|
@@ -216,11 +216,10 @@ menu "Global build settings"
|
|
this per package by adding PKG_CHECK_FORMAT_SECURITY:=0 in the package
|
|
this per package by adding PKG_CHECK_FORMAT_SECURITY:=0 in the package
|
|
Makefile.
|
|
Makefile.
|
|
|
|
|
|
- config PKG_ASLR_PIE
|
|
|
|
- bool
|
|
|
|
|
|
+ choice
|
|
prompt "User space ASLR PIE compilation"
|
|
prompt "User space ASLR PIE compilation"
|
|
- select BUSYBOX_DEFAULT_PIE
|
|
|
|
- default n
|
|
|
|
|
|
+ default PKG_ASLR_PIE_NONE if ((SMALL_FLASH || LOW_MEMORY_FOOTPRINT) && !SDK)
|
|
|
|
+ default PKG_ASLR_PIE_REGULAR
|
|
help
|
|
help
|
|
Add -fPIC to CFLAGS and -specs=hardened-build-ld to LDFLAGS.
|
|
Add -fPIC to CFLAGS and -specs=hardened-build-ld to LDFLAGS.
|
|
This enables package build as Position Independent Executables (PIE)
|
|
This enables package build as Position Independent Executables (PIE)
|
|
@@ -231,6 +230,21 @@ menu "Global build settings"
|
|
to predict when an attacker is attempting a memory-corruption exploit.
|
|
to predict when an attacker is attempting a memory-corruption exploit.
|
|
You can disable this per package by adding PKG_ASLR_PIE:=0 in the package
|
|
You can disable this per package by adding PKG_ASLR_PIE:=0 in the package
|
|
Makefile.
|
|
Makefile.
|
|
|
|
+ Be ware that ASLR increases the binary size.
|
|
|
|
+ config PKG_ASLR_PIE_NONE
|
|
|
|
+ bool "None"
|
|
|
|
+ help
|
|
|
|
+ PIE is deactivated for all applications
|
|
|
|
+ config PKG_ASLR_PIE_REGULAR
|
|
|
|
+ bool "Regular"
|
|
|
|
+ help
|
|
|
|
+ PIE is activated for some binaries, mostly network exposed applications
|
|
|
|
+ config PKG_ASLR_PIE_ALL
|
|
|
|
+ bool "All"
|
|
|
|
+ select BUSYBOX_DEFAULT_PIE
|
|
|
|
+ help
|
|
|
|
+ PIE is activated for all applications
|
|
|
|
+ endchoice
|
|
|
|
|
|
choice
|
|
choice
|
|
prompt "User space Stack-Smashing Protection"
|
|
prompt "User space Stack-Smashing Protection"
|