From c69b60c3ba20d857c9d09386230ba080669247a8 Mon Sep 17 00:00:00 2001 From: inference Date: Sat, 11 Jun 2022 18:56:30 +0100 Subject: [PATCH] Add -fPIE to C_SEC flags to enable PIE at compile-time (only link-time PIE is unsupported for encountered packages). --- portage/env/nopie.conf | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/portage/env/nopie.conf b/portage/env/nopie.conf index 04d4787..c9ce5ed 100644 --- a/portage/env/nopie.conf +++ b/portage/env/nopie.conf @@ -20,7 +20,7 @@ OBJDUMP="llvm-objdump" # Flags. ## Hardening flags. -C_HARDENING="-fPIC -fstack-protector-all -fstack-clash-protection -D_FORTIFY_SOURCE=2" +C_HARDENING="-fPIE -fPIC -fstack-protector-all -fstack-clash-protection -D_FORTIFY_SOURCE=2" LD_HARDENING="-Wl,--strip-all -Wl,-z,defs -Wl,-z,now -Wl,-z,relro" ## Common flags.