Gcc wrapper to enforce hardening toolchain improvements
export DEB_BUILD_HARDENING=1
gcc ...
The hardened-cc wrapper is normally used by calling gcc as usual when DEB_BUILD_HARDENING is set to 1. It will configure the necessary toolchain hardening features. By default, all features are enabled. If a given feature does not work correctly and needs to be disabled, the corresponding environment variables mentioned below can be set to 0.
Enable hardening features.
Print the full resulting gcc command line to STDERR before calling gcc.
Instead of using STDERR for debugging, redirect to the given path. Some builds are very sensitive to unexpected STDERR output.
Disable stack overflow protection. See README.Debian for details.
Disable read-only linker sections. See README.Debian for details.
Don't fortify several standard functions. See README.Debian for details.
Don't build position independent executables. See README.Debian for details.
Disable unsafe format string usage errors. See README.Debian for details.
System-wide settings can be added to /etc/hardening-wrapper.conf, one per line.
The real gcc symlinks are renamed gcc.real, and a diversion is registered with dpkg-divert(1). Thus hardened-cc's idea of the default gcc is dictated by whatever package installed /usr/bin/gcc.
hardened-ld(1) gcc(1)