Open GoogleCodeExporter opened 9 years ago
(see http://gcc.gnu.org/bugzilla/show_bug.cgi?id=59148)
Original comment by ramosian.glider@gmail.com
on 22 Nov 2013 at 2:39
See also http://llvm.org/bugs/show_bug.cgi?id=18775,
where clang does not support -D_FORTIFY_SOURCE=2
Original comment by konstant...@gmail.com
on 11 Feb 2014 at 11:01
I think this is becoming more important now that Ubuntu enabled
-D_FORTIFY_SOURCE=2 by default. Note that there is not easy way to disable it -
passing -D_FORTIFY_SOURCE=0 when -fsanitize=address is active would cause ugly
warnings about macro redefinition.
Original comment by tetra20...@gmail.com
on 14 Jan 2015 at 11:22
Tizen enables -D_FORTIFY_SOURCE by default as well. Looks like this feature has
become very popular...
Original comment by tetra20...@gmail.com
on 26 Jan 2015 at 9:44
Does it mean that these bugs are out-of-date and clang now supports
FORTIFY_SOURCE?
http://llvm.org/bugs/show_bug.cgi?id=18775
http://llvm.org/bugs/show_bug.cgi?id=16821
I guess we should support it then.
Original comment by euge...@google.com
on 26 Jan 2015 at 10:15
> Does it mean that these bugs are out-of-date
> and clang now supports FORTIFY_SOURCE?
I'm not sure - all my targets use GCC. Simple examples seem to work with TOT
Clang though.
Will you accept libasan patch with fortified interceptors or should we wait
until fortification is stable in Clang?
Original comment by tetra20...@gmail.com
on 26 Jan 2015 at 10:49
Sure, I don't see any harm in it.
Original comment by euge...@google.com
on 26 Jan 2015 at 11:52
Original issue reported on code.google.com by
ramosian.glider@gmail.com
on 22 Nov 2013 at 1:48