aboutsummaryrefslogtreecommitdiff
path: root/core/gcc/patches
diff options
context:
space:
mode:
authorCem Keylan <cem@ckyln.com>2020-05-30 12:33:17 +0300
committerCem Keylan <cem@ckyln.com>2020-05-30 12:33:17 +0300
commitf9777af5fcb6d290285e5d3588bf71c937d71dda (patch)
tree9540113e58abb924251d805225e405fe14a762a9 /core/gcc/patches
parentd55926e7745da96edcdaa9d296cc27f9d5c378fc (diff)
downloadrepository-f9777af5fcb6d290285e5d3588bf71c937d71dda.tar.gz
gcc: architecture dependent build
Diffstat (limited to 'core/gcc/patches')
-rw-r--r--core/gcc/patches/musl-libssp.patch20
1 files changed, 20 insertions, 0 deletions
diff --git a/core/gcc/patches/musl-libssp.patch b/core/gcc/patches/musl-libssp.patch
new file mode 100644
index 00000000..fe5c6143
--- /dev/null
+++ b/core/gcc/patches/musl-libssp.patch
@@ -0,0 +1,20 @@
+Author: Timo Teräs <timo.teras@iki.fi>
+
+Alpine musl package provides libssp_nonshared.a. We link to it unconditionally,
+as otherwise we get link failures if some objects are -fstack-protector built
+and final link happens with -fno-stack-protector. This seems to be the common
+case when bootstrapping gcc, the piepatches do not seem to fully fix the
+crosstoolchain and bootstrap sequence wrt. stack-protector flag usage.
+
+--- gcc-6.1.0/gcc/gcc.c.orig
++++ gcc-6.1.0/gcc/gcc.c
+@@ -870,8 +870,7 @@
+
+ #ifndef LINK_SSP_SPEC
+ #ifdef TARGET_LIBC_PROVIDES_SSP
+-#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \
+- "|fstack-protector-strong|fstack-protector-explicit:}"
++#define LINK_SSP_SPEC "-lssp_nonshared"
+ #else
+ #define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \
+ "|fstack-protector-strong|fstack-protector-explicit" \