Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

hardening flags: add FORTIFY_SOURCE=3 support #212498

Merged
merged 6 commits into from
Feb 16, 2023
Merged

Commits on Jan 24, 2023

  1. Configuration menu
    Copy the full SHA
    3d453e2 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    00aadf0 View commit details
    Browse the repository at this point in the history
  3. llvm*Packages.clang: mark hardeningUnsupportedFlags fortify3

    it's very unclear what the status of FORTIFY_SOURCE=3 support
    in clang is
    risicle committed Jan 24, 2023
    Configuration menu
    Copy the full SHA
    74ea4fe View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    c09e1fa View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    6360298 View commit details
    Browse the repository at this point in the history
  6. libffi: disable fortify3 hardening for tests

    using the same odd mechanism as is used to disable fortify
    mid-build
    risicle committed Jan 24, 2023
    Configuration menu
    Copy the full SHA
    4e49c5d View commit details
    Browse the repository at this point in the history