-
Notifications
You must be signed in to change notification settings - Fork 29.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
build: Utilize Modern Compiler Flags to Address Potential Security Issues #18671
Comments
Pull requests welcome. :-) I've investigated most of these over the years. Performance concerns and toolchain issues make it complicated.
I forgot the details but IIRC
I believe this was blocked on clang 3.4 not supporting
Was too costly on some architectures. Would have to be benchmarked and checked if it interacts properly with add-ons.
I think this was blocked on one of our bundled dependencies (openssl or v8?) not being compatible with
Covered by |
I created a new issue #20122 to track the Data Relocation and Protection (RELRO) flag to make it independent and more clear to track. Further discussions could be put there, and I also presents some testing results, thanks. @kenny-y @bnoordhuis |
I created a new issue #20928 to track the Stack-based Buffer Overrun Detection issue, let's put further discussions there, thanks. |
Close this since all things can be done are already done. |
I've done some search in issues list and I feel I should log a new one.
It's a common best practice to utilize the flags of modern compilers, e.g. the following flags are from
GCC
noexecstack
was addressed in #17933I've done a little experiment and found that most of the flags can be directly applied on Linux platform without build errors or loss of basic functionalities. Further test on functionality and the viability on other platforms remains unknown.
The text was updated successfully, but these errors were encountered: