summaryrefslogtreecommitdiffstats
path: root/meta/conf/distro
diff options
context:
space:
mode:
authorAndre McCurdy <armccurdy@gmail.com>2015-12-22 15:57:58 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-01-07 13:40:15 +0000
commit3d19a1e10c52ef2db9ca32302c042267cdac1821 (patch)
treebd9b77f9f68afcf62618d2e41e811daab2405654 /meta/conf/distro
parent807ed8a508a1665ad97bfea7ffe74879af0fd613 (diff)
downloadpoky-3d19a1e10c52ef2db9ca32302c042267cdac1821.tar.gz
security_flags.inc: disable -fstack-protector-XXX for valgrind
Valgrind (v3.11.0) expects to build with stack protection disabled and includes -fno-stack-protector in its default CFLAGS. However, the CFLAGS provided by OE are included on the compiler command line after the defaults so any -fstack-protector-all / -fstack-protector-strong option provided by security_flags.inc will cause problems. | .../build-bcm97425vms/tmp/work/mips32el-rdk-linux/valgrind/3.11.0-r0/valgrind-3.11.0/coregrind/m_mallocfree.c:892: undefined reference to `__stack_chk_guard' | .../build-bcm97425vms/tmp/work/mips32el-rdk-linux/valgrind/3.11.0-r0/valgrind-3.11.0/coregrind/m_mallocfree.c:947: undefined reference to `__stack_chk_fail' (From OE-Core rev: ff4f46700a4810fcb49c58978b17af4f52fa9925) Signed-off-by: Andre McCurdy <armccurdy@gmail.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/conf/distro')
-rw-r--r--meta/conf/distro/include/security_flags.inc2
1 files changed, 1 insertions, 1 deletions
diff --git a/meta/conf/distro/include/security_flags.inc b/meta/conf/distro/include/security_flags.inc
index 14ac0bf325..1795750fb3 100644
--- a/meta/conf/distro/include/security_flags.inc
+++ b/meta/conf/distro/include/security_flags.inc
@@ -84,7 +84,7 @@ SECURITY_CFLAGS_pn-python-numpy = "${SECURITY_NO_PIE_CFLAGS}"
84SECURITY_CFLAGS_pn-python3 = "${SECURITY_NO_PIE_CFLAGS}" 84SECURITY_CFLAGS_pn-python3 = "${SECURITY_NO_PIE_CFLAGS}"
85SECURITY_CFLAGS_pn-tcl = "${SECURITY_NO_PIE_CFLAGS}" 85SECURITY_CFLAGS_pn-tcl = "${SECURITY_NO_PIE_CFLAGS}"
86SECURITY_CFLAGS_pn-tiff = "${SECURITY_NO_PIE_CFLAGS}" 86SECURITY_CFLAGS_pn-tiff = "${SECURITY_NO_PIE_CFLAGS}"
87SECURITY_CFLAGS_pn-valgrind = "${SECURITY_NO_PIE_CFLAGS}" 87SECURITY_CFLAGS_pn-valgrind = ""
88SECURITY_CFLAGS_pn-zlib = "${SECURITY_NO_PIE_CFLAGS}" 88SECURITY_CFLAGS_pn-zlib = "${SECURITY_NO_PIE_CFLAGS}"
89 89
90# These 2 have text relco errors with the pie options enabled 90# These 2 have text relco errors with the pie options enabled