summaryrefslogtreecommitdiffstats
path: root/config
diff options
context:
space:
mode:
authorMarius Dinu <m95d+git@psihoexpert.ro>2024-11-09 19:20:47 +0200
committerChristian Marangi <ansuelsmth@gmail.com>2024-11-10 02:14:23 +0100
commitcbf7be9fb37baaaf7ee5c2b6315028bd47c764bc (patch)
tree19ab97649e4b1ce76866b8ed27cf9988f33f0466 /config
parent79f06827ff7145b850e072c0ed26802573a2199f (diff)
downloadopenwrt-cbf7be9fb37baaaf7ee5c2b6315028bd47c764bc.tar.gz
openwrt-cbf7be9fb37baaaf7ee5c2b6315028bd47c764bc.tar.bz2
openwrt-cbf7be9fb37baaaf7ee5c2b6315028bd47c764bc.zip
menuconfig: add help description for Stack Smashing Protection options
Descriptions taken from: https://wiki.osdev.org/Stack_Smashing_Protector Signed-off-by: Marius Dinu <m95d+git@psihoexpert.ro> Link: https://github.com/openwrt/openwrt/pull/16897 Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
Diffstat (limited to 'config')
-rw-r--r--config/Config-build.in18
1 files changed, 18 insertions, 0 deletions
diff --git a/config/Config-build.in b/config/Config-build.in
index 41c1daccd9..481be0bb6c 100644
--- a/config/Config-build.in
+++ b/config/Config-build.in
@@ -295,12 +295,22 @@ menu "Global build settings"
Enable GCC Stack Smashing Protection (SSP) for userspace applications
config PKG_CC_STACKPROTECTOR_NONE
bool "None"
+ help
+ No stack smashing protection.
config PKG_CC_STACKPROTECTOR_REGULAR
bool "Regular"
+ help
+ Protects functions with vulnerable objects.
+ This includes functions with buffers larger than 8 bytes or calls to alloca.
config PKG_CC_STACKPROTECTOR_STRONG
bool "Strong"
+ help
+ Like Regular, but also protects functions with
+ local arrays or references to local frame addresses.
config PKG_CC_STACKPROTECTOR_ALL
bool "All"
+ help
+ Protects all functions.
endchoice
choice
@@ -310,10 +320,18 @@ menu "Global build settings"
Enable GCC Stack-Smashing Protection (SSP) for the kernel
config KERNEL_CC_STACKPROTECTOR_NONE
bool "None"
+ help
+ No stack smashing protection.
config KERNEL_CC_STACKPROTECTOR_REGULAR
bool "Regular"
+ help
+ Protects functions with vulnerable objects.
+ This includes functions with buffers larger than 8 bytes or calls to alloca.
config KERNEL_CC_STACKPROTECTOR_STRONG
bool "Strong"
+ help
+ Like Regular, but also protects functions with
+ local arrays or references to local frame addresses.
endchoice
config KERNEL_STACKPROTECTOR