Hi Sam, On 10/13/22 20:31, Sam James wrote:
Reference: https://developers.redhat.com/blog/2021/04/16/broadening-compiler-checks-for-buffer-overflows-in-_fortify_source Reference: https://developers.redhat.com/articles/2022/09/17/gccs-new-fortification-level Signed-off-by: Sam James <sam@xxxxxxxxxx> --- man7/feature_test_macros.7 | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/man7/feature_test_macros.7 b/man7/feature_test_macros.7 index d33041001..e62185745 100644 --- a/man7/feature_test_macros.7 +++ b/man7/feature_test_macros.7 @@ -643,9 +643,20 @@ and result in compiler warnings; other checks take place at run time, and result in a run-time error if the check fails. .IP +With +.B _FORTIFY_SOURCE +set to 3, additional checking is added to capture some function
What do you mean by "capture"? Cheers, Alex
+calls used with an argument of variable size. +.IP Use of this macro requires compiler support, available with .BR gcc (1) since version 4.0. +.IP +For use of +.B _FORTIFY_SOURCE +set to 3, then +.BR gcc (1) +version 12.0 or later is required. .SS Default definitions, implicit definitions, and combining definitions If no feature test macros are explicitly defined, then the following feature test macros are defined by default:
-- <http://www.alejandro-colomar.es/>
Attachment:
OpenPGP_signature
Description: OpenPGP digital signature