From patchwork Thu Apr 4 16:42:01 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Malcolm X-Patchwork-Id: 1919878 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=UIRqxTQs; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=2620:52:3:1:0:246e:9693:128c; helo=server2.sourceware.org; envelope-from=gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [IPv6:2620:52:3:1:0:246e:9693:128c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4V9S8k1Mlyz1yYn for ; Fri, 5 Apr 2024 03:42:46 +1100 (AEDT) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 62E013844747 for ; Thu, 4 Apr 2024 16:42:44 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by sourceware.org (Postfix) with ESMTPS id EE34E3858C52 for ; Thu, 4 Apr 2024 16:42:11 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org EE34E3858C52 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=redhat.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org EE34E3858C52 Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=170.10.133.124 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1712248934; cv=none; b=fW+Jy0g4066L+lzkQq89akizSuERW7Md28i35omMIl1WTuDf5heZYVobJ7SUPhCpLM2ywRK6h6p6qSc2q66WxTb65G7LagkZAR2xqF8/z0fsSS0faIsuMvx/Xg71bJBuOXWpcWFYP0NaVauZbk//uH2jfuOQpBpBRSPVfNRU1mg= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1712248934; c=relaxed/simple; bh=VcBW4MGA3P1B1JW6p0QPWocp10wiWEopWI3HdsD7kds=; h=DKIM-Signature:From:To:Subject:Date:Message-Id:MIME-Version; b=g/y1PPIcrPehfh/wPRy776BKYh2HTWg6upErEL+j0cueqtnzNPXYaS8FCsSifgCo8bYLiXxr9XKHuHZA8Sj/8LQKrf3+ZRwHG5tGZtO3VnxgYeEarOZB7xpROpQnsZFHjnnqj/JsW4b4vsr7UoDhB4PVz3qpUY/4JtvLmVlTPIw= ARC-Authentication-Results: i=1; server2.sourceware.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1712248931; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=kNagm3motzshRuc9M4owtzxvk7EEaj2d/LXC82yrlxc=; b=UIRqxTQscqSvAwkgnALeij/BEhXsGN8LfoIwdcLtKlEAuajHe0NlBKKznGQms2Gp4uxWjW gNK4gCgEWKGVkpDv1I2QbmEO3Juq2aFJfmbM725QUTFN1p5hnr43bfAlTMsD77ysdTcTv6 eYM9UA6piXGC9lhmSG3nhVFvA2oDnZ8= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-556-IEnoHP_pNoK8T1kqT9W50A-1; Thu, 04 Apr 2024 12:42:10 -0400 X-MC-Unique: IEnoHP_pNoK8T1kqT9W50A-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id D0779185A787 for ; Thu, 4 Apr 2024 16:42:09 +0000 (UTC) Received: from t14s.localdomain.com (unknown [10.22.32.209]) by smtp.corp.redhat.com (Postfix) with ESMTP id AB9961C060D0; Thu, 4 Apr 2024 16:42:09 +0000 (UTC) From: David Malcolm To: gcc-patches@gcc.gnu.org Cc: David Malcolm Subject: [PATCH 2/9] wwwdocs: gcc-14: add URLs to some options Date: Thu, 4 Apr 2024 12:42:01 -0400 Message-Id: <20240404164208.2437213-3-dmalcolm@redhat.com> In-Reply-To: <20240404164208.2437213-1-dmalcolm@redhat.com> References: <20240404164208.2437213-1-dmalcolm@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.7 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com X-Spam-Status: No, score=-11.4 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, KAM_SHORT, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H4, RCVD_IN_MSPIKE_WL, SPF_HELO_NONE, SPF_NONE, TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org Signed-off-by: David Malcolm --- htdocs/gcc-14/changes.html | 23 ++++++++++++++++------- 1 file changed, 16 insertions(+), 7 deletions(-) diff --git a/htdocs/gcc-14/changes.html b/htdocs/gcc-14/changes.html index 5cc729c5..397458d5 100644 --- a/htdocs/gcc-14/changes.html +++ b/htdocs/gcc-14/changes.html @@ -149,26 +149,33 @@ a work-in-progress.

to enable additional hardening.
  • - New option -fhardened, an umbrella option that enables a set - of hardening flags. The options it enables can be displayed using the + New option + -fhardened, + an umbrella option that enables a set of hardening flags. + The options it enables can be displayed using the --help=hardened option.
  • - New option -fharden-control-flow-redundancy, to - verify, at the end of functions, that the visited basic blocks + New option + -fharden-control-flow-redundancy, + to verify, at the end of functions, that the visited basic blocks correspond to a legitimate execution path, so as to detect and prevent attacks that transfer control into the middle of functions.
  • - New type attribute hardbool, for C and Ada. Hardened + New type attribute + hardbool, + for C and Ada. Hardened booleans take user-specified representations for true and false, presumably with higher hamming distance than standard booleans, and get verified at every use, detecting memory corruption and some malicious attacks.
  • - New type attribute strub to control stack scrubbing + New type attribute + strub + to control stack scrubbing properties of functions and variables. The stack frame used by functions marked with the attribute gets zeroed-out upon returning or exception escaping. Scalar variables marked with the attribute @@ -176,7 +183,9 @@ a work-in-progress.

    enabled implicitly.
  • - New option -finline-stringops, to force inline + New option + -finline-stringops, + to force inline expansion of memcmp, memcpy, memmove and memset, even when that is not an optimization, to avoid relying on library