patches/dmalloc/5.5.2/160-strdup_macro.patch
author "Yann E. MORIN" <yann.morin.1998@anciens.enib.fr>
Mon Feb 21 23:39:46 2011 +0100 (2011-02-21)
changeset 2312 8b9938edd3d8
parent 569 147a29d2e81f
permissions -rw-r--r--
libc/glibc: add fortify option

By default, recent versions of glibc and eglibc will build some
functions that take format strings (eg. printf, syslog...) with
run-time checks against some format string attacks. This is
called a fortified build.

Unfortunately, this fails somehow while building the instrumented
version of syslog, with some kind of circular dependency...

Disable fortified builds by default, and hide the enabling option
behind EXPERIMENTAL for daring users...

Signed-off-by: "Yann E. MORIN" <yann.morin.1998@anciens.enib.fr>
     1 --- dmalloc-5.5.2.orig/configure	2008-06-17 13:10:09.000000000 +0200
     2 +++ dmalloc-5.5.2/configure	2008-06-17 13:11:25.000000000 +0200
     3 @@ -4691,8 +4691,35 @@
     4  echo "$as_me:$LINENO: checking strdup macro" >&5
     5  echo $ECHO_N "checking strdup macro... $ECHO_C" >&6
     6  if test "$cross_compiling" = yes; then
     7 -  ac_cv_strdup_macro=no
     8 +  cat >conftest.$ac_ext <<_ACEOF
     9 +/* confdefs.h */
    10 +_ACEOF
    11 +cat confdefs.h >>conftest.$ac_ext
    12 +cat >>conftest.$ac_ext <<_ACEOF
    13 +/* end confdefs.h.  */
    14 +
    15 +#if HAVE_STDLIB_H
    16 +#  include <string.h>
    17 +#endif
    18 +
    19 +#ifndef strdup
    20 +       choke me
    21 +#endif
    22  
    23 +main() { exit(0); }
    24 +
    25 +_ACEOF
    26 +rm -f conftest.o conftest.obj
    27 +if { (eval echo "$as_me:$LINENO: \"$ac_compile\"") >&5
    28 +  (eval $ac_compile) 2>&5
    29 +  ac_status=$?
    30 +  echo "$as_me:$LINENO: \$? = $ac_status" >&5
    31 +  (exit $ac_status); }; then
    32 +  ac_cv_strdup_macro=yes
    33 +else
    34 +  ac_cv_strdup_macro=no
    35 +fi
    36 +  
    37  else
    38    cat >conftest.$ac_ext <<_ACEOF
    39  /* confdefs.h.  */