aboutsummaryrefslogtreecommitdiff
path: root/i686/gcc/patches
diff options
context:
space:
mode:
authorCem Keylan <cem@ckyln.com>2020-05-19 03:47:08 +0300
committerCem Keylan <cem@ckyln.com>2020-05-19 03:47:08 +0300
commit336dd2ab8079763060280c7aaa797e7d6665df0c (patch)
tree3f4bdbde0dc9102abe00775d6a7e0d1aba6ae69d /i686/gcc/patches
parentefb76a88613529ae4f076590ad8a9f16d4c13398 (diff)
downloadrepository-336dd2ab8079763060280c7aaa797e7d6665df0c.tar.gz
gcc: use libssp provided by musl
Diffstat (limited to 'i686/gcc/patches')
-rw-r--r--i686/gcc/patches/musl-libssp.patch20
1 files changed, 20 insertions, 0 deletions
diff --git a/i686/gcc/patches/musl-libssp.patch b/i686/gcc/patches/musl-libssp.patch
new file mode 100644
index 00000000..fe5c6143
--- /dev/null
+++ b/i686/gcc/patches/musl-libssp.patch
@@ -0,0 +1,20 @@
+Author: Timo Teräs <timo.teras@iki.fi>
+
+Alpine musl package provides libssp_nonshared.a. We link to it unconditionally,
+as otherwise we get link failures if some objects are -fstack-protector built
+and final link happens with -fno-stack-protector. This seems to be the common
+case when bootstrapping gcc, the piepatches do not seem to fully fix the
+crosstoolchain and bootstrap sequence wrt. stack-protector flag usage.
+
+--- gcc-6.1.0/gcc/gcc.c.orig
++++ gcc-6.1.0/gcc/gcc.c
+@@ -870,8 +870,7 @@
+
+ #ifndef LINK_SSP_SPEC
+ #ifdef TARGET_LIBC_PROVIDES_SSP
+-#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \
+- "|fstack-protector-strong|fstack-protector-explicit:}"
++#define LINK_SSP_SPEC "-lssp_nonshared"
+ #else
+ #define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \
+ "|fstack-protector-strong|fstack-protector-explicit" \