mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-28 06:13:31 +01:00
use ssp-buffer-size=1 to avoid Werror failures
Build on Ubuntu 10.04 64-bit was failing: util.c: In function ‘parse_http_time’: util.c:1370: error: not protecting function: no buffer at least 8 bytes long We don't want to lose -Werror, and we don't care too much about the added overhead of protecting even small buffers, so let's simply turn on SSP for all buffers. Thanks to Jacob Appelbaum for the pointer and SwissTorExit for the original report. Signed-off-by: Andy Isaacson <adi@hexapodia.org>
This commit is contained in:
parent
8ba00e4305
commit
6751899fe1
@ -885,7 +885,7 @@ if test x$enable_gcc_warnings = xyes || test x$enable_gcc_warnings_advisory = xy
|
||||
# These warnings break gcc 4.0.2 and work on gcc 4.2
|
||||
# XXXX020 Use -fstack-protector.
|
||||
# XXXX020 See if any of these work with earlier versions.
|
||||
CFLAGS="$CFLAGS -Waddress -Wmissing-noreturn -Wnormalized=id -Woverride-init -Wstrict-overflow=1"
|
||||
CFLAGS="$CFLAGS -Waddress -Wmissing-noreturn -Wnormalized=id -Woverride-init -Wstrict-overflow=1 --param ssp-buffer-size=1"
|
||||
# We used to use -Wstrict-overflow=5, but that breaks us heavily under 4.3.
|
||||
fi
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user