From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-ig0-f177.google.com (mail-ig0-f177.google.com [209.85.213.177]) by mail.openembedded.org (Postfix) with ESMTP id 16DCB6FF86 for ; Fri, 18 Dec 2015 04:42:18 +0000 (UTC) Received: by mail-ig0-f177.google.com with SMTP id to4so28378177igc.0 for ; Thu, 17 Dec 2015 20:42:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=E8M82gZEjAjky3LYsQn89V8JvOtBz5s90He1gXe/+GQ=; b=aYBwTXN6XE+n1k5lN7498TqUllEgqd64h/XrBDEGNBmI0lcdEmMtaUisutGKdRHauw zmzyOp58R+X70T2aWOXCeTPNcyilKcAuCQ9GAOHJ1z70gfC7VL17uH8Y8tM6i0W42o2M DSZbGuWYzubBbgW04u6qP+HUTzy6W/yKvLR28WztSFcexdD7aqgsgS/BPLKuIcWKLQyA i3Xm1RTQQGTn1+3HI4LhzYAEmM3HG1joBznSsSahVtFmU5pmfKA0csj/WDs3/ZlYsSy4 bp/mEsZ5NPKpYg60MKUoS+8CRn1DpMUG8yVtOEH17zJ8iRZxX1Ft6WnApd4zeX0hDQQM Vy6g== X-Received: by 10.50.171.202 with SMTP id aw10mr593707igc.26.1450413739062; Thu, 17 Dec 2015 20:42:19 -0800 (PST) Received: from e6520.cablelabs.com (50-204-102-64-static.hfc.comcastbusiness.net. [50.204.102.64]) by smtp.gmail.com with ESMTPSA id c5sm2011003igt.9.2015.12.17.20.42.17 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 17 Dec 2015 20:42:18 -0800 (PST) From: Andre McCurdy To: openembedded-core@lists.openembedded.org Date: Thu, 17 Dec 2015 20:42:01 -0800 Message-Id: <1450413723-22208-3-git-send-email-armccurdy@gmail.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1450413723-22208-1-git-send-email-armccurdy@gmail.com> References: <1450413723-22208-1-git-send-email-armccurdy@gmail.com> Subject: [PATCH 2/4 v3] security_flags.inc: disable -fstack-protector-XXX for valgrind X-BeenThere: openembedded-core@lists.openembedded.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Patches and discussions about the oe-core layer List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 18 Dec 2015 04:42:19 -0000 Valgrind (v3.11.0) expects to build with stack protection disabled and includes -fno-stack-protector in its default CFLAGS. However, the CFLAGS provided by OE are included on the compiler command line after the defaults so any -fstack-protector-all / -fstack-protector-strong option provided by security_flags.inc will cause problems. | .../build-bcm97425vms/tmp/work/mips32el-rdk-linux/valgrind/3.11.0-r0/valgrind-3.11.0/coregrind/m_mallocfree.c:892: undefined reference to `__stack_chk_guard' | .../build-bcm97425vms/tmp/work/mips32el-rdk-linux/valgrind/3.11.0-r0/valgrind-3.11.0/coregrind/m_mallocfree.c:947: undefined reference to `__stack_chk_fail' Signed-off-by: Andre McCurdy --- meta/conf/distro/include/security_flags.inc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/conf/distro/include/security_flags.inc b/meta/conf/distro/include/security_flags.inc index 14ac0bf..1795750 100644 --- a/meta/conf/distro/include/security_flags.inc +++ b/meta/conf/distro/include/security_flags.inc @@ -84,7 +84,7 @@ SECURITY_CFLAGS_pn-python-numpy = "${SECURITY_NO_PIE_CFLAGS}" SECURITY_CFLAGS_pn-python3 = "${SECURITY_NO_PIE_CFLAGS}" SECURITY_CFLAGS_pn-tcl = "${SECURITY_NO_PIE_CFLAGS}" SECURITY_CFLAGS_pn-tiff = "${SECURITY_NO_PIE_CFLAGS}" -SECURITY_CFLAGS_pn-valgrind = "${SECURITY_NO_PIE_CFLAGS}" +SECURITY_CFLAGS_pn-valgrind = "" SECURITY_CFLAGS_pn-zlib = "${SECURITY_NO_PIE_CFLAGS}" # These 2 have text relco errors with the pie options enabled -- 1.9.1