On Thu, Jun 16, 2016 at 3:59 AM, Alexander Kanavin <alexander.kana...@linux.intel.com> wrote: > These recipes no longer seem to need full exclusion from security hardening.
Did you also confirm that for gcc 4.9 and 5.3? > The rest (glibc, gcc-runtime, valgrind, grub, grub-efi, uclibc) still do. > > [YOCTO #9489] > > Signed-off-by: Alexander Kanavin <alexander.kana...@linux.intel.com> > --- > meta/conf/distro/include/security_flags.inc | 6 ++---- > 1 file changed, 2 insertions(+), 4 deletions(-) > > diff --git a/meta/conf/distro/include/security_flags.inc > b/meta/conf/distro/include/security_flags.inc > index ea1d4e5..cd2b964 100644 > --- a/meta/conf/distro/include/security_flags.inc > +++ b/meta/conf/distro/include/security_flags.inc > @@ -43,7 +43,7 @@ SECURITY_CFLAGS_pn-flac = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-flex = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-gcc = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-gcc-runtime = "" > -SECURITY_CFLAGS_pn-gcc-sanitizers = "" > +SECURITY_CFLAGS_pn-gcc-sanitizers = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-gdb = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-gmp = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-gnutls = "${SECURITY_NO_PIE_CFLAGS}" > @@ -62,7 +62,7 @@ SECURITY_CFLAGS_pn-kexec-tools = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-iptables = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-libaio = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-libcap = "${SECURITY_NO_PIE_CFLAGS}" > -SECURITY_CFLAGS_pn-libgcc = "" > +SECURITY_CFLAGS_pn-libgcc = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-libid3tag = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-libnewt = "${SECURITY_NO_PIE_CFLAGS}" > SECURITY_CFLAGS_pn-libglu = "${SECURITY_NO_PIE_CFLAGS}" > @@ -109,10 +109,8 @@ TARGET_CFLAGS_append_class-target = " ${SECURITY_CFLAGS}" > TARGET_LDFLAGS_append_class-target = " ${SECURITY_LDFLAGS}" > > SECURITY_LDFLAGS_remove_pn-gcc-runtime = "-fstack-protector-strong" > -SECURITY_LDFLAGS_remove_pn-gcc-sanitizers = "-fstack-protector-strong" > SECURITY_LDFLAGS_remove_pn-glibc = "-fstack-protector-strong" > SECURITY_LDFLAGS_remove_pn-glibc-initial = "-fstack-protector-strong" > -SECURITY_LDFLAGS_remove_pn-libgcc = "-fstack-protector-strong" > SECURITY_LDFLAGS_remove_pn-uclibc = "-fstack-protector-strong" > SECURITY_LDFLAGS_remove_pn-uclibc-initial = "-fstack-protector-strong" > SECURITY_LDFLAGS_pn-xf86-video-fbdev = "${SECURITY_X_LDFLAGS}" > -- > 2.8.1 > > -- > _______________________________________________ > Openembedded-core mailing list > Openembedded-core@lists.openembedded.org > http://lists.openembedded.org/mailman/listinfo/openembedded-core -- _______________________________________________ Openembedded-core mailing list Openembedded-core@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-core