Changeset 6629008


Ignore:
Timestamp:
07/25/2020 03:15:37 AM (15 months ago)
Author:
Ken Moffat <ken@…>
Branches:
10.0, 10.1, 11.0, ken/refactor-virt, lazarus, qt5new, trunk, xry111/git-date, xry111/git-date-for-trunk, xry111/git-date-test
Children:
d24c31e8
Parents:
e153741
Message:

Firefox: Correct my asumption that clang on X86 supports all the security-hardening CFLAGS currently available with gcc. I had been led to believe that only arches such as arm, aarch64, ppc lacked all the hardening, but that is untrue.

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@23417 af4574ff-66df-0310-9fd7-8a98e5e911e0

Files:
2 edited

Legend:

Unmodified
Added
Removed
  • introduction/welcome/changelog.xml

    re153741 r6629008  
    4747      <itemizedlist>
    4848        <listitem>
     49          <para>[ken] - In firefox, note that clang (llvm-10.0.0) does not
     50          accept at least one hardening CFLAG.</para>
     51        </listitem>
     52        <listitem>
    4953          <para>[renodr] - Update to node.js-12.18.3. Fixes
    5054          <ulink url="&blfs-ticket-root;13834">#13834</ulink>.</para>
  • xsoft/graphweb/firefox.xml

    re153741 r6629008  
    392392      <application>clang</application> so that they can use one compiler
    393393      everywhere. On the X86 architectures <application>clang</application>
    394       now appears to support the same security-hardening options as
    395       <application>GCC</application>. With the current versions,
     394      now appears to support most of the same security-hardening options as
     395      <application>GCC</application> but the newer
     396      <literal>-fstack-clash-protection</literal> is still not supported.
     397      With the current versions and the default flags,
    396398      <application>GCC</application> creates a marginally bigger build but
    397399      takes typically 2 SBU less time on a 4-core machine using the mozconfig
Note: See TracChangeset for help on using the changeset viewer.