diff options
author | Hauke Mehrtens <hauke@hauke-m.de> | 2018-12-09 19:08:06 +0100 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2018-12-15 15:25:03 +0100 |
commit | af1aa07b0722a0d3cae0cbaa07a7a9ef46335d4e (patch) | |
tree | 4fd9b4df94ffcb05db0741a297630b06176950ae /toolchain/gcc/patches/7.4.0/230-musl_libssp.patch | |
parent | fbaf48387eb5e0e2bdc90d4c6f985a242a9fb0cc (diff) | |
download | upstream-af1aa07b0722a0d3cae0cbaa07a7a9ef46335d4e.tar.gz upstream-af1aa07b0722a0d3cae0cbaa07a7a9ef46335d4e.tar.bz2 upstream-af1aa07b0722a0d3cae0cbaa07a7a9ef46335d4e.zip |
gcc: update to version 7.4.0
This updates the GCC to the next minor release which fixes 178 bugs.
The two removed patches are included in gcc 7.4.0
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Tested-by: Koen Vandeputte <koen.vandeputte@ncentric.com>
Diffstat (limited to 'toolchain/gcc/patches/7.4.0/230-musl_libssp.patch')
-rw-r--r-- | toolchain/gcc/patches/7.4.0/230-musl_libssp.patch | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/toolchain/gcc/patches/7.4.0/230-musl_libssp.patch b/toolchain/gcc/patches/7.4.0/230-musl_libssp.patch new file mode 100644 index 0000000000..eebee9175c --- /dev/null +++ b/toolchain/gcc/patches/7.4.0/230-musl_libssp.patch @@ -0,0 +1,28 @@ +commit 1877bc9d8f2be143fbe530347a945850d0ecd234 +Author: Steven Barth <cyrus@openwrt.org> +Date: Mon Jun 22 10:31:07 2015 +0000 + + gcc/musl: rework SSP-support + + Make musl provide libssp_nonshared.a and make GCC link it unconditionally + if musl is used. This should be a no-op if SSP is disabled and seems to be + the only reliable way of dealing with SSP over all packages due to the mess + that is linkerflags handling in packages. + + Signed-off-by: Steven Barth <steven@midlink.org> + + SVN-Revision: 46108 + +--- a/gcc/gcc.c ++++ b/gcc/gcc.c +@@ -861,7 +861,9 @@ proper position among the other output f + #endif + + #ifndef LINK_SSP_SPEC +-#ifdef TARGET_LIBC_PROVIDES_SSP ++#if DEFAULT_LIBC == LIBC_MUSL ++#define LINK_SSP_SPEC "-lssp_nonshared" ++#elif defined(TARGET_LIBC_PROVIDES_SSP) + #define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \ + "|fstack-protector-strong|fstack-protector-explicit:}" + #else |