diff options
author | Alexander Kanavin <alexander.kanavin@linux.intel.com> | 2016-06-20 15:56:43 +0300 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-06-23 14:26:15 +0100 |
commit | 088120816835bfab2a675eb3f265b63290d077e6 (patch) | |
tree | 028761bf0dc34686a9b72b57d77858edbe559213 /meta/conf/distro/include | |
parent | 95cd78a7b5861f8ef10f419ba336439c50fda9ab (diff) | |
download | poky-088120816835bfab2a675eb3f265b63290d077e6.tar.gz |
security_flags.inc: add SECURITY_NO_PIE_CFLAGS to libgcc and gcc-sanitizers
These recipes no longer seem to need full exclusion from security hardening.
The rest (glibc, gcc-runtime, valgrind, grub, grub-efi, uclibc) still do.
[YOCTO #9489]
(From OE-Core rev: b3d7aae42550fb92bcb82fdee7e518b04bdf49b4)
Signed-off-by: Alexander Kanavin <alexander.kanavin@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/conf/distro/include')
-rw-r--r-- | meta/conf/distro/include/security_flags.inc | 6 |
1 files changed, 2 insertions, 4 deletions
diff --git a/meta/conf/distro/include/security_flags.inc b/meta/conf/distro/include/security_flags.inc index ea1d4e5328..cd2b9648f5 100644 --- a/meta/conf/distro/include/security_flags.inc +++ b/meta/conf/distro/include/security_flags.inc | |||
@@ -43,7 +43,7 @@ SECURITY_CFLAGS_pn-flac = "${SECURITY_NO_PIE_CFLAGS}" | |||
43 | SECURITY_CFLAGS_pn-flex = "${SECURITY_NO_PIE_CFLAGS}" | 43 | SECURITY_CFLAGS_pn-flex = "${SECURITY_NO_PIE_CFLAGS}" |
44 | SECURITY_CFLAGS_pn-gcc = "${SECURITY_NO_PIE_CFLAGS}" | 44 | SECURITY_CFLAGS_pn-gcc = "${SECURITY_NO_PIE_CFLAGS}" |
45 | SECURITY_CFLAGS_pn-gcc-runtime = "" | 45 | SECURITY_CFLAGS_pn-gcc-runtime = "" |
46 | SECURITY_CFLAGS_pn-gcc-sanitizers = "" | 46 | SECURITY_CFLAGS_pn-gcc-sanitizers = "${SECURITY_NO_PIE_CFLAGS}" |
47 | SECURITY_CFLAGS_pn-gdb = "${SECURITY_NO_PIE_CFLAGS}" | 47 | SECURITY_CFLAGS_pn-gdb = "${SECURITY_NO_PIE_CFLAGS}" |
48 | SECURITY_CFLAGS_pn-gmp = "${SECURITY_NO_PIE_CFLAGS}" | 48 | SECURITY_CFLAGS_pn-gmp = "${SECURITY_NO_PIE_CFLAGS}" |
49 | SECURITY_CFLAGS_pn-gnutls = "${SECURITY_NO_PIE_CFLAGS}" | 49 | SECURITY_CFLAGS_pn-gnutls = "${SECURITY_NO_PIE_CFLAGS}" |
@@ -62,7 +62,7 @@ SECURITY_CFLAGS_pn-kexec-tools = "${SECURITY_NO_PIE_CFLAGS}" | |||
62 | SECURITY_CFLAGS_pn-iptables = "${SECURITY_NO_PIE_CFLAGS}" | 62 | SECURITY_CFLAGS_pn-iptables = "${SECURITY_NO_PIE_CFLAGS}" |
63 | SECURITY_CFLAGS_pn-libaio = "${SECURITY_NO_PIE_CFLAGS}" | 63 | SECURITY_CFLAGS_pn-libaio = "${SECURITY_NO_PIE_CFLAGS}" |
64 | SECURITY_CFLAGS_pn-libcap = "${SECURITY_NO_PIE_CFLAGS}" | 64 | SECURITY_CFLAGS_pn-libcap = "${SECURITY_NO_PIE_CFLAGS}" |
65 | SECURITY_CFLAGS_pn-libgcc = "" | 65 | SECURITY_CFLAGS_pn-libgcc = "${SECURITY_NO_PIE_CFLAGS}" |
66 | SECURITY_CFLAGS_pn-libid3tag = "${SECURITY_NO_PIE_CFLAGS}" | 66 | SECURITY_CFLAGS_pn-libid3tag = "${SECURITY_NO_PIE_CFLAGS}" |
67 | SECURITY_CFLAGS_pn-libnewt = "${SECURITY_NO_PIE_CFLAGS}" | 67 | SECURITY_CFLAGS_pn-libnewt = "${SECURITY_NO_PIE_CFLAGS}" |
68 | SECURITY_CFLAGS_pn-libglu = "${SECURITY_NO_PIE_CFLAGS}" | 68 | SECURITY_CFLAGS_pn-libglu = "${SECURITY_NO_PIE_CFLAGS}" |
@@ -109,10 +109,8 @@ TARGET_CFLAGS_append_class-target = " ${SECURITY_CFLAGS}" | |||
109 | TARGET_LDFLAGS_append_class-target = " ${SECURITY_LDFLAGS}" | 109 | TARGET_LDFLAGS_append_class-target = " ${SECURITY_LDFLAGS}" |
110 | 110 | ||
111 | SECURITY_LDFLAGS_remove_pn-gcc-runtime = "-fstack-protector-strong" | 111 | SECURITY_LDFLAGS_remove_pn-gcc-runtime = "-fstack-protector-strong" |
112 | SECURITY_LDFLAGS_remove_pn-gcc-sanitizers = "-fstack-protector-strong" | ||
113 | SECURITY_LDFLAGS_remove_pn-glibc = "-fstack-protector-strong" | 112 | SECURITY_LDFLAGS_remove_pn-glibc = "-fstack-protector-strong" |
114 | SECURITY_LDFLAGS_remove_pn-glibc-initial = "-fstack-protector-strong" | 113 | SECURITY_LDFLAGS_remove_pn-glibc-initial = "-fstack-protector-strong" |
115 | SECURITY_LDFLAGS_remove_pn-libgcc = "-fstack-protector-strong" | ||
116 | SECURITY_LDFLAGS_remove_pn-uclibc = "-fstack-protector-strong" | 114 | SECURITY_LDFLAGS_remove_pn-uclibc = "-fstack-protector-strong" |
117 | SECURITY_LDFLAGS_remove_pn-uclibc-initial = "-fstack-protector-strong" | 115 | SECURITY_LDFLAGS_remove_pn-uclibc-initial = "-fstack-protector-strong" |
118 | SECURITY_LDFLAGS_pn-xf86-video-fbdev = "${SECURITY_X_LDFLAGS}" | 116 | SECURITY_LDFLAGS_pn-xf86-video-fbdev = "${SECURITY_X_LDFLAGS}" |