[meta-intel] [PATCH] rmc: remove stack-protector-strong from CFLAGS
Jianxun Zhang
jianxun.zhang at linux.intel.com
Mon Dec 5 10:31:13 PST 2016
> On Dec 2, 2016, at 2:19 PM, Saul Wold <sgw at linux.intel.com> wrote:
>
> Since the rmc is used standalone from systemd-boot and does not
> use libc which provides the stack_chk_fail code that causes an
> undefined symbol
>
> Signed-off-by: Saul Wold <sgw at linux.intel.com>
> ---
> common/recipes-bsp/rmc/rmc.bb | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/common/recipes-bsp/rmc/rmc.bb b/common/recipes-bsp/rmc/rmc.bb
> index 41062bf..8c89a99 100644
> --- a/common/recipes-bsp/rmc/rmc.bb
> +++ b/common/recipes-bsp/rmc/rmc.bb
> @@ -22,6 +22,7 @@ COMPATIBLE_HOST = "(x86_64.*|i.86.*)-linux*"
>
> TARGET_CFLAGS +="-Wl,--hash-style=both"
>
> +SECURITY_CFLAGS_remove_class-target = "-fstack-protector-strong”
Saul,
I believe this will fix the issue with the current OE security setting. There could be other similar cases too:
-fstack-protector -fstack-protector-all -fstack-protector-explicit
gcc (5.4) from my ubuntu. You may want to test/add these this time or put them in a watch list...
Thanks
> do_compile_class-target() {
> oe_runmake
> oe_runmake -f Makefile.efi
> --
> 2.7.4
>
> --
> _______________________________________________
> meta-intel mailing list
> meta-intel at yoctoproject.org
> https://lists.yoctoproject.org/listinfo/meta-intel
More information about the meta-intel
mailing list