Apply secure option
authorsaerome.kim <saerome.kim@samsung.com>
Fri, 8 Nov 2019 08:44:37 +0000 (17:44 +0900)
committersaerome.kim <saerome.kim@samsung.com>
Fri, 8 Nov 2019 10:57:02 +0000 (19:57 +0900)
commite2a8d4cfb10d300b684b98af7ad80a34490fe6f1
treede696827cb886bd7da289846ae18f9614c748d57
parent79221aff655c74f0e8e0d8c7912a8fe6bfc8e817
Apply secure option

- Problem: There is no FORTIFY option.
- Cause: Unlike the SSP that catches the stack BOF, a protection technique is
  needed to catch the BOF that occurs in a general memory buffer.
- Solution: apply FORTIFY and stack-canar options.

Change-Id: Id8b5e42d3aa1e3b045fdb9b756857119f9dcfe92
Signed-off-by: saerome.kim <saerome.kim@samsung.com>
ua-api/CMakeLists.txt
ua-daemon/CMakeLists.txt