compileTimeHardening 662 B

123456789101112
  1. Add two new configure flags:
  2. --enable-gcc-hardening
  3. This turns on gcc compile time hardening options. It ensures that
  4. signed ints have defined behavior (-fwrapv), -D_FORTIFY_SOURCE=2 is
  5. enabled (requiring -O2), stack smashing protection with canaries
  6. (-fstack-protector-all), ASLR protection if supported by the kernel
  7. (-fPIE, -pie). Additional security related warnings are enabled.
  8. Verified as working on Mac OS X and Debian Lenny.
  9. --enable-linker-hardening
  10. This turns on ELF specific hardening features (relro, now). This does
  11. not work with Mac OS X or any other non-ELF binary format.