Unix and Linux Discussions Tagged with gcc |
|
Thread / Thread Starter |
Last Post |
Replies |
Views |
Forum |
|
|
|
8 |
25,108 |
OS X (Apple) |
|
|
|
13 |
17,635 |
UNIX for Advanced & Expert Users |
|
|
|
14 |
4,386 |
Programming |
|
|
|
6 |
2,105 |
UNIX for Beginners Questions & Answers |
|
|
|
17 |
12,559 |
UNIX for Advanced & Expert Users |
|
|
|
2 |
3,033 |
Programming |
|
|
|
14 |
14,632 |
Programming |
|
|
|
2 |
151,825 |
OS X (Apple) |
|
|
|
4 |
2,639 |
Solaris |
|
|
|
10 |
3,443 |
UNIX for Beginners Questions & Answers |
|
|
|
2 |
1,515 |
UNIX for Dummies Questions & Answers |
|
|
|
0 |
2,583 |
UNIX for Advanced & Expert Users |
|
|
|
6 |
3,602 |
Programming |
|
|
|
4 |
8,387 |
Programming |
|
|
|
14 |
8,496 |
UNIX for Advanced & Expert Users |
|
|
|
5 |
3,811 |
Solaris |
|
|
|
3 |
3,455 |
SuSE |
|
|
|
4 |
5,465 |
Shell Programming and Scripting |
|
|
|
1 |
9,971 |
UNIX for Dummies Questions & Answers |
|
|
|
0 |
3,612 |
Programming |
|
|
|
7 |
6,956 |
Programming |
|
|
|
8 |
8,711 |
Solaris |
|
|
|
0 |
11,931 |
Solaris |
|
|
|
17 |
12,087 |
Solaris |
|
|
|
4 |
3,027 |
Solaris |
|
|
|
17 |
29,603 |
Solaris |
|
|
|
0 |
2,137 |
Programming |
|
|
|
1 |
8,513 |
Solaris |
|
|
|
15 |
7,408 |
AIX |
|
|
|
1 |
3,866 |
AIX |
|
|
|
2 |
8,911 |
Programming |
|
|
|
4 |
4,151 |
Programming |
|
|
|
1 |
2,242 |
Programming |
|
|
|
0 |
3,258 |
Programming |
|
|
|
3 |
6,680 |
UNIX for Dummies Questions & Answers |
|
|
|
1 |
4,900 |
Linux |
|
|
|
5 |
3,824 |
UNIX for Advanced & Expert Users |
|
|
|
12 |
34,425 |
Programming |
|
|
|
8 |
40,228 |
UNIX for Dummies Questions & Answers |
|
|
|
5 |
3,337 |
Programming |
HARDENED-CC(1) Debian GNU/Linux HARDENED-CC(1)
NAME
hardened-cc - gcc wrapper to enforce hardening toolchain improvements
SYNOPSIS
export DEB_BUILD_HARDENING=1
gcc ...
DESCRIPTION
The hardened-cc wrapper is normally used by calling gcc as usual when DEB_BUILD_HARDENING is set to 1. It will configure the necessary
toolchain hardening features. By default, all features are enabled. If a given feature does not work correctly and needs to be disabled,
the corresponding environment variables mentioned below can be set to 0.
ENVIRONMENT
DEB_BUILD_HARDENING=1
Enable hardening features.
DEB_BUILD_HARDENING_DEBUG=1
Print the full resulting gcc command line to STDERR before calling gcc.
DEB_BUILD_HARDENING_STACKPROTECTOR=0
Disable stack overflow protection. See README.Debian for details.
DEB_BUILD_HARDENING_RELRO=0
Disable read-only linker sections. See README.Debian for details.
DEB_BUILD_HARDENING_FORTIFY=0
Don't fortify several standard functions. See README.Debian for details.
DEB_BUILD_HARDENING_PIE=0
Don't build position independent executables. See README.Debian for details.
DEB_BUILD_HARDENING_FORMAT=0
Disable unsafe format string usage errors. See README.Debian for details.
NOTES
System-wide settings can be added to /etc/hardening-wrapper.conf, one per line.
The real gcc symlinks are renamed gcc.real, and a diversion is registered with dpkg-divert(1). Thus hardened-cc's idea of the default gcc
is dictated by whatever package installed /usr/bin/gcc.
SEE ALSO
hardened-ld(1) gcc(1)
Debian Project 2008-01-08 HARDENED-CC(1)