diff options
author | Ross Burton <ross.burton@arm.com> | 2025-01-21 18:23:09 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2025-01-22 13:20:29 +0000 |
commit | 310f9cd967f81869b27c4542a0015cf76c3e2c84 (patch) | |
tree | 65f1bf2af5342a34619e69ea5ea02c59cf2c19d7 /scripts/cve-json-to-text.py | |
parent | 1c5a2c8bcc96b8bdfc5186d75953dfabd4b3842a (diff) | |
download | poky-310f9cd967f81869b27c4542a0015cf76c3e2c84.tar.gz |
gcc: make include poisoning fatal again in gcc/g++
We have a patch to allow us to 'poison' system include directories,
which are warnings by default but we make them fatal in cross builds.
However, in the 13.1 upgrade[1] the patch to make the warnings fatal was
dropped in the compiler invocation, so it only took effect for pure
preprocessor calls. This was not noticed at the time as the test case
was flawed, but this has now been fixed.
Add back the fatal poisoning, and restructure the patch slightly so it
is less invasive.
[1] oe-core bea46612fd9106cc5b46eb1d81623b6492563c13
[RP: Tweak to fix gcc/gcc-cross-canadian failure]
(From OE-Core rev: 56f21a02c009cb74072ee79467a5bcab3c4643a5)
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/cve-json-to-text.py')
0 files changed, 0 insertions, 0 deletions