From 958bd50f910e5d0d7120c3999c9347f036220962 Mon Sep 17 00:00:00 2001 From: Marat Safin Date: Sun, 1 Jul 2018 14:31:20 +0300 Subject: community/rust: upgrade to 1.27.0 --- community/rust/static-pie.patch | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) (limited to 'community/rust/static-pie.patch') diff --git a/community/rust/static-pie.patch b/community/rust/static-pie.patch index 542dbffb88..c6ffdbe00c 100644 --- a/community/rust/static-pie.patch +++ b/community/rust/static-pie.patch @@ -40,8 +40,8 @@ library, just like static binaries, but more secure. 0x000000006ffffff9 (RELACOUNT) 223 0x0000000000000000 (NULL) 0x0 ---- a/src/librustc_back/target/linux_musl_base.rs -+++ b/src/librustc_back/target/linux_musl_base.rs +--- a/src/librustc_target/spec/linux_musl_base.rs ++++ b/src/librustc_target/spec/linux_musl_base.rs @@ -25,5 +25,8 @@ // These targets allow the user to choose between static and dynamic linking. base.crt_static_respected = true; @@ -51,8 +51,8 @@ library, just like static binaries, but more secure. + base } ---- a/src/librustc_back/target/mod.rs -+++ b/src/librustc_back/target/mod.rs +--- a/src/librustc_target/spec/mod.rs ++++ b/src/librustc_target/spec/mod.rs @@ -388,6 +388,8 @@ /// the functions in the executable are not randomized and can be used /// during an exploit of a vulnerability in any code. @@ -89,8 +89,8 @@ library, just like static binaries, but more secure. position_independent_executable = true; } } ---- a/src/librustc_back/target/mod.rs -+++ b/src/librustc_back/target/mod.rs +--- a/src/librustc_target/spec/mod.rs ++++ b/src/librustc_target/spec/mod.rs @@ -778,7 +778,8 @@ key!(has_rpath, bool); key!(no_default_libraries, bool); -- cgit v1.2.3