diff options
author | A. Wilcox <AWilcox@Wilcox-Tech.com> | 2019-02-28 23:20:33 +0000 |
---|---|---|
committer | A. Wilcox <AWilcox@Wilcox-Tech.com> | 2019-02-28 23:20:33 +0000 |
commit | 223093d95abfc2b2161105f2ef73a8287c687d95 (patch) | |
tree | c4e06a18734c392ef7bd33243cf7e8071f104dcb /system/gcc/003_all_default-fortify-source.patch | |
parent | 54003d7ae7f86ebba107ddad7ea6be0fdcaa6259 (diff) | |
download | packages-223093d95abfc2b2161105f2ef73a8287c687d95.tar.gz packages-223093d95abfc2b2161105f2ef73a8287c687d95.tar.bz2 packages-223093d95abfc2b2161105f2ef73a8287c687d95.tar.xz packages-223093d95abfc2b2161105f2ef73a8287c687d95.zip |
system/gcc: bump to 8.3.0
These patches have been forward-ported to 8:
002_all_default-relro.patch
005_all_default-as-needed.patch
011_all_default-warn-format-security.patch
012_all_default-warn-trampolines.patch
We are no longer using fortify-headers, so these patches are no longer needed:
003_all_default-fortify-source.patch
050_all_libiberty-asprintf.patch
053_all_libitm-no-fortify-source.patch
These patches no longer appear necessary:
067_all_gcc-poison-system-directories.patch
090_all_pr55930-dependency-tracking.patch
201-cilkrts.patch
203-libgcc_s.patch
207-static-pie.patch
These patches have already been applied upstream:
204-linux_libc_has_function.patch
332-gccgo-remove-ustat.patch
ada-aarch64-multiarch.patch
ada-fixes.patch
boehm-gc-musl.patch
fix-rs6000-pie.patch
gcc-4.8-build-args.patch
lra-pentium.patch
These patches are no longer necessary because GCJ has been removed:
310-build-gcj-s390x.patch
fix-gcj-iconv-musl.patch
fix-gcj-musl.patch
fix-gcj-stdgnu14-link.patch
The rest of the changes are updates from nsz's patchset.
Diffstat (limited to 'system/gcc/003_all_default-fortify-source.patch')
-rw-r--r-- | system/gcc/003_all_default-fortify-source.patch | 40 |
1 files changed, 0 insertions, 40 deletions
diff --git a/system/gcc/003_all_default-fortify-source.patch b/system/gcc/003_all_default-fortify-source.patch deleted file mode 100644 index 6ca803343..000000000 --- a/system/gcc/003_all_default-fortify-source.patch +++ /dev/null @@ -1,40 +0,0 @@ -# DP: Turn on -D_FORTIFY_SOURCE=2 by default for C, C++, ObjC, ObjC++, -# DP: if the optimization level is > 0 - ---- - gcc/doc/invoke.texi | 6 ++++++ - gcc/c-family/c-cppbuiltin.c | 3 + - 2 files changed, 9 insertions(+), 0 deletions(-) - -Index: b/gcc/doc/invoke.texi -=================================================================== ---- a/gcc/doc/invoke.texi -+++ b/gcc/doc/invoke.texi -@@ -7840,6 +7840,12 @@ also turns on the following optimization - Please note the warning under @option{-fgcse} about - invoking @option{-O2} on programs that use computed gotos. - -+NOTE: In Alpine Linux, @option{-D_FORTIFY_SOURCE=2} is -+set by default, and is activated when @option{-O} is set to 2 or higher. -+This enables additional compile-time and run-time checks for several libc -+functions. To disable, specify either @option{-U_FORTIFY_SOURCE} or -+@option{-D_FORTIFY_SOURCE=0}. -+ - @item -O3 - @opindex O3 - Optimize yet more. @option{-O3} turns on all optimizations specified -Index: b/gcc/c-family/c-cppbuiltin.c -=================================================================== ---- a/gcc/c-family/c-cppbuiltin.c -+++ b/gcc/c-family/c-cppbuiltin.c -@@ -1176,6 +1176,10 @@ c_cpp_builtins (cpp_reader *pfile) - builtin_define_with_value ("__REGISTER_PREFIX__", REGISTER_PREFIX, 0); - builtin_define_with_value ("__USER_LABEL_PREFIX__", user_label_prefix, 0); - -+ /* Fortify Source enabled by default for optimization levels > 0 */ -+ if (optimize) -+ builtin_define_with_int_value ("_FORTIFY_SOURCE", 2); -+ - /* Misc. */ - if (flag_gnu89_inline) - cpp_define (pfile, "__GNUC_GNU_INLINE__"); |