diff options
author | Adhemerval Zanella <adhemerval.zanella@linaro.org> | 2024-09-10 09:22:17 -0300 |
---|---|---|
committer | Adhemerval Zanella <adhemerval.zanella@linaro.org> | 2024-10-01 08:44:40 -0300 |
commit | 127cefd84dc551a43d0ac58b4619503d04869042 (patch) | |
tree | cf6d1e255d280933a84dece69b4020843ce49f8d /iconvdata/ibm869.c | |
parent | 9dfea3de7f690bff70e3c6eb346b9ad082bb2e35 (diff) | |
download | glibc-127cefd84dc551a43d0ac58b4619503d04869042.tar.gz glibc-127cefd84dc551a43d0ac58b4619503d04869042.tar.xz glibc-127cefd84dc551a43d0ac58b4619503d04869042.zip |
Do not use -Wp to disable fortify (BZ 31928)
The -Wp does not work properly if the compiler is configured to enable fortify by default, since it bypasses the compiler driver (which defines the fortify flags in this case). This patch is similar to the one used on Ubuntu [1]. I checked with a build for x86_64-linux-gnu, i686-linux-gnu, aarch64-linux-gnu, s390x-linux-gnu, and riscv64-linux-gnu with gcc-13 that enables the fortify by default. Co-authored-by: Matthias Klose <matthias.klose@canonical.com> [1] https://git.launchpad.net/~ubuntu-core-dev/ubuntu/+source/glibc/tree/debian/patches/ubuntu/fix-fortify-source.patch Reviewed-by: DJ Delorie <dj@redhat.com>
Diffstat (limited to 'iconvdata/ibm869.c')
0 files changed, 0 insertions, 0 deletions