ladybird/Meta/CMake
Daniel Bertalan a4645060e6 CMake: Add hardening flags
- `-fstack-protection-strong` enables stack canaries for functions where
  addresses of local variables are taken or arrays/structures
  containing arrays are allocated on the stack.
- `-fstrict-flex-arrays=2` causes the compiler to only treat arrays with
  unknown bounds (`[]`) or zero-length-arrays (`[0]`) as *flexible array
  members*, allowing the sanitizers to emit bounds checks for structs
  with proper arrays as their last member.

More rigorous options (such as AArch64 pointer authentication, Control
Flow Integrity, _FORTIFY_SOURCE) should be investigated in the future,
however this is a good baseline.
2024-07-17 21:51:29 +02:00
..
vcpkg
all_the_debug_macros.cmake
ca_certificates_data.cmake
check_for_dependencies.cmake
clang_development.cmake
code_generators.cmake
common_compile_options.cmake CMake: Add hardening flags 2024-07-17 21:51:29 +02:00
common_options.cmake
download_icc_profiles.cmake
flac_spec_tests.cmake
fontconfig.cmake
lagom-install-config.cmake
lagom_compile_options.cmake
lagom_install_options.cmake
lagom_options.cmake
libtextcodec_generators.cmake
libweb_generators.cmake
processor-count.cmake
public_suffix.cmake
setup_ccache.cmake
unicode_data.cmake
use_linker.cmake
utils.cmake
vulkan.cmake
wasm_spec_tests.cmake