diff options
author | Igor Pashev <pashev.igor@gmail.com> | 2019-11-18 15:53:29 +0300 |
---|---|---|
committer | Igor Pashev <pashev.igor@gmail.com> | 2019-11-18 15:53:29 +0300 |
commit | 8f6c4b0033c72f8ac14694c419a99458339dd6a9 (patch) | |
tree | 06c106e622a58100aa85a381b9b65d222b076df4 /debian/patches/gcc-default-ssp-strong.diff | |
parent | 42156b5190f4fa150e1fab6777eb81e69d4db8c9 (diff) | |
download | gcc-9-debian.tar.gz |
Import gcc-9 (9.2.1-19)debian/9.2.1-19debian
Diffstat (limited to 'debian/patches/gcc-default-ssp-strong.diff')
-rw-r--r-- | debian/patches/gcc-default-ssp-strong.diff | 59 |
1 files changed, 0 insertions, 59 deletions
diff --git a/debian/patches/gcc-default-ssp-strong.diff b/debian/patches/gcc-default-ssp-strong.diff deleted file mode 100644 index 2101fa2..0000000 --- a/debian/patches/gcc-default-ssp-strong.diff +++ /dev/null @@ -1,59 +0,0 @@ -# DP: Default to -fstack-protector-strong starting with Ubuntu 14.10. - -Index: b/src/gcc/gcc.c -=================================================================== ---- a/src/gcc/gcc.c -+++ b/src/gcc/gcc.c -@@ -863,7 +863,7 @@ proper position among the other output f - - #ifndef SSP_DEFAULT_SPEC - #ifdef TARGET_LIBC_PROVIDES_SSP --#define SSP_DEFAULT_SPEC "%{!fno-stack-protector:%{!fstack-protector-all:%{!ffreestanding:%{!nostdlib:-fstack-protector}}}} " FORMAT_SECURITY_SPEC -+#define SSP_DEFAULT_SPEC "%{!fno-stack-protector:%{!fstack-protector-all:%{!ffreestanding:%{!nostdlib:%{!fstack-protector:-fstack-protector-strong}}}}} " FORMAT_SECURITY_SPEC - #else - #define SSP_DEFAULT_SPEC FORMAT_SECURITY_SPEC - #endif -Index: b/src/gcc/doc/invoke.texi -=================================================================== ---- a/src/gcc/doc/invoke.texi -+++ b/src/gcc/doc/invoke.texi -@@ -9771,6 +9771,11 @@ branch target registers within any basic - Optimize the prologue of variadic argument functions with respect to usage of - those arguments. - -+NOTE: In Ubuntu 14.10 and later versions, -+@option{-fstack-protector-strong} is enabled by default for C, -+C++, ObjC, ObjC++, if none of @option{-fno-stack-protector}, -+@option{-nostdlib}, nor @option{-ffreestanding} are found. -+ - @item -fsection-anchors - @opindex fsection-anchors - Try to reduce the number of symbolic address calculations by using -@@ -10351,13 +10356,13 @@ value of a shared integer constant. The - The minimum size of buffers (i.e.@: arrays) that receive stack smashing - protection when @option{-fstack-protection} is used. - -+This default before Ubuntu 10.10 was "8". Currently it is "4", to increase -+the number of functions protected by the stack protector. -+ - @item min-size-for-stack-sharing - The minimum size of variables taking part in stack slot sharing when not - optimizing. The default value is 32. - --This default before Ubuntu 10.10 was "8". Currently it is "4", to increase --the number of functions protected by the stack protector. -- - @item max-jump-thread-duplication-stmts - Maximum number of statements allowed in a block that needs to be - duplicated when threading jumps. -@@ -11276,10 +11281,6 @@ functions with buffers larger than 8 byt - when a function is entered and then checked when the function exits. - If a guard check fails, an error message is printed and the program exits. - --NOTE: In Ubuntu 6.10 and later versions this option is enabled by default --for C, C++, ObjC, ObjC++, if none of @option{-fno-stack-protector}, --@option{-nostdlib}, nor @option{-ffreestanding} are found. -- - @item -fstack-protector-all - @opindex fstack-protector-all - Like @option{-fstack-protector} except that all functions are protected. |