Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:zhmars:arch
gcc13
_service:download_url:0001-Fix-stack-protection...
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _service:download_url:0001-Fix-stack-protection-issues.patch of Package gcc13
From ea44984405ea96f34aaca77bd4b9fd8b57fb5db8 Mon Sep 17 00:00:00 2001 From: Michael Ikey Doherty <michael.i.doherty@intel.com> Date: Fri, 28 Mar 2014 11:14:06 +0000 Subject: [PATCH 1/3] Fix stack protection issues Organization: Intel Corporation (UK) Ltd. - Co. Reg. #1134945 - Pipers Way, Swindon SN3 1RJ GCC failed to detect stack protection also causes glibc to fail to build. CLR specifically requires this feature within glibc. Signed-off-by: Michael Ikey Doherty <michael.i.doherty@intel.com> --- gcc/configure | 2 ++ 1 file changed, 2 insertions(+) diff --git a/gcc/configure b/gcc/configure index 415377a..b2c380f 100755 --- a/gcc/configure +++ b/gcc/configure @@ -27293,6 +27293,7 @@ $as_echo "#define HAVE_LD_SYSROOT 1" >>confdefs.h fi # Test for stack protector support in target C library. +gcc_cv_libc_provides_ssp=yes { $as_echo "$as_me:${as_lineno-$LINENO}: checking __stack_chk_fail in target C library" >&5 $as_echo_n "checking __stack_chk_fail in target C library... " >&6; } if test "${gcc_cv_libc_provides_ssp+set}" = set; then : @@ -27320,6 +27321,7 @@ else gcc_cv_libc_provides_ssp=yes fi # all versions of Bionic support stack protector +gcc_cv_libc_provides_ssp=yes elif test -f $target_header_dir/sys/cdefs.h \ && $EGREP '^[ ]*#[ ]*define[ ]+__BIONIC__[ ]+1' \ $target_header_dir/sys/cdefs.h > /dev/null; then -- 2.1.0
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor