Some toolchains may have configured itself with ssp in such cases just removing -fstack-protector-strong is not enough to disable ssp, additionally disabling it on cmdline is required too
Signed-off-by: Khem Raj <raj.k...@gmail.com> --- common/recipes-bsp/rmc/rmc-efi.bb | 1 + common/recipes-bsp/rmc/rmc.bb | 1 + 2 files changed, 2 insertions(+) diff --git a/common/recipes-bsp/rmc/rmc-efi.bb b/common/recipes-bsp/rmc/rmc-efi.bb index ea09619..2a1c9a9 100644 --- a/common/recipes-bsp/rmc/rmc-efi.bb +++ b/common/recipes-bsp/rmc/rmc-efi.bb @@ -21,6 +21,7 @@ EXTRA_OEMAKE = "RMC_INSTALL_PREFIX=${D}/${prefix} \ RMC_INSTALL_HEADER_PATH=${D}${includedir}/rmc" SECURITY_CFLAGS_remove_class-target = "-fstack-protector-strong" +SECURITY_CFLAGS_append_class-target = " -fno-stack-protector" python () { ccargs = d.getVar('TUNE_CCARGS').split() diff --git a/common/recipes-bsp/rmc/rmc.bb b/common/recipes-bsp/rmc/rmc.bb index fb0d173..8797644 100644 --- a/common/recipes-bsp/rmc/rmc.bb +++ b/common/recipes-bsp/rmc/rmc.bb @@ -28,6 +28,7 @@ EXTRA_OEMAKE = "RMC_INSTALL_PREFIX=${D}/${prefix} \ RMC_INSTALL_HEADER_PATH=${D}${includedir}/rmc" SECURITY_CFLAGS_remove_class-target = "-fstack-protector-strong" +SECURITY_CFLAGS_append_class-target = " -fno-stack-protector" do_compile_class-target() { oe_runmake -- 2.14.1 -- _______________________________________________ meta-intel mailing list meta-intel@yoctoproject.org https://lists.yoctoproject.org/listinfo/meta-intel