aboutsummaryrefslogtreecommitdiffstats
path: root/toolchain/gcc/patches/7.5.0/230-musl_libssp.patch
diff options
context:
space:
mode:
authorKoen Vandeputte <koen.vandeputte@ncentric.com>2019-11-19 10:38:45 +0100
committerKoen Vandeputte <koen.vandeputte@ncentric.com>2019-11-19 14:59:03 +0100
commite5c18dad14956ef41488fc7016ef0aa57e7347c7 (patch)
treee5ae1c45ecfaa8580ab64b4ac5426b72ac7b1c66 /toolchain/gcc/patches/7.5.0/230-musl_libssp.patch
parent7533087565005ecb41954790d4991cb7c32bb066 (diff)
downloadupstream-e5c18dad14956ef41488fc7016ef0aa57e7347c7.tar.gz
upstream-e5c18dad14956ef41488fc7016ef0aa57e7347c7.tar.bz2
upstream-e5c18dad14956ef41488fc7016ef0aa57e7347c7.zip
toolchain/gcc: bump to 7.5.0
This updates the GCC to the next minor release which fixes +213 bugs. Tested on ARMv6, ARMv7, MIPS R2, x86 Signed-off-by: Koen Vandeputte <koen.vandeputte@ncentric.com>
Diffstat (limited to 'toolchain/gcc/patches/7.5.0/230-musl_libssp.patch')
-rw-r--r--toolchain/gcc/patches/7.5.0/230-musl_libssp.patch28
1 files changed, 28 insertions, 0 deletions
diff --git a/toolchain/gcc/patches/7.5.0/230-musl_libssp.patch b/toolchain/gcc/patches/7.5.0/230-musl_libssp.patch
new file mode 100644
index 0000000000..eebee9175c
--- /dev/null
+++ b/toolchain/gcc/patches/7.5.0/230-musl_libssp.patch
@@ -0,0 +1,28 @@
+commit 1877bc9d8f2be143fbe530347a945850d0ecd234
+Author: Steven Barth <cyrus@openwrt.org>
+Date: Mon Jun 22 10:31:07 2015 +0000
+
+ gcc/musl: rework SSP-support
+
+ Make musl provide libssp_nonshared.a and make GCC link it unconditionally
+ if musl is used. This should be a no-op if SSP is disabled and seems to be
+ the only reliable way of dealing with SSP over all packages due to the mess
+ that is linkerflags handling in packages.
+
+ Signed-off-by: Steven Barth <steven@midlink.org>
+
+ SVN-Revision: 46108
+
+--- a/gcc/gcc.c
++++ b/gcc/gcc.c
+@@ -861,7 +861,9 @@ proper position among the other output f
+ #endif
+
+ #ifndef LINK_SSP_SPEC
+-#ifdef TARGET_LIBC_PROVIDES_SSP
++#if DEFAULT_LIBC == LIBC_MUSL
++#define LINK_SSP_SPEC "-lssp_nonshared"
++#elif defined(TARGET_LIBC_PROVIDES_SSP)
+ #define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \
+ "|fstack-protector-strong|fstack-protector-explicit:}"
+ #else