diff options
author | Cem Keylan <cem@ckyln.com> | 2022-05-07 20:52:09 +0200 |
---|---|---|
committer | Cem Keylan <cem@ckyln.com> | 2022-05-07 20:52:24 +0200 |
commit | 601d5f275212eb60b4265a7693f47b4446ee55f4 (patch) | |
tree | c18982e3d844a7f2acf29280ef71fd4b65b11de0 /testing/gcc/patches/musl-libssp.patch | |
parent | fac2efe4739bfb5201b53e0f1a1be4f043afea16 (diff) | |
download | repository-601d5f275212eb60b4265a7693f47b4446ee55f4.tar.gz |
gcc: add new package at 12.1.0 [TESTING]
Diffstat (limited to 'testing/gcc/patches/musl-libssp.patch')
-rw-r--r-- | testing/gcc/patches/musl-libssp.patch | 20 |
1 files changed, 20 insertions, 0 deletions
diff --git a/testing/gcc/patches/musl-libssp.patch b/testing/gcc/patches/musl-libssp.patch new file mode 100644 index 00000000..fe5c6143 --- /dev/null +++ b/testing/gcc/patches/musl-libssp.patch @@ -0,0 +1,20 @@ +Author: Timo Teräs <timo.teras@iki.fi> + +Alpine musl package provides libssp_nonshared.a. We link to it unconditionally, +as otherwise we get link failures if some objects are -fstack-protector built +and final link happens with -fno-stack-protector. This seems to be the common +case when bootstrapping gcc, the piepatches do not seem to fully fix the +crosstoolchain and bootstrap sequence wrt. stack-protector flag usage. + +--- gcc-6.1.0/gcc/gcc.c.orig ++++ gcc-6.1.0/gcc/gcc.c +@@ -870,8 +870,7 @@ + + #ifndef LINK_SSP_SPEC + #ifdef TARGET_LIBC_PROVIDES_SSP +-#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \ +- "|fstack-protector-strong|fstack-protector-explicit:}" ++#define LINK_SSP_SPEC "-lssp_nonshared" + #else + #define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \ + "|fstack-protector-strong|fstack-protector-explicit" \ |