]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commitdiff
glibc: Fix recipe bug that disabled stack protector
authorIvan Nestlerode <ivan.nestlerode@sonos.com>
Mon, 4 May 2026 21:28:43 +0000 (17:28 -0400)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 7 May 2026 09:53:48 +0000 (10:53 +0100)
Fixes [YOCTO #16265]

The glibc recipe is supposed to be building with
--enable-stack-protector=strong, but some CACHED_CONFIGVARS values are
actually breaking this, causing glibc to be built with no stack
protector at all.

Remove these CACHED_CONFIGVARS values so that stack protector support is
detected properly in do_configure and then enabled properly during
do_compile.

Full details are here:
https://bugzilla.yoctoproject.org/show_bug.cgi?id=16265

Signed-off-by: Ivan Nestlerode <ivan.nestlerode@sonos.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-core/glibc/glibc.inc

index 30d93bca77a3e04caf5a3c87c19c2507962ffe9b..dae087d53f615acee00aced49f4f4e72eb4ad1fc 100644 (file)
@@ -21,9 +21,6 @@ CACHED_CONFIGUREVARS += " \
   libc_cv_slibdir=${base_libdir} \
   libc_cv_rootsbindir=${base_sbindir} \
   libc_cv_localedir=${localedir} \
-  libc_cv_ssp_strong=no \
-  libc_cv_ssp_all=no \
-  libc_cv_ssp=no \
   libc_cv_include_x86_isa_level=no \
 "