Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
k8s-device-plugin: Restore use of non-problematic openssf-compiler-op…
…tions Continue the (admittedly ugly) pattern of copy+modifying openssf.spec to remove -Wl,-z,now so we can reenable the remaining hardening. Here's the diff in hardening-check output this produces: --- before 2025-01-08 10:50:31.373533578 -0700 +++ after 2025-01-08 10:50:42.569543846 -0700 @@ -1,7 +1,7 @@ /usr/bin/gpu-feature-discovery: Position Independent Executable: no, normal executable! Stack protected: no, not found! -Fortify Source functions: no, only unprotected functions found! +Fortify Source functions: yes Read-only relocations: yes Immediate binding: no, not found! Stack clash protection: unknown, no -fstack-clash-protection instructions found @@ -9,7 +9,7 @@ /usr/bin/mps-control-daemon: Position Independent Executable: no, normal executable! Stack protected: yes -Fortify Source functions: no, only unprotected functions found! +Fortify Source functions: yes (some protected functions found) Read-only relocations: yes Immediate binding: no, not found! Stack clash protection: unknown, no -fstack-clash-protection instructions found @@ -17,7 +17,7 @@ /usr/bin/nvidia-device-plugin: Position Independent Executable: no, normal executable! Stack protected: yes -Fortify Source functions: no, only unprotected functions found! +Fortify Source functions: yes (some protected functions found) Read-only relocations: yes Immediate binding: no, not found! Stack clash protection: unknown, no -fstack-clash-protection instructions found Fixes: #34568 Signed-off-by: dann frazier <dann.frazier@chainguard.dev>
- Loading branch information