]> code.ossystems Code Review - openembedded-core.git/commit
tclibc: For newlib and baremetal disable some security features
authorNathan Rossi <nathan@nathanrossi.com>
Mon, 10 Sep 2018 12:44:13 +0000 (12:44 +0000)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 11 Sep 2018 08:05:29 +0000 (09:05 +0100)
commitdfe434b793c156a87b5ead5cb85fe60d920d69d3
treed9b1adb8a8068c1bb19491c62d33d2aaddcb89ac
parent69ce8ba6cc610f310ae28d988d487918906e6ef9
tclibc: For newlib and baremetal disable some security features

With GCCPIE being enabled by default with security_flags.inc the
compiler will by default attempt to compile and link programs as PIE.
The targets that use newlib and baremetal in general do not support PIE
or are otherwise unable to use it due to how embedded targets are
compiled and executed. As such it makes sense to disable PIE by default
for these libc's in order to prevent build failures.

For baremetal tclibc there are no libc features or implementation as
such there is no implementation for the strong stack protector by
default.

Signed-off-by: Nathan Rossi <nathan@nathanrossi.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
meta/conf/distro/include/tclibc-baremetal.inc
meta/conf/distro/include/tclibc-newlib.inc