new gcc snapshot
[dottout.git] / net-im / emesene / files / sys-devel / gcc / files / pro-police-docs.patch
blob091ea44ef0d71143bb967c9fd2f01d19aee96882
1 Index: gcc/doc/invoke.texi
2 ===================================================================
3 RCS file: /cvsroot/gcc/gcc/gcc/doc/invoke.texi,v
4 retrieving revision 1.364
5 diff -c -3 -p -r1.364 invoke.texi
6 *** gcc/doc/invoke.texi 21 Nov 2003 11:42:58 -0000 1.364
7 --- gcc/doc/invoke.texi 22 Nov 2003 08:12:35 -0000
8 *************** in the following sections.
9 *** 228,234 ****
10 -Wno-multichar -Wnonnull -Wpacked -Wpadded @gol
11 -Wparentheses -Wpointer-arith -Wredundant-decls @gol
12 -Wreturn-type -Wsequence-point -Wshadow @gol
13 ! -Wsign-compare -Wstrict-aliasing @gol
14 -Wswitch -Wswitch-default -Wswitch-enum @gol
15 -Wsystem-headers -Wtrigraphs -Wundef -Wuninitialized @gol
16 -Wunknown-pragmas -Wunreachable-code @gol
17 --- 228,234 ----
18 -Wno-multichar -Wnonnull -Wpacked -Wpadded @gol
19 -Wparentheses -Wpointer-arith -Wredundant-decls @gol
20 -Wreturn-type -Wsequence-point -Wshadow @gol
21 ! -Wsign-compare -Wstack-protector -Wstrict-aliasing @gol
22 -Wswitch -Wswitch-default -Wswitch-enum @gol
23 -Wsystem-headers -Wtrigraphs -Wundef -Wuninitialized @gol
24 -Wunknown-pragmas -Wunreachable-code @gol
25 *************** in the following sections.
26 *** 681,686 ****
27 --- 681,687 ----
28 -fshort-double -fshort-wchar @gol
29 -fverbose-asm -fpack-struct -fstack-check @gol
30 -fstack-limit-register=@var{reg} -fstack-limit-symbol=@var{sym} @gol
31 + -fstack-protector -fstack-protector-all @gol
32 -fargument-alias -fargument-noalias @gol
33 -fargument-noalias-global -fleading-underscore @gol
34 -ftls-model=@var{model} @gol
35 *************** effectively. Often, the problem is that
36 *** 3014,3019 ****
37 --- 3015,3024 ----
38 complex; GCC will refuse to optimize programs when the optimization
39 itself is likely to take inordinate amounts of time.
41 + @item -Wstack-protector
42 + @opindex Wstack-protector
43 + Warn when not issuing stack smashing protection for some reason
45 @item -Werror
46 @opindex Werror
47 Make all warnings into errors.
48 *************** and grows downwards, you can use the fla
49 *** 11474,11479 ****
50 --- 11479,11502 ----
51 @option{-fstack-limit-symbol=__stack_limit} and
52 @option{-Wl,--defsym,__stack_limit=0x7ffe0000} to enforce a stack limit
53 of 128KB@. Note that this may only work with the GNU linker.
55 + @item -fstack-protector
56 + @item -fstack-protector-all
57 + @opindex fstack-protector
58 + @opindex fstack-protector-all
59 + @opindex fno-stack-protector
60 + Generate code to protect an application from a stack smashing
61 + attack. The features are (1) the insertion of random value next to the
62 + frame pointer to detect the integrity of the stack, (2) the reordering
63 + of local variables to place buffers after pointers to avoid the
64 + corruption of pointers that could be used to further corrupt arbitrary
65 + memory locations, (3) the copying of pointers in function arguments to
66 + an area preceding local variable buffers to prevent the corruption of
67 + pointers that could be used to further corrupt arbitrary memory
68 + locations, and the (4) omission of instrumentation code from some
69 + functions to decrease the performance overhead. If the integrity
70 + would be broken, the program is aborted. If no-stack-protector is
71 + specified, instrumentation codes are generated at every functions.
73 @cindex aliasing of parameters
74 @cindex parameters, aliased