blob: 4483a89ef6c3f7f6ff642937c11b5ecd5af3edd1 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
|
From 9e0ee97de976d840819e2fa27d0baa7a6aa8e7d4 Mon Sep 17 00:00:00 2001
From: Mahesh Bodapati <mbodapat@xilinx.com>
Date: Fri, 28 Oct 2022 13:57:48 +0530
Subject: [PATCH 34/34] By default the linker will generate warnings if it is
creating an executable stack or a segment with all three of read, write and
execute permissions. These settings are not appropriate for all targets
Upstream-Status: Pending
Signed-off-by: Mark Hatle <mark.hatle@amd.com>
---
ld/configure.tgt | 1 +
1 file changed, 1 insertion(+)
diff --git a/ld/configure.tgt b/ld/configure.tgt
index e3fd0c2452b..6d6db66b99b 100644
--- a/ld/configure.tgt
+++ b/ld/configure.tgt
@@ -55,6 +55,7 @@ if test "${ac_default_ld_warn_rwx_segments}" = unset; then
cris-*-* | crisv32-*-* | \
hppa*-*-* | \
mips*-*-* | \
+ microblaze*-*-* | \
sparc*-*-* | \
v850*-*-*)
ac_default_ld_warn_rwx_segments=0
--
2.17.1
|