summaryrefslogtreecommitdiffstats
path: root/src/Makefile.efi
diff options
context:
space:
mode:
authorMichael Brown2020-06-24 00:08:49 +0200
committerMichael Brown2020-06-24 17:23:21 +0200
commita61b27b97f572a83ede765a0e779694865950cf2 (patch)
tree01be6a68c487542581fb9cb1b1f95902fd9ad657 /src/Makefile.efi
parent[parseopt] Treat empty integer strings in user input as invalid (diff)
downloadipxe-a61b27b97f572a83ede765a0e779694865950cf2.tar.gz
ipxe-a61b27b97f572a83ede765a0e779694865950cf2.tar.xz
ipxe-a61b27b97f572a83ede765a0e779694865950cf2.zip
[efi] Enable stack protection where possible
Enable -fstack-protector for EFI builds, where binary size is less critical than for BIOS builds. The stack cookie must be constructed immediately on entry, which prohibits the use of any viable entropy source. Construct a cookie by XORing together various mildly random quantities to produce a value that will at least not be identical on each run. On detecting a stack corruption, attempt to call Exit() with an appropriate error. If that fails, then lock up the machine since there is no other safe action that can be taken. The old conditional check for support of -fno-stack-protector is omitted since this flag dates back to GCC 4.1. Signed-off-by: Michael Brown <mcb30@ipxe.org>
Diffstat (limited to 'src/Makefile.efi')
-rw-r--r--src/Makefile.efi8
1 files changed, 8 insertions, 0 deletions
diff --git a/src/Makefile.efi b/src/Makefile.efi
index 151b3318..10f3fe74 100644
--- a/src/Makefile.efi
+++ b/src/Makefile.efi
@@ -1,5 +1,13 @@
# -*- makefile -*- : Force emacs to use Makefile mode
+# Enable stack protection if available
+#
+SPG_TEST = $(CC) -fstack-protector-strong -mstack-protector-guard=global \
+ -x c -c /dev/null -o /dev/null >/dev/null 2>&1
+SPG_FLAGS := $(shell $(SPG_TEST) && $(ECHO) '-fstack-protector-strong ' \
+ '-mstack-protector-guard=global')
+CFLAGS += $(SPG_FLAGS)
+
# The EFI linker script
#
LDSCRIPT = scripts/efi.lds