tpm2-tss: do not enforce -fstack-protector-all

Stack protection is now controlled buildroot wide with the BR2_SSP_*
options, so disable the explicit -fstack-protector-all so the SSP logic in
the toolchain wrapper is used instead.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit d38bcb9de5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
Peter Korsgaard
2019-01-15 11:15:16 +01:00
parent 9b3dd17872
commit 7a42c2f02e

View File

@@ -11,8 +11,9 @@ TPM2_TSS_LICENSE_FILES = LICENSE
TPM2_TSS_INSTALL_STAGING = YES
TPM2_TSS_DEPENDENCIES = liburiparser host-pkgconf
# configure.ac doesn't contain a link test, so it doesn't detect when
# libssp is missing.
TPM2_TSS_CONF_ENV = ax_cv_check_cflags___________Wall__Werror_______fstack_protector_all=$(if $(BR2_TOOLCHAIN_HAS_SSP),yes,no)
# -fstack-protector-all is used by default. Disable that so the
# BR2_SSP_* options in the toolchain wrapper are used instead
TPM2_TSS_CONF_ENV = \
ax_cv_check_cflags___________Wall__Werror_______fstack_protector_all=no
$(eval $(autotools-package))