From 4a8877bebece7d590e8d59c51fd4d78da400081a Mon Sep 17 00:00:00 2001 From: "Todd C. Miller" Date: Fri, 1 Apr 2022 10:23:54 -0600 Subject: [PATCH] Mention other hardening compilation and linker options. --- INSTALL.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/INSTALL.md b/INSTALL.md index 61849b15c..73d19368d 100644 --- a/INSTALL.md +++ b/INSTALL.md @@ -220,8 +220,9 @@ Defaults are listed in brackets after the description. --disable-hardening Disable the use of compiler/linker exploit mitigation options which are enabled by default. This includes compiling with - _FORTIFY_SOURCE defined to 2, building with -fstack-protector - and linking with -zrelro, where supported. + _FORTIFY_SOURCE defined to 2, building with -fstack-protector, + -fstack-clash-protection, -fcf-protection and linking with + -zrelro, -znow, and -znoexecstack where supported. --disable-ssp Disable use of the -fstack-protector compiler option.