3.4/35_all_gcc44_config_crtbegints.patch
deleted file mode 100644
index f1e6532..0000000
--- a/espf-gcc-4.3.4/35_all_gcc44_config_crtbegints.patch
+++ /dev/null
@@ -1,36 +0,0 @@
-2009-09-25 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/linux.h If ENABLE_CRTBEGINTS, -static and -pie use crtbegineTS.o.
- * gcc/config/rs6000/sysv4.h If ENABLE_CRTBEGINTS, -static and -pie use crtbegineTS.o.
-
---- gcc/config/linux.h 2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/linux.h 2009-09-08 04:08:06.000000000 +0200
-@@ -43,7 +43,11 @@
- object constructed before entering `main'. */
-
- #undef STARTFILE_SPEC
--#if defined HAVE_LD_PIE
-+#if defined (HAVE_LD_PIE) && defined (ENABLE_CRTBEGINTS)
-+#define STARTFILE_SPEC \
-+ "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} crti.o%s \
-+ %{static:%{pie:crtbeginTS.o%s;:crtbeginT.o%s}} %{!static:%{shared|pie:crtbeginS.o%s;:crtbegin.o%s}}"
-+#elif defined (HAVE_LD_PIE) && ! defined (ENABLE_CRTBEGINTS)
- #define STARTFILE_SPEC \
- "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
- crti.o%s %{static:crtbeginT.o%s;shared|pie:crtbeginS.o%s;:crtbegin.o%s}"
---- gcc/config/rs6000/sysv4.h 2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/rs6000/sysv4.h 2009-09-08 04:41:50.000000000 +0200
-@@ -883,7 +883,12 @@
- %{!mnewlib: %{pthread:-lpthread} %{shared:-lc} \
- %{!shared: %{profile:-lc_p} %{!profile:-lc}}}"
-
--#ifdef HAVE_LD_PIE
-+#if defined (HAVE_LD_PIE) && defined (ENABLE_CRTBEGINTS)
-+#define STARTFILE_LINUX_SPEC \
-+ "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
-+ %{mnewlib:ecrti.o%s;:crti.o%s} \
-+ {static:%{pie:crtbeginTS.o%s;:crtbeginT.o%s}} %{!static:%{shared|pie:crtbeginS.o%s;:crtbegin.o%s}}"
-+#elif defined (HAVE_LD_PIE) && ! defined (ENABLE_CRTBEGINTS)
- #define STARTFILE_LINUX_SPEC "\
- %{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
- %{mnewlib:ecrti.o%s;:crti.o%s} \
diff --git a/espf-gcc-4.3.4/40_all_gcc44_cp_lang-specs.h.patch b/espf-gcc-4.3.4/40_all_gcc44_cp_lang-specs.h.patch
deleted file mode 100644
index 954b102..0000000
--- a/espf-gcc-4.3.4/40_all_gcc44_cp_lang-specs.h.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-2009-06-18 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/cp/lang-specs.h compiler spec Add %(espf_options).
-
---- gcc/cp/lang-specs.h.orig 2009-03-23 01:21:54.000000000 +0100
-+++ gcc/cp/lang-specs.h 2009-03-23 01:22:16.000000000 +0100
-@@ -47,7 +47,7 @@
- %(cpp_options) %2 -o %{save-temps:%b.ii} %{!save-temps:%g.ii} \n}\
- cc1plus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.ii} %{!save-temps:%g.ii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- %{!fsyntax-only:-o %g.s %{!o*:--output-pch=%i.gch} %W{o*:--output-pch=%*}%V}}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {"@c++",
-@@ -57,11 +57,11 @@
- %(cpp_options) %2 -o %{save-temps:%b.ii} %{!save-temps:%g.ii} \n}\
- cc1plus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.ii} %{!save-temps:%g.ii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- %{!fsyntax-only:%(invoke_as)}}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {".ii", "@c++-cpp-output", 0, 0, 0},
- {"@c++-cpp-output",
- "%{!M:%{!MM:%{!E:\
-- cc1plus -fpreprocessed %i %(cc1_options) %2 %{+e*}\
-+ cc1plus -fpreprocessed %i %(cc1_options) %(espf_options) %2 %{+e*}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
diff --git a/espf-gcc-4.3.4/41_all_gcc44_objc_lang-specs.h.patch b/espf-gcc-4.3.4/41_all_gcc44_objc_lang-specs.h.patch
deleted file mode 100644
index affa77d..0000000
--- a/espf-gcc-4.3.4/41_all_gcc44_objc_lang-specs.h.patch
+++ /dev/null
@@ -1,37 +0,0 @@
-2009-06-18 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/objc/lang-specs.h compiler spec Add %(espf_options).
-
---- gcc/objc/lang-specs.h 2009-03-23 01:21:54.000000000 +0100
-+++ gcc/objc/lang-specs.h 2009-03-23 01:22:16.000000000 +0100
-@@ -30,13 +30,13 @@
- %{traditional|ftraditional|traditional-cpp:\
- %eGNU Objective C no longer supports traditional compilation}\
- %{save-temps|no-integrated-cpp:cc1obj -E %(cpp_options) -o %{save-temps:%b.mi} %{!save-temps:%g.mi} \n\
-- cc1obj -fpreprocessed %{save-temps:%b.mi} %{!save-temps:%g.mi} %(cc1_options) %{print-objc-runtime-info} %{gen-decls}}\
-+ cc1obj -fpreprocessed %{save-temps:%b.mi} %{!save-temps:%g.mi} %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}}\
- %{!save-temps:%{!no-integrated-cpp:\
-- cc1obj %(cpp_unique_options) %(cc1_options) %{print-objc-runtime-info} %{gen-decls}}}\
-+ cc1obj %(cpp_unique_options) %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}}}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
- {".mi", "@objc-cpp-output", 0, 0, 0},
- {"@objc-cpp-output",
-- "%{!M:%{!MM:%{!E:cc1obj -fpreprocessed %i %(cc1_options) %{print-objc-runtime-info} %{gen-decls}\
-+ "%{!M:%{!MM:%{!E:cc1obj -fpreprocessed %i %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
- {"@objective-c-header",
- "%{E|M|MM:cc1obj -E %{traditional|ftraditional|traditional-cpp:-traditional-cpp}\
-@@ -45,10 +45,10 @@
- %{traditional|ftraditional|traditional-cpp:\
- %eGNU Objective C no longer supports traditional compilation}\
- %{save-temps|no-integrated-cpp:cc1obj -E %(cpp_options) -o %{save-temps:%b.mi} %{!save-temps:%g.mi} \n\
-- cc1obj -fpreprocessed %b.mi %(cc1_options) %{print-objc-runtime-info} %{gen-decls}\
-+ cc1obj -fpreprocessed %b.mi %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}\
- -o %g.s %{!o*:--output-pch=%i.gch}\
- %W{o*:--output-pch=%*}%V}\
- %{!save-temps:%{!no-integrated-cpp:\
-- cc1obj %(cpp_unique_options) %(cc1_options) %{print-objc-runtime-info} %{gen-decls}\
-+ cc1obj %(cpp_unique_options) %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}\
- -o %g.s %{!o*:--output-pch=%i.gch}\
- %W{o*:--output-pch=%*}%V}}}}}", 0, 0, 0},
diff --git a/espf-gcc-4.3.4/42_all_gcc44_objcp_lang-specs.h.patch b/espf-gcc-4.3.4/42_all_gcc44_objcp_lang-specs.h.patch
deleted file mode 100644
index 542a803..0000000
--- a/espf-gcc-4.3.4/42_all_gcc44_objcp_lang-specs.h.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-2009-06-18 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/objcp/lang-specs.h compiler spec Add %(espf_options).
-
---- gcc/objcp/lang-specs.h 2009-03-23 01:21:54.000000000 +0100
-+++ gcc/objcp/lang-specs.h 2009-03-23 01:22:16.000000000 +0100
-@@ -36,7 +36,7 @@
- %(cpp_options) %2 -o %{save-temps:%b.mii} %{!save-temps:%g.mii} \n}\
- cc1objplus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.mii} %{!save-temps:%g.mii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- -o %g.s %{!o*:--output-pch=%i.gch} %W{o*:--output-pch=%*}%V}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {"@objective-c++",
-@@ -46,15 +46,15 @@
- %(cpp_options) %2 -o %{save-temps:%b.mii} %{!save-temps:%g.mii} \n}\
- cc1objplus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.mii} %{!save-temps:%g.mii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- %{!fsyntax-only:%(invoke_as)}}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {".mii", "@objective-c++-cpp-output", 0, 0, 0},
- {"@objective-c++-cpp-output",
- "%{!M:%{!MM:%{!E:\
-- cc1objplus -fpreprocessed %i %(cc1_options) %2 %{+e*}\
-+ cc1objplus -fpreprocessed %i %(cc1_options) %(espf_options) %2 %{+e*}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
- {"@objc++-cpp-output",
- "%{!M:%{!MM:%{!E:\
-- cc1objplus -fpreprocessed %i %(cc1_options) %2 %{+e*}\
-+ cc1objplus -fpreprocessed %i %(cc1_options) %(espf_options) %2 %{+e*}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
diff --git a/espf-gcc-4.3.4/60_all_gcc44_invoke.texi.patch b/espf-gcc-4.3.4/60_all_gcc44_invoke.texi.patch
deleted file mode 100644
index 863ebc0..0000000
--- a/espf-gcc-4.3.4/60_all_gcc44_invoke.texi.patch
+++ /dev/null
@@ -1,44 +0,0 @@
-2009-09-11 Magnus Granberg <zorry@ume.nu>
-
- * gcc/doc/invoke.texi Add NOTES about -fstack-protector-all, -pie and
- -fPIE/-fpie when --enable-espf is enable, this options is on by default.
-
---- gcc/doc/invoke.texi 2009-04-01 09:18:47.000000000 +0200
-+++ gcc/doc/invoke.texi 2009-06-18 14:08:38.000000000 +0200
-@@ -7134,6 +7134,11 @@
- @opindex fstack-protector-all
- Like @option{-fstack-protector} except that all functions are protected.
-
-+NOTE: When --enable-espf this option is enabled by default
-+for C, C++, ObjC, ObjC++, if neither @option{-fno-stack-protector}
-+or @option{-nostdlib} or @option{-nodefaultlibs} or
-+@option{-fstack-protector} are found.
-+
- @item -fsection-anchors
- @opindex fsection-anchors
- Try to reduce the number of symbolic address calculations by using
-@@ -7960,6 +7965,12 @@
- that were used to generate code (@option{-fpie}, @option{-fPIE},
- or model suboptions) when you specify this option.
-
-+NOTE: When --enable-espf this option is enabled by default
-+for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE}
-+or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or
-+@option{-nostartfiles} or @option{-shared} or @option{-pg} or @option{-p}
-+are found.
-+
- @item -rdynamic
- @opindex rdynamic
- Pass the flag @option{-export-dynamic} to the ELF linker, on targets
-@@ -15889,6 +15910,11 @@
- @code{__pie__} and @code{__PIE__}. The macros have the value 1
- for @option{-fpie} and 2 for @option{-fPIE}.
-
-+NOTE: When --enable-espf this option is enabled by default
-+for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE}
-+or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or
-+@option{-nostartfiles} or @option{-shared} are found.
-+
- @item -fno-jump-tables
- @opindex fno-jump-tables
- Do not use jump tables for switch statements even where it would be
diff --git a/espf-gcc-4.3.4/README b/espf-gcc-4.3.4/README
deleted file mode 100644
index 9dfb83a..0000000
--- a/espf-gcc-4.3.4/README
+++ /dev/null
@@ -1,18 +0,0 @@
-This work started with bugs #94325 #100689 #106222 #149292 #149649 and the overlay on http://overlays.gentoo.org/dev/kevquinn.
-By Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY and mentor.
-
-The work stalled. Some threads on the Gentoo forum started to do their own fixes to get it working.
-Xake started the thread where most of the new work is done: "How long until hardened and toolchain will produce a hardened gcc4?"
-http://forums.gentoo.org/viewtopic-t-668885.html. I joined the thread and started to code.
-
-We started with the pieworld code from kevquinn's overlay. The PIE and minispecs part hit the tree later on.
-With GCC 4.4.0 I was willing to do some code cleanup, use built-in specs and add it as --enable-espf in the
-configure command line.
-
-Thank you all:
-Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY, Xake, Dwokfur,
-KernelOfTruth, SteveL, nixnut, Hopeless, forsaken1, XioXous, obrut<-, mv, qjim, Tommy[D], Genewb, radegand,
-unk, neuron, alexxy, hellboi64, likewhoa, g0rg0n, costel78, polsas, 7v5w7go9ub0o, uberpinguin, Naib, cilly,
-bonsaikitten, kerframil, agaffney, Gordon Malm, blueness, Matthias Klose, Kees Cook, mentor, Anarchy and
-everyone else for helping to test, suggestions, fixes and anything else we have missed.
-/2009-00-09 Magnus Grenberg (Zorry) <zorry@ume.nu>
diff --git a/espf-gcc-4.3.4/README.Changelog b/espf-gcc-4.3.4/README.Changelog
deleted file mode 100644
index 462ffe7..0000000
--- a/espf-gcc-4.3.4/README.Changelog
+++ /dev/null
@@ -1,232 +0,0 @@
-0.3.9 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/configure Added check for TLS on the target in the SSP check.
-
- #149292 b.g.o
- * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux64.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/rs6000/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux64.h Removed uclibc don't support TLS on stack-protector
-
-0.3.8 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/configure Added a -fstack-protector check.
- * gcc/config.in Added HAVE_GCC_SSP
- * gcc/gcc.c Removed code for espf_link_spec in do_spec_1() %X
- * gcc/espf.h Added ifdef HAVE_GCC_SSP, change code for espf_link_spec and link_pie_spec
-
-0.3.7 Magnus Granberg <zorry@ume.nu>
-
- * gcc/gcc.c Remove code for Wl,-z,now check
- * gcc/espf.h Change text for -z now
-
-0.3.6 Magnus Granberg <zorry@ume.nu>
-
- * configure Check --enable-espf change ppc* to powerpc*, powerpc64 and add ia64.
- * gcc/configure Don't check for -z,relro on ia64. Disable crtbeginTS for ia64.
- * gcc/espf.h ia64 don't support -fstack-protector*
-
-0.3.5 Maguns Granberg <zorry@ume.nu>
-
- * gcc/espf.h Change the specs for crtbegin.TS.o.
- * gcc/gcc.c Rename espf_cc1_options to espf_options_pie_check.
- * gcc/config/linux.h Fix typos ENABLE_CRTBEGINS to ENABLE_CRTBEGINTS
- * gcc/config/rs6000/linux64.h ASM_SPEC32: %{fpic:-K PIC} %{fPIC:-K PIC} to %{fpic|fPIC|fpie|fPIE:-K PIC}
-
-0.3.4 Magnus Granberg <zorry@ume.nu>
-
- * gcc/configure Add crtbeginTS.o support.
- * gcc/Makefile.in Add crtbeginTS.o support.
- * gcc/gcc.c Add espf_cc1_options.
- * gcc/espf.h Added espf_cc1_options, crtbeginTS.o support,
- espf_cc1_options and espf_cc1_strictoverflow.
- * gcc/config.in Add crtbeginTS.o support.
- * gcc/config/linux.h Add crtbeginTS.o support.
- * gcc/config/rs6000/sysv4.h Add crtbeginTS.o support.
- * gcc/doc/invoke.texi Add NOTES about -fstack-protector-all,
- -pie and -fPIE.
- * libgcc/Makefile.in Add crtbeginTS.o support.
-
-0.3.3 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c change #ifdef ENABLE_ESPF to #ifndef ENABLE_ESPF
-
-0.3.2 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c disable flag_delete_null_pointer_checks >= -O2
- * gcc/espf.h add ESPF_CC1_SSP_SPEC and ESPF_CC1_PIE_SPEC to fix bugs on -vanilla spec
-
- #149292 b.g.o
- * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux64.h uclibc don't support TLS on stack-protector
- * gcc/config/rs6000/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux64.h uclibc don't support TLS on stack-protector
-
-0.3.1 Magnus Granberg <zorry@ume.nu>
-
- * gcc/cp/Make-lang.in cc1plus: pch test fail when cc1plus is compile with -fPIE.
- * gcc/configure fix --enable-espf when USE"-hardened"
-
-4.4.1-espf-0.3.0 Magnus Granberg <zorry@ume.nu>
-
- * gcc/espf.h add ESPF_LINK_SPEC ESPF_LINK_NOW_SPEC
- * gcc/gcc.c move do_self_spec (espf_command_options_spec)
- do_spec_1() add espf_link_spec
-
-0.3.0 Magnus Granberg <zorry@ume.nu>
-
- * gcc/objc/lang-specs.h Add %(espf_options)
- * gcc/objcp/lang-specs.h Add %(espf_options)
- * gcc/cp/lang-specs.h Add %(espf_options)
- * gcc/config.in removed ENABLE_LIBSSP
- * Makefile.in We add -fno-stack-protector to
- BOOT_CFLAGS, LIBCFLAGS and LIBCXXFLAGS
- cc1: pch.exp test fail when cc1 is compile with -fPIE
- * libmudflap/Makefiles.in Add -fno-stack-protector -U_FORTIFY_SOURCE
- to AM_CFLAGS
- * configure add --enable-espf
- add -fno-stack-protector to stage1_cflags
- add targes ppc* arm sparc*
- * gcc/configure change code for check --enable-espf
- * libmudflap/configure add enable_espf
- * gcc/espf.h ESPF_CC1_OPTIONS_SPEC renamed to ESPF_OPTIONS_SPEC
- add ESPF_CPP_OPTIONS_SPEC ESPF_COMMAND_OPTIONS_SPEC
- ESPF_CC1_OPTIONS_SSP_SPEC renamed to ESPF_OPTIONS_SSP_SPEC
- ESPF_COMPILER_COMMAND_PIE_SPEC renamed to ESPF_OPTIONS_PIE_SPEC
- ESPF_LINK_COMMAND_PIE_SPEC renamed to ESPF_LINK_PIE_SPEC
- add !p !pg to ESPF_LINK_PIE_SPEC
- removed ESPF_LINK_SPEC ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC
- * gcc/gcc.c cpp_options add %(espf_cpp_options)
- compiler spec add %(espf_options)
- change code for ESPF_EXTRA_SPECS
- process_command(): Check for lazy, or now
- do_spec_1(): Add -z now and -z relro
- main() add do_self_spec (espf_command_options_spec)
- removed do_self_spec (espf_cc1_command_spec) do_self_spec (espf_link_command_spec)
-
-0.2.9 Magnus Granberg <zorry@ume.nu>
-
- * gcc/espf.h add ESPF_COMPILER_COMMAND_PIE_SPEC
- add ESPF_LINK_COMMAND_PIE_SPEC
- change ESPF_COMPILER_COMMAND_SPEC ESPF_LINK_COMMAND_SPEC
-
-0.2.8 Magnus Granberg <zorry@ume.nu>
-
- * gcc/configure removed check crtbeginTS.o
- * gcc/espf.h added notes
- add ESPF_CC1_SPEC
- removed ESPF_CPP_UNIQUE_OPTIONS espf_override_options()
- * gcc/gcc.c cc1_spec Set it to CC1_SPEC if ! ENABLE_ESPF
- * gcc/toplev.c removed ESPF_OVERRIDE_OPTIONS
-
-0.2.7 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c (decode_options): Remove flag_strict_overflow as opt2
- * gcc/config.in removed HAVE_CRTBEGINTS
- * gcc/Makefile removed crtbeginTS.o
- * libgcc/Makefile.in removed crtbeginTS.o
- * gcc/config/i386/i386.h removed espf_override_options ESPF_EXTRA_SPECS
- * gcc/config/linux.h remoevd crtbeginTS.o
- * gcc/espf.h ESPF_CC1_OPTIONS_PIE_SPEC renamed to ESPF_CC1_COMMAND_SPEC
- * gcc/gcc.c add ESPF_EXTRA_SPECS
- main() add do_self_spec (espf_cc1_command_spec)
-
-0.2.6 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h add espf_override_options() to OVERRIDE_OPTIONS
- * gcc/espf.h add espf_override_options()
- * gcc/toplev.c add ESPF_OVERRIDE_OPTIONS
-
-0.2.5 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h removed espf_cc1
- * gcc/config/i386/linux.h removed espf_cc1 %(crtend_gen)
- * gcc/config/i386/x86-64.h removed espf_cc1 %(crtend_gen)
- * gcc/config/linux.h removed espf_cc1 %(crtfile_gen)
- %(crtbegin_t_gen) %(crtend_gen)
- add crtbeginTS.o
- * gcc/config.in removed TARGET_LIBC_PROVIDES_PIE
- add HAVE_CRTBEGINTS
- * gcc/Makefile.in add ESPF_NOPIE_CFLAGS ESPF_NOSSP_CFLAGS to
- CRTSTUFF_T_CFLAGS
- add ESPF_NOSSP_CFLAGS to CRTSTUFF_T_CFLAGS_S
- * espf.h ESPF_CC1_SPEC renamed to ESPF_CC1_OPTIONS_SPEC
- add ESPF_LINK_SPEC
- ESPF_CC1_SSP_SPEC renamed to ESPF_CC1_OPTIONS_SSP_SPEC
- ESPF_CC1_PIE_SPEC renamed to ESPF_CC1_OPTIONS_PIE_SPEC
- ESPF_CC1_OPTIONS_SPEC renamed to ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC
- LINK_PIE_SPEC renamed to ESPF_LINK_COMMAND_SPEC
- removed ESPF_CC1_STRICT_SPEC CRTFILE_GEN_SPEC CRTBEGIN_GEN_SPEC
- CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC
- * gcc/configure remove TARGET_LIBC_PROVIDES_PIE
- define HAVE_CRTBEGINTS
- * gcc/gcc.c LINK_COMMAND_SPEC add %(espf_link)
- main() add do_self_spec (espf_link_command_spec)
-
-0.2.4 Magnus Granberg <zorry@ume.nu>
-
- libgcc/Makefile.in clean specs
-
-0.2.3 Magnus Granberg <zorry@ume.nu>
-
- *gcc/espf.h add ESPF_CC1_STRICT_SPEC
-
-0.2.2 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h Add espf_cc1
- Add ESPF_EXTRA_SPECS
- * gcc/config/i386/linux.h Add espf_cc1
- * gcc/config/i386/x86-64.h Add espf_cc1
- * gcc/config/linux.h Add espf_cc1
- * gcc/Makefile.in add crtbeginTS.o to EXTRA_PARTS list
- * libgcc/Makefile.in add crtbeginTS.o to EXTRA_PARTS list
- * gcc/configure add define ENABLE_LIBSSP
- * gcc/gcc.c %(fortify_default) renamed to %(espf_cpp_unique_options)
- %(pie_incompatible) renamed to %(espf_cc1_options)
- removed ESPF_EXTRA_SPECS
- * gcc/espf.h ESPF_DEFAULT_SPEC renamed to ESPF_CC1_SPEC
- SSP_DEFAULT_SPEC renamed to ESPF_CC1_SSP_SPEC
- FORTIFY_DEFAULT_SPEC renamed to ESPF_CPP_UNIQUE_OPTIONS
- PIE_DEFAULT_SPEC renamed to ESPF_CC1_PIE_SPEC
- PIE_INCOMPATIBLE_SPEC renamed to ESPF_CC1_OPTIONS_SPEC
- add new CRTFILE_GEN_SPEC CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC if !
- TARGET_LIBC_PROVIDES_PIE
-
-4.4.0-espf-0.2.1 Magnus Granberg <zorry@ume.nu>
-
- * gcc/gcc.c include: espf.h
- cc1_spec = CC1_SPEC if not ENABLE_ESPF
- cpp_unique_options add %(fortify_default)
- cc1_options add %(pie_incompatible)
- EXTRA_SPECS add ESPF_EXTRA_SPECS
- * libgcc/Makefile.in add crtbeginTs.o
- gcc/Makefile.in add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS
- LIBGCC2_CFLAGS add ESPF_NOSSP_CFLAGS
- CRTSTUFF_CFLAGS add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS
- crtbegin* add crtbeginTS
- $(out_object_file): ix86_split_to_parts() stack smashing attack b.g.o #149292
- * libgcc/configure add enable_espf
- * gcc/config/linux.h add %(crtfile_gen) %(crtbegin_t_gen) %(crtend_gen)
- * gcc/config/i386/linux.h add %(crtend_gen)
- * gcc/config/i386/linux64.h add %(crtend_gen)
- * gcc/config.gcc extra_parts add crtbeginTS.o
- * libgcc/config.host extra_parts add crtbeginTS.o
- * gcc/configure check -z relro
- check -z now
- check FORTIFY_SOURCES level 2
- check Scrt1.o
- check --enable-espf
- check crtbeginTS.o
- * gcc/espf.h new file
- * gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib
- * gcc/config.in add ENABLE_LIBSSP
- add ENABLE_ESPF
- add TARGET_LIBC_PROVIDES_FORTIFY2
- add TARGET_LIBC_PROVIDES_PIE
- * configure define ENABLE_LIBSSP
-
-gcc-4.3.3-piepatches-v10.2.1 \ No newline at end of file
diff --git a/espf-gcc-4.3.4/README.Gentoo.patches b/espf-gcc-4.3.4/README.Gentoo.patches
deleted file mode 100644
index ef89a69..0000000
--- a/espf-gcc-4.3.4/README.Gentoo.patches
+++ /dev/null
@@ -1,28 +0,0 @@
- ================
- === W[hat]TF ===
- ================
-
-Gentoo patchsets that have grown too large to keep on the rsync mirrors have
-been moved to our cvs tree. From there, we bundle up all the whee little
-patches into a tarball and distribute it via our public mirroring system.
-
-If you want specific info about a patch (like wtf it does or whose great idea
-it was to change the code), read the patch ! We try to fill out the top of
-them with useful info such as what it does, why it's needed, bug reports,
-original creators, etc... For simple patches, we reserve the right to assume
-your IQ is greater than absolute 0 and figure out what it does w/out an
-explanation. If, by some miracle of science, it falls below the absolute 0
-mark, you should help mankind by finding some scientists and letting them
-probe you with their ... erm ... probes.
-
- =================
- === W[here]TF ===
- =================
-
-For those with CVS access, you want the 'src/patchsets' dir inside of the
-'gentoo' cvs module.
-
-For those w/out CVS access, this URL should help you:
-http://sources.gentoo.org/gentoo/src/patchsets/
-
-It should be pretty easy to find your way around, you're a big boy after all.
diff --git a/espf-gcc-4.3.4/README.history b/espf-gcc-4.3.4/README.history
deleted file mode 100644
index cbe1b32..0000000
--- a/espf-gcc-4.3.4/README.history
+++ /dev/null
@@ -1,154 +0,0 @@
-0.3.9 14-04-2010
- 10_all_gcc44_configure.patch
- - 50_all_gcc44_no_ssp_tls_uclibc.patch
-
-0.3.8 10-04-2010
- 10_all_gcc44_configure.patch
- 11_all_gcc44_config.in.patch
- 20_all_gcc44_gcc.c.patch
- 30_all_gcc44_espf.h.patch
-
-0.3.7 10-02-2010
- 20_all_gcc44_gcc.c.patch
- 30_all_gcc44_espf.h.patch
-
-0.3.6 23-12-2009
- 10_all_gcc44_configure.patch
- 30_all_gcc44_espf.h.patch
- README
-
-0.3.5 24-09-2009
- 30_all_gcc44_espf.h.patch
- 35_all_gcc44_config_crtbegints.patch
- + 33_all_gcc44_config_rs6000_linux64.h.patch
- + README.Gentoo.patches
-
-0.3.4 11-09-2009
- 10_all_gcc44_configure.patch
- 11_all_gcc44_config.in.patch
- 12_all_gcc44_Makefile.in.patch
- 20_all_gcc44_gcc.c.patch
- - 23_all_gcc44_opts.c.patch
- 30_all_gcc44_espf.h.patch
- 35_all_gcc44_config_crtbegints.patch
- + 60_all_gcc44_invoke.texi.patch
- + README
-
-0.3.3 14-08-2009
- 23_all_gcc44_opts.c.patch
-
-0.3.2 09-08-2009
- 50_all_gcc44_no_ssp_tls_uclibc.patch
- + README.Changelog
- + README.history
- + 23_all_gcc44_opts.c.patch
- 30_all_gcc44-espf.h.patch
-
-0.3.1 23-07-2009
- 10_all_gcc44_configure.patch
-
-0.3.0 23-07-2009
- 10_all_gcc44_configure.patch
- 11_all_gcc44_config.in.patch
- 12_all_gcc44_Makefile.in.patch
- 20_all_gcc44_gcc.c.patch
- + 40_all_gcc44_obj_lang-specs.h.patch
- + 40_all_gcc44_objp_lang-specs.h.patch
- + 40_all_gcc44_cp_lang-specs.h.patch
- - 50_all_gcc44_gentoo_v20090614.1.patch
- 30_all_gcc44-espf.h.patch
-
-0.2.9 14-06-2009
- 12_all_gcc44_Makefile.in.patch
- 30_all_gcc44-espf.h.patch
- + 50_all_gcc44_gentoo_v20090614.1.patch
- - 50_all_gcc44_gentoo_v20090612.2.patch
-
-0.2.8 12-06-2009
- 10_all_gcc44_configure.patch
- 11_all_gcc44_config.in.patch
- 12_all_gcc44_Makefile.in.patch
- - 22_all_gcc44-toplev.c.patch
- + 30_all_gcc44-espf.h.patch
- - 25_all_gcc44-espf.h.patch
- + 50_all_gcc44_gentoo_v20090612.2.patch
-
-0.2.7 29-05-2009
- 11_all_gcc44_config.in.patch
- 12_all_gcc44_Makefile.in.patch
- 20_all_gcc44_gcc.c.patch
- + 23_all_gcc44_opts.c.patch
- 25_all_gcc44-espf.h.patch
- - 30_all_gcc44-config-defaul-linux.patch
-
-0.2.6 28-05-2009
- + 22_all_gcc44-toplev.c.patch
- 25_all_gcc44-espf.h.patch
- 30_all_gcc44-config-defaul-linux.patch
-
-0.2.5 27-05-2009
- 10_all_gcc44_configure.patch
- 12_all_gcc44_Makefile.in.patch
- 20_all_gcc44_gcc.c.patch
- 25_all_gcc44-espf.h.patch
- 30_all_gcc44-config-defaul-linux.patch
- - 40_all_gcc44-gentoo.patch
-
-0.2.4 08-05-2009
- 12_all_gcc44_Makefile.in.patch
-
-0.2.3 08-05-2009
- 20_all_gcc44_gcc.c.patch
- 40_all_gcc44-gentoo.patch
-
-0.2.2 04-05-2009
- + 10_all_gcc44_configure.patch
- + 11_all_gcc44_config.in.patch
- + 12_all_gcc44_Makefile.in.patch
- + 20_all_gcc44_gcc.c.patch
- + 21_all_gcc44_decl-tls-model.patch
- + 25_all_gcc44-espf.h.patch
- + 30_all_gcc44-config-defaul-linux.patch
- + 40_all_gcc44-gentoo.patch
- - 01_all_gcc44-configure.patch
- - 10_all_gcc44-gcc_configure.patch
- - 11_all_gcc44-gcc_config.in.patch
- - 12_all_gcc44-gcc_config.gcc.patch
- - 13_all_gcc44-gcc_Makefile.in.patch
- - 15_all_gcc44-libgcc_config.host.patch
- - 16_all_gcc44-libgcc_configure.patch
- - 17_all_gcc44-libgcc_Makefile.in.patch
- - 21_all_gcc44-gcc_espf.h.patch
- - 22_all_gcc44-gcc_gcc.c.patch
- - 23_all_gcc44-gcc_varasm.c.patch
- - 30_all_gcc44-add-crt-start-endfiles-linux.patch
-
-0.2.1 28-04-2009
- + 01_all_gcc44-configure.patch
- + 10_all_gcc44-gcc_configure.patch
- + 11_all_gcc44-gcc_config.in.patch
- + 12_all_gcc44-gcc_config.gcc.patch
- + 13_all_gcc44-gcc_Makefile.in.patch
- + 15_all_gcc44-libgcc_config.host.patch
- + 16_all_gcc44-libgcc_configure.patch
- + 17_all_gcc44-libgcc_Makefile.in.patch
- + 21_all_gcc44-gcc_espf.h.patch
- + 22_all_gcc44-gcc_gcc.c.patch
- + 23_all_gcc44-gcc_varasm.c.patch
- + 30_all_gcc44-add-crt-start-endfiles-linux.patch
- - 00_all_gcc4.4-cvs-incompat.patch
- - 05_all_gcc4.4-compile-no-ssp.patch
- - 10_all_gcc4.4-hardened-minispecs-support.patch
- - 11_all_gcc4.4-decl-tls-model.patch
- - 12_all_gcc4.4-fortify-minispecs-support.patch
- - 20-all_gcc4.4-default-crt-start-endfile.patch
- - 30-all_gcc4.4-crtbeginTS-fno-PIE.patch
-
-0.1.0 16.04.2009
- + 00_all_gcc4.4-cvs-incompat.patch
- + 05_all_gcc4.4-compile-no-ssp.patch
- + 10_all_gcc4.4-hardened-minispecs-support.patch
- + 11_all_gcc4.4-decl-tls-model.patch
- + 12_all_gcc4.4-fortify-minispecs-support.patch
- + 20-all_gcc4.4-default-crt-start-endfile.patch
- + 30-all_gcc4.4-crtbeginTS-fno-PIE.patch
diff --git a/espf-gcc-4.4.3/10_all_gcc44_configure.patch b/espf-gcc-4.4.3/10_all_gcc44_configure.patch
deleted file mode 100644
index 86b33df..0000000
--- a/espf-gcc-4.4.3/10_all_gcc44_configure.patch
+++ /dev/null
@@ -1,320 +0,0 @@
-2010-04-14 Magnus Granberg <zorry@gentoo.org>
-
- * configure Add --enable-espf. Add-fno-stack-protector
- to stage1_cflags.
- * gcc/configure Check -z now and -z relro.
- Check if the compiler support -fstack-protector and define HAVE_GCC_SSP.
- Check if we support FORTIFY_SOURCES.
- Define ENABLE_ESPF.
- * libmudflap/configure Add AC_SUBST enable_espf.
-
- On Gentoo
- * gcc/configure We don't need to check for FORTIFY_SOURCES support.
- Check if the compiler support -fstack-protector and define HAVE_GCC_SSP.
- Check if we support crtbeginTS and define ENABLE_CRTBEGINTS.
- Add AC_SUBST enable_crtbeginTS.
-
---- configure 2009-04-29 01:16:59.000000000 +0200
-+++ configure 2009-07-21 18:45:41.000000000 +0200
-@@ -272,7 +272,7 @@
- PACKAGE_BUGREPORT=
-
- ac_unique_file="move-if-change"
--ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS TOPLEVEL_CONFIGURE_ARGUMENTS build build_cpu build_vendor build_os build_noncanonical host_noncanonical target_noncanonical host host_cpu host_vendor host_os target target_cpu target_vendor target_os INSTALL_PROGRAM INSTALL_SCRIPT INSTALL_DATA LN LN_S build_libsubdir build_subdir host_subdir target_subdir CC CFLAGS LDFLAGS CPPFLAGS ac_ct_CC EXEEXT OBJEXT CXX CXXFLAGS ac_ct_CXX GNATBIND ac_ct_GNATBIND GNATMAKE ac_ct_GNATMAKE do_compare gmplibs gmpinc extra_mpfr_configure_flags ppllibs pplinc clooglibs clooginc stage1_languages SYSROOT_CFLAGS_FOR_TARGET DEBUG_PREFIX_CFLAGS_FOR_TARGET CFLAGS_FOR_TARGET CXXFLAGS_FOR_TARGET RPATH_ENVVAR GCC_SHLIB_SUBDIR tooldir build_tooldir CONFIGURE_GDB_TK GDB_TK INSTALL_GDB_TK build_configargs build_configdirs host_configargs configdirs target_configargs AR_FOR_BUILD AS_FOR_BUILD CC_FOR_BUILD CFLAGS_FOR_BUILD CXXFLAGS_FOR_BUILD CXX_FOR_BUILD DLLTOOL_FOR_BUILD GCJ_FOR_BUILD GFORTRAN_FOR_BUILD LDFLAGS_FOR_BUILD LD_FOR_BUILD NM_FOR_BUILD RANLIB_FOR_BUILD WINDMC_FOR_BUILD WINDRES_FOR_BUILD config_shell YACC BISON M4 LEX FLEX MAKEINFO EXPECT RUNTEST AR AS DLLTOOL LD LIPO NM RANLIB STRIP WINDRES WINDMC OBJCOPY OBJDUMP CC_FOR_TARGET CXX_FOR_TARGET GCC_FOR_TARGET GCJ_FOR_TARGET GFORTRAN_FOR_TARGET AR_FOR_TARGET AS_FOR_TARGET DLLTOOL_FOR_TARGET LD_FOR_TARGET LIPO_FOR_TARGET NM_FOR_TARGET OBJDUMP_FOR_TARGET RANLIB_FOR_TARGET STRIP_FOR_TARGET WINDRES_FOR_TARGET WINDMC_FOR_TARGET RAW_CXX_FOR_TARGET FLAGS_FOR_TARGET COMPILER_AS_FOR_TARGET COMPILER_LD_FOR_TARGET COMPILER_NM_FOR_TARGET MAINTAINER_MODE_TRUE MAINTAINER_MODE_FALSE MAINT stage1_cflags stage1_checking stage2_werror_flag datarootdir docdir pdfdir htmldir LIBOBJS LTLIBOBJS'
-+ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS TOPLEVEL_CONFIGURE_ARGUMENTS build build_cpu build_vendor build_os build_noncanonical host_noncanonical target_noncanonical host host_cpu host_vendor host_os target target_cpu target_vendor target_os INSTALL_PROGRAM INSTALL_SCRIPT INSTALL_DATA LN LN_S build_libsubdir build_subdir host_subdir target_subdir enable_espf CC CFLAGS LDFLAGS CPPFLAGS ac_ct_CC EXEEXT OBJEXT CXX CXXFLAGS ac_ct_CXX GNATBIND ac_ct_GNATBIND GNATMAKE ac_ct_GNATMAKE do_compare gmplibs gmpinc extra_mpfr_configure_flags ppllibs pplinc clooglibs clooginc stage1_languages SYSROOT_CFLAGS_FOR_TARGET DEBUG_PREFIX_CFLAGS_FOR_TARGET CFLAGS_FOR_TARGET CXXFLAGS_FOR_TARGET RPATH_ENVVAR GCC_SHLIB_SUBDIR tooldir build_tooldir CONFIGURE_GDB_TK GDB_TK INSTALL_GDB_TK build_configargs build_configdirs host_configargs configdirs target_configargs AR_FOR_BUILD AS_FOR_BUILD CC_FOR_BUILD CFLAGS_FOR_BUILD CXXFLAGS_FOR_BUILD CXX_FOR_BUILD DLLTOOL_FOR_BUILD GCJ_FOR_BUILD GFORTRAN_FOR_BUILD LDFLAGS_FOR_BUILD LD_FOR_BUILD NM_FOR_BUILD RANLIB_FOR_BUILD WINDMC_FOR_BUILD WINDRES_FOR_BUILD config_shell YACC BISON M4 LEX FLEX MAKEINFO EXPECT RUNTEST AR AS DLLTOOL LD LIPO NM RANLIB STRIP WINDRES WINDMC OBJCOPY OBJDUMP CC_FOR_TARGET CXX_FOR_TARGET GCC_FOR_TARGET GCJ_FOR_TARGET GFORTRAN_FOR_TARGET AR_FOR_TARGET AS_FOR_TARGET DLLTOOL_FOR_TARGET LD_FOR_TARGET LIPO_FOR_TARGET NM_FOR_TARGET OBJDUMP_FOR_TARGET RANLIB_FOR_TARGET STRIP_FOR_TARGET WINDRES_FOR_TARGET WINDMC_FOR_TARGET RAW_CXX_FOR_TARGET FLAGS_FOR_TARGET COMPILER_AS_FOR_TARGET COMPILER_LD_FOR_TARGET COMPILER_NM_FOR_TARGET MAINTAINER_MODE_TRUE MAINTAINER_MODE_FALSE MAINT stage1_cflags stage1_checking stage2_werror_flag datarootdir docdir pdfdir htmldir LIBOBJS LTLIBOBJS'
- ac_subst_files='serialization_dependencies host_makefile_frag target_makefile_frag alphaieee_frag ospace_frag'
- ac_pwd=`pwd`
-
-@@ -934,6 +934,11 @@
- --enable-FEATURE[=ARG] include FEATURE [ARG=yes]
- --enable-gold use gold instead of ld
- --enable-libada build libada directory
-+ --enable-espf
-+ Enable Stack protector, Position independent executable and
-+ Fortify_sources as default if we have suppot for it when compiling
-+ and link with -z relro and -z now as default.
-+ Linux targets supported i*86, x86_64, powerpc*, ia64 and arm*
- --enable-libssp build libssp directory
- --disable-ppl-version-check disable check for PPL version
- --disable-cloog-version-check disable check for CLooG version
-@@ -2145,6 +2150,25 @@
- noconfigdirs="$noconfigdirs gnattools"
- fi
-
-+# Check whether --enable-espf was given and target have the support.
-+# Check whether --enable-espf or --disable-espf was given.
-+if test "${enable_espf+set}" = set; then
-+ enableval="$enable_espf"
-+
-+ case $target in
-+ i?86*-*-linux* | x86_64*-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux*)
-+ enable_espf=yes
-+ ;;
-+ *)
-+ { { echo "$as_me:$LINENO: error: *** --enable-espf is not supported on this $target target." >&5
-+echo "$as_me: error: *** --enable-espf is not supported on this $target target." >&2;}
-+ { (exit 1); exit 1; }; }
-+ ;;
-+ esac
-+
-+fi;
-+
-+
- # Check whether --enable-libssp or --disable-libssp was given.
- if test "${enable_libssp+set}" = set; then
- enableval="$enable_libssp"
-@@ -12431,6 +12456,9 @@
- *) stage1_cflags="-g -J" ;;
- esac ;;
- esac
-+if test x$enable_espf = xyes; then
-+ stage1_cflags="$stage1_cflags -fno-stack-protector"
-+fi
-
- # This is aimed to mimic bootstrap with a non-GCC compiler to catch problems.
- if test "$GCC" = yes; then
-@@ -13234,6 +13262,7 @@
- s,@build_subdir@,$build_subdir,;t t
- s,@host_subdir@,$host_subdir,;t t
- s,@target_subdir@,$target_subdir,;t t
-+s,@enable_espf@,$enable_espf,;t t
- s,@CC@,$CC,;t t
- s,@CFLAGS@,$CFLAGS,;t t
- s,@LDFLAGS@,$LDFLAGS,;t t
---- gcc/configure 2009-04-29 01:16:54.000000000 +0200
-+++ gcc/configure 2009-06-08 01:03:01.000000000 +0200
-@@ -458,7 +458,7 @@
- # include <unistd.h>
- #endif"
-
--ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS build build_cpu build_vendor build_os host host_cpu host_vendor host_os target target_cpu target_vendor target_os target_noncanonical build_libsubdir build_subdir host_subdir target_subdir GENINSRC CC CFLAGS LDFLAGS CPPFLAGS ac_ct_CC EXEEXT OBJEXT GNATBIND ac_ct_GNATBIND GNATMAKE ac_ct_GNATMAKE NO_MINUS_C_MINUS_O OUTPUT_OPTION CPP EGREP loose_warn strict_warn warn_cflags nocommon_flag TREEBROWSER valgrind_path valgrind_path_defines valgrind_command coverage_flags enable_multilib enable_decimal_float enable_fixed_point enable_shared TARGET_SYSTEM_ROOT TARGET_SYSTEM_ROOT_DEFINE CROSS_SYSTEM_HEADER_DIR onestep PKGVERSION REPORT_BUGS_TO REPORT_BUGS_TEXI datarootdir docdir htmldir SET_MAKE AWK LN_S LN RANLIB ac_ct_RANLIB ranlib_flags INSTALL INSTALL_PROGRAM INSTALL_DATA make_compare_target have_mktemp_command MAKEINFO BUILD_INFO GENERATED_MANPAGES FLEX BISON NM AR COLLECT2_LIBS GNAT_LIBEXC LDEXP_LIB TARGET_GETGROUPS_T LIBICONV LTLIBICONV LIBICONV_DEP manext objext gthread_flags extra_modes_file extra_opt_files USE_NLS LIBINTL LIBINTL_DEP INCINTL XGETTEXT GMSGFMT POSUB CATALOGS DATADIRNAME INSTOBJEXT GENCAT CATOBJEXT CROSS ALL SYSTEM_HEADER_DIR inhibit_libc CC_FOR_BUILD BUILD_CFLAGS BUILD_LDFLAGS STMP_FIXINC STMP_FIXPROTO collect2 LIBTOOL SED FGREP GREP LD DUMPBIN ac_ct_DUMPBIN OBJDUMP ac_ct_OBJDUMP ac_ct_AR STRIP ac_ct_STRIP lt_ECHO DSYMUTIL ac_ct_DSYMUTIL NMEDIT ac_ct_NMEDIT LIPO ac_ct_LIPO OTOOL ac_ct_OTOOL OTOOL64 ac_ct_OTOOL64 objdir enable_fast_install gcc_cv_as ORIGINAL_AS_FOR_TARGET gcc_cv_ld ORIGINAL_LD_FOR_TARGET gcc_cv_nm ORIGINAL_NM_FOR_TARGET gcc_cv_objdump gcc_cv_readelf libgcc_visibility GGC zlibdir zlibinc MAINT gcc_tooldir dollar slibdir subdirs srcdir all_compilers all_gtfiles all_lang_makefrags all_lang_makefiles all_languages all_selected_languages build_exeext build_install_headers_dir build_xm_file_list build_xm_include_list build_xm_defines build_file_translate check_languages cpp_install_dir xmake_file tmake_file extra_gcc_objs extra_headers_list extra_objs extra_parts extra_passes extra_programs float_h_file gcc_config_arguments gcc_gxx_include_dir host_exeext host_xm_file_list host_xm_include_list host_xm_defines out_host_hook_obj install lang_opt_files lang_specs_files lang_tree_files local_prefix md_file objc_boehm_gc out_file out_object_file thread_file tm_file_list tm_include_list tm_defines tm_p_file_list tm_p_include_list xm_file_list xm_include_list xm_defines c_target_objs cxx_target_objs fortran_target_objs target_cpu_default GMPLIBS GMPINC PPLLIBS PPLINC CLOOGLIBS CLOOGINC LIBOBJS LTLIBOBJS'
-+ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS build build_cpu build_vendor build_os host host_cpu host_vendor host_os target target_cpu target_vendor target_os target_noncanonical build_libsubdir build_subdir host_subdir target_subdir GENINSRC CC CFLAGS LDFLAGS CPPFLAGS ac_ct_CC EXEEXT OBJEXT GNATBIND ac_ct_GNATBIND GNATMAKE ac_ct_GNATMAKE NO_MINUS_C_MINUS_O OUTPUT_OPTION CPP EGREP loose_warn strict_warn warn_cflags nocommon_flag TREEBROWSER valgrind_path valgrind_path_defines valgrind_command coverage_flags enable_multilib enable_decimal_float enable_fixed_point enable_shared TARGET_SYSTEM_ROOT TARGET_SYSTEM_ROOT_DEFINE CROSS_SYSTEM_HEADER_DIR onestep PKGVERSION REPORT_BUGS_TO REPORT_BUGS_TEXI datarootdir docdir htmldir SET_MAKE AWK LN_S LN RANLIB ac_ct_RANLIB ranlib_flags INSTALL INSTALL_PROGRAM INSTALL_DATA make_compare_target have_mktemp_command MAKEINFO BUILD_INFO GENERATED_MANPAGES FLEX BISON NM AR COLLECT2_LIBS GNAT_LIBEXC LDEXP_LIB TARGET_GETGROUPS_T LIBICONV LTLIBICONV LIBICONV_DEP manext objext gthread_flags extra_modes_file extra_opt_files USE_NLS LIBINTL LIBINTL_DEP INCINTL XGETTEXT GMSGFMT POSUB CATALOGS DATADIRNAME INSTOBJEXT GENCAT CATOBJEXT CROSS ALL SYSTEM_HEADER_DIR inhibit_libc CC_FOR_BUILD BUILD_CFLAGS BUILD_LDFLAGS STMP_FIXINC STMP_FIXPROTO collect2 LIBTOOL SED FGREP GREP LD DUMPBIN ac_ct_DUMPBIN OBJDUMP ac_ct_OBJDUMP ac_ct_AR STRIP ac_ct_STRIP lt_ECHO DSYMUTIL ac_ct_DSYMUTIL NMEDIT ac_ct_NMEDIT LIPO ac_ct_LIPO OTOOL ac_ct_OTOOL OTOOL64 ac_ct_OTOOL64 objdir enable_fast_install gcc_cv_as ORIGINAL_AS_FOR_TARGET gcc_cv_ld ORIGINAL_LD_FOR_TARGET gcc_cv_nm ORIGINAL_NM_FOR_TARGET gcc_cv_objdump gcc_cv_readelf libgcc_visibility enable_espf enable_crtbeginTS GGC zlibdir zlibinc MAINT gcc_tooldir dollar slibdir subdirs srcdir all_compilers all_gtfiles all_lang_makefrags all_lang_makefiles all_languages all_selected_languages build_exeext build_install_headers_dir build_xm_file_list build_xm_include_list build_xm_defines build_file_translate check_languages cpp_install_dir xmake_file tmake_file extra_gcc_objs extra_headers_list extra_objs extra_parts extra_passes extra_programs float_h_file gcc_config_arguments gcc_gxx_include_dir host_exeext host_xm_file_list host_xm_include_list host_xm_defines out_host_hook_obj install lang_opt_files lang_specs_files lang_tree_files local_prefix md_file objc_boehm_gc out_file out_object_file thread_file tm_file_list tm_include_list tm_defines tm_p_file_list tm_p_include_list xm_file_list xm_include_list xm_defines c_target_objs cxx_target_objs fortran_target_objs target_cpu_default GMPLIBS GMPINC PPLLIBS PPLINC CLOOGLIBS CLOOGINC LIBOBJS LTLIBOBJS'
- ac_subst_files='language_hooks'
- ac_pwd=`pwd`
-
-@@ -24177,6 +24182,50 @@
- ;;
- esac
-
-+echo "$as_me:$LINENO: checking linker -z now support" >&5
-+echo $ECHO_N "checking linker -z now support... $ECHO_C" >&6
-+if test "${gcc_cv_ld_now+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+ gcc_cv_ld_now=no
-+if test $in_tree_ld = yes ; then
-+ if test "$gcc_cv_gld_major_version" -eq 2 -a "$gcc_cv_gld_minor_version" -ge 16 -o "$gcc_cv_gld_major_version" -gt 2 \
-+ && test $in_tree_ld_is_elf = yes; then
-+ gcc_cv_ld_now=yes
-+ fi
-+elif test x$gcc_cv_ld != x; then
-+ # Check if linker supports -z now options
-+ if $gcc_cv_ld --help 2>/dev/null | grep now > /dev/null; then
-+ gcc_cv_ld_now=yes
-+ fi
-+fi
-+
-+fi
-+echo "$as_me:$LINENO: result: $gcc_cv_ld_now" >&5
-+echo "${ECHO_T}$gcc_cv_ld_now" >&6
-+
-+echo "$as_me:$LINENO: checking linker -z relro support" >&5
-+echo $ECHO_N "checking linker -z relro support... $ECHO_C" >&6
-+if test "${gcc_cv_ld_relro+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+ gcc_cv_ld_relro=no
-+if test $in_tree_ld = yes ; then
-+ if test "$gcc_cv_gld_major_version" -eq 2 -a "$gcc_cv_gld_minor_version" -ge 16 -o "$gcc_cv_gld_major_version" -gt 2 \
-+ && test $in_tree_ld_is_elf = yes; then
-+ gcc_cv_ld_relro=yes
-+ fi
-+elif test x$gcc_cv_ld != x; then
-+ # Check if linker supports -z relro and -z norelro options
-+ if $gcc_cv_ld --help 2>/dev/null | grep relro > /dev/null; then
-+ gcc_cv_ld_relro=yes
-+ fi
-+fi
-+
-+fi
-+echo "$as_me:$LINENO: result: $gcc_cv_ld_relro" >&5
-+echo "${ECHO_T}$gcc_cv_ld_relro" >&6
-+
- echo "$as_me:$LINENO: checking linker --sysroot support" >&5
- echo $ECHO_N "checking linker --sysroot support... $ECHO_C" >&6
- if test "${gcc_cv_ld_sysroot+set}" = set; then
-@@ -24411,6 +23737,146 @@
-
- fi
-
-+if test x$gcc_cv_libc_provides_ssp = xyes; then
-+ echo "$as_me:$LINENO: checking whether $CC support -fstack-protector" >&5
-+echo $ECHO_N "checking whether $CC support -fstack-protector... $ECHO_C" >&6
-+if test "${gcc_cv_cc_stack_protector+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+
-+ saved_CFLAGS="$CFLAGS"
-+ CFLAGS="$CFLAGS -fstack-protector"
-+ cat >conftest.$ac_ext <<_ACEOF
-+#ifndef __SSP__
-+#error
-+#endif
-+
-+_ACEOF
-+rm -f conftest.$ac_objext
-+if { (eval echo "$as_me:$LINENO: \"$ac_compile\"") >&5
-+ (eval $ac_compile) 2>conftest.er1
-+ ac_status=$?
-+ grep -v '^ *+' conftest.er1 >conftest.err
-+ rm -f conftest.er1
-+ cat conftest.err >&5
-+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
-+ (exit $ac_status); } &&
-+ { ac_try='test -z "$ac_c_werror_flag"
-+ || test ! -s conftest.err'
-+ { (eval echo "$as_me:$LINENO: \"$ac_try\"") >&5
-+ (eval $ac_try) 2>&5
-+ ac_status=$?
-+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
-+ (exit $ac_status); }; } &&
-+ { ac_try='test -s conftest.$ac_objext'
-+ { (eval echo "$as_me:$LINENO: \"$ac_try\"") >&5
-+ (eval $ac_try) 2>&5
-+ ac_status=$?
-+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
-+ (exit $ac_status); }; }; then
-+
-+ case $target in
-+ i?86*-*-linux* | x86_64*-*-linux* | powerpc-*-linux* | powerpc64-*-linux*)
-+ if test x$set_have_as_tls = xyes; then
-+ gcc_cv_cc_stack_protector=yes
-+ else
-+ gcc_cv_cc_stack_protector=no
-+ fi
-+ ;;
-+ *)
-+ cc_cv_cc_stack_protector=yes
-+ ;;
-+ esac
-+
-+else
-+ echo "$as_me: failed program was:" >&5
-+sed 's/^/| /' conftest.$ac_ext >&5
-+
-+gcc_cv_cc_stack_protector=no
-+fi
-+rm -f conftest.err conftest.$ac_objext conftest.$ac_ext
-+ CFLAGS="$saved_CFLAGS"
-+
-+fi
-+echo "$as_me:$LINENO: result: $gcc_cv_cc_stack_protector" >&5
-+echo "${ECHO_T}$gcc_cv_cc_stack_protector" >&6
-+fi
-+if test x$gcc_cv_cc_stack_protector = xyes; then
-+
-+cat >>confdefs.h <<\_ACEOF
-+#define HAVE_GCC_SSP 1
-+_ACEOF
-+
-+fi
-+
-+
-+if test x$enable_espf = xyes ; then
-+case $target in
-+ ia64*-*-linux*)
-+ if test x$gcc_cv_ld_now = xyes; then
-+ enable_espf_ld=yes
-+ else
-+ enable_espf_ld=no
-+ fi
-+ ;;
-+ *-*-linux*)
-+ if test x$gcc_cv_ld_relro = xyes && test x$gcc_cv_ld_now = xyes; then
-+ enable_espf_ld=yes
-+ else
-+ enable_espf_ld=no
-+ fi
-+ ;;
-+ *)
-+ enable_espf_ld=no
-+ ;;
-+ esac
-+else
-+ enable_espf_ld=no
-+fi
-+if test x$enable_espf_ld = xyes; then
-+
-+cat >>confdefs.h <<\_ACEOF
-+#define ENABLE_ESPF 1
-+_ACEOF
-+
-+fi
-+if test x$enable_espf = xyes && test x$enable_espf_ld = xno; then
-+ { { echo "$as_me:$LINENO: error: *** --enable-espf is not supported. You don't have -z,relro or -z,now support in the linker." >&5
-+echo "$as_me: error: *** --enable-espf is not supported. You don't have -z,relro or -z,now support in the linker." >&2;}
-+ { (exit 1); exit 1; }; }
-+fi
-+
-+echo "$as_me:$LINENO: checking for crtbeginTS.o support" >&5
-+echo $ECHO_N "checking for crtbeginTS.o support... $ECHO_C" >&6
-+if test "${enable_crtbeginTS+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+
-+if test x$enable_espf = xyes ; then
-+ case "$target" in
-+ ia64*-*-linux*)
-+ enable_crtbeginTS=no ;;
-+ *-*-linux*)
-+ if test x$gcc_cv_ld_pie = xyes && test x$lt_cv_prog_compiler_static_works = xyes; then
-+ enable_crtbeginTS=yes
-+ fi
-+ ;;
-+ *) enable_crtbeginTS=no ;;
-+ esac
-+fi
-+
-+fi
-+echo "$as_me:$LINENO: result: $enable_crtbeginTS" >&5
-+echo "${ECHO_T}$enable_crtbeginTS" >&6
-+
-+if test x$enable_crtbeginTS = xyes; then
-+
-+cat >>confdefs.h <<\_ACEOF
-+#define ENABLE_CRTBEGINTS 1
-+_ACEOF
-+
-+fi
-+
- # Check if TFmode long double should be used by default or not.
- # Some glibc targets used DFmode long double, but with glibc 2.4
- # and later they can use TFmode.
-@@ -25581,6 +25704,8 @@
- s,@gcc_cv_objdump@,$gcc_cv_objdump,;t t
- s,@gcc_cv_readelf@,$gcc_cv_readelf,;t t
- s,@libgcc_visibility@,$libgcc_visibility,;t t
-+s,@enable_espf@,$enable_espf,;t t
-+s,@enable_crtbeginTS@,$enable_crtbeginTS,;t t
- s,@GGC@,$GGC,;t t
- s,@zlibdir@,$zlibdir,;t t
- s,@zlibinc@,$zlibinc,;t t
---- libmudflap/configure 2009-04-29 01:16:55.000000000 +0200
-+++ libmudflap/configure 2009-07-21 18:28:52.000000000 +0200
-@@ -458,7 +458,7 @@
- # include <unistd.h>
- #endif"
-
--ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS build build_cpu build_vendor build_os host host_cpu host_vendor host_os target target_cpu target_vendor target_os target_noncanonical INSTALL_PROGRAM INSTALL_SCRIPT INSTALL_DATA CYGPATH_W PACKAGE VERSION ACLOCAL AUTOCONF AUTOMAKE AUTOHEADER MAKEINFO install_sh STRIP ac_ct_STRIP INSTALL_STRIP_PROGRAM mkdir_p AWK SET_MAKE am__leading_dot AMTAR am__tar am__untar MAINTAINER_MODE_TRUE MAINTAINER_MODE_FALSE MAINT multi_basedir CC ac_ct_CC EXEEXT OBJEXT DEPDIR am__include am__quote AMDEP_TRUE AMDEP_FALSE AMDEPBACKSLASH CCDEPMODE am__fastdepCC_TRUE am__fastdepCC_FALSE CFLAGS CPP CPPFLAGS EGREP LIBTOOL SED FGREP GREP LD DUMPBIN ac_ct_DUMPBIN NM LN_S OBJDUMP ac_ct_OBJDUMP AR ac_ct_AR RANLIB ac_ct_RANLIB lt_ECHO DSYMUTIL ac_ct_DSYMUTIL NMEDIT ac_ct_NMEDIT LIPO ac_ct_LIPO OTOOL ac_ct_OTOOL OTOOL64 ac_ct_OTOOL64 enable_shared enable_static MF_HAVE_STDINT_H MF_HAVE_UINTPTR_T LIBMUDFLAPTH_TRUE LIBMUDFLAPTH_FALSE build_libmudflapth toolexecdir toolexeclibdir ac_ct_NM SECTION_FLAGS LIBOBJS LTLIBOBJS'
-+ac_subst_vars='SHELL PATH_SEPARATOR PACKAGE_NAME PACKAGE_TARNAME PACKAGE_VERSION PACKAGE_STRING PACKAGE_BUGREPORT exec_prefix prefix program_transform_name bindir sbindir libexecdir datadir sysconfdir sharedstatedir localstatedir libdir includedir oldincludedir infodir mandir build_alias host_alias target_alias DEFS ECHO_C ECHO_N ECHO_T LIBS build build_cpu build_vendor build_os host host_cpu host_vendor host_os target target_cpu target_vendor target_os target_noncanonical INSTALL_PROGRAM INSTALL_SCRIPT INSTALL_DATA CYGPATH_W PACKAGE VERSION ACLOCAL AUTOCONF AUTOMAKE AUTOHEADER MAKEINFO install_sh STRIP ac_ct_STRIP INSTALL_STRIP_PROGRAM mkdir_p AWK SET_MAKE am__leading_dot AMTAR am__tar am__untar enable_espf MAINTAINER_MODE_TRUE MAINTAINER_MODE_FALSE MAINT multi_basedir CC ac_ct_CC EXEEXT OBJEXT DEPDIR am__include am__quote AMDEP_TRUE AMDEP_FALSE AMDEPBACKSLASH CCDEPMODE am__fastdepCC_TRUE am__fastdepCC_FALSE CFLAGS CPP CPPFLAGS EGREP LIBTOOL SED FGREP GREP LD DUMPBIN ac_ct_DUMPBIN NM LN_S OBJDUMP ac_ct_OBJDUMP AR ac_ct_AR RANLIB ac_ct_RANLIB lt_ECHO DSYMUTIL ac_ct_DSYMUTIL NMEDIT ac_ct_NMEDIT LIPO ac_ct_LIPO OTOOL ac_ct_OTOOL OTOOL64 ac_ct_OTOOL64 enable_shared enable_static MF_HAVE_STDINT_H MF_HAVE_UINTPTR_T LIBMUDFLAPTH_TRUE LIBMUDFLAPTH_FALSE build_libmudflapth toolexecdir toolexeclibdir ac_ct_NM SECTION_FLAGS LIBOBJS LTLIBOBJS'
- ac_subst_files=''
- ac_pwd=`pwd`
-
-@@ -14017,6 +14019,7 @@
- s,@AMTAR@,$AMTAR,;t t
- s,@am__tar@,$am__tar,;t t
- s,@am__untar@,$am__untar,;t t
-+s,@enable_espf@,$enable_espf,;t t
- s,@MAINTAINER_MODE_TRUE@,$MAINTAINER_MODE_TRUE,;t t
- s,@MAINTAINER_MODE_FALSE@,$MAINTAINER_MODE_FALSE,;t t
- s,@MAINT@,$MAINT,;t t
diff --git a/espf-gcc-4.4.3/11_all_gcc44_config.in.patch b/espf-gcc-4.4.3/11_all_gcc44_config.in.patch
deleted file mode 100644
index f5205f2..0000000
--- a/espf-gcc-4.4.3/11_all_gcc44_config.in.patch
+++ /dev/null
@@ -1,50 +0,0 @@
-2010-04-10 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/config.in Add ENABLE_CRTBEGINTS, ENABLE_ESPF and
- TARGET_LIBC_PROVIDES_FORTIFY2.
-
- On Gentoo
- * gcc/config.in We don't need to add TARGET_LIBC_PROVIDES_FORTIFY2.
- Add HAVE_GCC_SSP
-
---- gcc/config.in 2009-04-21 11:08:08.000000000 +0200
-+++ gcc/config.in 2009-05-12 00:10:08.000000000 +0200
-@@ -46,6 +46,12 @@
- #endif
-
-
-+/* Define to 1 to enable crtbeginTS.o. */
-+#ifndef USED_FOR_TARGET
-+#undef ENABLE_CRTBEGINTS
-+#endif
-+
-+
- /* Define to 1 to specify that we are using the BID decimal floating point
- format instead of DPD */
- #ifndef USED_FOR_TARGET
-@@ -65,6 +65,12 @@
- #endif
-
-
-+/* Define to 1 to enable espf. */
-+#ifndef USED_FOR_TARGET
-+#undef ENABLE_ESPF
-+#endif
-+
-+
- /* Define to 1 to enable fixed-point arithmetic extension to C. */
- #ifndef USED_FOR_TARGET
- #undef ENABLE_FIXED_POINT
-@@ -912,6 +924,12 @@
- #endif
-
-
-+/* Define to 1 if your compiler supports -fstack-protector */
-+#ifndef USED_FOR_TARGET
-+#undef HAVE_GCC_SSP
-+#endif
-+
-+
- /* Define to 1 if you have the `getchar_unlocked' function. */
- #ifndef USED_FOR_TARGET
- #undef HAVE_GETCHAR_UNLOCKED
diff --git a/espf-gcc-4.4.3/12_all_gcc44_Makefile.in.patch b/espf-gcc-4.4.3/12_all_gcc44_Makefile.in.patch
deleted file mode 100644
index f4524f3..0000000
--- a/espf-gcc-4.4.3/12_all_gcc44_Makefile.in.patch
+++ /dev/null
@@ -1,209 +0,0 @@
-2009-09-20 Magnus Granberg <zorry@ume.nu>
-
- * Makefile.in We add -fno-stack-protector to
- BOOT_CFLAGS, LIBCFLAGS and LIBCXXFLAGS if enable_espf yes.
- * gcc/Makefile.in Add -fno-PIE and -fno-stack-protector.
- Libgcc2 doesn't compile with -fstack-protector.
- Crtstuff doesn't compile with -fPIE and -fstack-protector.
- $(out_object_file): ix86_split_to_parts() stack smashing attack b.g.o #149292.
- Add crtbeginTS.o to EXTRA_PARTS if enable_crtbeginTS yes
- We add new file crtbeginTS.o if enable_crtbeginTS yes
- * libgcc/Makefile.in Add crtbeginTS.o to EXTRA_PARTS if enable_crtbeginTS yes
- We add new file crtbeginTS.o if enable_crtbeginTS yes
-
-2009-07-21 Magnus Granberg <zorry@ume.nu>, Kees Cook <kees@outflux.net>
-
- LP #344502
- * libmudflap/Makefiles.in Add -fno-stack-protector -U_FORTIFY_SOURCE
- to AM_CFLAGS if enable_espf yes.
-
---- Makefile.in 2009-04-14 10:57:33.000000000 +0200
-+++ Makefile.in 2009-07-21 05:29:54.000000000 +0200
-@@ -305,9 +305,17 @@
- BUILD_PREFIX = @BUILD_PREFIX@
- BUILD_PREFIX_1 = @BUILD_PREFIX_1@
-
-+# Some stuff don't compile with SSP
-+enable_espf = @enable_espf@
-+ifeq ($(enable_espf),yes)
-+ESPF_NOSSP_CFLAGS = -fno-stack-protector
-+else
-+ESPF_NOSSP_CFLAGS=
-+endif
-+
- # Flags to pass to stage2 and later makes. They are defined
- # here so that they can be overridden by Makefile fragments.
--BOOT_CFLAGS= -g -O2
-+BOOT_CFLAGS= -g -O2 $(ESPF_NOSSP_CFLAGS)
- BOOT_LDFLAGS=
- BOOT_ADAFLAGS=-gnatpg -gnata
-
-@@ -350,9 +358,9 @@
-
- CFLAGS = @CFLAGS@
- LDFLAGS = @LDFLAGS@
--LIBCFLAGS = $(CFLAGS)
-+LIBCFLAGS = $(CFLAGS) $(ESPF_NOSSP_CFLAGS)
- CXXFLAGS = @CXXFLAGS@
--LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates
-+LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates $(ESPF_NOSSP_CFLAGS)
-
- # Only build the C compiler for stage1, because that is the only one that
- # we can guarantee will build with the native compiler, and also it is the
---- gcc/Makefile.in 2009-04-29 01:16:56.000000000 +0200
-+++ gcc/Makefile.in 2009-07-05 02:11:04.000000000 +0200
-@@ -580,13 +580,24 @@
- INHIBIT_LIBC_CFLAGS = -Dinhibit_libc
- endif
-
-+# We don't want __stack_chk_fail in crt* and libgcc2.a.
-+# We don't want to compile crtbegin, crtend and crtbeginT with -fPIE.
-+enable_espf = @enable_espf@
-+ifeq ($(enable_espf),yes)
-+ESPF_NOPIE_CFLAGS = -fno-PIE
-+ESPF_NOSSP_CFLAGS = -fno-stack-protector
-+else
-+ESPF_NOPIE_CFLAGS=
-+ESPF_NOSSP_CFLAGS=
-+endif
-+
- # Options to use when compiling libgcc2.a.
- #
- LIBGCC2_DEBUG_CFLAGS = -g
- LIBGCC2_CFLAGS = -O2 $(LIBGCC2_INCLUDES) $(GCC_CFLAGS) $(TARGET_LIBGCC2_CFLAGS) \
- $(LIBGCC2_DEBUG_CFLAGS) $(GTHREAD_FLAGS) \
- -DIN_LIBGCC2 -D__GCC_FLOAT_NOT_NEEDED \
-- $(INHIBIT_LIBC_CFLAGS)
-+ $(INHIBIT_LIBC_CFLAGS) $(ESPF_NOSSP_CFLAGS)
-
- # Additional options to use when compiling libgcc2.a.
- # Some targets override this to -isystem include
-@@ -599,7 +610,7 @@
- CRTSTUFF_CFLAGS = -O2 $(GCC_CFLAGS) $(INCLUDES) $(MULTILIB_CFLAGS) -g0 \
- -finhibit-size-directive -fno-inline-functions -fno-exceptions \
- -fno-zero-initialized-in-bss -fno-toplevel-reorder -fno-tree-vectorize \
-- $(INHIBIT_LIBC_CFLAGS)
-+ $(INHIBIT_LIBC_CFLAGS) $(ESPF_NOSSP_CFLAGS)
-
- # Additional sources to handle exceptions; overridden by targets as needed.
- LIB2ADDEH = $(srcdir)/unwind-dw2.c $(srcdir)/unwind-dw2-fde.c \
-@@ -629,6 +640,12 @@
- # The rules for compiling them should be in the t-* file for the machine.
- EXTRA_PARTS = @extra_parts@
-
-+# We add crtbeginTS.o to the EXTRA_PARTS list if enable_crtbeginTS = yes
-+enable_crtbeginTS = @enable_crtbeginTS@
-+ifeq ($(enable_crtbeginTS),yes)
-+EXTRA_PARTS += crtbeginTS.o
-+endif
-+
- # List of extra object files that should be compiled and linked with
- # compiler proper (cc1, cc1obj, cc1plus).
- EXTRA_OBJS = @extra_objs@
-@@ -1719,8 +1736,9 @@
- echo LIBGCC_SYNC = '$(LIBGCC_SYNC)' >> tmp-libgcc.mvars
- echo LIBGCC_SYNC_CFLAGS = '$(LIBGCC_SYNC_CFLAGS)' >> tmp-libgcc.mvars
- echo CRTSTUFF_CFLAGS = '$(CRTSTUFF_CFLAGS)' >> tmp-libgcc.mvars
-- echo CRTSTUFF_T_CFLAGS = '$(CRTSTUFF_T_CFLAGS)' >> tmp-libgcc.mvars
-+ echo CRTSTUFF_T_CFLAGS = '$(CRTSTUFF_T_CFLAGS) $(ESPF_NOPIE_CFLAGS)' >> tmp-libgcc.mvars
- echo CRTSTUFF_T_CFLAGS_S = '$(CRTSTUFF_T_CFLAGS_S)' >> tmp-libgcc.mvars
-+ echo enable_crtbeginTS = '$(enable_crtbeginTS)' >> tmp-libgcc.mvars
-
- mv tmp-libgcc.mvars libgcc.mvars
-
-@@ -1754,12 +1771,14 @@
- $(T)crtbegin.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
- gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
- $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS) \
-+ $(ESPF_NOPIE_CFLAGS) \
- -c $(srcdir)/crtstuff.c -DCRT_BEGIN \
- -o $(T)crtbegin$(objext)
-
- $(T)crtend.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
- gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
- $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS) \
-+ $(ESPF_NOPIE_CFLAGS) \
- -c $(srcdir)/crtstuff.c -DCRT_END \
- -o $(T)crtend$(objext)
-
-@@ -1780,9 +1800,19 @@
- $(T)crtbeginT.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
- gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
- $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS) \
-+ $(ESPF_NOPIE_CFLAGS) \
- -c $(srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O \
- -o $(T)crtbeginT$(objext)
-
-+# This is a version of crtbegin for -static -fPIE links if espf is enable.
-+ifeq ($(enable_crtbeginTS),yes)
-+$(T)crtbeginTS.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
-+ gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
-+ $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS_S) \
-+ -c $(srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O -DCRTSTUFFS_O \
-+ -o $(T)crtbeginTS$(objext)
-+endif
-+
- # Compile the start modules crt0.o and mcrt0.o that are linked with
- # every program
- $(T)crt0.o: s-crt0 ; @true
-@@ -3057,7 +3083,7 @@
- output.h $(INSN_ATTR_H) $(SYSTEM_H) $(TOPLEV_H) $(TARGET_H) libfuncs.h \
- $(TARGET_DEF_H) $(FUNCTION_H) $(SCHED_INT_H) $(TM_P_H) $(EXPR_H) \
- langhooks.h $(GGC_H) $(OPTABS_H) $(REAL_H) tm-constrs.h $(GIMPLE_H)
-- $(CC) -c $(ALL_CFLAGS) $(ALL_CPPFLAGS) \
-+ $(CC) -c $(ALL_CFLAGS) $(ALL_CPPFLAGS) $(ESPF_NOSSP_CFLAGS)\
- $(out_file) $(OUTPUT_OPTION)
-
- # Build auxiliary files that support ecoff format.
---- libgcc/Makefile.in 2009-04-10 01:23:07.000000000 +0200
-+++ libgcc/Makefile.in 2009-09-08 03:42:47.000000000 +0200
-@@ -280,6 +280,12 @@
- gen-hide-list = echo > \$@
- endif
-
-+# We add crtbeginTS.o to the EXTRA_PARTS list if enable_crtbeginTS = yes
-+enable_libgcc_crtbeginTS = $(enable_crtbeginTS)
-+ifeq ($(enable_libgcc_crtbeginTS),yes)
-+EXTRA_PARTS += crtbeginTS.o
-+endif
-+
- ifneq ($(EXTRA_PARTS),)
- extra-parts = libgcc-extra-parts
- INSTALL_PARTS = $(EXTRA_PARTS)
-@@ -831,6 +837,13 @@
- crtbeginT.o: $(gcc_srcdir)/crtstuff.c
- $(crt_compile) $(CRTSTUFF_T_CFLAGS) \
- -c $(gcc_srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O
-+
-+# This is a version of crtbegin for -static -fPIE links.
-+ifeq ($(enable_libgcc_crtbeginTS),yes)
-+crtbeginTS.o: $(gcc_srcdir)/crtstuff.c
-+ $(crt_compile) $(CRTSTUFF_T_CFLAGS_S) \
-+ -c $(gcc_srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O -DCRTSTUFFS_O
-+endif
- endif
-
- # Build extra startfiles in the libgcc directory.
---- libmudflap/Makefile.in 2009-04-29 01:16:56.000000000 +0200
-+++ libmudflap/Makefile.in 2009-07-21 05:41:56.000000000 +0200
-@@ -253,10 +253,18 @@
- MAINT_CHARSET = latin1
- SUBDIRS = testsuite
-
-+# Some stuff don't compile with PIE or SSP
-+enable_espf = @enable_espf@
-+ifeq ($(enable_espf),yes)
-+NO_ESPF_CFLAGS = -fno-stack-protector -U_FORTIFY_SOURCE
-+else
-+NO_ESPF_CFLAGS =
-+endif
-+
- # May be used by various substitution variables.
- gcc_version := $(shell cat $(top_srcdir)/../gcc/BASE-VER)
--AM_CFLAGS = -Wall $(SECTION_FLAGS)
--@LIBMUDFLAPTH_FALSE@libmudflapth =
-+AM_CFLAGS = -Wall $(SECTION_FLAGS) $(NO_ESPF_CFLAGS)
-+@LIBMUDFLAPTH_FALSE@libmudflapth =
- @LIBMUDFLAPTH_TRUE@libmudflapth = libmudflapth.la
- toolexeclib_LTLIBRARIES = libmudflap.la $(libmudflapth)
- libsubincludedir = $(libdir)/gcc/$(target_noncanonical)/$(gcc_version)/include
diff --git a/espf-gcc-4.4.3/20_all_gcc44_gcc.c.patch b/espf-gcc-4.4.3/20_all_gcc44_gcc.c.patch
deleted file mode 100644
index ed9af5c..0000000
--- a/espf-gcc-4.4.3/20_all_gcc44_gcc.c.patch
+++ /dev/null
@@ -1,146 +0,0 @@
-2010-02-10 Magnus Granberg <zorry@ume.nu>
-
- * gcc/gcc.c include: espf.h
- *cpp_unique_options Add espf_cpp_unique_options.
- #ifdef EXTRA_SPECS: Add ESPF_EXTRA_SPECS
- main(): Add do_self_spec espf_command_options_spec()
-
-2009-06-27 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/gcc.c *cpp_options Add %(espf_cpp_options)
-
- * gcc/gcc.c default_compilers[] Add %(espf_options)
- *cpp_unique_options Add %(espf_cpp_unique_options)
-
-2010-02-10 Magnus Granberg <zorry@ume.nu>
-
- *gcc/gcc.c Gentoo changes
- static const char *cc1_spec We set that in espf.h if ENABLE_ESPF.
- *cpp_unique_options Remove espf_cpp_unique_options. (-D_FORTIFY_SOURCE=2)
- *cc1_options Add espf_options_pie_check if ENABLE_ESPF.
-
---- gcc/gcc.c.zorry 2009-04-29 01:17:00.000000000 +0200
-+++ gcc/gcc.c 2009-07-22 20:18:10.000000000 +0200
-@@ -83,6 +83,7 @@
- #include "gcc.h"
- #include "flags.h"
- #include "opts.h"
-+#include "espf.h" /* for --enable-espf support */
-
- /* By default there is no special suffix for target executables. */
- /* FIXME: when autoconf is fixed, remove the host check - dj */
-@@ -758,7 +759,9 @@
-
- static const char *asm_debug;
- static const char *cpp_spec = CPP_SPEC;
-+#ifndef ENABLE_ESPF
- static const char *cc1_spec = CC1_SPEC;
-+#endif
- static const char *cc1plus_spec = CC1PLUS_SPEC;
- static const char *link_gcc_c_sequence_spec = LINK_GCC_C_SEQUENCE_SPEC;
- static const char *link_ssp_spec = LINK_SSP_SPEC;
-@@ -817,7 +817,7 @@
- static const char *cpp_options =
- "%(cpp_unique_options) %1 %{m*} %{std*&ansi&trigraphs} %{W*&pedantic*} %{w}\
- %{f*} %{g*:%{!g0:%{g*} %{!fno-working-directory:-fworking-directory}}} %{O*}\
-- %{undef} %{save-temps:-fpch-preprocess}";
-+ %{undef} %{save-temps:-fpch-preprocess} %(espf_cpp_options)";
-
- /* This contains cpp options which are not passed when the preprocessor
- output will be used by another program. */
-@@ -825,6 +826,9 @@
-
- /* NB: This is shared amongst all front-ends, except for Ada. */
- static const char *cc1_options =
-+#ifdef ENABLE_ESPF
-+"%(espf_options_pie_check)"
-+#endif
- "%{pg:%{fomit-frame-pointer:%e-pg and -fomit-frame-pointer are incompatible}}\
- %1 %{!Q:-quiet} -dumpbase %B %{d*} %{m*} %{a*}\
- %{c|S:%{o*:-auxbase-strip %*}%{!o*:-auxbase %b}}%{!c:%{!S:-auxbase %b}}\
-@@ -999,15 +1000,15 @@
- %{save-temps|traditional-cpp|no-integrated-cpp:%(trad_capable_cpp) \
- %(cpp_options) -o %{save-temps:%b.i} %{!save-temps:%g.i} \n\
- cc1 -fpreprocessed %{save-temps:%b.i} %{!save-temps:%g.i} \
-- %(cc1_options)}\
-+ %(cc1_options) %(espf_options)}\
- %{!save-temps:%{!traditional-cpp:%{!no-integrated-cpp:\
-- cc1 %(cpp_unique_options) %(cc1_options)}}}\
-+ cc1 %(cpp_unique_options) %(cc1_options) %(espf_options)}}}\
- %{!fsyntax-only:%(invoke_as)}} \
- %{combine:\
- %{save-temps|traditional-cpp|no-integrated-cpp:%(trad_capable_cpp) \
- %(cpp_options) -o %{save-temps:%b.i} %{!save-temps:%g.i}}\
- %{!save-temps:%{!traditional-cpp:%{!no-integrated-cpp:\
-- cc1 %(cpp_unique_options) %(cc1_options)}}\
-+ cc1 %(cpp_unique_options) %(cc1_options) %(espf_options)}}\
- %{!fsyntax-only:%(invoke_as)}}}}}}", 0, 1, 1},
- {"-",
- "%{!E:%e-E or -x required when input is from standard input}\
-@@ -1030,7 +1031,7 @@
- %W{o*:--output-pch=%*}%V}}}}}}", 0, 0, 0},
- {".i", "@cpp-output", 0, 1, 0},
- {"@cpp-output",
-- "%{!M:%{!MM:%{!E:cc1 -fpreprocessed %i %(cc1_options) %{!fsyntax-only:%(invoke_as)}}}}", 0, 1, 0},
-+ "%{!M:%{!MM:%{!E:cc1 -fpreprocessed %i %(cc1_options) %(espf_options) %{!fsyntax-only:%(invoke_as)}}}}", 0, 1, 0},
- {".s", "@assembler", 0, 1, 0},
- {"@assembler",
- "%{!M:%{!MM:%{!E:%{!S:as %(asm_debug) %(asm_options) %i %A }}}}", 0, 1, 0},
-@@ -1619,18 +1620,23 @@
- INIT_STATIC_SPEC ("sysroot_hdrs_suffix_spec", &sysroot_hdrs_suffix_spec),
- };
-
--#ifdef EXTRA_SPECS /* additional specs needed */
-+/* EXTRA_SPECS needs to be defined */
-+#ifndef EXTRA_SPECS
-+#define EXTRA_SPECS
-+#endif
-+
-+/* EXTRA_SPECS and ESPF_EXTRA_SPECS add additional specs */
- /* Structure to keep track of just the first two args of a spec_list.
-- That is all that the EXTRA_SPECS macro gives us. */
-+ That is all that the EXTRA_SPECS and ESPF_EXTRA_SPECS macro gives us. */
- struct spec_list_1
- {
- const char *const name;
- const char *const ptr;
- };
-
--static const struct spec_list_1 extra_specs_1[] = { EXTRA_SPECS };
-+/* ESPF_EXTRA_SPECS before EXTRA_SPECS */
-+static const struct spec_list_1 extra_specs_1[] = { ESPF_EXTRA_SPECS, EXTRA_SPECS };
- static struct spec_list *extra_specs = (struct spec_list *) 0;
--#endif
-
- /* List of dynamically allocates specs that have been defined so far. */
-
-@@ -1715,7 +1721,6 @@
- if (verbose_flag)
- notice ("Using built-in specs.\n");
-
--#ifdef EXTRA_SPECS
- extra_specs = XCNEWVEC (struct spec_list, ARRAY_SIZE (extra_specs_1));
-
- for (i = ARRAY_SIZE (extra_specs_1) - 1; i >= 0; i--)
-@@ -1728,7 +1733,6 @@
- sl->ptr_spec = &sl->ptr;
- next = sl;
- }
--#endif
-
- for (i = ARRAY_SIZE (static_specs) - 1; i >= 0; i--)
- {
-@@ -6521,6 +6543,12 @@
- gcc_exec_prefix = concat (gcc_exec_prefix, spec_machine, dir_separator_str,
- spec_version, dir_separator_str, NULL);
-
-+#ifdef ENABLE_ESPF
-+ /* Process ESPF_COMMAND_OPTIONS_SPEC, adding any new options to the end
-+ of the command line. */
-+ do_self_spec (espf_command_options_spec);
-+#endif
-+
- /* Now we have the specs.
- Set the `valid' bits for switches that match anything in any spec. */
-
diff --git a/espf-gcc-4.4.3/21_all_gcc44_decl-tls-model.patch b/espf-gcc-4.4.3/21_all_gcc44_decl-tls-model.patch
deleted file mode 100644
index d40b3dc..0000000
--- a/espf-gcc-4.4.3/21_all_gcc44_decl-tls-model.patch
+++ /dev/null
@@ -1,20 +0,0 @@
-2009-06-13 Magnus Granberg <zorry@ume.nu>
-
- b.g.o #232601
- * gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib.
-
---- gcc/varasm.c 2009-03-17 21:18:21.000000000 +0100
-+++ gcc/varasm.c 2009-04-29 03:10:09.000000000 +0200
-@@ -5607,7 +5607,11 @@
- bool is_local;
-
- is_local = targetm.binds_local_p (decl);
-- if (!flag_shlib)
-+ #ifdef ENABLE_ESPF
-+ if (!flag_pic)
-+ #else
-+ if (!flag_shlib)
-+ #endif
- {
- if (is_local)
- kind = TLS_MODEL_LOCAL_EXEC;
diff --git a/espf-gcc-4.4.3/30_all_gcc44_espf.h.patch b/espf-gcc-4.4.3/30_all_gcc44_espf.h.patch
deleted file mode 100644
index 70ce8ff..0000000
--- a/espf-gcc-4.4.3/30_all_gcc44_espf.h.patch
+++ /dev/null
@@ -1,156 +0,0 @@
-2010-04-09 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/espf.h New file to support --enable-espf
- Version 20100409.1
-
---- gcc/espf.h 2010-04-09 16:14:00.000000000 +0200
-+++ gcc/espf.h 2010-04-09 16:24:01.000000000 +0200
-@@ -0,0 +1,148 @@
-+/* License terms see GNU GENERAL PUBLIC LICENSE Version 3.
-+ * Version 20100409.1
-+ * Magnus Granberg (Zorry) <zorry@gentoo.org> */
-+#ifndef GCC_ESPF_H
-+#define GCC_ESPF_H
-+
-+/* This file will add -fstack-protector, -fPIE, -pie -D_FORTIFY_SOURCES=2 -z,relro and -z,now
-+ as default if the defines and the spec allow it.
-+
-+ On Gentoo
-+ Added a hack for gcc-specs-* in toolchain-funcs.eclass and _filter-hardened in flag-o-matic.eclass
-+ to support older hardened GCC patches and we don't need to change the code on gcc-specs-* and _filter-hardened.
-+ We use -fstack-protector-all instead of -fstack-protector
-+ This will add some unsupported upstream commands options as -nopie.
-+ -D__KERNEL__ is added so we don't have -fPIE and -fstack-protector-all when building kernels.
-+ ESPF_CC1_SPEC is added to CC1_SPEC.
-+ -D_FORTIFY_SOURCES=2 is added with gentoo's patchset as default so no need to set it hear.
-+ ESPF_LINK_SPEC will not add -z,relro as it default on with binutils.
-+ ESPF_CC1_STRICT_SPEC is added so we don't use gcc/opts.c to disable it.
-+ ESPF_OPTIONS_PIE_CHECK_SPEC check for -pie, -p, -pg, -profile, -static and -shared.
-+ ENABLE_CRTBEGINTS add support for crtbeginTS.o, build -static with -fPIE or -fpie.
-+*/
-+#ifdef ENABLE_ESPF
-+
-+ /* Hack to support gcc-specs-* in toolchain-funcs.eclass and _filter-hardened in flag-o-matic.eclass */
-+ #define ESPF_CC1_SPEC " %(espf_cc1_ssp) %(espf_cc1_pie) %(espf_cc1_strict)"
-+ #ifdef HAVE_GCC_SSP
-+ #define ESPF_CC1_SSP_SPEC "%{!fno-stack-protector: %{!fno-stack-protector-all: }}"
-+ #else
-+ #define ESPF_CC1_SSP_SPEC ""
-+ #endif
-+ #define ESPF_CC1_PIE_SPEC "%{!nopie: }"
-+ #define ESPF_CC1_STRICT_SPEC "%{!fstrict-overflow:%{!fno-strict-overflow: -fno-strict-overflow}}"
-+
-+ /* ESPF_LINK_SPEC is added to LINK_PIE_SPEC if espf is enable
-+ -z now will be added if we don't have -vanilla spec */
-+ #define ESPF_LINK_SPEC "%(espf_link_now)"
-+ #define ESPF_LINK_NOW_SPEC "%{!now:-z now}"
-+
-+ /* ESPF_OPTIONS_SPEC is added to the compiler spec in gcc/gcc.c */
-+ #define ESPF_OPTIONS_SPEC "%(espf_options_ssp)"
-+
-+ /* ESPF_CPP_OPTIONS_SPEC is added to the cpp_options spec in gcc/gcc.c
-+ For precompiling headers. */
-+ #define ESPF_CPP_OPTIONS_SPEC "%(espf_options_ssp)"
-+
-+ /* This will add -fstack-protector-all if we don't have -nostdlib -nodefaultlibs -fno-stack-protector -fstack-protector
-+ -fstack-protector-all and we have TARGET_LIBC_PROVIDES_SSP and HAVE_GCC_SSP defined. */
-+ #ifdef HAVE_GCC_SSP
-+ #define ESPF_OPTIONS_SSP_SPEC \
-+ "%{!D__KERNEL__:%{!nostdlib:%{!nodefaultlibs: %{!fno-stack-protector: \
-+ %{!fstack-protector:%{!fstack-protector-all:-fstack-protector-all}}}}}}"
-+ #else
-+ #define ESPF_OPTIONS_SSP_SPEC ""
-+ #endif
-+
-+ /* If HAVE_LD_PIE not defined we will not add any -fPIE -pie */
-+ #ifdef HAVE_LD_PIE
-+
-+ /* We use ESPF_COMMAND_OPTIONS_SPEC to add pie command-line options. */
-+ #define ESPF_COMMAND_OPTIONS_SPEC "%{!D__KERNEL__:%{!nopie:%(espf_options_pie) %(espf_link_pie)}}"
-+
-+ /* This will add -fPIE if we don't have -pie -fpic -fPIC -fpie -fPIE -fno-pic -fno-PIC -fno-pie -fno-PIE -shared -static
-+ -nostdlib -nostartfiles. */
-+ /* With ENABLE_CRTBEGINTS we don't need to check for -static */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define ESPF_OPTIONS_PIE_SPEC \
-+ "%{!pie: %{!fpic:%{!fPIC:%{!fpie:%{!fPIE: %{!fno-pic:%{!fno-PIC:%{!fno-pie:%{!fno-PIE: \
-+ %{!shared: %{!nostdlib: %{!nostartfiles:-fPIE}} } }}}} }}}} }"
-+ #else
-+ #define ESPF_OPTIONS_PIE_SPEC \
-+ "%{!pie: %{!fpic:%{!fPIC:%{!fpie:%{!fPIE: %{!fno-pic:%{!fno-PIC:%{!fno-pie:%{!fno-PIE: \
-+ %{!shared: %{!static: %{!nostdlib: %{!nostartfiles:-fPIE}} } }}}} }}}} }}"
-+ #endif
-+
-+ /* This will add -pie if we don't have -pie -A -fno-pic -fno-PIC -fno-pie -fno-PIE -shared -static -r -nostdlib
-+ -nostartfiles */
-+ /* With ENABLE_CRTBEGINTS we don't need to check for -static
-+ and we add -pie only to get the start and endfiles. -pie will not go to the linker. */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define ESPF_LINK_PIE_SPEC \
-+ "%{!pie:%{!A:%{!fno-pie:%{!fno-PIE:%{!fno-pic:%{!fno-PIC:%{!shared:%{!r: \
-+ %{!nostdlib:%{!nostartfiles:-pie}}}}}}}}}}"
-+ #else
-+ #define ESPF_LINK_PIE_SPEC \
-+ "%{!pie:%{!A:%{!fno-pie:%{!fno-PIE:%{!fno-pic:%{!fno-PIC:%{!shared:%{!static:%{!r: \
-+ %{!nostdlib:%{!nostartfiles:-pie}}}}}}}}}}}"
-+ #endif
-+
-+ /* This will check if shared is set when -static -pie -fPIE -fpie -fno-PIC -fno-pic, -pie is set when -static -pg -p -profile.
-+ If set it will make gcc print out "-shared and -static|pie|fPIE|fpie|fno-PIC|fno-pic are incompatible" or
-+ "-pie and pg|p|profile are incompatible" */
-+ /* With ENABLE_CRTBEGINTS we don't need to check for -static */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define ESPF_OPTIONS_PIE_CHECK_SPEC \
-+ "%{shared:%{static|pie|fPIE|fpie|fno-PIC|fno-pic:%e-shared and -static|pie|fPIE|fpie|fno-PIC|fno-pic are incompatible}} \
-+ %{pie:%{pg|p|profile:%e-pie and -pg|p|profile are incompatible}}"
-+ #else
-+ #define ESPF_OPTIONS_PIE_CHECK_SPEC \
-+ "%{shared:%{static|pie|fPIE|fpie|fno-PIC|fno-pic:%e-shared and -static|pie|fPIE|fpie|fno-PIC|fno-pic are incompatible}} \
-+ %{pie:%{static|pg|p|profile:%e-pie and -static|pg|p|profile are incompatible}}"
-+ #endif
-+
-+ /* We don't pass -pie to the linker when -static */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define LINK_PIE_SPEC "%{!static:%{pie:-pie}} %(espf_link) "
-+ #else
-+ #define LINK_PIE_SPEC "%{pie:-pie} %(espf_link) "
-+ #endif
-+
-+ #else
-+ #define ESPF_OPTIONS_PIE_SPEC ""
-+ #define ESPF_OPTIONS_PIE_CHECK_SPEC ""
-+ #define ESPF_LINK_PIE_SPEC ""
-+ #define LINK_PIE_SPEC "%{pie:-pie} %(espf_link) "
-+ #endif
-+
-+ /* We add extra spec name's to the EXTRA_SPECS list */
-+ #define ESPF_EXTRA_SPECS \
-+ { "espf_cc1", ESPF_CC1_SPEC }, \
-+ { "espf_cc1_pie", ESPF_CC1_PIE_SPEC }, \
-+ { "espf_cc1_ssp", ESPF_CC1_SSP_SPEC }, \
-+ { "espf_cc1_strict", ESPF_CC1_STRICT_SPEC }, \
-+ { "espf_link", ESPF_LINK_SPEC }, \
-+ { "espf_link_now", ESPF_LINK_NOW_SPEC }, \
-+ { "espf_link_pie", ESPF_LINK_PIE_SPEC }, \
-+ { "espf_command_options", ESPF_COMMAND_OPTIONS_SPEC }, \
-+ { "espf_cpp_options", ESPF_CPP_OPTIONS_SPEC }, \
-+ { "espf_options", ESPF_OPTIONS_SPEC }, \
-+ { "espf_options_pie", ESPF_OPTIONS_PIE_SPEC }, \
-+ { "espf_options_pie_check", ESPF_OPTIONS_PIE_CHECK_SPEC }, \
-+ { "espf_options_ssp", ESPF_OPTIONS_SSP_SPEC }
-+
-+ static const char *espf_command_options_spec = ESPF_COMMAND_OPTIONS_SPEC;
-+ static const char *cc1_spec = CC1_SPEC ESPF_CC1_SPEC;
-+
-+#else /* If not ESPF_ENABLE defined do this. */
-+
-+ #define ESPF_OPTIONS_SPEC ""
-+ #define ESPF_CPP_OPTIONS_SPEC ""
-+
-+ /* We add extra spec name's to the EXTRA_SPECS list */
-+ #define ESPF_EXTRA_SPECS \
-+ { "espf_options", ESPF_OPTIONS_SPEC }, \
-+ { "espf_cpp_options", ESPF_CPP_OPTIONS_SPEC }
-+
-+#endif
-+#endif /* End GCC_ESPF_H */
diff --git a/espf-gcc-4.4.3/33_all_gcc44_config_rs6000_linux64.h.patch b/espf-gcc-4.4.3/33_all_gcc44_config_rs6000_linux64.h.patch
deleted file mode 100644
index b9fed34..0000000
--- a/espf-gcc-4.4.3/33_all_gcc44_config_rs6000_linux64.h.patch
+++ /dev/null
@@ -1,16 +0,0 @@
-2009-09-23 Peter S. Mazinger <ps.m@gmx.net>
-
- * gcc/config/rs6000/linux64.h ASM_SPEC32 Change %{fpic:-K PIC} %{fPIC:-K PIC}
- to %{fpic|fPIC|fpie|fPIE:-K PIC}
-
---- gcc/config/rs6000/linux64.h.psm 2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/rs6000/linux64.h 2009-09-23 12:34:26.000000000 +0200
-@@ -156,7 +156,7 @@
- #endif
-
- #define ASM_SPEC32 "-a32 %{n} %{T} %{Ym,*} %{Yd,*} \
--%{mrelocatable} %{mrelocatable-lib} %{fpic:-K PIC} %{fPIC:-K PIC} \
-+%{mrelocatable} %{mrelocatable-lib} %{fpic|fPIC|fpie|fPIE:-K PIC} \
- %{memb} %{!memb: %{msdata: -memb} %{msdata=eabi: -memb}} \
- %{!mlittle: %{!mlittle-endian: %{!mbig: %{!mbig-endian: \
- %{mcall-freebsd: -mbig} \
diff --git a/espf-gcc-4.4.3/35_all_gcc44_config_crtbegints.patch b/espf-gcc-4.4.3/35_all_gcc44_config_crtbegints.patch
deleted file mode 100644
index f1e6532..0000000
--- a/espf-gcc-4.4.3/35_all_gcc44_config_crtbegints.patch
+++ /dev/null
@@ -1,36 +0,0 @@
-2009-09-25 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/linux.h If ENABLE_CRTBEGINTS, -static and -pie use crtbegineTS.o.
- * gcc/config/rs6000/sysv4.h If ENABLE_CRTBEGINTS, -static and -pie use crtbegineTS.o.
-
---- gcc/config/linux.h 2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/linux.h 2009-09-08 04:08:06.000000000 +0200
-@@ -43,7 +43,11 @@
- object constructed before entering `main'. */
-
- #undef STARTFILE_SPEC
--#if defined HAVE_LD_PIE
-+#if defined (HAVE_LD_PIE) && defined (ENABLE_CRTBEGINTS)
-+#define STARTFILE_SPEC \
-+ "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} crti.o%s \
-+ %{static:%{pie:crtbeginTS.o%s;:crtbeginT.o%s}} %{!static:%{shared|pie:crtbeginS.o%s;:crtbegin.o%s}}"
-+#elif defined (HAVE_LD_PIE) && ! defined (ENABLE_CRTBEGINTS)
- #define STARTFILE_SPEC \
- "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
- crti.o%s %{static:crtbeginT.o%s;shared|pie:crtbeginS.o%s;:crtbegin.o%s}"
---- gcc/config/rs6000/sysv4.h 2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/rs6000/sysv4.h 2009-09-08 04:41:50.000000000 +0200
-@@ -883,7 +883,12 @@
- %{!mnewlib: %{pthread:-lpthread} %{shared:-lc} \
- %{!shared: %{profile:-lc_p} %{!profile:-lc}}}"
-
--#ifdef HAVE_LD_PIE
-+#if defined (HAVE_LD_PIE) && defined (ENABLE_CRTBEGINTS)
-+#define STARTFILE_LINUX_SPEC \
-+ "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
-+ %{mnewlib:ecrti.o%s;:crti.o%s} \
-+ {static:%{pie:crtbeginTS.o%s;:crtbeginT.o%s}} %{!static:%{shared|pie:crtbeginS.o%s;:crtbegin.o%s}}"
-+#elif defined (HAVE_LD_PIE) && ! defined (ENABLE_CRTBEGINTS)
- #define STARTFILE_LINUX_SPEC "\
- %{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
- %{mnewlib:ecrti.o%s;:crti.o%s} \
diff --git a/espf-gcc-4.4.3/40_all_gcc44_cp_lang-specs.h.patch b/espf-gcc-4.4.3/40_all_gcc44_cp_lang-specs.h.patch
deleted file mode 100644
index 954b102..0000000
--- a/espf-gcc-4.4.3/40_all_gcc44_cp_lang-specs.h.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-2009-06-18 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/cp/lang-specs.h compiler spec Add %(espf_options).
-
---- gcc/cp/lang-specs.h.orig 2009-03-23 01:21:54.000000000 +0100
-+++ gcc/cp/lang-specs.h 2009-03-23 01:22:16.000000000 +0100
-@@ -47,7 +47,7 @@
- %(cpp_options) %2 -o %{save-temps:%b.ii} %{!save-temps:%g.ii} \n}\
- cc1plus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.ii} %{!save-temps:%g.ii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- %{!fsyntax-only:-o %g.s %{!o*:--output-pch=%i.gch} %W{o*:--output-pch=%*}%V}}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {"@c++",
-@@ -57,11 +57,11 @@
- %(cpp_options) %2 -o %{save-temps:%b.ii} %{!save-temps:%g.ii} \n}\
- cc1plus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.ii} %{!save-temps:%g.ii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- %{!fsyntax-only:%(invoke_as)}}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {".ii", "@c++-cpp-output", 0, 0, 0},
- {"@c++-cpp-output",
- "%{!M:%{!MM:%{!E:\
-- cc1plus -fpreprocessed %i %(cc1_options) %2 %{+e*}\
-+ cc1plus -fpreprocessed %i %(cc1_options) %(espf_options) %2 %{+e*}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
diff --git a/espf-gcc-4.4.3/41_all_gcc44_objc_lang-specs.h.patch b/espf-gcc-4.4.3/41_all_gcc44_objc_lang-specs.h.patch
deleted file mode 100644
index affa77d..0000000
--- a/espf-gcc-4.4.3/41_all_gcc44_objc_lang-specs.h.patch
+++ /dev/null
@@ -1,37 +0,0 @@
-2009-06-18 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/objc/lang-specs.h compiler spec Add %(espf_options).
-
---- gcc/objc/lang-specs.h 2009-03-23 01:21:54.000000000 +0100
-+++ gcc/objc/lang-specs.h 2009-03-23 01:22:16.000000000 +0100
-@@ -30,13 +30,13 @@
- %{traditional|ftraditional|traditional-cpp:\
- %eGNU Objective C no longer supports traditional compilation}\
- %{save-temps|no-integrated-cpp:cc1obj -E %(cpp_options) -o %{save-temps:%b.mi} %{!save-temps:%g.mi} \n\
-- cc1obj -fpreprocessed %{save-temps:%b.mi} %{!save-temps:%g.mi} %(cc1_options) %{print-objc-runtime-info} %{gen-decls}}\
-+ cc1obj -fpreprocessed %{save-temps:%b.mi} %{!save-temps:%g.mi} %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}}\
- %{!save-temps:%{!no-integrated-cpp:\
-- cc1obj %(cpp_unique_options) %(cc1_options) %{print-objc-runtime-info} %{gen-decls}}}\
-+ cc1obj %(cpp_unique_options) %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}}}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
- {".mi", "@objc-cpp-output", 0, 0, 0},
- {"@objc-cpp-output",
-- "%{!M:%{!MM:%{!E:cc1obj -fpreprocessed %i %(cc1_options) %{print-objc-runtime-info} %{gen-decls}\
-+ "%{!M:%{!MM:%{!E:cc1obj -fpreprocessed %i %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
- {"@objective-c-header",
- "%{E|M|MM:cc1obj -E %{traditional|ftraditional|traditional-cpp:-traditional-cpp}\
-@@ -45,10 +45,10 @@
- %{traditional|ftraditional|traditional-cpp:\
- %eGNU Objective C no longer supports traditional compilation}\
- %{save-temps|no-integrated-cpp:cc1obj -E %(cpp_options) -o %{save-temps:%b.mi} %{!save-temps:%g.mi} \n\
-- cc1obj -fpreprocessed %b.mi %(cc1_options) %{print-objc-runtime-info} %{gen-decls}\
-+ cc1obj -fpreprocessed %b.mi %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}\
- -o %g.s %{!o*:--output-pch=%i.gch}\
- %W{o*:--output-pch=%*}%V}\
- %{!save-temps:%{!no-integrated-cpp:\
-- cc1obj %(cpp_unique_options) %(cc1_options) %{print-objc-runtime-info} %{gen-decls}\
-+ cc1obj %(cpp_unique_options) %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}\
- -o %g.s %{!o*:--output-pch=%i.gch}\
- %W{o*:--output-pch=%*}%V}}}}}", 0, 0, 0},
diff --git a/espf-gcc-4.4.3/42_all_gcc44_objcp_lang-specs.h.patch b/espf-gcc-4.4.3/42_all_gcc44_objcp_lang-specs.h.patch
deleted file mode 100644
index 542a803..0000000
--- a/espf-gcc-4.4.3/42_all_gcc44_objcp_lang-specs.h.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-2009-06-18 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/objcp/lang-specs.h compiler spec Add %(espf_options).
-
---- gcc/objcp/lang-specs.h 2009-03-23 01:21:54.000000000 +0100
-+++ gcc/objcp/lang-specs.h 2009-03-23 01:22:16.000000000 +0100
-@@ -36,7 +36,7 @@
- %(cpp_options) %2 -o %{save-temps:%b.mii} %{!save-temps:%g.mii} \n}\
- cc1objplus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.mii} %{!save-temps:%g.mii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- -o %g.s %{!o*:--output-pch=%i.gch} %W{o*:--output-pch=%*}%V}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {"@objective-c++",
-@@ -46,15 +46,15 @@
- %(cpp_options) %2 -o %{save-temps:%b.mii} %{!save-temps:%g.mii} \n}\
- cc1objplus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.mii} %{!save-temps:%g.mii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- %{!fsyntax-only:%(invoke_as)}}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {".mii", "@objective-c++-cpp-output", 0, 0, 0},
- {"@objective-c++-cpp-output",
- "%{!M:%{!MM:%{!E:\
-- cc1objplus -fpreprocessed %i %(cc1_options) %2 %{+e*}\
-+ cc1objplus -fpreprocessed %i %(cc1_options) %(espf_options) %2 %{+e*}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
- {"@objc++-cpp-output",
- "%{!M:%{!MM:%{!E:\
-- cc1objplus -fpreprocessed %i %(cc1_options) %2 %{+e*}\
-+ cc1objplus -fpreprocessed %i %(cc1_options) %(espf_options) %2 %{+e*}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
diff --git a/espf-gcc-4.4.3/60_all_gcc44_invoke.texi.patch b/espf-gcc-4.4.3/60_all_gcc44_invoke.texi.patch
deleted file mode 100644
index 863ebc0..0000000
--- a/espf-gcc-4.4.3/60_all_gcc44_invoke.texi.patch
+++ /dev/null
@@ -1,44 +0,0 @@
-2009-09-11 Magnus Granberg <zorry@ume.nu>
-
- * gcc/doc/invoke.texi Add NOTES about -fstack-protector-all, -pie and
- -fPIE/-fpie when --enable-espf is enable, this options is on by default.
-
---- gcc/doc/invoke.texi 2009-04-01 09:18:47.000000000 +0200
-+++ gcc/doc/invoke.texi 2009-06-18 14:08:38.000000000 +0200
-@@ -7134,6 +7134,11 @@
- @opindex fstack-protector-all
- Like @option{-fstack-protector} except that all functions are protected.
-
-+NOTE: When --enable-espf this option is enabled by default
-+for C, C++, ObjC, ObjC++, if neither @option{-fno-stack-protector}
-+or @option{-nostdlib} or @option{-nodefaultlibs} or
-+@option{-fstack-protector} are found.
-+
- @item -fsection-anchors
- @opindex fsection-anchors
- Try to reduce the number of symbolic address calculations by using
-@@ -7960,6 +7965,12 @@
- that were used to generate code (@option{-fpie}, @option{-fPIE},
- or model suboptions) when you specify this option.
-
-+NOTE: When --enable-espf this option is enabled by default
-+for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE}
-+or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or
-+@option{-nostartfiles} or @option{-shared} or @option{-pg} or @option{-p}
-+are found.
-+
- @item -rdynamic
- @opindex rdynamic
- Pass the flag @option{-export-dynamic} to the ELF linker, on targets
-@@ -15889,6 +15910,11 @@
- @code{__pie__} and @code{__PIE__}. The macros have the value 1
- for @option{-fpie} and 2 for @option{-fPIE}.
-
-+NOTE: When --enable-espf this option is enabled by default
-+for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE}
-+or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or
-+@option{-nostartfiles} or @option{-shared} are found.
-+
- @item -fno-jump-tables
- @opindex fno-jump-tables
- Do not use jump tables for switch statements even where it would be
diff --git a/espf-gcc-4.4.3/README b/espf-gcc-4.4.3/README
deleted file mode 100644
index d95d9fb..0000000
--- a/espf-gcc-4.4.3/README
+++ /dev/null
@@ -1,18 +0,0 @@
-This work started with bugs #94325 #100689 #106222 #149292 #149649 and the overlay on http://overlays.gentoo.org/dev/kevquinn.
-By Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY and mentor.
-
-The work stalled. Some threads on the Gentoo forum started to do their own fixes to get it working.
-Xake started the thread where most of the new work is done: "How long until hardened and toolchain will produce a hardened gcc4?"
-http://forums.gentoo.org/viewtopic-t-668885.html. I joined the thread and started to code.
-
-We started with the pieworld code from kevquinn's overlay. The PIE and minispecs part hit the tree later on.
-With GCC 4.4.0 I was willing to do some code cleanup, use built-in specs and add it as --enable-espf in the
-configure command line.
-
-Thank you all:
-Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY, Xake, Dwokfur,
-KernelOfTruth, SteveL, nixnut, Hopeless, forsaken1, XioXous, obrut<-, mv, qjim, Tommy[D], Genewb, radegand,
-unk, neuron, alexxy, hellboi64, likewhoa, g0rg0n, costel78, polsas, 7v5w7go9ub0o, uberpinguin, Naib, cilly,
-bonsaikitten, kerframil, agaffney, Gordon Malm, blueness, Matthias Klose, Kees Cook, mentor, Anarchy,
-devurandom and everyone else for helping to test, suggestions, fixes and anything else we have missed.
-/2009-00-09 Magnus Grenberg (Zorry) <zorry@ume.nu>
diff --git a/espf-gcc-4.4.3/README.Changelog b/espf-gcc-4.4.3/README.Changelog
deleted file mode 100644
index 462ffe7..0000000
--- a/espf-gcc-4.4.3/README.Changelog
+++ /dev/null
@@ -1,232 +0,0 @@
-0.3.9 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/configure Added check for TLS on the target in the SSP check.
-
- #149292 b.g.o
- * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux64.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/rs6000/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux64.h Removed uclibc don't support TLS on stack-protector
-
-0.3.8 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/configure Added a -fstack-protector check.
- * gcc/config.in Added HAVE_GCC_SSP
- * gcc/gcc.c Removed code for espf_link_spec in do_spec_1() %X
- * gcc/espf.h Added ifdef HAVE_GCC_SSP, change code for espf_link_spec and link_pie_spec
-
-0.3.7 Magnus Granberg <zorry@ume.nu>
-
- * gcc/gcc.c Remove code for Wl,-z,now check
- * gcc/espf.h Change text for -z now
-
-0.3.6 Magnus Granberg <zorry@ume.nu>
-
- * configure Check --enable-espf change ppc* to powerpc*, powerpc64 and add ia64.
- * gcc/configure Don't check for -z,relro on ia64. Disable crtbeginTS for ia64.
- * gcc/espf.h ia64 don't support -fstack-protector*
-
-0.3.5 Maguns Granberg <zorry@ume.nu>
-
- * gcc/espf.h Change the specs for crtbegin.TS.o.
- * gcc/gcc.c Rename espf_cc1_options to espf_options_pie_check.
- * gcc/config/linux.h Fix typos ENABLE_CRTBEGINS to ENABLE_CRTBEGINTS
- * gcc/config/rs6000/linux64.h ASM_SPEC32: %{fpic:-K PIC} %{fPIC:-K PIC} to %{fpic|fPIC|fpie|fPIE:-K PIC}
-
-0.3.4 Magnus Granberg <zorry@ume.nu>
-
- * gcc/configure Add crtbeginTS.o support.
- * gcc/Makefile.in Add crtbeginTS.o support.
- * gcc/gcc.c Add espf_cc1_options.
- * gcc/espf.h Added espf_cc1_options, crtbeginTS.o support,
- espf_cc1_options and espf_cc1_strictoverflow.
- * gcc/config.in Add crtbeginTS.o support.
- * gcc/config/linux.h Add crtbeginTS.o support.
- * gcc/config/rs6000/sysv4.h Add crtbeginTS.o support.
- * gcc/doc/invoke.texi Add NOTES about -fstack-protector-all,
- -pie and -fPIE.
- * libgcc/Makefile.in Add crtbeginTS.o support.
-
-0.3.3 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c change #ifdef ENABLE_ESPF to #ifndef ENABLE_ESPF
-
-0.3.2 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c disable flag_delete_null_pointer_checks >= -O2
- * gcc/espf.h add ESPF_CC1_SSP_SPEC and ESPF_CC1_PIE_SPEC to fix bugs on -vanilla spec
-
- #149292 b.g.o
- * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux64.h uclibc don't support TLS on stack-protector
- * gcc/config/rs6000/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux64.h uclibc don't support TLS on stack-protector
-
-0.3.1 Magnus Granberg <zorry@ume.nu>
-
- * gcc/cp/Make-lang.in cc1plus: pch test fail when cc1plus is compile with -fPIE.
- * gcc/configure fix --enable-espf when USE"-hardened"
-
-4.4.1-espf-0.3.0 Magnus Granberg <zorry@ume.nu>
-
- * gcc/espf.h add ESPF_LINK_SPEC ESPF_LINK_NOW_SPEC
- * gcc/gcc.c move do_self_spec (espf_command_options_spec)
- do_spec_1() add espf_link_spec
-
-0.3.0 Magnus Granberg <zorry@ume.nu>
-
- * gcc/objc/lang-specs.h Add %(espf_options)
- * gcc/objcp/lang-specs.h Add %(espf_options)
- * gcc/cp/lang-specs.h Add %(espf_options)
- * gcc/config.in removed ENABLE_LIBSSP
- * Makefile.in We add -fno-stack-protector to
- BOOT_CFLAGS, LIBCFLAGS and LIBCXXFLAGS
- cc1: pch.exp test fail when cc1 is compile with -fPIE
- * libmudflap/Makefiles.in Add -fno-stack-protector -U_FORTIFY_SOURCE
- to AM_CFLAGS
- * configure add --enable-espf
- add -fno-stack-protector to stage1_cflags
- add targes ppc* arm sparc*
- * gcc/configure change code for check --enable-espf
- * libmudflap/configure add enable_espf
- * gcc/espf.h ESPF_CC1_OPTIONS_SPEC renamed to ESPF_OPTIONS_SPEC
- add ESPF_CPP_OPTIONS_SPEC ESPF_COMMAND_OPTIONS_SPEC
- ESPF_CC1_OPTIONS_SSP_SPEC renamed to ESPF_OPTIONS_SSP_SPEC
- ESPF_COMPILER_COMMAND_PIE_SPEC renamed to ESPF_OPTIONS_PIE_SPEC
- ESPF_LINK_COMMAND_PIE_SPEC renamed to ESPF_LINK_PIE_SPEC
- add !p !pg to ESPF_LINK_PIE_SPEC
- removed ESPF_LINK_SPEC ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC
- * gcc/gcc.c cpp_options add %(espf_cpp_options)
- compiler spec add %(espf_options)
- change code for ESPF_EXTRA_SPECS
- process_command(): Check for lazy, or now
- do_spec_1(): Add -z now and -z relro
- main() add do_self_spec (espf_command_options_spec)
- removed do_self_spec (espf_cc1_command_spec) do_self_spec (espf_link_command_spec)
-
-0.2.9 Magnus Granberg <zorry@ume.nu>
-
- * gcc/espf.h add ESPF_COMPILER_COMMAND_PIE_SPEC
- add ESPF_LINK_COMMAND_PIE_SPEC
- change ESPF_COMPILER_COMMAND_SPEC ESPF_LINK_COMMAND_SPEC
-
-0.2.8 Magnus Granberg <zorry@ume.nu>
-
- * gcc/configure removed check crtbeginTS.o
- * gcc/espf.h added notes
- add ESPF_CC1_SPEC
- removed ESPF_CPP_UNIQUE_OPTIONS espf_override_options()
- * gcc/gcc.c cc1_spec Set it to CC1_SPEC if ! ENABLE_ESPF
- * gcc/toplev.c removed ESPF_OVERRIDE_OPTIONS
-
-0.2.7 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c (decode_options): Remove flag_strict_overflow as opt2
- * gcc/config.in removed HAVE_CRTBEGINTS
- * gcc/Makefile removed crtbeginTS.o
- * libgcc/Makefile.in removed crtbeginTS.o
- * gcc/config/i386/i386.h removed espf_override_options ESPF_EXTRA_SPECS
- * gcc/config/linux.h remoevd crtbeginTS.o
- * gcc/espf.h ESPF_CC1_OPTIONS_PIE_SPEC renamed to ESPF_CC1_COMMAND_SPEC
- * gcc/gcc.c add ESPF_EXTRA_SPECS
- main() add do_self_spec (espf_cc1_command_spec)
-
-0.2.6 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h add espf_override_options() to OVERRIDE_OPTIONS
- * gcc/espf.h add espf_override_options()
- * gcc/toplev.c add ESPF_OVERRIDE_OPTIONS
-
-0.2.5 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h removed espf_cc1
- * gcc/config/i386/linux.h removed espf_cc1 %(crtend_gen)
- * gcc/config/i386/x86-64.h removed espf_cc1 %(crtend_gen)
- * gcc/config/linux.h removed espf_cc1 %(crtfile_gen)
- %(crtbegin_t_gen) %(crtend_gen)
- add crtbeginTS.o
- * gcc/config.in removed TARGET_LIBC_PROVIDES_PIE
- add HAVE_CRTBEGINTS
- * gcc/Makefile.in add ESPF_NOPIE_CFLAGS ESPF_NOSSP_CFLAGS to
- CRTSTUFF_T_CFLAGS
- add ESPF_NOSSP_CFLAGS to CRTSTUFF_T_CFLAGS_S
- * espf.h ESPF_CC1_SPEC renamed to ESPF_CC1_OPTIONS_SPEC
- add ESPF_LINK_SPEC
- ESPF_CC1_SSP_SPEC renamed to ESPF_CC1_OPTIONS_SSP_SPEC
- ESPF_CC1_PIE_SPEC renamed to ESPF_CC1_OPTIONS_PIE_SPEC
- ESPF_CC1_OPTIONS_SPEC renamed to ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC
- LINK_PIE_SPEC renamed to ESPF_LINK_COMMAND_SPEC
- removed ESPF_CC1_STRICT_SPEC CRTFILE_GEN_SPEC CRTBEGIN_GEN_SPEC
- CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC
- * gcc/configure remove TARGET_LIBC_PROVIDES_PIE
- define HAVE_CRTBEGINTS
- * gcc/gcc.c LINK_COMMAND_SPEC add %(espf_link)
- main() add do_self_spec (espf_link_command_spec)
-
-0.2.4 Magnus Granberg <zorry@ume.nu>
-
- libgcc/Makefile.in clean specs
-
-0.2.3 Magnus Granberg <zorry@ume.nu>
-
- *gcc/espf.h add ESPF_CC1_STRICT_SPEC
-
-0.2.2 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h Add espf_cc1
- Add ESPF_EXTRA_SPECS
- * gcc/config/i386/linux.h Add espf_cc1
- * gcc/config/i386/x86-64.h Add espf_cc1
- * gcc/config/linux.h Add espf_cc1
- * gcc/Makefile.in add crtbeginTS.o to EXTRA_PARTS list
- * libgcc/Makefile.in add crtbeginTS.o to EXTRA_PARTS list
- * gcc/configure add define ENABLE_LIBSSP
- * gcc/gcc.c %(fortify_default) renamed to %(espf_cpp_unique_options)
- %(pie_incompatible) renamed to %(espf_cc1_options)
- removed ESPF_EXTRA_SPECS
- * gcc/espf.h ESPF_DEFAULT_SPEC renamed to ESPF_CC1_SPEC
- SSP_DEFAULT_SPEC renamed to ESPF_CC1_SSP_SPEC
- FORTIFY_DEFAULT_SPEC renamed to ESPF_CPP_UNIQUE_OPTIONS
- PIE_DEFAULT_SPEC renamed to ESPF_CC1_PIE_SPEC
- PIE_INCOMPATIBLE_SPEC renamed to ESPF_CC1_OPTIONS_SPEC
- add new CRTFILE_GEN_SPEC CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC if !
- TARGET_LIBC_PROVIDES_PIE
-
-4.4.0-espf-0.2.1 Magnus Granberg <zorry@ume.nu>
-
- * gcc/gcc.c include: espf.h
- cc1_spec = CC1_SPEC if not ENABLE_ESPF
- cpp_unique_options add %(fortify_default)
- cc1_options add %(pie_incompatible)
- EXTRA_SPECS add ESPF_EXTRA_SPECS
- * libgcc/Makefile.in add crtbeginTs.o
- gcc/Makefile.in add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS
- LIBGCC2_CFLAGS add ESPF_NOSSP_CFLAGS
- CRTSTUFF_CFLAGS add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS
- crtbegin* add crtbeginTS
- $(out_object_file): ix86_split_to_parts() stack smashing attack b.g.o #149292
- * libgcc/configure add enable_espf
- * gcc/config/linux.h add %(crtfile_gen) %(crtbegin_t_gen) %(crtend_gen)
- * gcc/config/i386/linux.h add %(crtend_gen)
- * gcc/config/i386/linux64.h add %(crtend_gen)
- * gcc/config.gcc extra_parts add crtbeginTS.o
- * libgcc/config.host extra_parts add crtbeginTS.o
- * gcc/configure check -z relro
- check -z now
- check FORTIFY_SOURCES level 2
- check Scrt1.o
- check --enable-espf
- check crtbeginTS.o
- * gcc/espf.h new file
- * gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib
- * gcc/config.in add ENABLE_LIBSSP
- add ENABLE_ESPF
- add TARGET_LIBC_PROVIDES_FORTIFY2
- add TARGET_LIBC_PROVIDES_PIE
- * configure define ENABLE_LIBSSP
-
-gcc-4.3.3-piepatches-v10.2.1 \ No newline at end of file
diff --git a/espf-gcc-4.4.3/README.Gentoo.patches b/espf-gcc-4.4.3/README.Gentoo.patches
deleted file mode 100644
index db43079..0000000
--- a/espf-gcc-4.4.3/README.Gentoo.patches
+++ /dev/null
@@ -1,28 +0,0 @@
- ================
- === W[hat]TF ===
- ================
-
-Gentoo patchsets that have grown too large to keep on the rsync mirrors have
-been moved to our git tree. From there, we bundle up all the whee little
-patches into a tarball and distribute it via our public mirroring system.
-
-If you want specific info about a patch (like wtf it does or whose great idea
-it was to change the code), read the patch ! We try to fill out the top of
-them with useful info such as what it does, why it's needed, bug reports,
-original creators, etc... For simple patches, we reserve the right to assume
-your IQ is greater than absolute 0 and figure out what it does w/out an
-explanation. If, by some miracle of science, it falls below the absolute 0
-mark, you should help mankind by finding some scientists and letting them
-probe you with their ... erm ... probes.
-
- =================
- === W[here]TF ===
- =================
-
-For those with git access
-git://git.overlays.gentoo.org/proj/hardened-gccpatchset.git
-
-For those w/out git access, this URL should help you:
-http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-gccpatchset.git;a=summary
-
-It should be pretty easy to find your way around, you're a big boy after all.
diff --git a/espf-gcc-4.4.3/README.history b/espf-gcc-4.4.3/README.history
deleted file mode 100644
index cbe1b32..0000000
--- a/espf-gcc-4.4.3/README.history
+++ /dev/null
@@ -1,154 +0,0 @@
-0.3.9 14-04-2010
- 10_all_gcc44_configure.patch
- - 50_all_gcc44_no_ssp_tls_uclibc.patch
-
-0.3.8 10-04-2010
- 10_all_gcc44_configure.patch
- 11_all_gcc44_config.in.patch
- 20_all_gcc44_gcc.c.patch
- 30_all_gcc44_espf.h.patch
-
-0.3.7 10-02-2010
- 20_all_gcc44_gcc.c.patch
- 30_all_gcc44_espf.h.patch
-
-0.3.6 23-12-2009
- 10_all_gcc44_configure.patch
- 30_all_gcc44_espf.h.patch
- README
-
-0.3.5 24-09-2009
- 30_all_gcc44_espf.h.patch
- 35_all_gcc44_config_crtbegints.patch
- + 33_all_gcc44_config_rs6000_linux64.h.patch
- + README.Gentoo.patches
-
-0.3.4 11-09-2009
- 10_all_gcc44_configure.patch
- 11_all_gcc44_config.in.patch
- 12_all_gcc44_Makefile.in.patch
- 20_all_gcc44_gcc.c.patch
- - 23_all_gcc44_opts.c.patch
- 30_all_gcc44_espf.h.patch
- 35_all_gcc44_config_crtbegints.patch
- + 60_all_gcc44_invoke.texi.patch
- + README
-
-0.3.3 14-08-2009
- 23_all_gcc44_opts.c.patch
-
-0.3.2 09-08-2009
- 50_all_gcc44_no_ssp_tls_uclibc.patch
- + README.Changelog
- + README.history
- + 23_all_gcc44_opts.c.patch
- 30_all_gcc44-espf.h.patch
-
-0.3.1 23-07-2009
- 10_all_gcc44_configure.patch
-
-0.3.0 23-07-2009
- 10_all_gcc44_configure.patch
- 11_all_gcc44_config.in.patch
- 12_all_gcc44_Makefile.in.patch
- 20_all_gcc44_gcc.c.patch
- + 40_all_gcc44_obj_lang-specs.h.patch
- + 40_all_gcc44_objp_lang-specs.h.patch
- + 40_all_gcc44_cp_lang-specs.h.patch
- - 50_all_gcc44_gentoo_v20090614.1.patch
- 30_all_gcc44-espf.h.patch
-
-0.2.9 14-06-2009
- 12_all_gcc44_Makefile.in.patch
- 30_all_gcc44-espf.h.patch
- + 50_all_gcc44_gentoo_v20090614.1.patch
- - 50_all_gcc44_gentoo_v20090612.2.patch
-
-0.2.8 12-06-2009
- 10_all_gcc44_configure.patch
- 11_all_gcc44_config.in.patch
- 12_all_gcc44_Makefile.in.patch
- - 22_all_gcc44-toplev.c.patch
- + 30_all_gcc44-espf.h.patch
- - 25_all_gcc44-espf.h.patch
- + 50_all_gcc44_gentoo_v20090612.2.patch
-
-0.2.7 29-05-2009
- 11_all_gcc44_config.in.patch
- 12_all_gcc44_Makefile.in.patch
- 20_all_gcc44_gcc.c.patch
- + 23_all_gcc44_opts.c.patch
- 25_all_gcc44-espf.h.patch
- - 30_all_gcc44-config-defaul-linux.patch
-
-0.2.6 28-05-2009
- + 22_all_gcc44-toplev.c.patch
- 25_all_gcc44-espf.h.patch
- 30_all_gcc44-config-defaul-linux.patch
-
-0.2.5 27-05-2009
- 10_all_gcc44_configure.patch
- 12_all_gcc44_Makefile.in.patch
- 20_all_gcc44_gcc.c.patch
- 25_all_gcc44-espf.h.patch
- 30_all_gcc44-config-defaul-linux.patch
- - 40_all_gcc44-gentoo.patch
-
-0.2.4 08-05-2009
- 12_all_gcc44_Makefile.in.patch
-
-0.2.3 08-05-2009
- 20_all_gcc44_gcc.c.patch
- 40_all_gcc44-gentoo.patch
-
-0.2.2 04-05-2009
- + 10_all_gcc44_configure.patch
- + 11_all_gcc44_config.in.patch
- + 12_all_gcc44_Makefile.in.patch
- + 20_all_gcc44_gcc.c.patch
- + 21_all_gcc44_decl-tls-model.patch
- + 25_all_gcc44-espf.h.patch
- + 30_all_gcc44-config-defaul-linux.patch
- + 40_all_gcc44-gentoo.patch
- - 01_all_gcc44-configure.patch
- - 10_all_gcc44-gcc_configure.patch
- - 11_all_gcc44-gcc_config.in.patch
- - 12_all_gcc44-gcc_config.gcc.patch
- - 13_all_gcc44-gcc_Makefile.in.patch
- - 15_all_gcc44-libgcc_config.host.patch
- - 16_all_gcc44-libgcc_configure.patch
- - 17_all_gcc44-libgcc_Makefile.in.patch
- - 21_all_gcc44-gcc_espf.h.patch
- - 22_all_gcc44-gcc_gcc.c.patch
- - 23_all_gcc44-gcc_varasm.c.patch
- - 30_all_gcc44-add-crt-start-endfiles-linux.patch
-
-0.2.1 28-04-2009
- + 01_all_gcc44-configure.patch
- + 10_all_gcc44-gcc_configure.patch
- + 11_all_gcc44-gcc_config.in.patch
- + 12_all_gcc44-gcc_config.gcc.patch
- + 13_all_gcc44-gcc_Makefile.in.patch
- + 15_all_gcc44-libgcc_config.host.patch
- + 16_all_gcc44-libgcc_configure.patch
- + 17_all_gcc44-libgcc_Makefile.in.patch
- + 21_all_gcc44-gcc_espf.h.patch
- + 22_all_gcc44-gcc_gcc.c.patch
- + 23_all_gcc44-gcc_varasm.c.patch
- + 30_all_gcc44-add-crt-start-endfiles-linux.patch
- - 00_all_gcc4.4-cvs-incompat.patch
- - 05_all_gcc4.4-compile-no-ssp.patch
- - 10_all_gcc4.4-hardened-minispecs-support.patch
- - 11_all_gcc4.4-decl-tls-model.patch
- - 12_all_gcc4.4-fortify-minispecs-support.patch
- - 20-all_gcc4.4-default-crt-start-endfile.patch
- - 30-all_gcc4.4-crtbeginTS-fno-PIE.patch
-
-0.1.0 16.04.2009
- + 00_all_gcc4.4-cvs-incompat.patch
- + 05_all_gcc4.4-compile-no-ssp.patch
- + 10_all_gcc4.4-hardened-minispecs-support.patch
- + 11_all_gcc4.4-decl-tls-model.patch
- + 12_all_gcc4.4-fortify-minispecs-support.patch
- + 20-all_gcc4.4-default-crt-start-endfile.patch
- + 30-all_gcc4.4-crtbeginTS-fno-PIE.patch
diff --git a/espf-gcc-4.5.0/10_all_gcc45_configure.patch b/espf-gcc-4.5.0/10_all_gcc45_configure.patch
deleted file mode 100644
index a157a99..0000000
--- a/espf-gcc-4.5.0/10_all_gcc45_configure.patch
+++ /dev/null
@@ -1,292 +0,0 @@
-2010-04-15 Magnus Granberg <zorry@gentoo.org>, Anthony G. Basile <basile@opensource.dyc.edu>
-
- * configure Add --enable-espf. Add-fno-stack-protector
- to stage1_cflags.
- * gcc/configure Check -z now and -z relro.
- Check if the compiler support -fstack-protector and define HAVE_GCC_SSP.
- Check if we support FORTIFY_SOURCES.
- Define ENABLE_ESPF.
- * libmudflap/configure Add AC_SUBST enable_espf.
-
- On Gentoo
- * gcc/configure We don't need to check for FORTIFY_SOURCES support.
- Check if the compiler support -fstack-protector and define HAVE_GCC_SSP.
- Check if we support crtbeginTS and define ENABLE_CRTBEGINTS.
- Add AC_SUBST enable_crtbeginTS.
-
---- configure 2010-01-31 13:12:21.000000000 -0500
-+++ configure 2010-02-07 14:29:51.000000000 -0500
-@@ -707,6 +707,7 @@
- CFLAGS
- CC
- target_subdir
-+enable_espf
- host_subdir
- build_subdir
- build_libsubdir
-@@ -1485,6 +1486,11 @@
- --enable-FEATURE[=ARG] include FEATURE [ARG=yes]
- --enable-gold use gold instead of ld
- --enable-libada build libada directory
-+ --enable-espf
-+ Enable Stack protector, Position independent executable and
-+ Fortify_sources as default if we have suppot for it when compiling
-+ and link with -z relro and -z now as default.
-+ Linux targets supported i*86, x86_64, powerpc*, ia64, arm* and mips
- --enable-libssp build libssp directory
- --enable-build-with-cxx build with C++ compiler instead of C compiler
- --disable-ppl-version-check disable check for PPL version
-@@ -3164,6 +3170,24 @@
- noconfigdirs="$noconfigdirs gnattools"
- fi
-
-+# Check whether --enable-espf was given and target have the support.
-+# Check whether --enable-espf or --disable-espf was given.
-+if test "${enable_espf+set}" = set; then
-+ enableval="$enable_espf"
-+
-+ case $target in
-+ i?86*-*-linux* | x86_64*-*-linux* | powerpc-*-linux* | powerpc64-*-linux* | arm*-*-linux* | ia64-*-linux* | mips-*-linux*)
-+ enable_espf=yes
-+ ;;
-+ *)
-+ { { echo "$as_me:$LINENO: error: *** --enable-espf is not supported on this $target target." >&5
-+echo "$as_me: error: *** --enable-espf is not supported on this $target target." >&2;}
-+ { (exit 1); exit 1; }; }
-+ ;;
-+ esac
-+
-+fi;
-+
- # Check whether --enable-libssp was given.
- if test "${enable_libssp+set}" = set; then :
- enableval=$enable_libssp; ENABLE_LIBSSP=$enableval
-@@ -14266,6 +14290,9 @@
- *) stage1_cflags="-g -J" ;;
- esac ;;
- esac
-+if test x$enable_espf = xyes; then
-+ stage1_cflags="$stage1_cflags -fno-stack-protector"
-+fi
-
- # This is aimed to mimic bootstrap with a non-GCC compiler to catch problems.
- if test "$GCC" = yes -a "$ENABLE_BUILD_WITH_CXX" != yes; then
---- gcc/configure 2010-01-31 10:01:53.000000000 -0500
-+++ gcc/configure 2010-02-07 14:29:56.000000000 -0500
-@@ -678,6 +678,8 @@
- HOST_LIBS
- GGC
- libgcc_visibility
-+enable_espf
-+enable_crtbeginTS
- gcc_cv_readelf
- gcc_cv_objdump
- ORIGINAL_NM_FOR_TARGET
-@@ -24480,6 +24481,50 @@
- ;;
- esac
-
-+echo "$as_me:$LINENO: checking linker -z now support" >&5
-+echo $ECHO_N "checking linker -z now support... $ECHO_C" >&6
-+if test "${gcc_cv_ld_now+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+ gcc_cv_ld_now=no
-+if test $in_tree_ld = yes ; then
-+ if test "$gcc_cv_gld_major_version" -eq 2 -a "$gcc_cv_gld_minor_version" -ge 16 -o "$gcc_cv_gld_major_version" -gt 2 \
-+ && test $in_tree_ld_is_elf = yes; then
-+ gcc_cv_ld_now=yes
-+ fi
-+elif test x$gcc_cv_ld != x; then
-+ # Check if linker supports -z now options
-+ if $gcc_cv_ld --help 2>/dev/null | grep now > /dev/null; then
-+ gcc_cv_ld_now=yes
-+ fi
-+fi
-+
-+fi
-+echo "$as_me:$LINENO: result: $gcc_cv_ld_now" >&5
-+echo "${ECHO_T}$gcc_cv_ld_now" >&6
-+
-+echo "$as_me:$LINENO: checking linker -z relro support" >&5
-+echo $ECHO_N "checking linker -z relro support... $ECHO_C" >&6
-+if test "${gcc_cv_ld_relro+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+ gcc_cv_ld_relro=no
-+if test $in_tree_ld = yes ; then
-+ if test "$gcc_cv_gld_major_version" -eq 2 -a "$gcc_cv_gld_minor_version" -ge 16 -o "$gcc_cv_gld_major_version" -gt 2 \
-+ && test $in_tree_ld_is_elf = yes; then
-+ gcc_cv_ld_relro=yes
-+ fi
-+elif test x$gcc_cv_ld != x; then
-+ # Check if linker supports -z relro and -z norelro options
-+ if $gcc_cv_ld --help 2>/dev/null | grep relro > /dev/null; then
-+ gcc_cv_ld_relro=yes
-+ fi
-+fi
-+
-+fi
-+echo "$as_me:$LINENO: result: $gcc_cv_ld_relro" >&5
-+echo "${ECHO_T}$gcc_cv_ld_relro" >&6
-+
- { $as_echo "$as_me:${as_lineno-$LINENO}: checking linker --build-id support" >&5
- $as_echo_n "checking linker --build-id support... " >&6; }
- if test "${gcc_cv_ld_buildid+set}" = set; then :
-@@ -24411,6 +23737,146 @@
-
- fi
-
-+if test x$gcc_cv_libc_provides_ssp = xyes; then
-+ echo "$as_me:$LINENO: checking whether $CC support -fstack-protector" >&5
-+echo $ECHO_N "checking whether $CC support -fstack-protector... $ECHO_C" >&6
-+if test "${gcc_cv_cc_stack_protector+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+
-+ saved_CFLAGS="$CFLAGS"
-+ CFLAGS="$CFLAGS -fstack-protector"
-+ cat >conftest.$ac_ext <<_ACEOF
-+#ifndef __SSP__
-+#error
-+#endif
-+
-+_ACEOF
-+rm -f conftest.$ac_objext
-+if { (eval echo "$as_me:$LINENO: \"$ac_compile\"") >&5
-+ (eval $ac_compile) 2>conftest.er1
-+ ac_status=$?
-+ grep -v '^ *+' conftest.er1 >conftest.err
-+ rm -f conftest.er1
-+ cat conftest.err >&5
-+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
-+ (exit $ac_status); } &&
-+ { ac_try='test -z "$ac_c_werror_flag"
-+ || test ! -s conftest.err'
-+ { (eval echo "$as_me:$LINENO: \"$ac_try\"") >&5
-+ (eval $ac_try) 2>&5
-+ ac_status=$?
-+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
-+ (exit $ac_status); }; } &&
-+ { ac_try='test -s conftest.$ac_objext'
-+ { (eval echo "$as_me:$LINENO: \"$ac_try\"") >&5
-+ (eval $ac_try) 2>&5
-+ ac_status=$?
-+ echo "$as_me:$LINENO: \$? = $ac_status" >&5
-+ (exit $ac_status); }; }; then
-+
-+ case $target in
-+ i?86*-*-linux* | x86_64*-*-linux* | powerpc-*-linux* | powerpc64-*-linux*)
-+ if test x$set_have_as_tls = xyes; then
-+ gcc_cv_cc_stack_protector=yes
-+ else
-+ gcc_cv_cc_stack_protector=no
-+ fi
-+ ;;
-+ *)
-+ cc_cv_cc_stack_protector=yes
-+ ;;
-+ esac
-+
-+else
-+ echo "$as_me: failed program was:" >&5
-+sed 's/^/| /' conftest.$ac_ext >&5
-+
-+gcc_cv_cc_stack_protector=no
-+fi
-+rm -f conftest.err conftest.$ac_objext conftest.$ac_ext
-+ CFLAGS="$saved_CFLAGS"
-+
-+fi
-+echo "$as_me:$LINENO: result: $gcc_cv_cc_stack_protector" >&5
-+echo "${ECHO_T}$gcc_cv_cc_stack_protector" >&6
-+fi
-+if test x$gcc_cv_cc_stack_protector = xyes; then
-+
-+cat >>confdefs.h <<\_ACEOF
-+#define HAVE_GCC_SSP 1
-+_ACEOF
-+
-+fi
-+
-+
-+if test x$enable_espf = xyes ; then
-+case $target in
-+ ia64*-*-linux*)
-+ if test x$gcc_cv_ld_now = xyes; then
-+ enable_espf_ld=yes
-+ else
-+ enable_espf_ld=no
-+ fi
-+ ;;
-+ *-*-linux*)
-+ if test x$gcc_cv_ld_relro = xyes && test x$gcc_cv_ld_now = xyes; then
-+ enable_espf_ld=yes
-+ else
-+ enable_espf_ld=no
-+ fi
-+ ;;
-+ *)
-+ enable_espf_ld=no
-+ ;;
-+ esac
-+else
-+ enable_espf_ld=no
-+fi
-+if test x$enable_espf_ld = xyes; then
-+
-+cat >>confdefs.h <<\_ACEOF
-+#define ENABLE_ESPF 1
-+_ACEOF
-+
-+fi
-+if test x$enable_espf = xyes && test x$enable_espf_ld = xno; then
-+ { { echo "$as_me:$LINENO: error: *** --enable-espf is not supported. You don't have -z,relro or -z,now support in the linker." >&5
-+echo "$as_me: error: *** --enable-espf is not supported. You don't have -z,relro or -z,now support in the linker." >&2;}
-+ { (exit 1); exit 1; }; }
-+fi
-+
-+echo "$as_me:$LINENO: checking for crtbeginTS.o support" >&5
-+echo $ECHO_N "checking for crtbeginTS.o support... $ECHO_C" >&6
-+if test "${enable_crtbeginTS+set}" = set; then
-+ echo $ECHO_N "(cached) $ECHO_C" >&6
-+else
-+
-+if test x$enable_espf = xyes ; then
-+ case "$target" in
-+ ia64*-*-linux*)
-+ enable_crtbeginTS=no ;;
-+ *-*-linux*)
-+ if test x$gcc_cv_ld_pie = xyes && test x$lt_cv_prog_compiler_static_works = xyes; then
-+ enable_crtbeginTS=yes
-+ fi
-+ ;;
-+ *) enable_crtbeginTS=no ;;
-+ esac
-+fi
-+
-+fi
-+echo "$as_me:$LINENO: result: $enable_crtbeginTS" >&5
-+echo "${ECHO_T}$enable_crtbeginTS" >&6
-+
-+if test x$enable_crtbeginTS = xyes; then
-+
-+cat >>confdefs.h <<\_ACEOF
-+#define ENABLE_CRTBEGINTS 1
-+_ACEOF
-+
-+fi
-+
- # Check if TFmode long double should be used by default or not.
- # Some glibc targets used DFmode long double, but with glibc 2.4
- # and later they can use TFmode.
---- libmudflap/configure 2009-12-05 12:18:53.000000000 -0500
-+++ libmudflap/configure 2010-02-07 14:29:51.000000000 -0500
-@@ -652,6 +652,7 @@
- MAINTAINER_MODE_FALSE
- MAINTAINER_MODE_TRUE
- am__untar
-+enable_espf
- am__tar
- AMTAR
- am__leading_dot
diff --git a/espf-gcc-4.5.0/11_all_gcc44_config.in.patch b/espf-gcc-4.5.0/11_all_gcc44_config.in.patch
deleted file mode 100644
index c234e91..0000000
--- a/espf-gcc-4.5.0/11_all_gcc44_config.in.patch
+++ /dev/null
@@ -1,49 +0,0 @@
-2009-09-18 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config.in Add ENABLE_CRTBEGINTS, ENABLE_ESPF and
- TARGET_LIBC_PROVIDES_FORTIFY2.
-
- On Gentoo
- * gcc/config.in We don't need to add TARGET_LIBC_PROVIDES_FORTIFY2.
-
---- gcc/config.in 2009-04-21 11:08:08.000000000 +0200
-+++ gcc/config.in 2009-05-12 00:10:08.000000000 +0200
-@@ -46,6 +46,12 @@
- #endif
-
-
-+/* Define to 1 to enable crtbeginTS.o. */
-+#ifndef USED_FOR_TARGET
-+#undef ENABLE_CRTBEGINTS
-+#endif
-+
-+
- /* Define to 1 to specify that we are using the BID decimal floating point
- format instead of DPD */
- #ifndef USED_FOR_TARGET
-@@ -65,6 +65,12 @@
- #endif
-
-
-+/* Define to 1 to enable espf. */
-+#ifndef USED_FOR_TARGET
-+#undef ENABLE_ESPF
-+#endif
-+
-+
- /* Define to 1 to enable fixed-point arithmetic extension to C. */
- #ifndef USED_FOR_TARGET
- #undef ENABLE_FIXED_POINT
-@@ -912,6 +924,12 @@
- #endif
-
-
-+/* Define to 1 if your compiler supports -fstack-protector */
-+#ifndef USED_FOR_TARGET
-+#undef HAVE_GCC_SSP
-+#endif
-+
-+
- /* Define to 1 if you have the `getchar_unlocked' function. */
- #ifndef USED_FOR_TARGET
- #undef HAVE_GETCHAR_UNLOCKED
diff --git a/espf-gcc-4.5.0/12_all_gcc45_Makefile.in.patch b/espf-gcc-4.5.0/12_all_gcc45_Makefile.in.patch
deleted file mode 100644
index ba50609..0000000
--- a/espf-gcc-4.5.0/12_all_gcc45_Makefile.in.patch
+++ /dev/null
@@ -1,200 +0,0 @@
-2009-09-20 Magnus Granberg <zorry@gentoo.org> Anthony G. Basile <basile@opensource.dyc.edu>
-
- * Makefile.in We add -fno-stack-protector to
- BOOT_CFLAGS, LIBCFLAGS and LIBCXXFLAGS if enable_espf yes.
- * gcc/Makefile.in Add -fno-PIE and -fno-stack-protector.
- Libgcc2 doesn't compile with -fstack-protector.
- Crtstuff doesn't compile with -fPIE and -fstack-protector.
- Add crtbeginTS.o to EXTRA_PARTS if enable_crtbeginTS yes
- We add new file crtbeginTS.o if enable_crtbeginTS yes
- * libgcc/Makefile.in Add crtbeginTS.o to EXTRA_PARTS if enable_crtbeginTS yes
- We add new file crtbeginTS.o if enable_crtbeginTS yes
-
-2009-07-21 Magnus Granberg <zorry@ume.nu>, Kees Cook <kees@outflux.net>
-
- LP #344502
- * libmudflap/Makefiles.in Add -fno-stack-protector -U_FORTIFY_SOURCE
- to AM_CFLAGS if enable_espf yes.
-
---- Makefile.in 2010-01-22 08:35:38.000000000 -0500
-+++ Makefile.in 2010-02-07 15:10:59.000000000 -0500
-@@ -350,9 +350,17 @@
- BUILD_PREFIX = @BUILD_PREFIX@
- BUILD_PREFIX_1 = @BUILD_PREFIX_1@
-
-+# Some stuff don't compile with SSP
-+enable_espf = @enable_espf@
-+ifeq ($(enable_espf),yes)
-+ESPF_NOSSP_CFLAGS = -fno-stack-protector
-+else
-+ESPF_NOSSP_CFLAGS=
-+endif
-+
- # Flags to pass to stage2 and later makes. They are defined
- # here so that they can be overridden by Makefile fragments.
--BOOT_CFLAGS= -g -O2
-+BOOT_CFLAGS= -g -O2 $(ESPF_NOSSP_CFLAGS)
- BOOT_LDFLAGS=
- BOOT_ADAFLAGS=-gnatpg -gnata
-
-@@ -397,9 +405,9 @@
-
- CFLAGS = @CFLAGS@
- LDFLAGS = @LDFLAGS@
--LIBCFLAGS = $(CFLAGS)
-+LIBCFLAGS = $(CFLAGS) $(ESPF_NOSSP_CFLAGS)
- CXXFLAGS = @CXXFLAGS@
--LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates
-+LIBCXXFLAGS = $(CXXFLAGS) -fno-implicit-templates $(ESPF_NOSSP_CFLAGS)
-
- TFLAGS =
-
---- gcc/Makefile.in 2010-01-22 17:22:51.000000000 -0500
-+++ gcc/Makefile.in 2010-02-07 15:15:13.000000000 -0500
-@@ -629,13 +629,24 @@
- INHIBIT_LIBC_CFLAGS = -Dinhibit_libc
- endif
-
-+# We don't want __stack_chk_fail in crt* and libgcc2.a.
-+# We don't want to compile crtbegin, crtend and crtbeginT with -fPIE.
-+enable_espf = @enable_espf@
-+ifeq ($(enable_espf),yes)
-+ESPF_NOPIE_CFLAGS = -fno-PIE
-+ESPF_NOSSP_CFLAGS = -fno-stack-protector
-+else
-+ESPF_NOPIE_CFLAGS=
-+ESPF_NOSSP_CFLAGS=
-+endif
-+
- # Options to use when compiling libgcc2.a.
- #
- LIBGCC2_DEBUG_CFLAGS = -g
- LIBGCC2_CFLAGS = -O2 $(LIBGCC2_INCLUDES) $(GCC_CFLAGS) $(TARGET_LIBGCC2_CFLAGS) \
- $(LIBGCC2_DEBUG_CFLAGS) $(GTHREAD_FLAGS) \
- -DIN_LIBGCC2 -D__GCC_FLOAT_NOT_NEEDED \
-- $(INHIBIT_LIBC_CFLAGS)
-+ $(INHIBIT_LIBC_CFLAGS) $(ESPF_NOSSP_CFLAGS)
-
- # Additional options to use when compiling libgcc2.a.
- # Some targets override this to -isystem include
-@@ -648,7 +659,7 @@
- CRTSTUFF_CFLAGS = -O2 $(GCC_CFLAGS) $(INCLUDES) $(MULTILIB_CFLAGS) -g0 \
- -finhibit-size-directive -fno-inline -fno-exceptions \
- -fno-zero-initialized-in-bss -fno-toplevel-reorder -fno-tree-vectorize \
-- $(INHIBIT_LIBC_CFLAGS)
-+ $(INHIBIT_LIBC_CFLAGS) $(ESPF_NOSSP_CFLAGS)
-
- # Additional sources to handle exceptions; overridden by targets as needed.
- LIB2ADDEH = $(srcdir)/unwind-dw2.c $(srcdir)/unwind-dw2-fde.c \
-@@ -678,6 +689,12 @@
- # The rules for compiling them should be in the t-* file for the machine.
- EXTRA_PARTS = @extra_parts@
-
-+# We add crtbeginTS.o to the EXTRA_PARTS list if enable_crtbeginTS = yes
-+enable_crtbeginTS = @enable_crtbeginTS@
-+ifeq ($(enable_crtbeginTS),yes)
-+EXTRA_PARTS += crtbeginTS.o
-+endif
-+
- # List of extra object files that should be compiled and linked with
- # compiler proper (cc1, cc1obj, cc1plus).
- EXTRA_OBJS = @extra_objs@
-@@ -1856,9 +1873,10 @@
- echo LIBGCC_SYNC = '$(LIBGCC_SYNC)' >> tmp-libgcc.mvars
- echo LIBGCC_SYNC_CFLAGS = '$(LIBGCC_SYNC_CFLAGS)' >> tmp-libgcc.mvars
- echo CRTSTUFF_CFLAGS = '$(CRTSTUFF_CFLAGS)' >> tmp-libgcc.mvars
-- echo CRTSTUFF_T_CFLAGS = '$(CRTSTUFF_T_CFLAGS)' >> tmp-libgcc.mvars
-+ echo CRTSTUFF_T_CFLAGS = '$(CRTSTUFF_T_CFLAGS) $(ESPF_NOPIE_CFLAGS)' >> tmp-libgcc.mvars
- echo CRTSTUFF_T_CFLAGS_S = '$(CRTSTUFF_T_CFLAGS_S)' >> tmp-libgcc.mvars
- echo TARGET_SYSTEM_ROOT = '$(TARGET_SYSTEM_ROOT)' >> tmp-libgcc.mvars
-+ echo enable_crtbeginTS = '$(enable_crtbeginTS)' >> tmp-libgcc.mvars
-
- mv tmp-libgcc.mvars libgcc.mvars
-
-@@ -1892,12 +1910,14 @@
- $(T)crtbegin.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
- gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
- $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS) \
-+ $(ESPF_NOPIE_CFLAGS) \
- -c $(srcdir)/crtstuff.c -DCRT_BEGIN \
- -o $(T)crtbegin$(objext)
-
- $(T)crtend.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
- gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
- $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS) \
-+ $(ESPF_NOPIE_CFLAGS) \
- -c $(srcdir)/crtstuff.c -DCRT_END \
- -o $(T)crtend$(objext)
-
-@@ -1918,9 +1938,19 @@
- $(T)crtbeginT.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
- gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
- $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS) \
-+ $(ESPF_NOPIE_CFLAGS) \
- -c $(srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O \
- -o $(T)crtbeginT$(objext)
-
-+# This is a version of crtbegin for -static -fPIE links if espf is enable.
-+ifeq ($(enable_crtbeginTS),yes)
-+$(T)crtbeginTS.o: crtstuff.c $(GCC_PASSES) $(TCONFIG_H) auto-host.h \
-+ gbl-ctors.h stmp-int-hdrs tsystem.h coretypes.h $(TM_H)
-+ $(GCC_FOR_TARGET) $(CRTSTUFF_CFLAGS) $(CRTSTUFF_T_CFLAGS_S) \
-+ -c $(srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O -DCRTSTUFFS_O \
-+ -o $(T)crtbeginTS$(objext)
-+endif
-+
- # Compile the start modules crt0.o and mcrt0.o that are linked with
- # every program
- $(T)crt0.o: s-crt0 ; @true
---- libgcc/Makefile.in 2009-07-30 18:33:49.000000000 -0400
-+++ libgcc/Makefile.in 2010-02-07 15:10:59.000000000 -0500
-@@ -291,6 +291,12 @@
- gen-hide-list = echo > \$@
- endif
-
-+# We add crtbeginTS.o to the EXTRA_PARTS list if enable_crtbeginTS = yes
-+enable_libgcc_crtbeginTS = $(enable_crtbeginTS)
-+ifeq ($(enable_libgcc_crtbeginTS),yes)
-+EXTRA_PARTS += crtbeginTS.o
-+endif
-+
- ifneq ($(EXTRA_PARTS),)
- extra-parts = libgcc-extra-parts
- INSTALL_PARTS = $(EXTRA_PARTS)
-@@ -842,6 +848,13 @@
- crtbeginT.o: $(gcc_srcdir)/crtstuff.c
- $(crt_compile) $(CRTSTUFF_T_CFLAGS) \
- -c $(gcc_srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O
-+
-+# This is a version of crtbegin for -static -fPIE links.
-+ifeq ($(enable_libgcc_crtbeginTS),yes)
-+crtbeginTS.o: $(gcc_srcdir)/crtstuff.c
-+ $(crt_compile) $(CRTSTUFF_T_CFLAGS_S) \
-+ -c $(gcc_srcdir)/crtstuff.c -DCRT_BEGIN -DCRTSTUFFT_O -DCRTSTUFFS_O
-+endif
- endif
-
- # Build extra startfiles in the libgcc directory.
---- libmudflap/Makefile.in 2009-12-05 12:18:53.000000000 -0500
-+++ libmudflap/Makefile.in 2010-02-07 15:10:59.000000000 -0500
-@@ -304,10 +304,18 @@
- MAINT_CHARSET = latin1
- SUBDIRS = testsuite
-
-+# Some stuff don't compile with PIE or SSP
-+enable_espf = @enable_espf@
-+ifeq ($(enable_espf),yes)
-+NO_ESPF_CFLAGS = -fno-stack-protector -U_FORTIFY_SOURCE
-+else
-+NO_ESPF_CFLAGS =
-+endif
-+
- # May be used by various substitution variables.
- gcc_version := $(shell cat $(top_srcdir)/../gcc/BASE-VER)
--AM_CFLAGS = -Wall $(SECTION_FLAGS)
--@LIBMUDFLAPTH_FALSE@libmudflapth =
-+AM_CFLAGS = -Wall $(SECTION_FLAGS) $(NO_ESPF_CFLAGS)
-+@LIBMUDFLAPTH_FALSE@libmudflapth =
- @LIBMUDFLAPTH_TRUE@libmudflapth = libmudflapth.la
- toolexeclib_LTLIBRARIES = libmudflap.la $(libmudflapth)
- libsubincludedir = $(libdir)/gcc/$(target_noncanonical)/$(gcc_version)/include
diff --git a/espf-gcc-4.5.0/20_all_gcc45_gcc.c.patch b/espf-gcc-4.5.0/20_all_gcc45_gcc.c.patch
deleted file mode 100644
index 0a7c850..0000000
--- a/espf-gcc-4.5.0/20_all_gcc45_gcc.c.patch
+++ /dev/null
@@ -1,146 +0,0 @@
-2009-07-18 Magnus Granberg <zorry@ume.nu>
-
- * gcc/gcc.c include: espf.h
- #ifdef EXTRA_SPECS: Add ESPF_EXTRA_SPECS
- main(): Add do_self_spec espf_command_options_spec()
-
-2010-04-10 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>,
- Anthony G. Basile <basile@opensource.dyc.edu>
-
- LP #346126
- * gcc/gcc.c *cpp_options Add %(espf_cpp_options)
-
- * gcc/gcc.c default_compilers[] Add %(espf_options)
- *cpp_unique_options Add %(espf_cpp_unique_options)
-
-2010-04-10 Magnus Granberg <zorry@gentoo.org>
-
- *gcc/gcc.c Gentoo changes
- static const char *cc1_spec We set that in espf.h if ENABLE_ESPF.
- *cpp_unique_options Remove espf_cpp_unique_options. (-D_FORTIFY_SOURCE=2)
- *cc1_options Add espf_options_pie_check if ENABLE_ESPF.
-
---- gcc-4.5-20100128.orig/gcc/gcc.c 2010-01-21 10:29:30.000000000 -0500
-+++ gcc-4.5-20100128/gcc/gcc.c 2010-01-29 23:29:16.000000000 -0500
-@@ -84,6 +84,7 @@
- #include "gcc.h"
- #include "flags.h"
- #include "opts.h"
-+#include "espf.h" /* for --enable-espf support */
-
- #ifdef HAVE_MMAP_FILE
- # include <sys/mman.h>
-@@ -822,7 +823,9 @@
-
- static const char *asm_debug;
- static const char *cpp_spec = CPP_SPEC;
-+#ifndef ENABLE_ESPF
- static const char *cc1_spec = CC1_SPEC;
-+#endif
- static const char *cc1plus_spec = CC1PLUS_SPEC;
- static const char *link_gcc_c_sequence_spec = LINK_GCC_C_SEQUENCE_SPEC;
- static const char *link_ssp_spec = LINK_SSP_SPEC;
-@@ -885,7 +888,7 @@
- static const char *cpp_options =
- "%(cpp_unique_options) %1 %{m*} %{std*&ansi&trigraphs} %{W*&pedantic*} %{w}\
- %{f*} %{g*:%{!g0:%{g*} %{!fno-working-directory:-fworking-directory}}} %{O*}\
-- %{undef} %{save-temps*:-fpch-preprocess}";
-+ %{undef} %{save-temps*:-fpch-preprocess} %(espf_cpp_options)";
-
- /* This contains cpp options which are not passed when the preprocessor
- output will be used by another program. */
-@@ -893,6 +896,9 @@
-
- /* NB: This is shared amongst all front-ends, except for Ada. */
- static const char *cc1_options =
-+#ifdef ENABLE_ESPF
-+"%(espf_options_pie_check)"
-+#endif
- "%{pg:%{fomit-frame-pointer:%e-pg and -fomit-frame-pointer are incompatible}}\
- %1 %{!Q:-quiet} %{!dumpbase:-dumpbase %B} %{d*} %{m*} %{a*}\
- %{fcompare-debug-second:%:compare-debug-auxbase-opt(%b)} \
-@@ -1075,15 +1081,15 @@
- %{save-temps*|traditional-cpp|no-integrated-cpp:%(trad_capable_cpp) \
- %(cpp_options) -o %{save-temps*:%b.i} %{!save-temps*:%g.i} \n\
- cc1 -fpreprocessed %{save-temps*:%b.i} %{!save-temps*:%g.i} \
-- %(cc1_options)}\
-+ %(cc1_options) %(espf_options)}\
- %{!save-temps*:%{!traditional-cpp:%{!no-integrated-cpp:\
-- cc1 %(cpp_unique_options) %(cc1_options)}}}\
-+ cc1 %(cpp_unique_options) %(cc1_options) %(espf_options)}}}\
- %{!fsyntax-only:%(invoke_as)}} \
- %{combine:\
- %{save-temps*|traditional-cpp|no-integrated-cpp:%(trad_capable_cpp) \
- %(cpp_options) -o %{save-temps*:%b.i} %{!save-temps*:%g.i}}\
- %{!save-temps*:%{!traditional-cpp:%{!no-integrated-cpp:\
-- cc1 %(cpp_unique_options) %(cc1_options)}}\
-+ cc1 %(cpp_unique_options) %(cc1_options) %(espf_options)}}\
- %{!fsyntax-only:%(invoke_as)}}}}}}", 0, 1, 1},
- {"-",
- "%{!E:%e-E or -x required when input is from standard input}\
-@@ -1106,7 +1112,7 @@
- %W{o*:--output-pch=%*}%V}}}}}}", 0, 0, 0},
- {".i", "@cpp-output", 0, 1, 0},
- {"@cpp-output",
-- "%{!M:%{!MM:%{!E:cc1 -fpreprocessed %i %(cc1_options) %{!fsyntax-only:%(invoke_as)}}}}", 0, 1, 0},
-+ "%{!M:%{!MM:%{!E:cc1 -fpreprocessed %i %(cc1_options) %(espf_options) %{!fsyntax-only:%(invoke_as)}}}}", 0, 1, 0},
- {".s", "@assembler", 0, 1, 0},
- {"@assembler",
- "%{!M:%{!MM:%{!E:%{!S:as %(asm_debug) %(asm_options) %i %A }}}}", 0, 1, 0},
-@@ -1699,18 +1705,23 @@
- INIT_STATIC_SPEC ("sysroot_hdrs_suffix_spec", &sysroot_hdrs_suffix_spec),
- };
-
--#ifdef EXTRA_SPECS /* additional specs needed */
-+/* EXTRA_SPECS needs to be defined */
-+#ifndef EXTRA_SPECS
-+#define EXTRA_SPECS
-+#endif
-+
-+/* EXTRA_SPECS and ESPF_EXTRA_SPECS add additional specs */
- /* Structure to keep track of just the first two args of a spec_list.
-- That is all that the EXTRA_SPECS macro gives us. */
-+ That is all that the EXTRA_SPECS and ESPF_EXTRA_SPECS macro gives us. */
- struct spec_list_1
- {
- const char *const name;
- const char *const ptr;
- };
-
--static const struct spec_list_1 extra_specs_1[] = { EXTRA_SPECS };
-+/* ESPF_EXTRA_SPECS before EXTRA_SPECS */
-+static const struct spec_list_1 extra_specs_1[] = { ESPF_EXTRA_SPECS, EXTRA_SPECS };
- static struct spec_list *extra_specs = (struct spec_list *) 0;
--#endif
-
- /* List of dynamically allocates specs that have been defined so far. */
-
-@@ -1798,7 +1809,6 @@
- if (verbose_flag)
- notice ("Using built-in specs.\n");
-
--#ifdef EXTRA_SPECS
- extra_specs = XCNEWVEC (struct spec_list, ARRAY_SIZE (extra_specs_1));
-
- for (i = ARRAY_SIZE (extra_specs_1) - 1; i >= 0; i--)
-@@ -1811,7 +1821,6 @@
- sl->ptr_spec = &sl->ptr;
- next = sl;
- }
--#endif
-
- for (i = ARRAY_SIZE (static_specs) - 1; i >= 0; i--)
- {
-@@ -7096,6 +7123,12 @@
- gcc_exec_prefix = concat (gcc_exec_prefix, spec_machine, dir_separator_str,
- spec_version, dir_separator_str, NULL);
-
-+#ifdef ENABLE_ESPF
-+ /* Process ESPF_COMMAND_OPTIONS_SPEC, adding any new options to the end
-+ of the command line. */
-+ do_self_spec (espf_command_options_spec);
-+#endif
-+
- /* Now we have the specs.
- Set the `valid' bits for switches that match anything in any spec. */
-
diff --git a/espf-gcc-4.5.0/21_all_gcc44_decl-tls-model.patch b/espf-gcc-4.5.0/21_all_gcc44_decl-tls-model.patch
deleted file mode 100644
index d40b3dc..0000000
--- a/espf-gcc-4.5.0/21_all_gcc44_decl-tls-model.patch
+++ /dev/null
@@ -1,20 +0,0 @@
-2009-06-13 Magnus Granberg <zorry@ume.nu>
-
- b.g.o #232601
- * gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib.
-
---- gcc/varasm.c 2009-03-17 21:18:21.000000000 +0100
-+++ gcc/varasm.c 2009-04-29 03:10:09.000000000 +0200
-@@ -5607,7 +5607,11 @@
- bool is_local;
-
- is_local = targetm.binds_local_p (decl);
-- if (!flag_shlib)
-+ #ifdef ENABLE_ESPF
-+ if (!flag_pic)
-+ #else
-+ if (!flag_shlib)
-+ #endif
- {
- if (is_local)
- kind = TLS_MODEL_LOCAL_EXEC;
diff --git a/espf-gcc-4.5.0/30_all_gcc44_espf.h.patch b/espf-gcc-4.5.0/30_all_gcc44_espf.h.patch
deleted file mode 100644
index 70ce8ff..0000000
--- a/espf-gcc-4.5.0/30_all_gcc44_espf.h.patch
+++ /dev/null
@@ -1,156 +0,0 @@
-2010-04-09 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/espf.h New file to support --enable-espf
- Version 20100409.1
-
---- gcc/espf.h 2010-04-09 16:14:00.000000000 +0200
-+++ gcc/espf.h 2010-04-09 16:24:01.000000000 +0200
-@@ -0,0 +1,148 @@
-+/* License terms see GNU GENERAL PUBLIC LICENSE Version 3.
-+ * Version 20100409.1
-+ * Magnus Granberg (Zorry) <zorry@gentoo.org> */
-+#ifndef GCC_ESPF_H
-+#define GCC_ESPF_H
-+
-+/* This file will add -fstack-protector, -fPIE, -pie -D_FORTIFY_SOURCES=2 -z,relro and -z,now
-+ as default if the defines and the spec allow it.
-+
-+ On Gentoo
-+ Added a hack for gcc-specs-* in toolchain-funcs.eclass and _filter-hardened in flag-o-matic.eclass
-+ to support older hardened GCC patches and we don't need to change the code on gcc-specs-* and _filter-hardened.
-+ We use -fstack-protector-all instead of -fstack-protector
-+ This will add some unsupported upstream commands options as -nopie.
-+ -D__KERNEL__ is added so we don't have -fPIE and -fstack-protector-all when building kernels.
-+ ESPF_CC1_SPEC is added to CC1_SPEC.
-+ -D_FORTIFY_SOURCES=2 is added with gentoo's patchset as default so no need to set it hear.
-+ ESPF_LINK_SPEC will not add -z,relro as it default on with binutils.
-+ ESPF_CC1_STRICT_SPEC is added so we don't use gcc/opts.c to disable it.
-+ ESPF_OPTIONS_PIE_CHECK_SPEC check for -pie, -p, -pg, -profile, -static and -shared.
-+ ENABLE_CRTBEGINTS add support for crtbeginTS.o, build -static with -fPIE or -fpie.
-+*/
-+#ifdef ENABLE_ESPF
-+
-+ /* Hack to support gcc-specs-* in toolchain-funcs.eclass and _filter-hardened in flag-o-matic.eclass */
-+ #define ESPF_CC1_SPEC " %(espf_cc1_ssp) %(espf_cc1_pie) %(espf_cc1_strict)"
-+ #ifdef HAVE_GCC_SSP
-+ #define ESPF_CC1_SSP_SPEC "%{!fno-stack-protector: %{!fno-stack-protector-all: }}"
-+ #else
-+ #define ESPF_CC1_SSP_SPEC ""
-+ #endif
-+ #define ESPF_CC1_PIE_SPEC "%{!nopie: }"
-+ #define ESPF_CC1_STRICT_SPEC "%{!fstrict-overflow:%{!fno-strict-overflow: -fno-strict-overflow}}"
-+
-+ /* ESPF_LINK_SPEC is added to LINK_PIE_SPEC if espf is enable
-+ -z now will be added if we don't have -vanilla spec */
-+ #define ESPF_LINK_SPEC "%(espf_link_now)"
-+ #define ESPF_LINK_NOW_SPEC "%{!now:-z now}"
-+
-+ /* ESPF_OPTIONS_SPEC is added to the compiler spec in gcc/gcc.c */
-+ #define ESPF_OPTIONS_SPEC "%(espf_options_ssp)"
-+
-+ /* ESPF_CPP_OPTIONS_SPEC is added to the cpp_options spec in gcc/gcc.c
-+ For precompiling headers. */
-+ #define ESPF_CPP_OPTIONS_SPEC "%(espf_options_ssp)"
-+
-+ /* This will add -fstack-protector-all if we don't have -nostdlib -nodefaultlibs -fno-stack-protector -fstack-protector
-+ -fstack-protector-all and we have TARGET_LIBC_PROVIDES_SSP and HAVE_GCC_SSP defined. */
-+ #ifdef HAVE_GCC_SSP
-+ #define ESPF_OPTIONS_SSP_SPEC \
-+ "%{!D__KERNEL__:%{!nostdlib:%{!nodefaultlibs: %{!fno-stack-protector: \
-+ %{!fstack-protector:%{!fstack-protector-all:-fstack-protector-all}}}}}}"
-+ #else
-+ #define ESPF_OPTIONS_SSP_SPEC ""
-+ #endif
-+
-+ /* If HAVE_LD_PIE not defined we will not add any -fPIE -pie */
-+ #ifdef HAVE_LD_PIE
-+
-+ /* We use ESPF_COMMAND_OPTIONS_SPEC to add pie command-line options. */
-+ #define ESPF_COMMAND_OPTIONS_SPEC "%{!D__KERNEL__:%{!nopie:%(espf_options_pie) %(espf_link_pie)}}"
-+
-+ /* This will add -fPIE if we don't have -pie -fpic -fPIC -fpie -fPIE -fno-pic -fno-PIC -fno-pie -fno-PIE -shared -static
-+ -nostdlib -nostartfiles. */
-+ /* With ENABLE_CRTBEGINTS we don't need to check for -static */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define ESPF_OPTIONS_PIE_SPEC \
-+ "%{!pie: %{!fpic:%{!fPIC:%{!fpie:%{!fPIE: %{!fno-pic:%{!fno-PIC:%{!fno-pie:%{!fno-PIE: \
-+ %{!shared: %{!nostdlib: %{!nostartfiles:-fPIE}} } }}}} }}}} }"
-+ #else
-+ #define ESPF_OPTIONS_PIE_SPEC \
-+ "%{!pie: %{!fpic:%{!fPIC:%{!fpie:%{!fPIE: %{!fno-pic:%{!fno-PIC:%{!fno-pie:%{!fno-PIE: \
-+ %{!shared: %{!static: %{!nostdlib: %{!nostartfiles:-fPIE}} } }}}} }}}} }}"
-+ #endif
-+
-+ /* This will add -pie if we don't have -pie -A -fno-pic -fno-PIC -fno-pie -fno-PIE -shared -static -r -nostdlib
-+ -nostartfiles */
-+ /* With ENABLE_CRTBEGINTS we don't need to check for -static
-+ and we add -pie only to get the start and endfiles. -pie will not go to the linker. */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define ESPF_LINK_PIE_SPEC \
-+ "%{!pie:%{!A:%{!fno-pie:%{!fno-PIE:%{!fno-pic:%{!fno-PIC:%{!shared:%{!r: \
-+ %{!nostdlib:%{!nostartfiles:-pie}}}}}}}}}}"
-+ #else
-+ #define ESPF_LINK_PIE_SPEC \
-+ "%{!pie:%{!A:%{!fno-pie:%{!fno-PIE:%{!fno-pic:%{!fno-PIC:%{!shared:%{!static:%{!r: \
-+ %{!nostdlib:%{!nostartfiles:-pie}}}}}}}}}}}"
-+ #endif
-+
-+ /* This will check if shared is set when -static -pie -fPIE -fpie -fno-PIC -fno-pic, -pie is set when -static -pg -p -profile.
-+ If set it will make gcc print out "-shared and -static|pie|fPIE|fpie|fno-PIC|fno-pic are incompatible" or
-+ "-pie and pg|p|profile are incompatible" */
-+ /* With ENABLE_CRTBEGINTS we don't need to check for -static */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define ESPF_OPTIONS_PIE_CHECK_SPEC \
-+ "%{shared:%{static|pie|fPIE|fpie|fno-PIC|fno-pic:%e-shared and -static|pie|fPIE|fpie|fno-PIC|fno-pic are incompatible}} \
-+ %{pie:%{pg|p|profile:%e-pie and -pg|p|profile are incompatible}}"
-+ #else
-+ #define ESPF_OPTIONS_PIE_CHECK_SPEC \
-+ "%{shared:%{static|pie|fPIE|fpie|fno-PIC|fno-pic:%e-shared and -static|pie|fPIE|fpie|fno-PIC|fno-pic are incompatible}} \
-+ %{pie:%{static|pg|p|profile:%e-pie and -static|pg|p|profile are incompatible}}"
-+ #endif
-+
-+ /* We don't pass -pie to the linker when -static */
-+ #ifdef ENABLE_CRTBEGINTS
-+ #define LINK_PIE_SPEC "%{!static:%{pie:-pie}} %(espf_link) "
-+ #else
-+ #define LINK_PIE_SPEC "%{pie:-pie} %(espf_link) "
-+ #endif
-+
-+ #else
-+ #define ESPF_OPTIONS_PIE_SPEC ""
-+ #define ESPF_OPTIONS_PIE_CHECK_SPEC ""
-+ #define ESPF_LINK_PIE_SPEC ""
-+ #define LINK_PIE_SPEC "%{pie:-pie} %(espf_link) "
-+ #endif
-+
-+ /* We add extra spec name's to the EXTRA_SPECS list */
-+ #define ESPF_EXTRA_SPECS \
-+ { "espf_cc1", ESPF_CC1_SPEC }, \
-+ { "espf_cc1_pie", ESPF_CC1_PIE_SPEC }, \
-+ { "espf_cc1_ssp", ESPF_CC1_SSP_SPEC }, \
-+ { "espf_cc1_strict", ESPF_CC1_STRICT_SPEC }, \
-+ { "espf_link", ESPF_LINK_SPEC }, \
-+ { "espf_link_now", ESPF_LINK_NOW_SPEC }, \
-+ { "espf_link_pie", ESPF_LINK_PIE_SPEC }, \
-+ { "espf_command_options", ESPF_COMMAND_OPTIONS_SPEC }, \
-+ { "espf_cpp_options", ESPF_CPP_OPTIONS_SPEC }, \
-+ { "espf_options", ESPF_OPTIONS_SPEC }, \
-+ { "espf_options_pie", ESPF_OPTIONS_PIE_SPEC }, \
-+ { "espf_options_pie_check", ESPF_OPTIONS_PIE_CHECK_SPEC }, \
-+ { "espf_options_ssp", ESPF_OPTIONS_SSP_SPEC }
-+
-+ static const char *espf_command_options_spec = ESPF_COMMAND_OPTIONS_SPEC;
-+ static const char *cc1_spec = CC1_SPEC ESPF_CC1_SPEC;
-+
-+#else /* If not ESPF_ENABLE defined do this. */
-+
-+ #define ESPF_OPTIONS_SPEC ""
-+ #define ESPF_CPP_OPTIONS_SPEC ""
-+
-+ /* We add extra spec name's to the EXTRA_SPECS list */
-+ #define ESPF_EXTRA_SPECS \
-+ { "espf_options", ESPF_OPTIONS_SPEC }, \
-+ { "espf_cpp_options", ESPF_CPP_OPTIONS_SPEC }
-+
-+#endif
-+#endif /* End GCC_ESPF_H */
diff --git a/espf-gcc-4.5.0/33_all_gcc44_config_rs6000_linux64.h.patch b/espf-gcc-4.5.0/33_all_gcc44_config_rs6000_linux64.h.patch
deleted file mode 100644
index b9fed34..0000000
--- a/espf-gcc-4.5.0/33_all_gcc44_config_rs6000_linux64.h.patch
+++ /dev/null
@@ -1,16 +0,0 @@
-2009-09-23 Peter S. Mazinger <ps.m@gmx.net>
-
- * gcc/config/rs6000/linux64.h ASM_SPEC32 Change %{fpic:-K PIC} %{fPIC:-K PIC}
- to %{fpic|fPIC|fpie|fPIE:-K PIC}
-
---- gcc/config/rs6000/linux64.h.psm 2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/rs6000/linux64.h 2009-09-23 12:34:26.000000000 +0200
-@@ -156,7 +156,7 @@
- #endif
-
- #define ASM_SPEC32 "-a32 %{n} %{T} %{Ym,*} %{Yd,*} \
--%{mrelocatable} %{mrelocatable-lib} %{fpic:-K PIC} %{fPIC:-K PIC} \
-+%{mrelocatable} %{mrelocatable-lib} %{fpic|fPIC|fpie|fPIE:-K PIC} \
- %{memb} %{!memb: %{msdata: -memb} %{msdata=eabi: -memb}} \
- %{!mlittle: %{!mlittle-endian: %{!mbig: %{!mbig-endian: \
- %{mcall-freebsd: -mbig} \
diff --git a/espf-gcc-4.5.0/33_all_gcc45_config_rs6000_linux64.h.patch b/espf-gcc-4.5.0/33_all_gcc45_config_rs6000_linux64.h.patch
deleted file mode 100644
index 447b2f1..0000000
--- a/espf-gcc-4.5.0/33_all_gcc45_config_rs6000_linux64.h.patch
+++ /dev/null
@@ -1,16 +0,0 @@
-2009-09-23 Peter S. Mazinger <ps.m@gmx.net>
-
- * gcc/config/rs6000/linux64.h ASM_SPEC32 Change %{fpic:-K PIC} %{fPIC:-K PIC}
- to %{fpic|fPIC|fpie|fPIE:-K PIC}
-
---- gcc/config/rs6000/linux64.h.psm 2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/rs6000/linux64.h 2009-09-23 12:34:26.000000000 +0200
-@@ -156,7 +156,7 @@
- #endif
-
- #define ASM_SPEC32 "-a32 %{n} %{T} %{Ym,*} %{Yd,*} \
--%{mrelocatable} %{mrelocatable-lib} %{fpic:-K PIC} %{fPIC:-K PIC} \
-+%{mrelocatable} %{mrelocatable-lib} %{fpic|fPIC|fpie|fPIE:-K PIC} \
- %{memb} %{!memb: %{msdata=eabi: -memb}} \
- %{!mlittle: %{!mlittle-endian: %{!mbig: %{!mbig-endian: \
- %{mcall-freebsd: -mbig} \
diff --git a/espf-gcc-4.5.0/35_all_gcc44_config_crtbegints.patch b/espf-gcc-4.5.0/35_all_gcc44_config_crtbegints.patch
deleted file mode 100644
index f1e6532..0000000
--- a/espf-gcc-4.5.0/35_all_gcc44_config_crtbegints.patch
+++ /dev/null
@@ -1,36 +0,0 @@
-2009-09-25 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/linux.h If ENABLE_CRTBEGINTS, -static and -pie use crtbegineTS.o.
- * gcc/config/rs6000/sysv4.h If ENABLE_CRTBEGINTS, -static and -pie use crtbegineTS.o.
-
---- gcc/config/linux.h 2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/linux.h 2009-09-08 04:08:06.000000000 +0200
-@@ -43,7 +43,11 @@
- object constructed before entering `main'. */
-
- #undef STARTFILE_SPEC
--#if defined HAVE_LD_PIE
-+#if defined (HAVE_LD_PIE) && defined (ENABLE_CRTBEGINTS)
-+#define STARTFILE_SPEC \
-+ "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} crti.o%s \
-+ %{static:%{pie:crtbeginTS.o%s;:crtbeginT.o%s}} %{!static:%{shared|pie:crtbeginS.o%s;:crtbegin.o%s}}"
-+#elif defined (HAVE_LD_PIE) && ! defined (ENABLE_CRTBEGINTS)
- #define STARTFILE_SPEC \
- "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
- crti.o%s %{static:crtbeginT.o%s;shared|pie:crtbeginS.o%s;:crtbegin.o%s}"
---- gcc/config/rs6000/sysv4.h 2009-04-10 01:23:07.000000000 +0200
-+++ gcc/config/rs6000/sysv4.h 2009-09-08 04:41:50.000000000 +0200
-@@ -883,7 +883,12 @@
- %{!mnewlib: %{pthread:-lpthread} %{shared:-lc} \
- %{!shared: %{profile:-lc_p} %{!profile:-lc}}}"
-
--#ifdef HAVE_LD_PIE
-+#if defined (HAVE_LD_PIE) && defined (ENABLE_CRTBEGINTS)
-+#define STARTFILE_LINUX_SPEC \
-+ "%{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
-+ %{mnewlib:ecrti.o%s;:crti.o%s} \
-+ {static:%{pie:crtbeginTS.o%s;:crtbeginT.o%s}} %{!static:%{shared|pie:crtbeginS.o%s;:crtbegin.o%s}}"
-+#elif defined (HAVE_LD_PIE) && ! defined (ENABLE_CRTBEGINTS)
- #define STARTFILE_LINUX_SPEC "\
- %{!shared: %{pg|p|profile:gcrt1.o%s;pie:Scrt1.o%s;:crt1.o%s}} \
- %{mnewlib:ecrti.o%s;:crti.o%s} \
diff --git a/espf-gcc-4.5.0/40_all_gcc44_cp_lang-specs.h.patch b/espf-gcc-4.5.0/40_all_gcc44_cp_lang-specs.h.patch
deleted file mode 100644
index 954b102..0000000
--- a/espf-gcc-4.5.0/40_all_gcc44_cp_lang-specs.h.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-2009-06-18 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/cp/lang-specs.h compiler spec Add %(espf_options).
-
---- gcc/cp/lang-specs.h.orig 2009-03-23 01:21:54.000000000 +0100
-+++ gcc/cp/lang-specs.h 2009-03-23 01:22:16.000000000 +0100
-@@ -47,7 +47,7 @@
- %(cpp_options) %2 -o %{save-temps:%b.ii} %{!save-temps:%g.ii} \n}\
- cc1plus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.ii} %{!save-temps:%g.ii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- %{!fsyntax-only:-o %g.s %{!o*:--output-pch=%i.gch} %W{o*:--output-pch=%*}%V}}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {"@c++",
-@@ -57,11 +57,11 @@
- %(cpp_options) %2 -o %{save-temps:%b.ii} %{!save-temps:%g.ii} \n}\
- cc1plus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.ii} %{!save-temps:%g.ii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- %{!fsyntax-only:%(invoke_as)}}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {".ii", "@c++-cpp-output", 0, 0, 0},
- {"@c++-cpp-output",
- "%{!M:%{!MM:%{!E:\
-- cc1plus -fpreprocessed %i %(cc1_options) %2 %{+e*}\
-+ cc1plus -fpreprocessed %i %(cc1_options) %(espf_options) %2 %{+e*}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
diff --git a/espf-gcc-4.5.0/41_all_gcc44_objc_lang-specs.h.patch b/espf-gcc-4.5.0/41_all_gcc44_objc_lang-specs.h.patch
deleted file mode 100644
index affa77d..0000000
--- a/espf-gcc-4.5.0/41_all_gcc44_objc_lang-specs.h.patch
+++ /dev/null
@@ -1,37 +0,0 @@
-2009-06-18 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/objc/lang-specs.h compiler spec Add %(espf_options).
-
---- gcc/objc/lang-specs.h 2009-03-23 01:21:54.000000000 +0100
-+++ gcc/objc/lang-specs.h 2009-03-23 01:22:16.000000000 +0100
-@@ -30,13 +30,13 @@
- %{traditional|ftraditional|traditional-cpp:\
- %eGNU Objective C no longer supports traditional compilation}\
- %{save-temps|no-integrated-cpp:cc1obj -E %(cpp_options) -o %{save-temps:%b.mi} %{!save-temps:%g.mi} \n\
-- cc1obj -fpreprocessed %{save-temps:%b.mi} %{!save-temps:%g.mi} %(cc1_options) %{print-objc-runtime-info} %{gen-decls}}\
-+ cc1obj -fpreprocessed %{save-temps:%b.mi} %{!save-temps:%g.mi} %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}}\
- %{!save-temps:%{!no-integrated-cpp:\
-- cc1obj %(cpp_unique_options) %(cc1_options) %{print-objc-runtime-info} %{gen-decls}}}\
-+ cc1obj %(cpp_unique_options) %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}}}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
- {".mi", "@objc-cpp-output", 0, 0, 0},
- {"@objc-cpp-output",
-- "%{!M:%{!MM:%{!E:cc1obj -fpreprocessed %i %(cc1_options) %{print-objc-runtime-info} %{gen-decls}\
-+ "%{!M:%{!MM:%{!E:cc1obj -fpreprocessed %i %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
- {"@objective-c-header",
- "%{E|M|MM:cc1obj -E %{traditional|ftraditional|traditional-cpp:-traditional-cpp}\
-@@ -45,10 +45,10 @@
- %{traditional|ftraditional|traditional-cpp:\
- %eGNU Objective C no longer supports traditional compilation}\
- %{save-temps|no-integrated-cpp:cc1obj -E %(cpp_options) -o %{save-temps:%b.mi} %{!save-temps:%g.mi} \n\
-- cc1obj -fpreprocessed %b.mi %(cc1_options) %{print-objc-runtime-info} %{gen-decls}\
-+ cc1obj -fpreprocessed %b.mi %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}\
- -o %g.s %{!o*:--output-pch=%i.gch}\
- %W{o*:--output-pch=%*}%V}\
- %{!save-temps:%{!no-integrated-cpp:\
-- cc1obj %(cpp_unique_options) %(cc1_options) %{print-objc-runtime-info} %{gen-decls}\
-+ cc1obj %(cpp_unique_options) %(cc1_options) %(espf_options) %{print-objc-runtime-info} %{gen-decls}\
- -o %g.s %{!o*:--output-pch=%i.gch}\
- %W{o*:--output-pch=%*}%V}}}}}", 0, 0, 0},
diff --git a/espf-gcc-4.5.0/42_all_gcc44_objcp_lang-specs.h.patch b/espf-gcc-4.5.0/42_all_gcc44_objcp_lang-specs.h.patch
deleted file mode 100644
index 542a803..0000000
--- a/espf-gcc-4.5.0/42_all_gcc44_objcp_lang-specs.h.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-2009-06-18 Matthias Klose <doko@ubuntu.com>, Kees Cook <kees@outflux.net>
-
- LP #346126
- * gcc/objcp/lang-specs.h compiler spec Add %(espf_options).
-
---- gcc/objcp/lang-specs.h 2009-03-23 01:21:54.000000000 +0100
-+++ gcc/objcp/lang-specs.h 2009-03-23 01:22:16.000000000 +0100
-@@ -36,7 +36,7 @@
- %(cpp_options) %2 -o %{save-temps:%b.mii} %{!save-temps:%g.mii} \n}\
- cc1objplus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.mii} %{!save-temps:%g.mii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- -o %g.s %{!o*:--output-pch=%i.gch} %W{o*:--output-pch=%*}%V}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {"@objective-c++",
-@@ -46,15 +46,15 @@
- %(cpp_options) %2 -o %{save-temps:%b.mii} %{!save-temps:%g.mii} \n}\
- cc1objplus %{save-temps|no-integrated-cpp:-fpreprocessed %{save-temps:%b.mii} %{!save-temps:%g.mii}}\
- %{!save-temps:%{!no-integrated-cpp:%(cpp_unique_options)}}\
-- %(cc1_options) %2 %{+e1*}\
-+ %(cc1_options) %(espf_options) %2 %{+e1*}\
- %{!fsyntax-only:%(invoke_as)}}}}",
- CPLUSPLUS_CPP_SPEC, 0, 0},
- {".mii", "@objective-c++-cpp-output", 0, 0, 0},
- {"@objective-c++-cpp-output",
- "%{!M:%{!MM:%{!E:\
-- cc1objplus -fpreprocessed %i %(cc1_options) %2 %{+e*}\
-+ cc1objplus -fpreprocessed %i %(cc1_options) %(espf_options) %2 %{+e*}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
- {"@objc++-cpp-output",
- "%{!M:%{!MM:%{!E:\
-- cc1objplus -fpreprocessed %i %(cc1_options) %2 %{+e*}\
-+ cc1objplus -fpreprocessed %i %(cc1_options) %(espf_options) %2 %{+e*}\
- %{!fsyntax-only:%(invoke_as)}}}}", 0, 0, 0},
diff --git a/espf-gcc-4.5.0/50_all_gcc44_no_ssp_tls_uclibc.patch b/espf-gcc-4.5.0/50_all_gcc44_no_ssp_tls_uclibc.patch
deleted file mode 100644
index 32764de..0000000
--- a/espf-gcc-4.5.0/50_all_gcc44_no_ssp_tls_uclibc.patch
+++ /dev/null
@@ -1,87 +0,0 @@
-2009-08-09 Peter S. Mazinger <ps.m@gmx.net>
-
- #149292 b.g.o
- * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux64.h uclibc don't support TLS on stack-protector
- * gcc/config/rs6000/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux64.h uclibc don't support TLS on stack-protector
-
---- gcc/config/i386/linux.h 2 Jul 2005 08:52:20 -0000 1.60
-+++ gcc/config/i386/linux.h 2 Jul 2005 08:52:20 -0000 1.60
-@@ -186,7 +186,7 @@
- /* This macro may be overridden in i386/k*bsd-gnu.h. */
- #define REG_NAME(reg) reg
-
--#ifdef TARGET_LIBC_PROVIDES_SSP
-+#if defined TARGET_LIBC_PROVIDES_SSP && !defined __UCLIBC__
- /* i386 glibc provides __stack_chk_guard in %gs:0x14. */
- #define TARGET_THREAD_SSP_OFFSET 0x14
- #endif
---- gcc/config/i386/linux64.h 2 Jul 2005 08:52:20 -0000 1.33
-+++ gcc/config/i386/linux64.h 2 Jul 2005 08:52:20 -0000 1.33
-@@ -74,7 +74,7 @@
- /* This macro may be overridden in i386/k*bsd-gnu.h. */
- #define REG_NAME(reg) reg
-
--#ifdef TARGET_LIBC_PROVIDES_SSP
-+#if defined TARGET_LIBC_PROVIDES_SSP && !defined __UCLIBC__
- /* i386 glibc provides __stack_chk_guard in %gs:0x14,
- x86_64 glibc provides it in %fs:0x28. */
- #define TARGET_THREAD_SSP_OFFSET (TARGET_64BIT ? 0x28 : 0x14)
---- gcc/config/rs6000/linux.h 2 Jul 2005 08:52:11 -0000 1.53
-+++ gcc/config/rs6000/linux.h 2 Jul 2005 08:52:11 -0000 1.53
-@@ -114,7 +114,7 @@
-
- #define MD_UNWIND_SUPPORT "config/rs6000/linux-unwind.h"
-
--#ifdef TARGET_LIBC_PROVIDES_SSP
-+#if defined TARGET_LIBC_PROVIDES_SSP && !defined __UCLIBC__
- /* ppc32 glibc provides __stack_chk_guard in -0x7008(2). */
- #define TARGET_THREAD_SSP_OFFSET -0x7008
- #endif
---- gcc/config/rs6000/linux64.h 2 Jul 2005 08:52:15 -0000 1.81
-+++ gcc/config/rs6000/linux64.h 2 Jul 2005 08:52:15 -0000 1.81
-@@ -548,7 +548,7 @@
-
- #define MD_UNWIND_SUPPORT "config/rs6000/linux-unwind.h"
-
--#ifdef TARGET_LIBC_PROVIDES_SSP
-+#if defined TARGET_LIBC_PROVIDES_SSP && !defined __UCLIBC__
- /* ppc32 glibc provides __stack_chk_guard in -0x7008(2),
- ppc64 glibc provides it at -0x7010(13). */
- #define TARGET_THREAD_SSP_OFFSET (TARGET_64BIT ? -0x7010 : -0x7008)
---- gcc/config/s390/linux.h 2005-08-22 15:53:01.000000000 +0200 1.40
-+++ gcc/config/s390/linux.h 2005-08-22 15:53:01.000000000 +0200 1.40
-@@ -94,7 +94,7 @@
-
- #define MD_UNWIND_SUPPORT "config/s390/linux-unwind.h"
-
--#ifdef TARGET_LIBC_PROVIDES_SSP
-+#if defined TARGET_LIBC_PROVIDES_SSP && !defined __UCLIBC__
- /* s390 glibc provides __stack_chk_guard in 0x14(tp),
- s390x glibc provides it at 0x28(tp). */
- #define TARGET_THREAD_SSP_OFFSET (TARGET_64BIT ? 0x28 : 0x14)
---- gcc/config/sparc/linux.h 6 Jul 2005 07:48:57 -0000 1.72
-+++ gcc/config/sparc/linux.h 6 Jul 2005 07:48:57 -0000 1.72
-@@ -230,7 +230,7 @@
- #undef NEED_INDICATE_EXEC_STACK
- #define NEED_INDICATE_EXEC_STACK 1
-
--#ifdef TARGET_LIBC_PROVIDES_SSP
-+#if defined TARGET_LIBC_PROVIDES_SSP && !defined __UCLIBC__
- /* sparc glibc provides __stack_chk_guard in [%g7 + 0x14]. */
- #define TARGET_THREAD_SSP_OFFSET 0x14
- #endif
---- gcc/config/sparc/linux64.h 6 Jul 2005 07:48:57 -0000 1.95
-+++ gcc/config/sparc/linux64.h 6 Jul 2005 07:48:57 -0000 1.95
-@@ -364,7 +364,7 @@
- #undef NEED_INDICATE_EXEC_STACK
- #define NEED_INDICATE_EXEC_STACK 1
-
--#ifdef TARGET_LIBC_PROVIDES_SSP
-+#if defined TARGET_LIBC_PROVIDES_SSP && !defined __UCLIBC__
- /* sparc glibc provides __stack_chk_guard in [%g7 + 0x14],
- sparc64 glibc provides it at [%g7 + 0x28]. */
- #define TARGET_THREAD_SSP_OFFSET (TARGET_ARCH64 ? 0x28 : 0x14)
diff --git a/espf-gcc-4.5.0/60_all_gcc44_invoke.texi.patch b/espf-gcc-4.5.0/60_all_gcc44_invoke.texi.patch
deleted file mode 100644
index 863ebc0..0000000
--- a/espf-gcc-4.5.0/60_all_gcc44_invoke.texi.patch
+++ /dev/null
@@ -1,44 +0,0 @@
-2009-09-11 Magnus Granberg <zorry@ume.nu>
-
- * gcc/doc/invoke.texi Add NOTES about -fstack-protector-all, -pie and
- -fPIE/-fpie when --enable-espf is enable, this options is on by default.
-
---- gcc/doc/invoke.texi 2009-04-01 09:18:47.000000000 +0200
-+++ gcc/doc/invoke.texi 2009-06-18 14:08:38.000000000 +0200
-@@ -7134,6 +7134,11 @@
- @opindex fstack-protector-all
- Like @option{-fstack-protector} except that all functions are protected.
-
-+NOTE: When --enable-espf this option is enabled by default
-+for C, C++, ObjC, ObjC++, if neither @option{-fno-stack-protector}
-+or @option{-nostdlib} or @option{-nodefaultlibs} or
-+@option{-fstack-protector} are found.
-+
- @item -fsection-anchors
- @opindex fsection-anchors
- Try to reduce the number of symbolic address calculations by using
-@@ -7960,6 +7965,12 @@
- that were used to generate code (@option{-fpie}, @option{-fPIE},
- or model suboptions) when you specify this option.
-
-+NOTE: When --enable-espf this option is enabled by default
-+for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE}
-+or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or
-+@option{-nostartfiles} or @option{-shared} or @option{-pg} or @option{-p}
-+are found.
-+
- @item -rdynamic
- @opindex rdynamic
- Pass the flag @option{-export-dynamic} to the ELF linker, on targets
-@@ -15889,6 +15910,11 @@
- @code{__pie__} and @code{__PIE__}. The macros have the value 1
- for @option{-fpie} and 2 for @option{-fPIE}.
-
-+NOTE: When --enable-espf this option is enabled by default
-+for C, C++, ObjC, ObjC++, if neither @option{-fno-pie} or @option{-fno-PIE}
-+or @option{-fno-pic} or @option{-fno-PIC} or @option{-nostdlib} or
-+@option{-nostartfiles} or @option{-shared} are found.
-+
- @item -fno-jump-tables
- @opindex fno-jump-tables
- Do not use jump tables for switch statements even where it would be
diff --git a/espf-gcc-4.5.0/README b/espf-gcc-4.5.0/README
deleted file mode 100644
index d95d9fb..0000000
--- a/espf-gcc-4.5.0/README
+++ /dev/null
@@ -1,18 +0,0 @@
-This work started with bugs #94325 #100689 #106222 #149292 #149649 and the overlay on http://overlays.gentoo.org/dev/kevquinn.
-By Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY and mentor.
-
-The work stalled. Some threads on the Gentoo forum started to do their own fixes to get it working.
-Xake started the thread where most of the new work is done: "How long until hardened and toolchain will produce a hardened gcc4?"
-http://forums.gentoo.org/viewtopic-t-668885.html. I joined the thread and started to code.
-
-We started with the pieworld code from kevquinn's overlay. The PIE and minispecs part hit the tree later on.
-With GCC 4.4.0 I was willing to do some code cleanup, use built-in specs and add it as --enable-espf in the
-configure command line.
-
-Thank you all:
-Kevin K. Quinn, Peter S. Mazinger, Natanael Copa, Alexander Gabert, Solar, PaX Team, SpanKY, Xake, Dwokfur,
-KernelOfTruth, SteveL, nixnut, Hopeless, forsaken1, XioXous, obrut<-, mv, qjim, Tommy[D], Genewb, radegand,
-unk, neuron, alexxy, hellboi64, likewhoa, g0rg0n, costel78, polsas, 7v5w7go9ub0o, uberpinguin, Naib, cilly,
-bonsaikitten, kerframil, agaffney, Gordon Malm, blueness, Matthias Klose, Kees Cook, mentor, Anarchy,
-devurandom and everyone else for helping to test, suggestions, fixes and anything else we have missed.
-/2009-00-09 Magnus Grenberg (Zorry) <zorry@ume.nu>
diff --git a/espf-gcc-4.5.0/README.Changelog b/espf-gcc-4.5.0/README.Changelog
deleted file mode 100644
index 822797e..0000000
--- a/espf-gcc-4.5.0/README.Changelog
+++ /dev/null
@@ -1,235 +0,0 @@
-0.3.9 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/configure Added check for TLS on the target in the SSP check.
-
- #149292 b.g.o
- * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux64.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/rs6000/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux.h Removed uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux64.h Removed uclibc don't support TLS on stack-protector
-
-0.3.8 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/configure Redone the -fstack-protector check.
- * gcc/config.in Added HAVE_GCC_SSP
- * gcc/gcc.c Removed code for espf_link_spec in X
- * gcc/espf.h Added ifdef HAVE_GCC_SSP, change code for espf_link_spec and link_pie_spec
-
-0.3.7_beta Anthony G. Basile <basile@opensource.dyc.edu>
-
- * gcc/configure Check if -fstack-protector is supported by gcc on ARCH
- Updated AC_SUBST enable_espf
- * gcc/Makefile.in Remove the fix for $(out_object_file): ix86_split_to_parts() stack smashing attack b.g.o #149292.
- * gcc/gcc.c Updaded the .c .cc compiler specs.
-
-0.3.6 Magnus Granberg <zorry@ume.nu>
-
- * configure Check --enable-espf change ppc* to powerpc*, powerpc64 and add ia64.
- * gcc/configure Don't check for -z,relro on ia64. Disable crtbeginTS for ia64.
- * gcc/espf.h ia64 don't support -fstack-protector*
-
-0.3.5 Maguns Granberg <zorry@ume.nu>
-
- * gcc/espf.h Change the specs for crtbegin.TS.o.
- * gcc/gcc.c Rename espf_cc1_options to espf_options_pie_check.
- * gcc/config/linux.h Fix typos ENABLE_CRTBEGINS to ENABLE_CRTBEGINTS
- * gcc/config/rs6000/linux64.h ASM_SPEC32: %{fpic:-K PIC} %{fPIC:-K PIC} to
- %{fpic|fPIC|fpie|fPIE:-K PIC}
-
-0.3.4 Magnus Granberg <zorry@ume.nu>
-
- * gcc/configure Add crtbeginTS.o support.
- * gcc/Makefile.in Add crtbeginTS.o support.
- * gcc/gcc.c Add espf_cc1_options.
- * gcc/espf.h Added espf_cc1_options, crtbeginTS.o support,
- espf_cc1_options and espf_cc1_strictoverflow.
- * gcc/config.in Add crtbeginTS.o support.
- * gcc/config/linux.h Add crtbeginTS.o support.
- * gcc/config/rs6000/sysv4.h Add crtbeginTS.o support.
- * gcc/doc/invoke.texi Add NOTES about -fstack-protector-all,
- -pie and -fPIE.
- * libgcc/Makefile.in Add crtbeginTS.o support.
-
-0.3.3 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c change #ifdef ENABLE_ESPF to #ifndef ENABLE_ESPF
-
-0.3.2 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c disable flag_delete_null_pointer_checks >= -O2
- * gcc/espf.h add ESPF_CC1_SSP_SPEC and ESPF_CC1_PIE_SPEC to fix bugs on -vanilla spec
-
- #149292 b.g.o
- * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux64.h uclibc don't support TLS on stack-protector
- * gcc/config/rs6000/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux.h uclibc don't support TLS on stack-protector
- * gcc/config/sparc/linux64.h uclibc don't support TLS on stack-protector
-
-0.3.1 Magnus Granberg <zorry@ume.nu>
-
- * gcc/cp/Make-lang.in cc1plus: pch test fail when cc1plus is compile with -fPIE.
- * gcc/configure fix --enable-espf when USE"-hardened"
-
-4.4.1-espf-0.3.0 Magnus Granberg <zorry@ume.nu>
-
- * gcc/espf.h add ESPF_LINK_SPEC ESPF_LINK_NOW_SPEC
- * gcc/gcc.c move do_self_spec (espf_command_options_spec)
- do_spec_1() add espf_link_spec
-
-0.3.0 Magnus Granberg <zorry@ume.nu>
-
- * gcc/objc/lang-specs.h Add %(espf_options)
- * gcc/objcp/lang-specs.h Add %(espf_options)
- * gcc/cp/lang-specs.h Add %(espf_options)
- * gcc/config.in removed ENABLE_LIBSSP
- * Makefile.in We add -fno-stack-protector to
- BOOT_CFLAGS, LIBCFLAGS and LIBCXXFLAGS
- cc1: pch.exp test fail when cc1 is compile with -fPIE
- * libmudflap/Makefiles.in Add -fno-stack-protector -U_FORTIFY_SOURCE
- to AM_CFLAGS
- * configure add --enable-espf
- add -fno-stack-protector to stage1_cflags
- add targes ppc* arm sparc*
- * gcc/configure change code for check --enable-espf
- * libmudflap/configure add enable_espf
- * gcc/espf.h ESPF_CC1_OPTIONS_SPEC renamed to ESPF_OPTIONS_SPEC
- add ESPF_CPP_OPTIONS_SPEC ESPF_COMMAND_OPTIONS_SPEC
- ESPF_CC1_OPTIONS_SSP_SPEC renamed to ESPF_OPTIONS_SSP_SPEC
- ESPF_COMPILER_COMMAND_PIE_SPEC renamed to ESPF_OPTIONS_PIE_SPEC
- ESPF_LINK_COMMAND_PIE_SPEC renamed to ESPF_LINK_PIE_SPEC
- add !p !pg to ESPF_LINK_PIE_SPEC
- removed ESPF_LINK_SPEC ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC
- * gcc/gcc.c cpp_options add %(espf_cpp_options)
- compiler spec add %(espf_options)
- change code for ESPF_EXTRA_SPECS
- process_command(): Check for lazy, or now
- do_spec_1(): Add -z now and -z relro
- main() add do_self_spec (espf_command_options_spec)
- removed do_self_spec (espf_cc1_command_spec) do_self_spec (espf_link_command_spec)
-
-0.2.9 Magnus Granberg <zorry@ume.nu>
-
- * gcc/espf.h add ESPF_COMPILER_COMMAND_PIE_SPEC
- add ESPF_LINK_COMMAND_PIE_SPEC
- change ESPF_COMPILER_COMMAND_SPEC ESPF_LINK_COMMAND_SPEC
-
-0.2.8 Magnus Granberg <zorry@ume.nu>
-
- * gcc/configure removed check crtbeginTS.o
- * gcc/espf.h added notes
- add ESPF_CC1_SPEC
- removed ESPF_CPP_UNIQUE_OPTIONS espf_override_options()
- * gcc/gcc.c cc1_spec Set it to CC1_SPEC if ! ENABLE_ESPF
- * gcc/toplev.c removed ESPF_OVERRIDE_OPTIONS
-
-0.2.7 Magnus Granberg <zorry@ume.nu>
-
- * gcc/opts.c (decode_options): Remove flag_strict_overflow as opt2
- * gcc/config.in removed HAVE_CRTBEGINTS
- * gcc/Makefile removed crtbeginTS.o
- * libgcc/Makefile.in removed crtbeginTS.o
- * gcc/config/i386/i386.h removed espf_override_options ESPF_EXTRA_SPECS
- * gcc/config/linux.h remoevd crtbeginTS.o
- * gcc/espf.h ESPF_CC1_OPTIONS_PIE_SPEC renamed to ESPF_CC1_COMMAND_SPEC
- * gcc/gcc.c add ESPF_EXTRA_SPECS
- main() add do_self_spec (espf_cc1_command_spec)
-
-0.2.6 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h add espf_override_options() to OVERRIDE_OPTIONS
- * gcc/espf.h add espf_override_options()
- * gcc/toplev.c add ESPF_OVERRIDE_OPTIONS
-
-0.2.5 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h removed espf_cc1
- * gcc/config/i386/linux.h removed espf_cc1 %(crtend_gen)
- * gcc/config/i386/x86-64.h removed espf_cc1 %(crtend_gen)
- * gcc/config/linux.h removed espf_cc1 %(crtfile_gen)
- %(crtbegin_t_gen) %(crtend_gen)
- add crtbeginTS.o
- * gcc/config.in removed TARGET_LIBC_PROVIDES_PIE
- add HAVE_CRTBEGINTS
- * gcc/Makefile.in add ESPF_NOPIE_CFLAGS ESPF_NOSSP_CFLAGS to
- CRTSTUFF_T_CFLAGS
- add ESPF_NOSSP_CFLAGS to CRTSTUFF_T_CFLAGS_S
- * espf.h ESPF_CC1_SPEC renamed to ESPF_CC1_OPTIONS_SPEC
- add ESPF_LINK_SPEC
- ESPF_CC1_SSP_SPEC renamed to ESPF_CC1_OPTIONS_SSP_SPEC
- ESPF_CC1_PIE_SPEC renamed to ESPF_CC1_OPTIONS_PIE_SPEC
- ESPF_CC1_OPTIONS_SPEC renamed to ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC
- LINK_PIE_SPEC renamed to ESPF_LINK_COMMAND_SPEC
- removed ESPF_CC1_STRICT_SPEC CRTFILE_GEN_SPEC CRTBEGIN_GEN_SPEC
- CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC
- * gcc/configure remove TARGET_LIBC_PROVIDES_PIE
- define HAVE_CRTBEGINTS
- * gcc/gcc.c LINK_COMMAND_SPEC add %(espf_link)
- main() add do_self_spec (espf_link_command_spec)
-
-0.2.4 Magnus Granberg <zorry@ume.nu>
-
- libgcc/Makefile.in clean specs
-
-0.2.3 Magnus Granberg <zorry@ume.nu>
-
- *gcc/espf.h add ESPF_CC1_STRICT_SPEC
-
-0.2.2 Magnus Granberg <zorry@ume.nu>
-
- * gcc/config/i386/i386.h Add espf_cc1
- Add ESPF_EXTRA_SPECS
- * gcc/config/i386/linux.h Add espf_cc1
- * gcc/config/i386/x86-64.h Add espf_cc1
- * gcc/config/linux.h Add espf_cc1
- * gcc/Makefile.in add crtbeginTS.o to EXTRA_PARTS list
- * libgcc/Makefile.in add crtbeginTS.o to EXTRA_PARTS list
- * gcc/configure add define ENABLE_LIBSSP
- * gcc/gcc.c %(fortify_default) renamed to %(espf_cpp_unique_options)
- %(pie_incompatible) renamed to %(espf_cc1_options)
- removed ESPF_EXTRA_SPECS
- * gcc/espf.h ESPF_DEFAULT_SPEC renamed to ESPF_CC1_SPEC
- SSP_DEFAULT_SPEC renamed to ESPF_CC1_SSP_SPEC
- FORTIFY_DEFAULT_SPEC renamed to ESPF_CPP_UNIQUE_OPTIONS
- PIE_DEFAULT_SPEC renamed to ESPF_CC1_PIE_SPEC
- PIE_INCOMPATIBLE_SPEC renamed to ESPF_CC1_OPTIONS_SPEC
- add new CRTFILE_GEN_SPEC CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC if !
- TARGET_LIBC_PROVIDES_PIE
-
-4.4.0-espf-0.2.1 Magnus Granberg <zorry@ume.nu>
-
- * gcc/gcc.c include: espf.h
- cc1_spec = CC1_SPEC if not ENABLE_ESPF
- cpp_unique_options add %(fortify_default)
- cc1_options add %(pie_incompatible)
- EXTRA_SPECS add ESPF_EXTRA_SPECS
- * libgcc/Makefile.in add crtbeginTs.o
- gcc/Makefile.in add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS
- LIBGCC2_CFLAGS add ESPF_NOSSP_CFLAGS
- CRTSTUFF_CFLAGS add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS
- crtbegin* add crtbeginTS
- $(out_object_file): ix86_split_to_parts() stack smashing attack b.g.o #149292
- * libgcc/configure add enable_espf
- * gcc/config/linux.h add %(crtfile_gen) %(crtbegin_t_gen) %(crtend_gen)
- * gcc/config/i386/linux.h add %(crtend_gen)
- * gcc/config/i386/linux64.h add %(crtend_gen)
- * gcc/config.gcc extra_parts add crtbeginTS.o
- * libgcc/config.host extra_parts add crtbeginTS.o
- * gcc/configure check -z relro
- check -z now
- check FORTIFY_SOURCES level 2
- check Scrt1.o
- check --enable-espf
- check crtbeginTS.o
- * gcc/espf.h new file
- * gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib
- * gcc/config.in add ENABLE_LIBSSP
- add ENABLE_ESPF
- add TARGET_LIBC_PROVIDES_FORTIFY2
- add TARGET_LIBC_PROVIDES_PIE
- * configure define ENABLE_LIBSSP
-
-gcc-4.3.3-piepatches-v10.2.1
diff --git a/espf-gcc-4.5.0/README.Gentoo.patches b/espf-gcc-4.5.0/README.Gentoo.patches
deleted file mode 100644
index db43079..0000000
--- a/espf-gcc-4.5.0/README.Gentoo.patches
+++ /dev/null
@@ -1,28 +0,0 @@
- ================
- === W[hat]TF ===
- ================
-
-Gentoo patchsets that have grown too large to keep on the rsync mirrors have
-been moved to our git tree. From there, we bundle up all the whee little
-patches into a tarball and distribute it via our public mirroring system.
-
-If you want specific info about a patch (like wtf it does or whose great idea
-it was to change the code), read the patch ! We try to fill out the top of
-them with useful info such as what it does, why it's needed, bug reports,
-original creators, etc... For simple patches, we reserve the right to assume
-your IQ is greater than absolute 0 and figure out what it does w/out an
-explanation. If, by some miracle of science, it falls below the absolute 0
-mark, you should help mankind by finding some scientists and letting them
-probe you with their ... erm ... probes.
-
- =================
- === W[here]TF ===
- =================
-
-For those with git access
-git://git.overlays.gentoo.org/proj/hardened-gccpatchset.git
-
-For those w/out git access, this URL should help you:
-http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-gccpatchset.git;a=summary
-
-It should be pretty easy to find your way around, you're a big boy after all.
diff --git a/espf-gcc-4.5.0/README.history b/espf-gcc-4.5.0/README.history
deleted file mode 100644
index 47f77b0..0000000
--- a/espf-gcc-4.5.0/README.history
+++ /dev/null
@@ -1,207 +0,0 @@
-0.3.9 14-04-2010
- 10_all_gcc44_configure.patch
- - 50_all_gcc44_no_ssp_tls_uclibc.patch
- 33_all_gcc44_config_rs6000_linux64.h.patch
-
-0.3.8 10-04-2010
- 10_all_gcc44_configure.patch
- 11_all_gcc44_config.in.patch
- 20_all_gcc44_gcc.c.patch
- 30_all_gcc44_espf.h.patch
-
-0.3.7 10-02-2010
- 20_all_gcc44_gcc.c.patch
- 30_all_gcc44_espf.h.patch
- 10_all_gcc44_configure.patch
-
-0.3.6 23-12-2009
- - 10_all_gcc44_configure.patch
- + 10_all_gcc44_configure.patch
- - 30_all_gcc44_espf.h.patch
- + 30_all_gcc44_espf.h.patch
- - README.Changelog
- + README.Changelog
- - README.history
- + README.history
- - README
- + README
-
-0.3.5 24-09-2009
- - 30_all_gcc44_espf.h.patch
- + 30_all_gcc44_espf.h.patch
- - 35_all_gcc44_config_crtbegints.patch
- + 35_all_gcc44_config_crtbegints.patch
- + 33_all_gcc44_config_rs6000_linux64.h.patch
- - README.Changelog
- + README.Changelog
- - README.history
- + README.history
- + README.Gentoo.patches
-
-0.3.4 11-09-2009
- - 10_all_gcc44_configure.patch
- + 10_all_gcc44_configure.patch
- - 11_all_gcc44_config.in.patch
- + 11_all_gcc44_config.in.patch
- - 12_all_gcc44_Makefile.in.patch
- + 12_all_gcc44_Makefile.in.patch
- - 20_all_gcc44_gcc.c.patch
- + 20_all_gcc44_gcc.c.patch
- - 23_all_gcc44_opts.c.patch
- - 30_all_gcc44_espf.h.patch
- + 30_all_gcc44_espf.h.patch
- + 35_all_gcc44_config_crtbegints.patch
- + 60_all_gcc44_invoke.texi.patch
- - README.Changelog
- + README.Changelog
- - README.history
- + README.history
- - README
- + README
-
-0.3.3 14-08-2009
- - 23_all_gcc44_opts.c.patch
- + 23_all_gcc44_opts.c.patch
-
-0.3.2 09-08-2009
- + 50_all_gcc44_no_ssp_tls_uclibc.patch
- + README.Changelog
- + README.history
- - 23_all_gcc44_opts.c.patch
- + 23_all_gcc44_opts.c.patch
- - 30_all_gcc44-espf.h.patch
- + 30_all_gcc44-espf.h.patch
-
-0.3.1 23-07-2009
- - 10_all_gcc44_configure.patch
- + 10_all_gcc44_configure.patch
-
-0.3.0 23-07-2009
- - 10_all_gcc44_configure.patch
- + 10_all_gcc44_configure.patch
- - 11_all_gcc44_config.in.patch
- + 11_all_gcc44_config.in.patch
- - 12_all_gcc44_Makefile.in.patch
- + 12_all_gcc44_Makefile.in.patch
- - 20_all_gcc44_gcc.c.patch
- + 20_all_gcc44_gcc.c.patch
- + 40_all_gcc44_obj_lang-specs.h.patch
- + 40_all_gcc44_objp_lang-specs.h.patch
- + 40_all_gcc44_cp_lang-specs.h.patch
- - 50_all_gcc44_gentoo_v20090614.1.patch
- - 30_all_gcc44-espf.h.patch
- + 30_all_gcc44-espf.h.patch
-
-0.2.9 14-06-2009
- - 12_all_gcc44_Makefile.in.patch
- + 12_all_gcc44_Makefile.in.patch
- - 30_all_gcc44-espf.h.patch
- + 30_all_gcc44-espf.h.patch
- - 50_all_gcc44_gentoo_v20090612.2.patch
- + 50_all_gcc44_gentoo_v20090614.1.patch
-
-0.2.8 12-06-2009
- - 10_all_gcc44_configure.patch
- + 10_all_gcc44_configure.patch
- - 11_all_gcc44_config.in.patch
- + 11_all_gcc44_config.in.patch
- - 12_all_gcc44_Makefile.in.patch
- + 12_all_gcc44_Makefile.in.patch
- - 22_all_gcc44-toplev.c.patch
- - 25_all_gcc44-espf.h.patch
- + 30_all_gcc44-espf.h.patch
- + 50_all_gcc44_gentoo_v20090612.2.patch
-
-0.2.7 29-05-2009
- - 11_all_gcc44_config.in.patch
- + 11_all_gcc44_config.in.patch
- - 12_all_gcc44_Makefile.in.patch
- + 12_all_gcc44_Makefile.in.patch
- - 20_all_gcc44_gcc.c.patch
- + 20_all_gcc44_gcc.c.patch
- + 23_all_gcc44_opts.c.patch
- - 25_all_gcc44-espf.h.patch
- + 25_all_gcc44-espf.h.patch
- - 30_all_gcc44-config-defaul-linux.patch
-
-0.2.6 28-05-2009
- + 22_all_gcc44-toplev.c.patch
- - 25_all_gcc44-espf.h.patch
- + 25_all_gcc44-espf.h.patch
- - 30_all_gcc44-config-defaul-linux.patch
- + 30_all_gcc44-config-defaul-linux.patch
-
-0.2.5 27-05-2009
- - 10_all_gcc44_configure.patch
- + 10_all_gcc44_configure.patch
- - 12_all_gcc44_Makefile.in.patch
- + 12_all_gcc44_Makefile.in.patch
- - 20_all_gcc44_gcc.c.patch
- + 20_all_gcc44_gcc.c.patch
- - 25_all_gcc44-espf.h.patch
- + 25_all_gcc44-espf.h.patch
- - 30_all_gcc44-config-defaul-linux.patch
- + 30_all_gcc44-config-defaul-linux.patch
- - 40_all_gcc44-gentoo.patch
-
-0.2.4 08-05-2009
- - 12_all_gcc44_Makefile.in.patch
- + 12_all_gcc44_Makefile.in.patch
-
-0.2.3 08-05-2009
- - 20_all_gcc44_gcc.c.patch
- + 20_all_gcc44_gcc.c.patch
- - 40_all_gcc44-gentoo.patch
- + 40_all_gcc44-gentoo.patch
-
-0.2.2 04-05-2009
- + 10_all_gcc44_configure.patch
- + 11_all_gcc44_config.in.patch
- + 12_all_gcc44_Makefile.in.patch
- + 20_all_gcc44_gcc.c.patch
- + 21_all_gcc44_decl-tls-model.patch
- + 25_all_gcc44-espf.h.patch
- + 30_all_gcc44-config-defaul-linux.patch
- + 40_all_gcc44-gentoo.patch
- - 01_all_gcc44-configure.patch
- - 10_all_gcc44-gcc_configure.patch
- - 11_all_gcc44-gcc_config.in.patch
- - 12_all_gcc44-gcc_config.gcc.patch
- - 13_all_gcc44-gcc_Makefile.in.patch
- - 15_all_gcc44-libgcc_config.host.patch
- - 16_all_gcc44-libgcc_configure.patch
- - 17_all_gcc44-libgcc_Makefile.in.patch
- - 21_all_gcc44-gcc_espf.h.patch
- - 22_all_gcc44-gcc_gcc.c.patch
- - 23_all_gcc44-gcc_varasm.c.patch
- - 30_all_gcc44-add-crt-start-endfiles-linux.patch
-
-0.2.1 28-04-2009
- + 01_all_gcc44-configure.patch
- + 10_all_gcc44-gcc_configure.patch
- + 11_all_gcc44-gcc_config.in.patch
- + 12_all_gcc44-gcc_config.gcc.patch
- + 13_all_gcc44-gcc_Makefile.in.patch
- + 15_all_gcc44-libgcc_config.host.patch
- + 16_all_gcc44-libgcc_configure.patch
- + 17_all_gcc44-libgcc_Makefile.in.patch
- + 21_all_gcc44-gcc_espf.h.patch
- + 22_all_gcc44-gcc_gcc.c.patch
- + 23_all_gcc44-gcc_varasm.c.patch
- + 30_all_gcc44-add-crt-start-endfiles-linux.patch
- - 00_all_gcc4.4-cvs-incompat.patch
- - 05_all_gcc4.4-compile-no-ssp.patch
- - 10_all_gcc4.4-hardened-minispecs-support.patch
- - 11_all_gcc4.4-decl-tls-model.patch
- - 12_all_gcc4.4-fortify-minispecs-support.patch
- - 20-all_gcc4.4-default-crt-start-endfile.patch
- - 30-all_gcc4.4-crtbeginTS-fno-PIE.patch
-
-0.1.0 16.04.2009
- + 00_all_gcc4.4-cvs-incompat.patch
- + 05_all_gcc4.4-compile-no-ssp.patch
- + 10_all_gcc4.4-hardened-minispecs-support.patch
- + 11_all_gcc4.4-decl-tls-model.patch
- + 12_all_gcc4.4-fortify-minispecs-support.patch
- + 20-all_gcc4.4-default-crt-start-endfile.patch
- + 30-all_gcc4.4-crtbeginTS-fno-PIE.patch
diff --git a/gcc-4.5.0/piepatch/00_all_gcc45-trampolinewarn.patch b/gcc-4.5.0/piepatch/00_all_gcc45-trampolinewarn.patch
deleted file mode 100644
index f35a56c..0000000
--- a/gcc-4.5.0/piepatch/00_all_gcc45-trampolinewarn.patch
+++ /dev/null
@@ -1,33 +0,0 @@
- This trivial patch causes gcc to emit a warning whenever
- it generates a trampoline. These are otherwise hard to
- locate. It is rigged to default ON - to have it default
- to OFF remove the text 'Init(1)' from the common.opt
- patch, leaving just 'Common Var(warn_trampolines)'.
- Kevin F. Quinn <kevquinn@gentoo.org> 17 Jan 2006
-
---- gcc/common.opt
-+++ gcc/common.opt
-@@ -141,6 +141,10 @@
- Common Var(warn_system_headers)
- Do not suppress warnings from system headers
-
-+Wtrampolines
-+Common Var(warn_trampolines) Init(1)
-+Warn whenever a trampoline is generated
-+
- Wuninitialized
- Common Var(warn_uninitialized)
- Warn about uninitialized automatic variables
---- gcc/builtins.c
-+++ gcc/builtins.c
-@@ -5150,6 +5150,10 @@
- targetm.calls.trampoline_init (m_tramp, t_func, r_chain);
-
- trampolines_created = 1;
-+
-+ if (warn_trampolines)
-+ warning (OPT_Wtrampolines, "generating trampoline in object (requires executable stack)");
-+
- return const0_rtx;
- }
-
diff --git a/gcc-4.5.0/piepatch/11_all_gcc45_config.in.patch b/gcc-4.5.0/piepatch/11_all_gcc45_config.in.patch
deleted file mode 100644
index df3a749..0000000
--- a/gcc-4.5.0/piepatch/11_all_gcc45_config.in.patch
+++ /dev/null
@@ -1,52 +0,0 @@
-2010-04-22 Magnus Granberg <zorry@gentoo.org>
-
- * gcc/config.in Add ENABLE_CRTBEGINTS ENABLE_ESP and
- HAVE_GCC_SSP HAVE_GCC_LD_PIE
-
---- agcc/config.in 2009-04-21 11:08:08.000000000 +0200
-+++ bgcc/config.in 2009-05-12 00:10:08.000000000 +0200
-@@ -46,6 +46,12 @@
- #endif
-
-
-+/* Define to 1 to enable crtbeginTS.o. */
-+#ifndef USED_FOR_TARGET
-+#undef ENABLE_CRTBEGINTS
-+#endif
-+
-+
- /* Define to 1 to specify that we are using the BID decimal floating point
- format instead of DPD */
- #ifndef USED_FOR_TARGET
-@@ -65,6 +65,12 @@
- #endif
-
-
-+/* Define to 1 to enable esp. */
-+#ifndef USED_FOR_TARGET
-+#undef ENABLE_ESP
-+#endif
-+
-+
- /* Define to 1 to enable fixed-point arithmetic extension to C. */
- #ifndef USED_FOR_TARGET
- #undef ENABLE_FIXED_POINT
-@@ -912,6 +924,18 @@
- #endif
-
-
-+/* Define if your compiler supports SSP */
-+#ifndef USED_FOR_TARGET
-+#undef HAVE_GCC_SSP
-+#endif
-+
-+
-+/* Define if your compiler and linker supports PIE */
-+#ifndef USED_FOR_TARGET
-+#undef HAVE_GCC_LD_PIE
-+#endif
-+
-+
- /* Define to 1 if you have the `getchar_unlocked' function. */
- #ifndef USED_FOR_TARGET
- #undef HAVE_GETCHAR_UNLOCKED
diff --git a/gcc-4.5.0/piepatch/README.Changelog b/gcc-4.5.0/piepatch/README.Changelog
index 7a2adad..37fbc3f 100644
--- a/gcc-4.5.0/piepatch/README.Changelog
+++ b/gcc-4.5.0/piepatch/README.Changelog
@@ -16,10 +16,6 @@
#293843 b.g.o
*gcc/esp.h Added -nonow to the -z now specs.
- The trampolinwarn patch is not longer in default patchset
- *gcc/common.opt Add Wtrampolines and default it to Init(1)
- *gcc/builtins.c Add Wtrampolines
-
0.4.0 Anthony G. Basile <basile@opensource.dyc.edu>
rename espf to esp and change espf-patchset to piepatchset
diff --git a/gcc-4.5.0/piepatch/README.history b/gcc-4.5.0/piepatch/README.history
index 1c3423f..8ed2d71 100644
--- a/gcc-4.5.0/piepatch/README.history
+++ b/gcc-4.5.0/piepatch/README.history
@@ -1,5 +1,4 @@
0.4.1 29-04-2010
- + 00_all_gcc45-trampolinwarn.patch
U 10_all_gcc45_configure.patch
U 12_all_gcc45_Makefile.in.patch
U 11_all_gcc44_config.in.patch
diff --git a/specs/README.Changelog b/specs/README.Changelog
deleted file mode 100644
index 99a6f3b..0000000
--- a/specs/README.Changelog
+++ /dev/null
@@ -1,85 +0,0 @@
-0.1.8 Magnus Granberg <zorry@gentoo.org>
-
- * vanilla.specs change espf_cc1_strict_overflow to espf_cc1_strict
- * README.Gentoo.patches Updated links.
-
-0.1.7 Magnus Granberg <zorry@ume.nu>
-
- * hardenednopie.spec new espf_options_pie_check
- * vanilla.specs new espf_cc1_strict_overflow:
- espf_link_now:
-
-0.1.6 Magnus Grenberg <zorry@ume.nu>
-
- * strictoverflow.specs new specs file
- espf_cc1_strict_overflow: new specs
- * vanilla include strictoverflow.specs
-
-0.1.5 Magnus Granberg <zorry@ume.nu>
-
- * hardenednopie.specs new espf_cc1_pie:
- * hardenednossp.specs new espf_cc1_ssp:
-
-0.1.4 Magnus Granberg <zorry@ume.nu>
-
- * nossp.specs renamed to hardenednossp.specs
- espf_cc1_options_ssp: renamed to espf_options_ssp:
- * nopie.specs renamed to hardenednopie.specs
- espf_compiler_command_pie: renamed to espf_optios_pie:
- espf_cc1_options_pie_incompatatible removed
- espf_link_command_pie: renamed to espf_link_pie:
- * noznow.specs renamed to hardenednoznow.specs
- espf_link: renamed to espf_link_now:
- * vanilla.specs: change nossp.specs to hardenednossp.specs
- change nopie.specs to hardenednopie.specs
- change noznow to hardenednoznow.specs
-
-0.1.3 Magnus Granberg <zorry@ume.nu>
-
- * nofortify.specs removed
- * strict.specs removed
- * nossp.specs espf_cc1_ssp: renamed to espf_cc1_options_ssp:
- * nopie.specs espf_cc1_pie: renamed to espf_compiler_command_pie:
- crtfile_gen removed
- crtbegin_t_gen: removed
- crtend_gen: removed
- link_pie: removed
- espf_cc1_options: renamed espf_cc1_options_pie_incompatible:
- espf_link_command_pie: new
- * noznow.specs link_now: removed %{nonow:}
- * vanilla.specs espf_cc1: removed
- nofortify.specs removed
- strict.specs removed
-
-0.1.2 Magnus Granberg <zorry@ume.nu>
-
- * strict.specs new
- * vanilla.specs strict.specs new
-
-0.1.1 Magnus Granberg <zorry@ume.nu>
-
- * nofortify.specs default_fortify: renamed to espf_cpp_unique_options:
- * nossp.specs ssp_default: renamed to espf_cc1_ssp:
- * nossp_all.specs removed
- * nopie.specs pie_default: renamed to espf_cc1_pie:
- pie_incompatible: renamed to espf_cc1_options:
- * strict.specs removed
- * vanilla.specs removed strict.specs
-
-0.1.0 Magnus Granberg <zorry@ume.nu>
-
- * fortify.specs removed
- * ssp.specs removed
- * sspall.specs removed
- * pie.specs removed
- * znow.specs removed
- * nofortify.specs ccp_fortify: renamed to default_fortify:
- * nossp.specs cc1_ssp: renamed to ssp_default:
- * nossp_all.specs removed nosspall.specs
- * nopie.specs asm_pie: removed
- cc1_pie: renamed to pie_default:
- hardend_crtfile_gen: renamed to crtfile_gen:
- hardeend_startfile_gen: renamed to crtbegin_t_gen:
- endfile_pie_gen: renamed to crtend_gen:
-
-gcc-4.3.2-specs-0.9.12 \ No newline at end of file
diff --git a/specs/README.Gentoo.patches b/specs/README.Gentoo.patches
deleted file mode 100644
index db43079..0000000
--- a/specs/README.Gentoo.patches
+++ /dev/null
@@ -1,28 +0,0 @@
- ================
- === W[hat]TF ===
- ================
-
-Gentoo patchsets that have grown too large to keep on the rsync mirrors have
-been moved to our git tree. From there, we bundle up all the whee little
-patches into a tarball and distribute it via our public mirroring system.
-
-If you want specific info about a patch (like wtf it does or whose great idea
-it was to change the code), read the patch ! We try to fill out the top of
-them with useful info such as what it does, why it's needed, bug reports,
-original creators, etc... For simple patches, we reserve the right to assume
-your IQ is greater than absolute 0 and figure out what it does w/out an
-explanation. If, by some miracle of science, it falls below the absolute 0
-mark, you should help mankind by finding some scientists and letting them
-probe you with their ... erm ... probes.
-
- =================
- === W[here]TF ===
- =================
-
-For those with git access
-git://git.overlays.gentoo.org/proj/hardened-gccpatchset.git
-
-For those w/out git access, this URL should help you:
-http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-gccpatchset.git;a=summary
-
-It should be pretty easy to find your way around, you're a big boy after all.
diff --git a/specs/README.history b/specs/README.history
deleted file mode 100644
index b56e661..0000000
--- a/specs/README.history
+++ /dev/null
@@ -1,56 +0,0 @@
-0.1.8 04-10-2010
- vanilla.specs
- README.Gentoo.patches
-
-0.1.7 09-24-2009
- vanilla.specs
- hardenednopie.specs
- - hardenednoznow.specs
- - strictoverflow.specs
- + README.Gentoo.patches
-
-0.1.6 09-20-2009
- + strictoverflow.specs
- vanilla.specs
-
-0.1.5 09-08-2009
- hardenednopie.specs
- hardenednossp.specs
-
-0.1.4 23-07-2009
- - nopie.specs
- - noznow.specs
- - nossp.specs
- vanilla.specs
- + hardenednopie.specs
- + hardenednoznow.specs
- + hardenednossp.specs
-
-0.1.3 14-06-2009
- - nofortify.specs
- nopie.specs
- noznow.specs
- vanilla.specs
- nossp.specs
- - strict.specs
-
-0.1.2 08-05-2009
- vanilla.specs
- + strict.specs
-
-0.1.1 04-05-2009
- - nossp_all.specs
- - strict.specs
- nofortify.specs
- nopie.specs
- vanilla.specs
- nossp.specs
-
-0.1.0 26-04-2009
- + nofortify.specs
- + nopie.specs
- + noznow.specs
- + vanilla.specs
- + nossp_all.specs
- + strict.specs
- + nossp.specs
diff --git a/specs/hardenednopie.specs b/specs/hardenednopie.specs
deleted file mode 100644
index bbc74e9..0000000
--- a/specs/hardenednopie.specs
+++ /dev/null
@@ -1,12 +0,0 @@
-*espf_cc1_pie:
-
-
-*espf_options_pie:
-
-
-*espf_options_pie_check:
-
-
-*espf_link_pie:
-
-
diff --git a/specs/hardenednossp.specs b/specs/hardenednossp.specs
deleted file mode 100644
index ab48017..0000000
--- a/specs/hardenednossp.specs
+++ /dev/null
@@ -1,6 +0,0 @@
-*espf_cc1_ssp:
-
-
-*espf_options_ssp:
-
-
diff --git a/specs/vanilla.specs b/specs/vanilla.specs
deleted file mode 100644
index 4a7b4fe..0000000
--- a/specs/vanilla.specs
+++ /dev/null
@@ -1,8 +0,0 @@
-%include <hardenednossp.specs>
-%include <hardenednopie.specs>
-*espf_link_now:
-
-
-*espf_cc1_strict:
-
-