mirror of
https://git.yoctoproject.org/poky
synced 2026-02-24 02:19:39 +01:00
These flags add addition checks at compile, link and runtime to prevent stack smashing, checking for buffer overflows, and link at program start to prevent call spoofing later. This needs to be explicitly enabled by adding the following line to your local.conf: require conf/distro/include/security_flags.inc [YOCTO #3868] (From OE-Core rev: ff0e863f2d345c42393a14a193f76d699745a2b9) Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
27 lines
1.4 KiB
PHP
27 lines
1.4 KiB
PHP
SECURITY_CFLAGS ?= "-fstack-protector-all -pie -fpie -D_FORTIFY_SOURCE=2"
|
|
SECURITY_LDFLAGS ?= "-Wl,-z,relro,-z,now"
|
|
|
|
# Curl seems to check for FORTIFY_SOURCE in CFLAGS, but even assigned
|
|
# to CPPFLAGS it gets picked into CFLAGS in bitbake.
|
|
#TARGET_CPPFLAGS_pn-curl += "-D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-curl = "-fstack-protector-all -pie -fpie"
|
|
SECURITY_CFLAGS_pn-ppp = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-eglibc = ""
|
|
SECURITY_CFLAGS_pn-eglibc-initial = ""
|
|
SECURITY_CFLAGS_pn-zlib = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-gcc-runtime = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-libgcc = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-tcl = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-libcap = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-python-smartpm = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-python-imaging = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-python-pycurl = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-kexec-tools = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
|
|
# These 2 have text relco errors with the pie options enabled
|
|
SECURITY_CFLAGS_pn-pulseaudio = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
SECURITY_CFLAGS_pn-ltp = "-fstack-protector-all -D_FORTIFY_SOURCE=2"
|
|
|
|
TARGET_CFLAGS_append = " ${SECURITY_CFLAGS}"
|
|
TARGET_LDFLAGS_append = " ${SECURITY_LDFLAGS}"
|