From a64d8d26b6f9c1fc3c97605c802bb4ed185dc3bf Mon Sep 17 00:00:00 2001 From: Natanael Copa Date: Tue, 18 Nov 2008 12:25:04 +0000 Subject: core/gcc: hack to not link all built programs to libgcc. --- core/gcc/gcc-4.3.2-default-ssp-pie.patch | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 core/gcc/gcc-4.3.2-default-ssp-pie.patch (limited to 'core/gcc/gcc-4.3.2-default-ssp-pie.patch') diff --git a/core/gcc/gcc-4.3.2-default-ssp-pie.patch b/core/gcc/gcc-4.3.2-default-ssp-pie.patch new file mode 100644 index 0000000000..b7a1267cf9 --- /dev/null +++ b/core/gcc/gcc-4.3.2-default-ssp-pie.patch @@ -0,0 +1,29 @@ +--- gcc-4.3.2.orig/gcc/common.opt Tue Jan 22 14:11:44 2008 ++++ gcc-4.3.2/gcc/common.opt Tue Nov 18 10:00:49 2008 +@@ -147,7 +147,7 @@ + Warn when one local variable shadows another + + Wstack-protector +-Common Var(warn_stack_protect) Warning ++Common Var(warn_stack_protect) Warning Init(1) + Warn when not issuing stack smashing protection for some reason + + Wstrict-aliasing +@@ -766,7 +766,7 @@ + Generate position-independent code if possible (large mode) + + fPIE +-Common Report Var(flag_pie,2) ++Common Report Var(flag_pie,2) Init(2) + Generate position-independent code for executables if possible (large mode) + + fpic +@@ -978,7 +978,7 @@ + Use propolice as a stack protection method + + fstack-protector-all +-Common Report RejectNegative Var(flag_stack_protect, 2) VarExists ++Common Report RejectNegative Var(flag_stack_protect, 2) init(2) + Use a stack protection method for every function + + fstrength-reduce -- cgit v1.2.3