diff --git a/documentation/ref-manual/migration.xml b/documentation/ref-manual/migration.xml index 91eabf807b..5dea5ad960 100644 --- a/documentation/ref-manual/migration.xml +++ b/documentation/ref-manual/migration.xml @@ -5182,9 +5182,10 @@ id=f4d4f99cfbc2396e49c1613a7d237b9e57f06f81'>commit message. By default, the security_flags.inc file - sets a GCCPIE variable with an option - to enable Position Independent Executables (PIE) within - gcc. + sets a + GCCPIE + variable with an option to enable Position Independent + Executables (PIE) within gcc. Enabling PIE in the GNU C Compiler (GCC), makes Return Oriented Programming (ROP) attacks much more difficult to execute. diff --git a/documentation/ref-manual/ref-variables.xml b/documentation/ref-manual/ref-variables.xml index a79fc2ec87..631759d372 100644 --- a/documentation/ref-manual/ref-variables.xml +++ b/documentation/ref-manual/ref-variables.xml @@ -22,7 +22,7 @@ D E F - G + G H I @@ -5030,6 +5030,30 @@ G + GCCPIE + + GCCPIE[doc] = "Enables Position Independent Executables (PIE) within the GNU C Compiler (GCC)." + + + + + Enables Position Independent Executables (PIE) within the + GNU C Compiler (GCC). + Enabling PIE in the GCC makes Return Oriented Programming + (ROP) attacks much more difficult to + execute. + + + + By default the security_flags.inc + file enables PIE by setting the variable as follows: + + GCCPIE ?= "--enable-default-pie" + + + + + GDB GDB[doc] = "The minimal command and arguments to run the GNU Debugger."