@@ -120,21 +120,15 @@ def test_MACHO(self):
120
120
arch = get_arch (cc , source , executable )
121
121
122
122
if arch == lief .ARCHITECTURES .X86 :
123
- self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-no_pie' ,'-Wl,-flat_namespace' ,'-Wl,-allow_stack_execute' ,'-fno-stack-protector' , '-Wl,-no_fixup_chains' ]),
124
- (1 , executable + ': failed NOUNDEFS Canary FIXUP_CHAINS PIE NX CONTROL_FLOW' ))
125
- self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-no_pie' ,'-Wl,-flat_namespace' ,'-Wl,-allow_stack_execute' ,'-fno-stack-protector' , '-Wl,-fixup_chains' ]),
126
- (1 , executable + ': failed NOUNDEFS Canary PIE NX CONTROL_FLOW' ))
127
- self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-no_pie' ,'-Wl,-flat_namespace' ,'-Wl,-allow_stack_execute' ,'-fstack-protector-all' , '-Wl,-fixup_chains' ]),
128
- (1 , executable + ': failed NOUNDEFS PIE NX CONTROL_FLOW' ))
129
- self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-no_pie' ,'-Wl,-flat_namespace' ,'-fstack-protector-all' , '-Wl,-fixup_chains' ]),
130
- (1 , executable + ': failed NOUNDEFS PIE CONTROL_FLOW' ))
131
- self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-no_pie' ,'-fstack-protector-all' , '-Wl,-fixup_chains' ]),
132
- (1 , executable + ': failed PIE CONTROL_FLOW' ))
133
- self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-no_pie' ,'-fstack-protector-all' , '-Wl,-fixup_chains' ]),
134
- (1 , executable + ': failed PIE CONTROL_FLOW' ))
135
- self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-no_pie' ,'-fstack-protector-all' , '-fcf-protection=full' , '-Wl,-fixup_chains' ]),
136
- (1 , executable + ': failed PIE' ))
137
- self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-pie' ,'-fstack-protector-all' , '-fcf-protection=full' , '-Wl,-fixup_chains' ]),
123
+ self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-no_pie' ,'-Wl,-flat_namespace' ,'-fno-stack-protector' , '-Wl,-no_fixup_chains' ]),
124
+ (1 , executable + ': failed NOUNDEFS Canary FIXUP_CHAINS PIE CONTROL_FLOW' ))
125
+ self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-flat_namespace' ,'-fno-stack-protector' , '-Wl,-fixup_chains' ]),
126
+ (1 , executable + ': failed NOUNDEFS Canary CONTROL_FLOW' ))
127
+ self .assertEqual (call_security_check (cc , source , executable , ['-Wl,-flat_namespace' ,'-fstack-protector-all' , '-Wl,-fixup_chains' ]),
128
+ (1 , executable + ': failed NOUNDEFS CONTROL_FLOW' ))
129
+ self .assertEqual (call_security_check (cc , source , executable , ['-fstack-protector-all' , '-Wl,-fixup_chains' ]),
130
+ (1 , executable + ': failed CONTROL_FLOW' ))
131
+ self .assertEqual (call_security_check (cc , source , executable , ['-fstack-protector-all' , '-fcf-protection=full' , '-Wl,-fixup_chains' ]),
138
132
(0 , '' ))
139
133
else :
140
134
# arm64 darwin doesn't support non-PIE binaries, control flow or executable stacks
0 commit comments