2020-11-13 10:30:52 +00:00
|
|
|
From 23468db70f830e99ac138826d28cc33fa71d3405 Mon Sep 17 00:00:00 2001
|
2020-08-21 10:18:02 +00:00
|
|
|
From: =?UTF-8?q?Timo=20Ter=C3=A4s?= <timo.teras@iki.fi>
|
|
|
|
Date: Fri, 21 Aug 2020 07:03:00 +0000
|
2020-11-13 10:30:52 +00:00
|
|
|
Subject: [PATCH 22/39] Alpine musl package provides libssp_nonshared.a. We
|
2020-08-21 10:18:02 +00:00
|
|
|
link to it unconditionally, as otherwise we get link failures if some objects
|
|
|
|
are -fstack-protector built and final link happens with -fno-stack-protector.
|
|
|
|
This seems to be the common case when bootstrapping gcc, the piepatches do
|
|
|
|
not seem to fully fix the crosstoolchain and bootstrap sequence wrt.
|
|
|
|
stack-protector flag usage.
|
|
|
|
|
|
|
|
---
|
|
|
|
gcc/gcc.c | 3 +--
|
|
|
|
1 file changed, 1 insertion(+), 2 deletions(-)
|
|
|
|
|
|
|
|
diff --git a/gcc/gcc.c b/gcc/gcc.c
|
|
|
|
index daeb4d0c8ea..6920bec0fa0 100644
|
|
|
|
--- a/gcc/gcc.c
|
|
|
|
+++ b/gcc/gcc.c
|
|
|
|
@@ -894,8 +894,7 @@ proper position among the other output files. */
|
|
|
|
|
|
|
|
#ifndef LINK_SSP_SPEC
|
|
|
|
#ifdef TARGET_LIBC_PROVIDES_SSP
|
|
|
|
-#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \
|
|
|
|
- "|fstack-protector-strong|fstack-protector-explicit:}"
|
|
|
|
+#define LINK_SSP_SPEC "-lssp_nonshared"
|
|
|
|
#else
|
|
|
|
#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \
|
|
|
|
"|fstack-protector-strong|fstack-protector-explicit" \
|
|
|
|
--
|
2020-11-13 10:30:52 +00:00
|
|
|
2.28.0
|
2020-08-21 10:18:02 +00:00
|
|
|
|