From: pascal Date: Thu, 24 Jul 2014 09:15:14 +0000 (+0000) Subject: Revert ssp-strong on arm. This has been exposing one or more bugs in GCC that X-Git-Url: http://artulab.com/gitweb/?a=commitdiff_plain;h=2278d9676be57de88666ecfd3def9d56adc7dd0f;p=openbsd Revert ssp-strong on arm. This has been exposing one or more bugs in GCC that kill large portions of the ports tree. Most notably, it broke devel/gperf at runtime. ok martynas@, "make a decision" deraadt@ --- diff --git a/gnu/gcc/gcc/toplev.c b/gnu/gcc/gcc/toplev.c index ae2185c0b18..bab1524150b 100644 --- a/gnu/gcc/gcc/toplev.c +++ b/gnu/gcc/gcc/toplev.c @@ -1834,7 +1834,11 @@ process_options (void) /* Targets must be able to place spill slots at lower addresses. If the target already uses a soft frame pointer, the transition is trivial. */ if (flag_stack_protect == -1) +#ifdef __arm__ + flag_stack_protect = FRAME_GROWS_DOWNWARD ? 1 : 0; +#else flag_stack_protect = FRAME_GROWS_DOWNWARD ? 3 : 0; +#endif if (!FRAME_GROWS_DOWNWARD && flag_stack_protect) { warning (0, "-fstack-protector not supported for this target");