All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH V2] defaultsetup.conf: Enable security flags+pie by default
@ 2018-07-27  7:41 Khem Raj
  2018-09-07 13:28 ` Andrea Adami
  0 siblings, 1 reply; 3+ messages in thread
From: Khem Raj @ 2018-07-27  7:41 UTC (permalink / raw)
  To: openembedded-core

This has been an opt-in for so long, some distributions e.g.
poky-lsb uses it by default however, since most of linux
distros have started to default to these settings for security
enhancements, time has come for OE to make it default too

remove documentation from advanced local.conf sample

Signed-off-by: Khem Raj <raj.khem@gmail.com>
---
v2:
- Remove references to explicitly enabling security flags

 meta/conf/distro/defaultsetup.conf   |  1 +
 meta/conf/local.conf.sample.extended | 11 -----------
 2 files changed, 1 insertion(+), 11 deletions(-)

diff --git a/meta/conf/distro/defaultsetup.conf b/meta/conf/distro/defaultsetup.conf
index ca2f9178d2..352e279596 100644
--- a/meta/conf/distro/defaultsetup.conf
+++ b/meta/conf/distro/defaultsetup.conf
@@ -1,6 +1,7 @@
 include conf/distro/include/default-providers.inc
 include conf/distro/include/default-versions.inc
 include conf/distro/include/default-distrovars.inc
+require conf/distro/include/security_flags.inc
 include conf/distro/include/world-broken.inc
 
 TCMODE ?= "default"
diff --git a/meta/conf/local.conf.sample.extended b/meta/conf/local.conf.sample.extended
index e698acb84b..7f107831ee 100644
--- a/meta/conf/local.conf.sample.extended
+++ b/meta/conf/local.conf.sample.extended
@@ -270,17 +270,6 @@
 #COPYLEFT_RECIPE_TYPES = 'target'
 #
 
-#
-# GCC/LD FLAGS to enable more secure code generation
-#
-# By including the security_flags include file you enable flags
-# to the compiler and linker that cause them to generate more secure
-# code, this is enabled by default in the poky-lsb distro.
-# This does affect compile speed slightly.
-#
-# Use the following line to enable the security compiler and linker flags to your build
-#require conf/distro/include/security_flags.inc
-
 # Image level user/group configuration.
 # Inherit extrausers to make the setting of EXTRA_USERS_PARAMS effective.
 #INHERIT += "extrausers"
-- 
2.18.0



^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH V2] defaultsetup.conf: Enable security flags+pie by default
  2018-07-27  7:41 [PATCH V2] defaultsetup.conf: Enable security flags+pie by default Khem Raj
@ 2018-09-07 13:28 ` Andrea Adami
  2018-09-11 11:03   ` Richard Purdie
  0 siblings, 1 reply; 3+ messages in thread
From: Andrea Adami @ 2018-09-07 13:28 UTC (permalink / raw)
  To: Khem Raj; +Cc: Patches and discussions about the oe-core layer

What is holding back this patch?

Cheers
Andrea
On Fri, Jul 27, 2018 at 9:41 AM Khem Raj <raj.khem@gmail.com> wrote:
>
> This has been an opt-in for so long, some distributions e.g.
> poky-lsb uses it by default however, since most of linux
> distros have started to default to these settings for security
> enhancements, time has come for OE to make it default too
>
> remove documentation from advanced local.conf sample
>
> Signed-off-by: Khem Raj <raj.khem@gmail.com>
> ---
> v2:
> - Remove references to explicitly enabling security flags
>
>  meta/conf/distro/defaultsetup.conf   |  1 +
>  meta/conf/local.conf.sample.extended | 11 -----------
>  2 files changed, 1 insertion(+), 11 deletions(-)
>
> diff --git a/meta/conf/distro/defaultsetup.conf b/meta/conf/distro/defaultsetup.conf
> index ca2f9178d2..352e279596 100644
> --- a/meta/conf/distro/defaultsetup.conf
> +++ b/meta/conf/distro/defaultsetup.conf
> @@ -1,6 +1,7 @@
>  include conf/distro/include/default-providers.inc
>  include conf/distro/include/default-versions.inc
>  include conf/distro/include/default-distrovars.inc
> +require conf/distro/include/security_flags.inc
>  include conf/distro/include/world-broken.inc
>
>  TCMODE ?= "default"
> diff --git a/meta/conf/local.conf.sample.extended b/meta/conf/local.conf.sample.extended
> index e698acb84b..7f107831ee 100644
> --- a/meta/conf/local.conf.sample.extended
> +++ b/meta/conf/local.conf.sample.extended
> @@ -270,17 +270,6 @@
>  #COPYLEFT_RECIPE_TYPES = 'target'
>  #
>
> -#
> -# GCC/LD FLAGS to enable more secure code generation
> -#
> -# By including the security_flags include file you enable flags
> -# to the compiler and linker that cause them to generate more secure
> -# code, this is enabled by default in the poky-lsb distro.
> -# This does affect compile speed slightly.
> -#
> -# Use the following line to enable the security compiler and linker flags to your build
> -#require conf/distro/include/security_flags.inc
> -
>  # Image level user/group configuration.
>  # Inherit extrausers to make the setting of EXTRA_USERS_PARAMS effective.
>  #INHERIT += "extrausers"
> --
> 2.18.0
>
> --
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core@lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH V2] defaultsetup.conf: Enable security flags+pie by default
  2018-09-07 13:28 ` Andrea Adami
@ 2018-09-11 11:03   ` Richard Purdie
  0 siblings, 0 replies; 3+ messages in thread
From: Richard Purdie @ 2018-09-11 11:03 UTC (permalink / raw)
  To: Andrea Adami, Khem Raj; +Cc: Patches and discussions about the oe-core layer

On Fri, 2018-09-07 at 15:28 +0200, Andrea Adami wrote:
> What is holding back this patch?

I think there were concerns about changing the OE defaults like this so
Khem and I agreed to merge it into poky as a default there for now.
There are probably a few defaults in poky we should have in
defaultsetup but those changes tend to be disruptive and
controversial...

Cheers,

Richard


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2018-09-11 11:03 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-07-27  7:41 [PATCH V2] defaultsetup.conf: Enable security flags+pie by default Khem Raj
2018-09-07 13:28 ` Andrea Adami
2018-09-11 11:03   ` Richard Purdie

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.