| Index: third_party/dpkg-dev/scripts/Dpkg/Vendor/Debian.pm
|
| diff --git a/third_party/dpkg-dev/scripts/Dpkg/Vendor/Debian.pm b/third_party/dpkg-dev/scripts/Dpkg/Vendor/Debian.pm
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..9cce36d52cad76e54c19586444db5712532a7bae
|
| --- /dev/null
|
| +++ b/third_party/dpkg-dev/scripts/Dpkg/Vendor/Debian.pm
|
| @@ -0,0 +1,194 @@
|
| +# Copyright © 2009-2011 Raphaël Hertzog <hertzog@debian.org>
|
| +#
|
| +# Hardening build flags handling derived from work of:
|
| +# Copyright © 2009-2011 Kees Cook <kees@debian.org>
|
| +# Copyright © 2007-2008 Canonical, Ltd.
|
| +#
|
| +# This program is free software; you can redistribute it and/or modify
|
| +# it under the terms of the GNU General Public License as published by
|
| +# the Free Software Foundation; either version 2 of the License, or
|
| +# (at your option) any later version.
|
| +#
|
| +# This program is distributed in the hope that it will be useful,
|
| +# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
| +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
| +# GNU General Public License for more details.
|
| +#
|
| +# You should have received a copy of the GNU General Public License
|
| +# along with this program. If not, see <https://www.gnu.org/licenses/>.
|
| +
|
| +package Dpkg::Vendor::Debian;
|
| +
|
| +use strict;
|
| +use warnings;
|
| +
|
| +our $VERSION = '0.01';
|
| +
|
| +use parent qw(Dpkg::Vendor::Default);
|
| +
|
| +use Dpkg::Gettext;
|
| +use Dpkg::ErrorHandling;
|
| +use Dpkg::Control::Types;
|
| +use Dpkg::BuildOptions;
|
| +use Dpkg::Arch qw(get_host_arch debarch_to_debtriplet);
|
| +
|
| +=encoding utf8
|
| +
|
| +=head1 NAME
|
| +
|
| +Dpkg::Vendor::Debian - Debian vendor object
|
| +
|
| +=head1 DESCRIPTION
|
| +
|
| +This vendor object customize the behaviour of dpkg scripts
|
| +for Debian specific actions.
|
| +
|
| +=cut
|
| +
|
| +sub run_hook {
|
| + my ($self, $hook, @params) = @_;
|
| +
|
| + if ($hook eq 'keyrings') {
|
| + return ('/usr/share/keyrings/debian-keyring.gpg',
|
| + '/usr/share/keyrings/debian-maintainers.gpg');
|
| + } elsif ($hook eq 'register-custom-fields') {
|
| + } elsif ($hook eq 'extend-patch-header') {
|
| + my ($textref, $ch_info) = @params;
|
| + if ($ch_info->{'Closes'}) {
|
| + foreach my $bug (split(/\s+/, $ch_info->{'Closes'})) {
|
| + $$textref .= "Bug-Debian: http://bugs.debian.org/$bug\n";
|
| + }
|
| + }
|
| +
|
| + # XXX: Layer violation...
|
| + require Dpkg::Vendor::Ubuntu;
|
| + my $b = Dpkg::Vendor::Ubuntu::find_launchpad_closes($ch_info->{'Changes'});
|
| + foreach my $bug (@$b) {
|
| + $$textref .= "Bug-Ubuntu: https://bugs.launchpad.net/bugs/$bug\n";
|
| + }
|
| + } elsif ($hook eq 'update-buildflags') {
|
| + $self->add_hardening_flags(@params);
|
| + } else {
|
| + return $self->SUPER::run_hook($hook, @params);
|
| + }
|
| +}
|
| +
|
| +sub add_hardening_flags {
|
| + my ($self, $flags) = @_;
|
| + my $arch = get_host_arch();
|
| + my ($abi, $os, $cpu) = debarch_to_debtriplet($arch);
|
| +
|
| + unless (defined $abi and defined $os and defined $cpu) {
|
| + warning(_g("unknown host architecture '%s'"), $arch);
|
| + ($abi, $os, $cpu) = ('', '', '');
|
| + }
|
| +
|
| + # Features enabled by default for all builds.
|
| + my %use_feature = (
|
| + pie => 0,
|
| + stackprotector => 1,
|
| + fortify => 1,
|
| + format => 1,
|
| + relro => 1,
|
| + bindnow => 0,
|
| + );
|
| +
|
| + # Adjust features based on Maintainer's desires.
|
| + my $opts = Dpkg::BuildOptions->new(envvar => 'DEB_BUILD_MAINT_OPTIONS');
|
| + foreach my $feature (split(/,/, $opts->get('hardening') // '')) {
|
| + $feature = lc($feature);
|
| + if ($feature =~ s/^([+-])//) {
|
| + my $value = ($1 eq '+') ? 1 : 0;
|
| + if ($feature eq 'all') {
|
| + $use_feature{$_} = $value foreach keys %use_feature;
|
| + } else {
|
| + if (exists $use_feature{$feature}) {
|
| + $use_feature{$feature} = $value;
|
| + } else {
|
| + warning(_g('unknown hardening feature: %s'), $feature);
|
| + }
|
| + }
|
| + } else {
|
| + warning(_g('incorrect value in hardening option of ' .
|
| + 'DEB_BUILD_MAINT_OPTIONS: %s'), $feature);
|
| + }
|
| + }
|
| +
|
| + # Mask features that are not available on certain architectures.
|
| + if ($os !~ /^(linux|knetbsd|hurd)$/ or
|
| + $cpu =~ /^(hppa|mips|mipsel|avr32)$/) {
|
| + # Disabled on non-linux/knetbsd/hurd (see #430455 and #586215).
|
| + # Disabled on hppa, mips/mipsel (#532821), avr32
|
| + # (#574716).
|
| + $use_feature{pie} = 0;
|
| + }
|
| + if ($cpu =~ /^(ia64|alpha|mips|mipsel|hppa)$/ or $arch eq 'arm') {
|
| + # Stack protector disabled on ia64, alpha, mips, mipsel, hppa.
|
| + # "warning: -fstack-protector not supported for this target"
|
| + # Stack protector disabled on arm (ok on armel).
|
| + # compiler supports it incorrectly (leads to SEGV)
|
| + $use_feature{stackprotector} = 0;
|
| + }
|
| + if ($cpu =~ /^(ia64|hppa|avr32)$/) {
|
| + # relro not implemented on ia64, hppa, avr32.
|
| + $use_feature{relro} = 0;
|
| + }
|
| +
|
| + # Mask features that might be influenced by other flags.
|
| + if ($flags->{build_options}->has('noopt')) {
|
| + # glibc 2.16 and later warn when using -O0 and _FORTIFY_SOURCE.
|
| + $use_feature{fortify} = 0;
|
| + }
|
| +
|
| + # Handle logical feature interactions.
|
| + if ($use_feature{relro} == 0) {
|
| + # Disable bindnow if relro is not enabled, since it has no
|
| + # hardening ability without relro and may incur load penalties.
|
| + $use_feature{bindnow} = 0;
|
| + }
|
| +
|
| + # PIE
|
| + if ($use_feature{pie}) {
|
| + $flags->append('CFLAGS', '-fPIE');
|
| + $flags->append('FFLAGS', '-fPIE');
|
| + $flags->append('CXXFLAGS', '-fPIE');
|
| + $flags->append('GCJFLAGS', '-fPIE');
|
| + $flags->append('LDFLAGS', '-fPIE -pie');
|
| + }
|
| +
|
| + # Stack protector
|
| + if ($use_feature{stackprotector}) {
|
| + $flags->append('CFLAGS', '-fstack-protector --param=ssp-buffer-size=4');
|
| + $flags->append('FFLAGS', '-fstack-protector --param=ssp-buffer-size=4');
|
| + $flags->append('CXXFLAGS', '-fstack-protector --param=ssp-buffer-size=4');
|
| + $flags->append('GCJFLAGS', '-fstack-protector --param=ssp-buffer-size=4');
|
| + }
|
| +
|
| + # Fortify Source
|
| + if ($use_feature{fortify}) {
|
| + $flags->append('CPPFLAGS', '-D_FORTIFY_SOURCE=2');
|
| + }
|
| +
|
| + # Format Security
|
| + if ($use_feature{format}) {
|
| + $flags->append('CFLAGS', '-Wformat -Werror=format-security');
|
| + $flags->append('CXXFLAGS', '-Wformat -Werror=format-security');
|
| + }
|
| +
|
| + # Read-only Relocations
|
| + if ($use_feature{relro}) {
|
| + $flags->append('LDFLAGS', '-Wl,-z,relro');
|
| + }
|
| +
|
| + # Bindnow
|
| + if ($use_feature{bindnow}) {
|
| + $flags->append('LDFLAGS', '-Wl,-z,now');
|
| + }
|
| +
|
| + # Store the feature usage.
|
| + while (my ($feature, $enabled) = each %use_feature) {
|
| + $flags->set_feature('hardening', $feature, $enabled);
|
| + }
|
| +}
|
| +
|
| +1;
|
|
|