mirror of https://github.com/opencv/opencv.git
Open Source Computer Vision Library
https://opencv.org/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
88 lines
2.9 KiB
88 lines
2.9 KiB
8 years ago
|
# Enable build defense flags.
|
||
|
# Performance may be affected.
|
||
|
# More information:
|
||
|
# - https://www.owasp.org/index.php/C-Based_Toolchain_Hardening
|
||
|
# - https://wiki.debian.org/Hardening
|
||
|
# - https://wiki.gentoo.org/wiki/Hardened/Toolchain
|
||
|
# - https://docs.microsoft.com/en-us/cpp/build/reference/sdl-enable-additional-security-checks
|
||
|
|
||
|
|
||
|
set(OPENCV_LINKER_DEFENSES_FLAGS_COMMON "")
|
||
|
|
||
|
macro(ocv_add_defense_compiler_flag option)
|
||
|
ocv_check_flag_support(CXX "${option}" _varname "${ARGN}")
|
||
|
if(${_varname})
|
||
|
set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} ${option}")
|
||
|
endif()
|
||
|
|
||
|
ocv_check_flag_support(C "${option}" _varname "${ARGN}")
|
||
|
if(${_varname})
|
||
|
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${option}")
|
||
|
endif()
|
||
|
endmacro()
|
||
|
|
||
|
macro(ocv_add_defense_compiler_flag_release option)
|
||
|
ocv_check_flag_support(CXX "${option}" _varname "${ARGN}")
|
||
|
if(${_varname})
|
||
|
set(CMAKE_CXX_FLAGS_RELEASE "${CMAKE_CXX_FLAGS_RELEASE} ${option}")
|
||
|
endif()
|
||
|
|
||
|
ocv_check_flag_support(C "${option}" _varname "${ARGN}")
|
||
|
if(${_varname})
|
||
|
set(CMAKE_C_FLAGS_RELEASE "${CMAKE_C_FLAGS_RELEASE} ${option}")
|
||
|
endif()
|
||
|
endmacro()
|
||
|
|
||
|
# Define flags
|
||
|
|
||
|
if(MSVC)
|
||
|
ocv_add_defense_compiler_flag("/GS")
|
||
|
ocv_add_defense_compiler_flag("/DynamicBase")
|
||
|
ocv_add_defense_compiler_flag("/SafeSEH")
|
||
|
ocv_add_defense_compiler_flag("/sdl")
|
||
|
elseif(CMAKE_COMPILER_IS_GNUCXX)
|
||
|
if(CMAKE_CXX_COMPILER_VERSION VERSION_LESS "4.9")
|
||
|
ocv_add_defense_compiler_flag("-fstack-protector")
|
||
|
else()
|
||
|
ocv_add_defense_compiler_flag("-fstack-protector-strong")
|
||
|
endif()
|
||
|
|
||
|
# These flags is added by general options: -Wformat -Wformat-security
|
||
|
if(NOT CMAKE_CXX_FLAGS MATCHES "-Wformat" OR NOT CMAKE_CXX_FLAGS MATCHES "format-security")
|
||
|
message(FATAL_ERROR "Defense flags: uncompatible options")
|
||
|
endif()
|
||
|
|
||
|
if(ANDROID)
|
||
|
ocv_add_defense_compiler_flag_release("-D_FORTIFY_SOURCE=2")
|
||
|
if(NOT CMAKE_CXX_FLAGS_RELEASE MATCHES "-D_FORTIFY_SOURCE=2") # TODO Check this
|
||
|
ocv_add_defense_compiler_flag_release("-D_FORTIFY_SOURCE=1")
|
||
|
endif()
|
||
|
else()
|
||
|
ocv_add_defense_compiler_flag_release("-D_FORTIFY_SOURCE=2")
|
||
|
endif()
|
||
|
|
||
|
set(OPENCV_LINKER_DEFENSES_FLAGS_COMMON "${OPENCV_LINKER_DEFENSES_FLAGS_COMMON} -z noexecstack -z relro -z now" )
|
||
|
else()
|
||
|
# not supported
|
||
|
endif()
|
||
|
|
||
|
set(CMAKE_POSITION_INDEPENDENT_CODE TRUE)
|
||
|
if(NOT CMAKE_CXX_FLAGS MATCHES "-fPIC")
|
||
|
ocv_add_defense_compiler_flag("-fPIC")
|
||
|
endif()
|
||
|
if(CMAKE_COMPILER_IS_GNUCXX)
|
||
|
set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fPIE -pie")
|
||
|
endif()
|
||
|
|
||
|
set( CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} ${LINKER_DEFENSES_FLAGS_COMMON}" )
|
||
|
set( CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} ${LINKER_DEFENSES_FLAGS_COMMON}" )
|
||
|
set( CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} ${LINKER_DEFENSES_FLAGS_COMMON}" )
|
||
|
|
||
|
if(CMAKE_COMPILER_IS_GNUCXX)
|
||
|
foreach(flags
|
||
|
CMAKE_CXX_FLAGS CMAKE_CXX_FLAGS_RELEASE CMAKE_CXX_FLAGS_DEBUG
|
||
|
CMAKE_C_FLAGS CMAKE_C_FLAGS_RELEASE CMAKE_C_FLAGS_DEBUG)
|
||
|
string(REPLACE "-O3" "-O2" ${flags} "${${flags}}")
|
||
|
endforeach()
|
||
|
endif()
|