"Fossies" - the Fresh Open Source Software Archive  

Source code changes of the file "Config.in" between
buildroot-2019.05.1.tar.bz2 and buildroot-2019.08-rc1.tar.bz2

About: Buildroot is a set of Makefiles and patches that makes it easy to generate a complete embedded Linux system. Release candidate.

Config.in  (buildroot-2019.05.1.tar.bz2):Config.in  (buildroot-2019.08-rc1.tar.bz2)
skipping to change at line 17 skipping to change at line 17
default y default y
config BR2_VERSION config BR2_VERSION
string string
option env="BR2_VERSION_FULL" option env="BR2_VERSION_FULL"
config BR2_HOSTARCH config BR2_HOSTARCH
string string
option env="HOSTARCH" option env="HOSTARCH"
config BR2_BUILD_DIR config BR2_BASE_DIR
string string
option env="BUILD_DIR" option env="BASE_DIR"
# br2-external paths definitions
source "$BR2_BASE_DIR/.br2-external.in.paths"
# Hidden config symbols for packages to check system gcc version # Hidden config symbols for packages to check system gcc version
config BR2_HOST_GCC_VERSION config BR2_HOST_GCC_VERSION
string string
option env="HOST_GCC_VERSION" option env="HOST_GCC_VERSION"
config BR2_HOST_GCC_AT_LEAST_4_5 config BR2_HOST_GCC_AT_LEAST_4_5
bool bool
default y if BR2_HOST_GCC_VERSION = "4 5" default y if BR2_HOST_GCC_VERSION = "4 5"
skipping to change at line 715 skipping to change at line 718
paths leak into the target rootfs. If you build with the paths leak into the target rootfs. If you build with the
same O=... path, however, the result is identical. same O=... path, however, the result is identical.
This is labeled as an experimental feature, as not all This is labeled as an experimental feature, as not all
packages behave properly to ensure reproducibility. packages behave properly to ensure reproducibility.
endmenu endmenu
comment "Security Hardening Options" comment "Security Hardening Options"
config BR2_PIC_PIE
bool "Build code with PIC/PIE"
depends on BR2_SHARED_LIBS
help
Generate Position-Independent Code (PIC) and link
Position-Independent Executables (PIE).
choice choice
bool "Stack Smashing Protection" bool "Stack Smashing Protection"
default BR2_SSP_ALL if BR2_ENABLE_SSP # legacy default BR2_SSP_ALL if BR2_ENABLE_SSP # legacy
depends on BR2_TOOLCHAIN_HAS_SSP depends on BR2_TOOLCHAIN_HAS_SSP
help help
Enable stack smashing protection support using GCC's Enable stack smashing protection support using GCC's
-fstack-protector option family. -fstack-protector option family.
See See
http://www.linuxfromscratch.org/hints/downloads/files/ssp.txt http://www.linuxfromscratch.org/hints/downloads/files/ssp.txt
skipping to change at line 749 skipping to change at line 759
Emit extra code to check for buffer overflows, such as stack Emit extra code to check for buffer overflows, such as stack
smashing attacks. This is done by adding a guard variable to smashing attacks. This is done by adding a guard variable to
functions with vulnerable objects. This includes functions functions with vulnerable objects. This includes functions
that call alloca, and functions with buffers larger than 8 that call alloca, and functions with buffers larger than 8
bytes. The guards are initialized when a function is entered bytes. The guards are initialized when a function is entered
and then checked when the function exits. If a guard check and then checked when the function exits. If a guard check
fails, an error message is printed and the program exits. fails, an error message is printed and the program exits.
config BR2_SSP_STRONG config BR2_SSP_STRONG
bool "-fstack-protector-strong" bool "-fstack-protector-strong"
depends on BR2_TOOLCHAIN_GCC_AT_LEAST_4_9
help help
Like -fstack-protector but includes additional functions to be Like -fstack-protector but includes additional functions to be
protected - those that have local array definitions, or have protected - those that have local array definitions, or have
references to local frame addresses. references to local frame addresses.
comment "Stack Smashing Protection strong needs a toolchain w/ gcc >= 4.9" -fstack-protector-strong officially appeared in gcc 4.9, but
depends on !BR2_TOOLCHAIN_GCC_AT_LEAST_4_9 some vendors have backported -fstack-protector-strong to older
versions of gcc.
config BR2_SSP_ALL config BR2_SSP_ALL
bool "-fstack-protector-all" bool "-fstack-protector-all"
help help
Like -fstack-protector except that all functions are Like -fstack-protector except that all functions are
protected. This option might have a significant performance protected. This option might have a significant performance
impact on the compiled binaries. impact on the compiled binaries.
endchoice endchoice
skipping to change at line 797 skipping to change at line 807
Disables Relocation link-time protections. Disables Relocation link-time protections.
config BR2_RELRO_PARTIAL config BR2_RELRO_PARTIAL
bool "Partial" bool "Partial"
help help
This option makes the dynamic section not writeable after This option makes the dynamic section not writeable after
initialization (with almost no performance penalty). initialization (with almost no performance penalty).
config BR2_RELRO_FULL config BR2_RELRO_FULL
bool "Full" bool "Full"
select BR2_PIC_PIE
help help
This option includes the partial configuration, but also marks This option includes the partial configuration, but also marks
the GOT as read-only at the cost of initialization time during the GOT as read-only at the cost of initialization time during
program loading, i.e every time an executable is started. program loading, i.e every time an executable is started.
endchoice endchoice
comment "RELocation Read Only (RELRO) needs shared libraries" comment "RELocation Read Only (RELRO) needs shared libraries"
depends on !BR2_SHARED_LIBS depends on !BR2_SHARED_LIBS
skipping to change at line 868 skipping to change at line 879
source "package/Config.in" source "package/Config.in"
source "fs/Config.in" source "fs/Config.in"
source "boot/Config.in" source "boot/Config.in"
source "package/Config.in.host" source "package/Config.in.host"
source "Config.in.legacy" source "Config.in.legacy"
source "$BR2_BUILD_DIR/.br2-external.in" # br2-external menus definitions
source "$BR2_BASE_DIR/.br2-external.in.menus"
 End of changes. 7 change blocks. 
5 lines changed or deleted 16 lines changed or added

Home  |  About  |  Features  |  All  |  Newest  |  Dox  |  Diffs  |  RSS Feeds  |  Screenshots  |  Comments  |  Imprint  |  Privacy  |  HTTP(S)