buildroot/boot/arm-trusted-firmware
Baruch Siach 5e330ff030 boot/arm-trusted-firmware: fix SSP disable in v2.2
ATF version 2.2 and older does not disable SSP when
ENABLE_STACK_PROTECTOR is not set. This is because the compiler enables
SSP by default, and ATF does not pass -fno-stack-protector to the
compiler. Upstream commit 7af195e29a42 ("Disable stack protection
explicitly") fixed the issue for v2.3 and newer.

Add -fno-stack-protector in CFLAGS when
BR2_TARGET_ARM_TRUSTED_FIRMWARE_SSP is not set to fix older ATF
versions.

Fixes:
https://gitlab.com/buildroot.org/buildroot/-/jobs/3301821171

Cc: Dick Olsson <hi@senzilla.io>
Cc: Sergey Matyukevich <geomatsi@gmail.com>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2022-11-13 21:54:57 +01:00
..
arm-trusted-firmware.hash boot/arm-trusted-firmware: bump version to 2.7 2022-07-23 21:10:46 +02:00
arm-trusted-firmware.mk boot/arm-trusted-firmware: fix SSP disable in v2.2 2022-11-13 21:54:57 +01:00
Config.in boot/arm-trusted-firmware: don't enable SSP by default 2022-10-28 08:46:15 +02:00