History log of /openbsd-src/gnu/gcc/gcc/common.opt (Results 1 – 16 of 16)
Revision Date Author Comments
# 3e83d15b 10-Jan-2023 deraadt <deraadt@openbsd.org>

create infrastructure so that jump tables on/off can be tweaked by an
architecture by changing JUMP_TABLES_DEFAULT
ok kettenis


# f451200a 10-Jul-2014 matthew <matthew@openbsd.org>

Backport support for -Wframe-larger-than=N to base GCC

This is the flag name that modern GCC and Clang have de facto
standardized on for the functionality that we locally named
-Wstack-larger-than-N

Backport support for -Wframe-larger-than=N to base GCC

This is the flag name that modern GCC and Clang have de facto
standardized on for the functionality that we locally named
-Wstack-larger-than-N.

ok brad, miod

show more ...


# 121b8252 06-May-2014 martynas <martynas@openbsd.org>

Introduce -fstack-shuffle, which randomizes local stack variables.
This will make the environment more hostile and help detect bugs
that depend on overrunning one variable into another, with almost
n

Introduce -fstack-shuffle, which randomizes local stack variables.
This will make the environment more hostile and help detect bugs
that depend on overrunning one variable into another, with almost
no performance cost.

Discussed with Theo at m2k14 hackathon. "oh god yes" tedu@, "oh nice" djm@

show more ...


# c7057713 30-Mar-2014 martynas <martynas@openbsd.org>

Change the heuristics of -fstack-protector to select to protect
additional functions --- those that have local array definitions,
or have references to local frame addresses.

Note that upstream uses

Change the heuristics of -fstack-protector to select to protect
additional functions --- those that have local array definitions,
or have references to local frame addresses.

Note that upstream uses -fstack-protector-strong and misleads people:
-fstack-protector, -fstack-protector-all, -fstack-protector-strong
can you tell which one is safe?

Luckily, OpenBSD has its own compiler and is able to do the right
thing for security: this is enabled by default, and called
-fstack-protector.

OK deraadt@, miod@. Tested for 3 months.

show more ...


# 1bd5ac70 14-Jan-2014 martynas <martynas@openbsd.org>

Add a new option "-fstack-protector-strong" for GCC4. This includes
additional functions to be protected --- those that have local array
definitions, or have references to local frame addresses.

No

Add a new option "-fstack-protector-strong" for GCC4. This includes
additional functions to be protected --- those that have local array
definitions, or have references to local frame addresses.

Note 1: Han explicitly licensed this under GPLv2 for us.
Note 2: Do *not* use this anywhere in "src" Makefiles, as the other
GCC doesn't have this option yet (but I'm working on it).

show more ...


# 9622a78f 28-Aug-2012 pascal <pascal@openbsd.org>

Add support for PIE-by-default in both ld and gcc. This is a completely
different approach than the one taken in kurt@'s original diff, but deemed
better after discussion and diff exchange with kett

Add support for PIE-by-default in both ld and gcc. This is a completely
different approach than the one taken in kurt@'s original diff, but deemed
better after discussion and diff exchange with kettenis@ and matthew@.

Lots of feedback by kettenis@ and matthew@, prodding and encouragement by
deraadt@.

ok kettenis@ matthew@

show more ...


# 9d06096b 02-Apr-2012 pascal <pascal@openbsd.org>

In r1.2, instead of making -fno-ident the default, its semantics have been
totally fucked up, effectively leading to inverted behaviour of the -fident and
-fno-ident flags (while keeping the .ident s

In r1.2, instead of making -fno-ident the default, its semantics have been
totally fucked up, effectively leading to inverted behaviour of the -fident and
-fno-ident flags (while keeping the .ident string in by default). Revert it
back to normal and default to -fno-ident.

ok millert@

show more ...


# 763c929c 26-Jul-2010 guenther <guenther@openbsd.org>

Turn on -Wsystem-headers by default, so that glitches in our headers
aren't silently ignored but rather get warned about and fixed. Purely
stylistic warnings like -Wredundant-decls are your own prob

Turn on -Wsystem-headers by default, so that glitches in our headers
aren't silently ignored but rather get warned about and fixed. Purely
stylistic warnings like -Wredundant-decls are your own problem however.

testing help from landry@, header fixes from kettenis@
ok deraadt@

show more ...


# 02ddaac8 30-May-2010 kettenis <kettenis@openbsd.org>

Only enable -fstack-protector by default on targets that support it.

ok marco@


# 100a546d 25-May-2010 robert <robert@openbsd.org>

Enable -fstack-protector by default.


# f3219db0 20-May-2010 drahn <drahn@openbsd.org>

turn off strict overflow for all optimizations on OpenBSD, also disable wrapv.
ok kettenis@ robert@, tested by marco@, kevlo@ myself


# 18000515 29-Apr-2010 kettenis <kettenis@openbsd.org>

Implement -Wvariable-decl.

ok robert@


# d456bc6e 28-Apr-2010 kettenis <kettenis@openbsd.org>

Enable -fwrapv by default. It's what many programmers expect and according
to miod@ "has a history of being required to build security concerned
software".

ok guenther@, jsg@, robert@


# 490b27d6 24-Feb-2010 robert <robert@openbsd.org>

merge more local changes:
- disable unsafe builtins
- create a stub for -Wbounded
- move strict aliasing to -O3


# 17c8d4a9 15-Oct-2009 robert <robert@openbsd.org>

merge some gcc-local(1) changes:
- disable -fident by default
- disable -fstrict-aliasing with -O2
- add support for -Wstack-larger-than-N (only for i386 and amd64 for now)


# 404b540a 15-Oct-2009 robert <robert@openbsd.org>

import of gcc-4.2.1, the last gcc release under GPLv2