summaryrefslogtreecommitdiff
path: root/share
diff options
context:
space:
mode:
Diffstat (limited to 'share')
-rw-r--r--share/man/man1/gcc-local.117
1 files changed, 15 insertions, 2 deletions
diff --git a/share/man/man1/gcc-local.1 b/share/man/man1/gcc-local.1
index a710017b329..51078a567b3 100644
--- a/share/man/man1/gcc-local.1
+++ b/share/man/man1/gcc-local.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: gcc-local.1,v 1.31 2012/08/12 17:01:35 schwarze Exp $
+.\" $OpenBSD: gcc-local.1,v 1.32 2012/08/31 19:01:31 pascal Exp $
.\"
.\" Copyright (c) 2002 Marc Espie
.\" Copyright (c) 2003 Anil Madhavapeddy
@@ -25,7 +25,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: August 12 2012 $
+.Dd $Mdocdate: August 31 2012 $
.Dt GCC-LOCAL 1
.Os
.Sh NAME
@@ -185,6 +185,19 @@ option, that turns stack protection code on for all functions,
and disables any heuristic that flags some functions as safe.
This extended checking has a moderate runtime cost, though.
.It
+On the amd64, mips64, mips64el and sparc64 architectures,
+.Nm gcc
+generates position-independent executables
+.Pq PIEs
+by default, allowing the system to load the resulting binary
+at a random location.
+This behavior can be turned off by passing
+.Fl fno-pie
+to the compiler and
+.Fl nopie
+to the linker.
+It is not supported for static executables.
+.It
.Nm gcc
recognizes a new flag,
.Fl Wbounded ,