index
:
compiler-flags-distro
main
Usage of enabled-by-default hardening-related compiler flags across Linux distributions
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
README.md
(
follow
)
Age
Commit message (
Expand
)
Author
2024-11-07
distinguish package build flags
Mark Esler
2024-09-09
Add fhardened
Mark Esler
2024-05-10
Update _FORTIFY_SOURCE=3 status on Arch Linux
kpcyrd
2024-01-21
Yet another libcpp hardening macro shitshow
jvoisin
2024-01-21
Add a resource
jvoisin
2024-01-21
Add a note about `-D_LIBCPP_ASSERT` and `-D_LIBCPP_ENABLE_ASSERTIONS`
jvoisin
2023-12-16
Chimera is using FORTIFY_SOURCE=3
jvoisin
2023-12-16
Ubuntu: add -D_FORTIFY_SOURCE=3 for 24.04 release
Mark Esler
2023-12-12
Chrome doesn't enable BoundSan
jvoisin
2023-10-29
Ubuntu and Debian have some CFI now
jvoisin
2023-10-17
Add Chrome
jvoisin
2023-10-13
Gentoo: add vanilla/normal column
Sam James
2023-09-06
Another date for fedora
jvoisin
2023-09-05
Update link for Arch Linux -D_FORTIFY_SOURCE=3
kpcyrd
2023-09-05
Add a date for fedora
jvoisin
2023-09-05
Add a date for fedora
jvoisin
2023-09-05
Add another source
jvoisin
2023-09-05
Add a date for Fedora
jvoisin
2023-09-05
Add more sources
jvoisin
2023-09-05
Add noexecstack
jvoisin
2023-09-05
Add an equivalent to -Wformat-security
jvoisin
2023-09-05
Add some compiler/runtimes versions
jvoisin
2023-09-05
Add fsanitize=bounds
jvoisin
2023-09-05
Add some musl libc limitations
jvoisin
2023-09-05
Add more data
jvoisin
2023-09-04
Add more chimera stuff
jvoisin
2023-09-04
Sort the table
jvoisin
2023-09-04
Add some hardening done by Chimera
jvoisin
2023-09-04
D_LIBCXX_ENABLE_ASSERTIONS isn't enabled in Alpine
jvoisin
2023-09-04
Clarify a bit some flags for alpine
jvoisin
2023-09-04
Add a date for android
jvoisin
2023-09-04
Add more android stuff
jvoisin
2023-09-03
No -D_FORTIFY_SOURCE=3 on Android
jvoisin
2023-09-03
Add android!
jvoisin
2023-09-03
Please github's markdown parser
jvoisin
2023-09-03
More "no" for fsanitize=[cfi|safe-stack]
jvoisin
2023-09-03
Add more "no" for fsanitize=[cfi|safe-stack]
jvoisin
2023-09-03
Add the superseded msign-return-address flag
jvoisin
2023-09-03
Alpine doesn't use -fsanitize
jvoisin
2023-09-03
Nobody is using ftrapv
jvoisin
2023-09-03
OpenBSD explicitly allows unsigned overflows, amazing.
jvoisin
2023-09-03
Nobody is using -mshstk
jvoisin
2023-09-03
Mark -D_LIBCXX_ENABLE_ASSERTIONS as superseded where applicable
jvoisin
2023-09-03
Remove a duplicate
jvoisin
2023-09-03
Add DLIBCXX_ENABLE_ASSERTIONS
jvoisin
2023-09-03
Add a source for Chimera's partial `-fsanitize=cfi` support
jvoisin
2023-09-03
Add "partial" as an in-between yes and no.
jvoisin
2023-09-03
Remove -fsanitize-minimal-runtime, since it's not a mitigation per se
jvoisin
2023-09-03
Add some notes
jvoisin
2023-09-03
Add -ftrapv
jvoisin
[next]