summaryrefslogtreecommitdiffstats
path: root/meta/conf/distro/include/security_flags.inc
diff options
context:
space:
mode:
authorAdrian Dudau <adrian.dudau@enea.com>2013-12-12 13:38:32 +0100
committerAdrian Dudau <adrian.dudau@enea.com>2013-12-12 13:50:20 +0100
commite2e6f6fe07049f33cb6348780fa975162752e421 (patch)
treeb1813295411235d1297a0ed642b1346b24fdfb12 /meta/conf/distro/include/security_flags.inc
downloadpoky-e2e6f6fe07049f33cb6348780fa975162752e421.tar.gz
initial commit of Enea Linux 3.1
Migrated from the internal git server on the dora-enea branch Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
Diffstat (limited to 'meta/conf/distro/include/security_flags.inc')
-rw-r--r--meta/conf/distro/include/security_flags.inc48
1 files changed, 48 insertions, 0 deletions
diff --git a/meta/conf/distro/include/security_flags.inc b/meta/conf/distro/include/security_flags.inc
new file mode 100644
index 0000000000..e313be67b1
--- /dev/null
+++ b/meta/conf/distro/include/security_flags.inc
@@ -0,0 +1,48 @@
1SECURITY_CFLAGS ?= "-fstack-protector-all -pie -fpie -D_FORTIFY_SOURCE=2"
2SECURITY_NO_PIE_CFLAGS ?= "-fstack-protector-all -D_FORTIFY_SOURCE=2"
3SECURITY_LDFLAGS ?= "-Wl,-z,relro,-z,now"
4
5SECURITY_CFLAGS_pn-aspell = "${SECURITY_NO_PIE_CFLAGS}"
6SECURITY_CFLAGS_pn-beecrypt = "${SECURITY_NO_PIE_CFLAGS}"
7# Curl seems to check for FORTIFY_SOURCE in CFLAGS, but even assigned
8# to CPPFLAGS it gets picked into CFLAGS in bitbake.
9#TARGET_CPPFLAGS_pn-curl += "-D_FORTIFY_SOURCE=2"
10SECURITY_CFLAGS_pn-curl = "-fstack-protector-all -pie -fpie"
11SECURITY_CFLAGS_pn-directfb = "${SECURITY_NO_PIE_CFLAGS}"
12SECURITY_CFLAGS_pn-eglibc = ""
13SECURITY_CFLAGS_pn-eglibc-initial = ""
14SECURITY_CFLAGS_pn-enchant = "${SECURITY_NO_PIE_CFLAGS}"
15SECURITY_CFLAGS_pn-flac = "${SECURITY_NO_PIE_CFLAGS}"
16SECURITY_CFLAGS_pn-gcc-runtime = "${SECURITY_NO_PIE_CFLAGS}"
17SECURITY_CFLAGS_pn-gdb = "${SECURITY_NO_PIE_CFLAGS}"
18SECURITY_CFLAGS_pn-gmp = "${SECURITY_NO_PIE_CFLAGS}"
19SECURITY_CFLAGS_pn-gnutls = "${SECURITY_NO_PIE_CFLAGS}"
20SECURITY_CFLAGS_pn-grub = ""
21SECURITY_CFLAGS_pn-gst-plugins-bad = "${SECURITY_NO_PIE_CFLAGS}"
22SECURITY_CFLAGS_pn-gst-plugins-gl = "${SECURITY_NO_PIE_CFLAGS}"
23SECURITY_CFLAGS_pn-gstreamer1.0-plugins-good = "${SECURITY_NO_PIE_CFLAGS}"
24SECURITY_CFLAGS_pn-harfbuzz = "${SECURITY_NO_PIE_CFLAGS}"
25SECURITY_CFLAGS_pn-kexec-tools = "${SECURITY_NO_PIE_CFLAGS}"
26SECURITY_CFLAGS_pn-libcap = "${SECURITY_NO_PIE_CFLAGS}"
27SECURITY_CFLAGS_pn-libgcc = "${SECURITY_NO_PIE_CFLAGS}"
28SECURITY_CFLAGS_pn-libglu = "${SECURITY_NO_PIE_CFLAGS}"
29SECURITY_CFLAGS_pn-libpcre = "${SECURITY_NO_PIE_CFLAGS}"
30SECURITY_CFLAGS_pn-mesa = "${SECURITY_NO_PIE_CFLAGS}"
31SECURITY_CFLAGS_pn-mesa-gl = "${SECURITY_NO_PIE_CFLAGS}"
32SECURITY_CFLAGS_pn-opensp = "${SECURITY_NO_PIE_CFLAGS}"
33SECURITY_CFLAGS_pn-ppp = "${SECURITY_NO_PIE_CFLAGS}"
34SECURITY_CFLAGS_pn-python = "${SECURITY_NO_PIE_CFLAGS}"
35SECURITY_CFLAGS_pn-python-imaging = "${SECURITY_NO_PIE_CFLAGS}"
36SECURITY_CFLAGS_pn-python-pycurl = "${SECURITY_NO_PIE_CFLAGS}"
37SECURITY_CFLAGS_pn-python-smartpm = "${SECURITY_NO_PIE_CFLAGS}"
38SECURITY_CFLAGS_pn-tcl = "${SECURITY_NO_PIE_CFLAGS}"
39SECURITY_CFLAGS_pn-tiff = "${SECURITY_NO_PIE_CFLAGS}"
40SECURITY_CFLAGS_pn-webkit-gtk = "${SECURITY_NO_PIE_CFLAGS}"
41SECURITY_CFLAGS_pn-zlib = "${SECURITY_NO_PIE_CFLAGS}"
42
43# These 2 have text relco errors with the pie options enabled
44SECURITY_CFLAGS_pn-ltp = "${SECURITY_NO_PIE_CFLAGS}"
45SECURITY_CFLAGS_pn-pulseaudio = "${SECURITY_NO_PIE_CFLAGS}"
46
47TARGET_CFLAGS_append = " ${SECURITY_CFLAGS}"
48TARGET_LDFLAGS_append = " ${SECURITY_LDFLAGS}"