[OE-core] [PATCH 3/6] security_flags: Disable fstack-protector for gcc runtime libs

Andre McCurdy armccurdy at gmail.com
Thu Feb 4 23:07:15 UTC 2016


On Thu, Feb 4, 2016 at 2:55 PM, Khem Raj <raj.khem at gmail.com> wrote:
> it causes a catch-22 situation where we build libssp in gcc-runtime
> but also pass -fstack-protector flags which require libssp, these
> libraries are special as well.
>
> also flush out ldflags for gcc libs and glibc
>
> Signed-off-by: Khem Raj <raj.khem at gmail.com>
> ---
>  meta/conf/distro/include/security_flags.inc | 11 ++++++++---
>  1 file changed, 8 insertions(+), 3 deletions(-)
>
> diff --git a/meta/conf/distro/include/security_flags.inc b/meta/conf/distro/include/security_flags.inc
> index ac4fc65..7f898ee 100644
> --- a/meta/conf/distro/include/security_flags.inc
> +++ b/meta/conf/distro/include/security_flags.inc
> @@ -39,8 +39,8 @@ SECURITY_CFLAGS_pn-expect = "${SECURITY_NO_PIE_CFLAGS}"
>  SECURITY_CFLAGS_pn-flac = "${SECURITY_NO_PIE_CFLAGS}"
>  SECURITY_CFLAGS_pn-flex = "${SECURITY_NO_PIE_CFLAGS}"
>  SECURITY_CFLAGS_pn-gcc = "${SECURITY_NO_PIE_CFLAGS}"
> -SECURITY_CFLAGS_pn-gcc-runtime = "${SECURITY_NO_PIE_CFLAGS}"
> -SECURITY_CFLAGS_pn-gcc-sanitizers = "${SECURITY_NO_PIE_CFLAGS}"
> +SECURITY_CFLAGS_pn-gcc-runtime = ""
> +SECURITY_CFLAGS_pn-gcc-sanitizers = ""
>  SECURITY_CFLAGS_pn-gdb = "${SECURITY_NO_PIE_CFLAGS}"
>  SECURITY_CFLAGS_pn-gmp = "${SECURITY_NO_PIE_CFLAGS}"
>  SECURITY_CFLAGS_pn-gnutls = "${SECURITY_NO_PIE_CFLAGS}"
> @@ -59,7 +59,7 @@ SECURITY_CFLAGS_pn-kexec-tools = "${SECURITY_NO_PIE_CFLAGS}"
>  SECURITY_CFLAGS_pn-iptables = "${SECURITY_NO_PIE_CFLAGS}"
>  SECURITY_CFLAGS_pn-libaio = "${SECURITY_NO_PIE_CFLAGS}"
>  SECURITY_CFLAGS_pn-libcap = "${SECURITY_NO_PIE_CFLAGS}"
> -SECURITY_CFLAGS_pn-libgcc = "${SECURITY_NO_PIE_CFLAGS}"
> +SECURITY_CFLAGS_pn-libgcc = ""

Should libgcc-initial be included here too?

>  SECURITY_CFLAGS_pn-libid3tag = "${SECURITY_NO_PIE_CFLAGS}"
>  SECURITY_CFLAGS_pn-libnewt = "${SECURITY_NO_PIE_CFLAGS}"
>  SECURITY_CFLAGS_pn-libglu = "${SECURITY_NO_PIE_CFLAGS}"
> @@ -90,6 +90,11 @@ SECURITY_CFLAGS_pn-pulseaudio = "${SECURITY_NO_PIE_CFLAGS}"
>  TARGET_CFLAGS_append = " ${SECURITY_CFLAGS}"
>  TARGET_LDFLAGS_append = " ${SECURITY_LDFLAGS}"
>
> +SECURITY_LDFLAGS_pn-gcc-runtime = ""
> +SECURITY_LDFLAGS_pn-gcc-sanitizers = ""
> +SECURITY_LDFLAGS_pn-glibc = ""
> +SECURITY_LDFLAGS_pn-glibc-initial = ""
> +SECURITY_LDFLAGS_pn-libgcc = ""
>  SECURITY_LDFLAGS_pn-xf86-video-fbdev = "${SECURITY_X_LDFLAGS}"
>  SECURITY_LDFLAGS_pn-xf86-video-intel = "${SECURITY_X_LDFLAGS}"
>  SECURITY_LDFLAGS_pn-xf86-video-omapfb = "${SECURITY_X_LDFLAGS}"
> --
> 2.7.0
>
> --
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core at lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core



More information about the Openembedded-core mailing list