HEADSUP: toolchain modifications required for built-in SSP
Yaakov Selkowitz
yselkowi@redhat.com
Thu Nov 30 01:48:00 GMT 2017
Newlib/RTEMS users,
Please be aware that, as of today's git master, and the next (2.6.0?)
tarball release, Newlib includes its own implementation of Stack
Smashing Protection (-fstack-protector*) and Object Size Checking
(-D_FORTIFY_SOURCE=*) features. This implementation replaces and
conflicts with GCC's libssp, which is practically broken and unmaintained.
In order to avoid the conflict with GCC's libssp, Newlib/RTEMS
toolchains using git master or the next release MUST be rebuilt,
configuring with the --disable-libssp flag, and exporting
gcc_cv_libc_provides_ssp=yes in the environment during 'make'.
If you have any issues with these features, please feel free to ask on list.
--
Yaakov Selkowitz
Software Engineer - Platform Enablement Group
Red Hat, Inc.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 659 bytes
Desc: OpenPGP digital signature
URL: <http://sourceware.org/pipermail/newlib/attachments/20171130/210f7b97/attachment.sig>
More information about the Newlib
mailing list