Link to the public post about clang FORTIFY.
Bug: N/A
Test: builds
Change-Id: I1c2040fdd3c3bbe61a8adfc1f414fce50087a1b8
diff --git a/libc/bionic/fortify.cpp b/libc/bionic/fortify.cpp
index cfbfbc5..144e133 100644
--- a/libc/bionic/fortify.cpp
+++ b/libc/bionic/fortify.cpp
@@ -71,15 +71,16 @@
#include "private/bionic_fortify.h"
-struct __bionic_zero_size_is_okay_t __bionic_zero_size_is_okay;
-
//
-// For more details see:
+// For more about FORTIFY see:
+//
+// https://android-developers.googleblog.com/2017/04/fortify-in-android.html
+//
// http://gcc.gnu.org/onlinedocs/gcc/Object-Size-Checking.html
// http://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html
//
-// TODO: add a link to similar clang documentation?
-//
+
+struct __bionic_zero_size_is_okay_t __bionic_zero_size_is_okay;
int __FD_ISSET_chk(int fd, fd_set* set, size_t set_size) {
__check_fd_set("FD_ISSET", fd, set_size);
diff --git a/libc/include/sys/cdefs.h b/libc/include/sys/cdefs.h
index aa93c78..004c6b5 100644
--- a/libc/include/sys/cdefs.h
+++ b/libc/include/sys/cdefs.h
@@ -256,8 +256,7 @@
* added to commonly used libc functions. If a buffer overrun is
* detected, the program is safely aborted.
*
- * See
- * http://gcc.gnu.org/onlinedocs/gcc/Object-Size-Checking.html for details.
+ * https://android-developers.googleblog.com/2017/04/fortify-in-android.html
*/
#define __BIONIC_FORTIFY_UNKNOWN_SIZE ((size_t) -1)