0.4.0 Magnus Granberg rename espf to esp and change espf-patchset to piepatchset 0.3.9 Magnus Granberg * gcc/configure Added check for TLS on the target in the SSP check. #149292 b.g.o * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector * gcc/config/i386/linux64.h Removed uclibc don't support TLS on stack-protector * gcc/config/rs6000/linux.h Removed uclibc don't support TLS on stack-protector * gcc/config/i386/linux.h Removed uclibc don't support TLS on stack-protector * gcc/config/sparc/linux.h Removed uclibc don't support TLS on stack-protector * gcc/config/sparc/linux64.h Removed uclibc don't support TLS on stack-protector 0.3.8 Magnus Granberg * gcc/configure Added a -fstack-protector check. * gcc/config.in Added HAVE_GCC_SSP * gcc/gcc.c Removed code for espf_link_spec in do_spec_1() %X * gcc/espf.h Added ifdef HAVE_GCC_SSP, change code for espf_link_spec and link_pie_spec 0.3.7 Magnus Granberg * gcc/gcc.c Remove code for Wl,-z,now check * gcc/espf.h Change text for -z now 0.3.6 Magnus Granberg * configure Check --enable-espf change ppc* to powerpc*, powerpc64 and add ia64. * gcc/configure Don't check for -z,relro on ia64. Disable crtbeginTS for ia64. * gcc/espf.h ia64 don't support -fstack-protector* 0.3.5 Maguns Granberg * gcc/espf.h Change the specs for crtbegin.TS.o. * gcc/gcc.c Rename espf_cc1_options to espf_options_pie_check. * gcc/config/linux.h Fix typos ENABLE_CRTBEGINS to ENABLE_CRTBEGINTS * gcc/config/rs6000/linux64.h ASM_SPEC32: %{fpic:-K PIC} %{fPIC:-K PIC} to %{fpic|fPIC|fpie|fPIE:-K PIC} 0.3.4 Magnus Granberg * gcc/configure Add crtbeginTS.o support. * gcc/Makefile.in Add crtbeginTS.o support. * gcc/gcc.c Add espf_cc1_options. * gcc/espf.h Added espf_cc1_options, crtbeginTS.o support, espf_cc1_options and espf_cc1_strictoverflow. * gcc/config.in Add crtbeginTS.o support. * gcc/config/linux.h Add crtbeginTS.o support. * gcc/config/rs6000/sysv4.h Add crtbeginTS.o support. * gcc/doc/invoke.texi Add NOTES about -fstack-protector-all, -pie and -fPIE. * libgcc/Makefile.in Add crtbeginTS.o support. 0.3.3 Magnus Granberg * gcc/opts.c change #ifdef ENABLE_ESPF to #ifndef ENABLE_ESPF 0.3.2 Magnus Granberg * gcc/opts.c disable flag_delete_null_pointer_checks >= -O2 * gcc/espf.h add ESPF_CC1_SSP_SPEC and ESPF_CC1_PIE_SPEC to fix bugs on -vanilla spec #149292 b.g.o * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector * gcc/config/i386/linux64.h uclibc don't support TLS on stack-protector * gcc/config/rs6000/linux.h uclibc don't support TLS on stack-protector * gcc/config/i386/linux.h uclibc don't support TLS on stack-protector * gcc/config/sparc/linux.h uclibc don't support TLS on stack-protector * gcc/config/sparc/linux64.h uclibc don't support TLS on stack-protector 0.3.1 Magnus Granberg * gcc/cp/Make-lang.in cc1plus: pch test fail when cc1plus is compile with -fPIE. * gcc/configure fix --enable-espf when USE"-hardened" 4.4.1-espf-0.3.0 Magnus Granberg * gcc/espf.h add ESPF_LINK_SPEC ESPF_LINK_NOW_SPEC * gcc/gcc.c move do_self_spec (espf_command_options_spec) do_spec_1() add espf_link_spec 0.3.0 Magnus Granberg * gcc/objc/lang-specs.h Add %(espf_options) * gcc/objcp/lang-specs.h Add %(espf_options) * gcc/cp/lang-specs.h Add %(espf_options) * gcc/config.in removed ENABLE_LIBSSP * Makefile.in We add -fno-stack-protector to BOOT_CFLAGS, LIBCFLAGS and LIBCXXFLAGS cc1: pch.exp test fail when cc1 is compile with -fPIE * libmudflap/Makefiles.in Add -fno-stack-protector -U_FORTIFY_SOURCE to AM_CFLAGS * configure add --enable-espf add -fno-stack-protector to stage1_cflags add targes ppc* arm sparc* * gcc/configure change code for check --enable-espf * libmudflap/configure add enable_espf * gcc/espf.h ESPF_CC1_OPTIONS_SPEC renamed to ESPF_OPTIONS_SPEC add ESPF_CPP_OPTIONS_SPEC ESPF_COMMAND_OPTIONS_SPEC ESPF_CC1_OPTIONS_SSP_SPEC renamed to ESPF_OPTIONS_SSP_SPEC ESPF_COMPILER_COMMAND_PIE_SPEC renamed to ESPF_OPTIONS_PIE_SPEC ESPF_LINK_COMMAND_PIE_SPEC renamed to ESPF_LINK_PIE_SPEC add !p !pg to ESPF_LINK_PIE_SPEC removed ESPF_LINK_SPEC ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC * gcc/gcc.c cpp_options add %(espf_cpp_options) compiler spec add %(espf_options) change code for ESPF_EXTRA_SPECS process_command(): Check for lazy, or now do_spec_1(): Add -z now and -z relro main() add do_self_spec (espf_command_options_spec) removed do_self_spec (espf_cc1_command_spec) do_self_spec (espf_link_command_spec) 0.2.9 Magnus Granberg * gcc/espf.h add ESPF_COMPILER_COMMAND_PIE_SPEC add ESPF_LINK_COMMAND_PIE_SPEC change ESPF_COMPILER_COMMAND_SPEC ESPF_LINK_COMMAND_SPEC 0.2.8 Magnus Granberg * gcc/configure removed check crtbeginTS.o * gcc/espf.h added notes add ESPF_CC1_SPEC removed ESPF_CPP_UNIQUE_OPTIONS espf_override_options() * gcc/gcc.c cc1_spec Set it to CC1_SPEC if ! ENABLE_ESPF * gcc/toplev.c removed ESPF_OVERRIDE_OPTIONS 0.2.7 Magnus Granberg * gcc/opts.c (decode_options): Remove flag_strict_overflow as opt2 * gcc/config.in removed HAVE_CRTBEGINTS * gcc/Makefile removed crtbeginTS.o * libgcc/Makefile.in removed crtbeginTS.o * gcc/config/i386/i386.h removed espf_override_options ESPF_EXTRA_SPECS * gcc/config/linux.h remoevd crtbeginTS.o * gcc/espf.h ESPF_CC1_OPTIONS_PIE_SPEC renamed to ESPF_CC1_COMMAND_SPEC * gcc/gcc.c add ESPF_EXTRA_SPECS main() add do_self_spec (espf_cc1_command_spec) 0.2.6 Magnus Granberg * gcc/config/i386/i386.h add espf_override_options() to OVERRIDE_OPTIONS * gcc/espf.h add espf_override_options() * gcc/toplev.c add ESPF_OVERRIDE_OPTIONS 0.2.5 Magnus Granberg * gcc/config/i386/i386.h removed espf_cc1 * gcc/config/i386/linux.h removed espf_cc1 %(crtend_gen) * gcc/config/i386/x86-64.h removed espf_cc1 %(crtend_gen) * gcc/config/linux.h removed espf_cc1 %(crtfile_gen) %(crtbegin_t_gen) %(crtend_gen) add crtbeginTS.o * gcc/config.in removed TARGET_LIBC_PROVIDES_PIE add HAVE_CRTBEGINTS * gcc/Makefile.in add ESPF_NOPIE_CFLAGS ESPF_NOSSP_CFLAGS to CRTSTUFF_T_CFLAGS add ESPF_NOSSP_CFLAGS to CRTSTUFF_T_CFLAGS_S * espf.h ESPF_CC1_SPEC renamed to ESPF_CC1_OPTIONS_SPEC add ESPF_LINK_SPEC ESPF_CC1_SSP_SPEC renamed to ESPF_CC1_OPTIONS_SSP_SPEC ESPF_CC1_PIE_SPEC renamed to ESPF_CC1_OPTIONS_PIE_SPEC ESPF_CC1_OPTIONS_SPEC renamed to ESPF_CC1_OPTIONS_PIE_INCOMPATIBLE_SPEC LINK_PIE_SPEC renamed to ESPF_LINK_COMMAND_SPEC removed ESPF_CC1_STRICT_SPEC CRTFILE_GEN_SPEC CRTBEGIN_GEN_SPEC CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC * gcc/configure remove TARGET_LIBC_PROVIDES_PIE define HAVE_CRTBEGINTS * gcc/gcc.c LINK_COMMAND_SPEC add %(espf_link) main() add do_self_spec (espf_link_command_spec) 0.2.4 Magnus Granberg libgcc/Makefile.in clean specs 0.2.3 Magnus Granberg *gcc/espf.h add ESPF_CC1_STRICT_SPEC 0.2.2 Magnus Granberg * gcc/config/i386/i386.h Add espf_cc1 Add ESPF_EXTRA_SPECS * gcc/config/i386/linux.h Add espf_cc1 * gcc/config/i386/x86-64.h Add espf_cc1 * gcc/config/linux.h Add espf_cc1 * gcc/Makefile.in add crtbeginTS.o to EXTRA_PARTS list * libgcc/Makefile.in add crtbeginTS.o to EXTRA_PARTS list * gcc/configure add define ENABLE_LIBSSP * gcc/gcc.c %(fortify_default) renamed to %(espf_cpp_unique_options) %(pie_incompatible) renamed to %(espf_cc1_options) removed ESPF_EXTRA_SPECS * gcc/espf.h ESPF_DEFAULT_SPEC renamed to ESPF_CC1_SPEC SSP_DEFAULT_SPEC renamed to ESPF_CC1_SSP_SPEC FORTIFY_DEFAULT_SPEC renamed to ESPF_CPP_UNIQUE_OPTIONS PIE_DEFAULT_SPEC renamed to ESPF_CC1_PIE_SPEC PIE_INCOMPATIBLE_SPEC renamed to ESPF_CC1_OPTIONS_SPEC add new CRTFILE_GEN_SPEC CRTBEGIN_T_GEN_SPEC CRTEND_GEN_SPEC if ! TARGET_LIBC_PROVIDES_PIE 4.4.0-espf-0.2.1 Magnus Granberg * gcc/gcc.c include: espf.h cc1_spec = CC1_SPEC if not ENABLE_ESPF cpp_unique_options add %(fortify_default) cc1_options add %(pie_incompatible) EXTRA_SPECS add ESPF_EXTRA_SPECS * libgcc/Makefile.in add crtbeginTs.o gcc/Makefile.in add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS LIBGCC2_CFLAGS add ESPF_NOSSP_CFLAGS CRTSTUFF_CFLAGS add ESPF_NOPIE_CFLAGS and ESPF_NOSSP_CFLAGS crtbegin* add crtbeginTS $(out_object_file): ix86_split_to_parts() stack smashing attack b.g.o #149292 * libgcc/configure add enable_espf * gcc/config/linux.h add %(crtfile_gen) %(crtbegin_t_gen) %(crtend_gen) * gcc/config/i386/linux.h add %(crtend_gen) * gcc/config/i386/linux64.h add %(crtend_gen) * gcc/config.gcc extra_parts add crtbeginTS.o * libgcc/config.host extra_parts add crtbeginTS.o * gcc/configure check -z relro check -z now check FORTIFY_SOURCES level 2 check Scrt1.o check --enable-espf check crtbeginTS.o * gcc/espf.h new file * gcc/varasm.c (decl_tls_model): Check flag_pic instead of flag_shlib * gcc/config.in add ENABLE_LIBSSP add ENABLE_ESPF add TARGET_LIBC_PROVIDES_FORTIFY2 add TARGET_LIBC_PROVIDES_PIE * configure define ENABLE_LIBSSP gcc-4.3.3-piepatches-v10.2.1