|
|
@@ -295,12 +295,22 @@ menu "Global build settings"
|
|
|
Enable GCC Stack Smashing Protection (SSP) for userspace applications
|
|
|
config PKG_CC_STACKPROTECTOR_NONE
|
|
|
bool "None"
|
|
|
+ help
|
|
|
+ No stack smashing protection.
|
|
|
config PKG_CC_STACKPROTECTOR_REGULAR
|
|
|
bool "Regular"
|
|
|
+ help
|
|
|
+ Protects functions with vulnerable objects.
|
|
|
+ This includes functions with buffers larger than 8 bytes or calls to alloca.
|
|
|
config PKG_CC_STACKPROTECTOR_STRONG
|
|
|
bool "Strong"
|
|
|
+ help
|
|
|
+ Like Regular, but also protects functions with
|
|
|
+ local arrays or references to local frame addresses.
|
|
|
config PKG_CC_STACKPROTECTOR_ALL
|
|
|
bool "All"
|
|
|
+ help
|
|
|
+ Protects all functions.
|
|
|
endchoice
|
|
|
|
|
|
choice
|
|
|
@@ -310,10 +320,18 @@ menu "Global build settings"
|
|
|
Enable GCC Stack-Smashing Protection (SSP) for the kernel
|
|
|
config KERNEL_CC_STACKPROTECTOR_NONE
|
|
|
bool "None"
|
|
|
+ help
|
|
|
+ No stack smashing protection.
|
|
|
config KERNEL_CC_STACKPROTECTOR_REGULAR
|
|
|
bool "Regular"
|
|
|
+ help
|
|
|
+ Protects functions with vulnerable objects.
|
|
|
+ This includes functions with buffers larger than 8 bytes or calls to alloca.
|
|
|
config KERNEL_CC_STACKPROTECTOR_STRONG
|
|
|
bool "Strong"
|
|
|
+ help
|
|
|
+ Like Regular, but also protects functions with
|
|
|
+ local arrays or references to local frame addresses.
|
|
|
endchoice
|
|
|
|
|
|
config KERNEL_STACKPROTECTOR
|