diff options
author | Marius Dinu <m95d+git@psihoexpert.ro> | 2024-11-09 19:20:47 +0200 |
---|---|---|
committer | Christian Marangi <ansuelsmth@gmail.com> | 2024-11-10 02:14:23 +0100 |
commit | cbf7be9fb37baaaf7ee5c2b6315028bd47c764bc (patch) | |
tree | 19ab97649e4b1ce76866b8ed27cf9988f33f0466 /config | |
parent | 79f06827ff7145b850e072c0ed26802573a2199f (diff) | |
download | openwrt-cbf7be9fb37baaaf7ee5c2b6315028bd47c764bc.tar.gz openwrt-cbf7be9fb37baaaf7ee5c2b6315028bd47c764bc.tar.bz2 openwrt-cbf7be9fb37baaaf7ee5c2b6315028bd47c764bc.zip |
menuconfig: add help description for Stack Smashing Protection options
Descriptions taken from:
https://wiki.osdev.org/Stack_Smashing_Protector
Signed-off-by: Marius Dinu <m95d+git@psihoexpert.ro>
Link: https://github.com/openwrt/openwrt/pull/16897
Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
Diffstat (limited to 'config')
-rw-r--r-- | config/Config-build.in | 18 |
1 files changed, 18 insertions, 0 deletions
diff --git a/config/Config-build.in b/config/Config-build.in index 41c1daccd9..481be0bb6c 100644 --- a/config/Config-build.in +++ b/config/Config-build.in @@ -295,12 +295,22 @@ menu "Global build settings" Enable GCC Stack Smashing Protection (SSP) for userspace applications config PKG_CC_STACKPROTECTOR_NONE bool "None" + help + No stack smashing protection. config PKG_CC_STACKPROTECTOR_REGULAR bool "Regular" + help + Protects functions with vulnerable objects. + This includes functions with buffers larger than 8 bytes or calls to alloca. config PKG_CC_STACKPROTECTOR_STRONG bool "Strong" + help + Like Regular, but also protects functions with + local arrays or references to local frame addresses. config PKG_CC_STACKPROTECTOR_ALL bool "All" + help + Protects all functions. endchoice choice @@ -310,10 +320,18 @@ menu "Global build settings" Enable GCC Stack-Smashing Protection (SSP) for the kernel config KERNEL_CC_STACKPROTECTOR_NONE bool "None" + help + No stack smashing protection. config KERNEL_CC_STACKPROTECTOR_REGULAR bool "Regular" + help + Protects functions with vulnerable objects. + This includes functions with buffers larger than 8 bytes or calls to alloca. config KERNEL_CC_STACKPROTECTOR_STRONG bool "Strong" + help + Like Regular, but also protects functions with + local arrays or references to local frame addresses. endchoice config KERNEL_STACKPROTECTOR |