diff options
Diffstat (limited to 'share')
-rw-r--r-- | share/man/man1/gcc-local.1 | 17 |
1 files changed, 15 insertions, 2 deletions
diff --git a/share/man/man1/gcc-local.1 b/share/man/man1/gcc-local.1 index a710017b329..51078a567b3 100644 --- a/share/man/man1/gcc-local.1 +++ b/share/man/man1/gcc-local.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: gcc-local.1,v 1.31 2012/08/12 17:01:35 schwarze Exp $ +.\" $OpenBSD: gcc-local.1,v 1.32 2012/08/31 19:01:31 pascal Exp $ .\" .\" Copyright (c) 2002 Marc Espie .\" Copyright (c) 2003 Anil Madhavapeddy @@ -25,7 +25,7 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: August 12 2012 $ +.Dd $Mdocdate: August 31 2012 $ .Dt GCC-LOCAL 1 .Os .Sh NAME @@ -185,6 +185,19 @@ option, that turns stack protection code on for all functions, and disables any heuristic that flags some functions as safe. This extended checking has a moderate runtime cost, though. .It +On the amd64, mips64, mips64el and sparc64 architectures, +.Nm gcc +generates position-independent executables +.Pq PIEs +by default, allowing the system to load the resulting binary +at a random location. +This behavior can be turned off by passing +.Fl fno-pie +to the compiler and +.Fl nopie +to the linker. +It is not supported for static executables. +.It .Nm gcc recognizes a new flag, .Fl Wbounded , |