Config-build.in 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417
  1. # SPDX-License-Identifier: GPL-2.0-only
  2. #
  3. # Copyright (C) 2006-2013 OpenWrt.org
  4. # Copyright (C) 2016 LEDE Project
  5. config EXPERIMENTAL
  6. bool "Enable experimental features by default"
  7. help
  8. Set this option to build with latest bleeding edge features
  9. which may or may not work as expected.
  10. If you would like to help the development of OpenWrt, you are
  11. encouraged to set this option and provide feedback (both
  12. positive and negative). But do so only if you know how to
  13. recover your device in case of flashing potentially non-working
  14. firmware.
  15. If you plan to use this build in production, say NO!
  16. menu "Global build settings"
  17. config JSON_OVERVIEW_IMAGE_INFO
  18. bool "Create JSON info file overview per target"
  19. default y
  20. help
  21. Create a JSON info file called profiles.json in the target
  22. directory containing machine readable list of built profiles
  23. and resulting images.
  24. config JSON_CYCLONEDX_SBOM
  25. bool "Create CycloneDX SBOM JSON"
  26. default BUILDBOT
  27. help
  28. Create a JSON files *.bom.cdx.json in the build
  29. directory containing Software Bill Of Materials in CycloneDX
  30. format.
  31. config ALL_NONSHARED
  32. bool "Select all target specific packages by default"
  33. select ALL_KMODS
  34. default BUILDBOT
  35. config ALL_KMODS
  36. bool "Select all kernel module packages by default"
  37. config ALL
  38. bool "Select all userspace packages by default"
  39. select ALL_KMODS
  40. select ALL_NONSHARED
  41. config BUILDBOT
  42. bool "Set build defaults for automatic builds (e.g. via buildbot)"
  43. help
  44. This option changes several defaults to be more suitable for
  45. automatic builds. This includes the following changes:
  46. - Deleting build directories after compiling (to save space)
  47. - Enabling per-device rootfs support
  48. ...
  49. config SIGNED_PACKAGES
  50. bool "Cryptographically signed package lists"
  51. default y
  52. config SIGNATURE_CHECK
  53. bool "Enable signature checking in opkg"
  54. default SIGNED_PACKAGES
  55. config DOWNLOAD_CHECK_CERTIFICATE
  56. bool "Enable TLS certificate verification during package download"
  57. default y
  58. config USE_APK
  59. bool "Use APK instead of OPKG to build distribution (EXPERIMENTAL)"
  60. comment "General build options"
  61. config TESTING_KERNEL
  62. bool "Use the testing kernel version"
  63. depends on HAS_TESTING_KERNEL
  64. default EXPERIMENTAL
  65. help
  66. If the target supports a newer kernel version than the default,
  67. you can use this config option to enable it
  68. config DISPLAY_SUPPORT
  69. bool "Show packages that require graphics support (local or remote)"
  70. config BUILD_PATENTED
  71. bool "Compile with support for patented functionality"
  72. help
  73. When this option is disabled, software which provides patented functionality
  74. will not be built. In case software provides optional support for patented
  75. functionality, this optional support will get disabled for this package.
  76. config BUILD_NLS
  77. bool "Compile with full language support"
  78. help
  79. When this option is enabled, packages are built with the full versions of
  80. iconv and GNU gettext instead of the default OpenWrt stubs. If uClibc is
  81. used, it is also built with locale support.
  82. config SHADOW_PASSWORDS
  83. bool
  84. default y
  85. config CLEAN_IPKG
  86. bool
  87. prompt "Remove ipkg/opkg status data files in final images"
  88. help
  89. This removes all ipkg/opkg status data files from the target directory
  90. before building the root filesystem.
  91. config IPK_FILES_CHECKSUMS
  92. bool
  93. prompt "Record files checksums in package metadata"
  94. help
  95. This makes file checksums part of package metadata. It increases size
  96. but provides you with pkg_check command to check for flash corruptions.
  97. config INCLUDE_CONFIG
  98. bool "Include build configuration in firmware" if DEVEL
  99. help
  100. If enabled, buildinfo files will be stored in /etc/build.* of firmware.
  101. config REPRODUCIBLE_DEBUG_INFO
  102. bool "Make debug information reproducible"
  103. default BUILDBOT
  104. help
  105. This strips the local build path out of debug information. This has the
  106. advantage of making it reproducible, but the disadvantage of making local
  107. debugging using ./scripts/remote-gdb harder, since the debug data will
  108. no longer point to the full path on the build host.
  109. config COLLECT_KERNEL_DEBUG
  110. bool
  111. prompt "Collect kernel debug information"
  112. select KERNEL_DEBUG_INFO
  113. default BUILDBOT
  114. help
  115. This collects debugging symbols from the kernel and all compiled modules.
  116. Useful for release builds, so that kernel issues can be debugged offline
  117. later.
  118. menu "Kernel build options"
  119. source "config/Config-kernel.in"
  120. endmenu
  121. comment "Package build options"
  122. config DEBUG
  123. bool
  124. prompt "Compile packages with debugging info"
  125. help
  126. Adds -g3 to the CFLAGS.
  127. config USE_GC_SECTIONS
  128. bool
  129. prompt "Dead code and data elimination for all packages (EXPERIMENTAL)"
  130. help
  131. Places functions and data items into its own sections to use the linker's
  132. garbage collection capabilites.
  133. Packages can choose to opt-out via setting PKG_BUILD_FLAGS:=no-gc-sections
  134. config USE_LTO
  135. bool
  136. prompt "Use the link-time optimizer for all packages (EXPERIMENTAL)"
  137. help
  138. Adds LTO flags to the CFLAGS and LDFLAGS.
  139. Packages can choose to opt-out via setting PKG_BUILD_FLAGS:=no-lto
  140. config MOLD
  141. depends on (aarch64 || arm || i386 || i686 || m68k || powerpc || powerpc64 || sh4 || x86_64)
  142. depends on !GCC_USE_VERSION_11
  143. def_bool $(shell, ./config/check-hostcxx.sh 10 2 12)
  144. config USE_MOLD
  145. bool
  146. prompt "Use the mold linker for all packages"
  147. depends on MOLD
  148. help
  149. Link packages with mold, a modern linker
  150. Packages can opt-out via setting PKG_BUILD_FLAGS:=no-mold
  151. config IPV6
  152. def_bool y
  153. comment "Stripping options"
  154. choice
  155. prompt "Binary stripping method"
  156. default USE_STRIP if USE_GLIBC
  157. default USE_SSTRIP
  158. help
  159. Select the binary stripping method you wish to use.
  160. config NO_STRIP
  161. bool "none"
  162. help
  163. This will install unstripped binaries (useful for native
  164. compiling/debugging).
  165. config USE_STRIP
  166. bool "strip"
  167. help
  168. This will install binaries stripped using strip from binutils.
  169. config USE_SSTRIP
  170. bool "sstrip"
  171. depends on !USE_GLIBC
  172. help
  173. This will install binaries stripped using sstrip.
  174. endchoice
  175. config STRIP_ARGS
  176. string
  177. prompt "Strip arguments"
  178. depends on USE_STRIP
  179. default "--strip-unneeded --remove-section=.comment --remove-section=.note" if DEBUG
  180. default "--strip-all"
  181. help
  182. Specifies arguments passed to the strip command when stripping binaries.
  183. config SSTRIP_DISCARD_TRAILING_ZEROES
  184. bool "Strip trailing zero bytes"
  185. depends on USE_SSTRIP && !USE_MOLD
  186. default y
  187. help
  188. Use sstrip's -z option to discard trailing zero bytes
  189. config STRIP_KERNEL_EXPORTS
  190. bool "Strip unnecessary exports from the kernel image"
  191. depends on !LINUX_6_6
  192. help
  193. Reduces kernel size by stripping unused kernel exports from the kernel
  194. image. Note that this might make the kernel incompatible with any kernel
  195. modules that were not selected at the time the kernel image was created.
  196. config USE_MKLIBS
  197. bool "Strip unnecessary functions from libraries"
  198. help
  199. Reduces libraries to only those functions that are necessary for using all
  200. selected packages (including those selected as <M>). Note that this will
  201. make the system libraries incompatible with most of the packages that are
  202. not selected during the build process.
  203. comment "Hardening build options"
  204. config PKG_CHECK_FORMAT_SECURITY
  205. bool
  206. prompt "Enable gcc format-security"
  207. default y
  208. help
  209. Add -Wformat -Werror=format-security to the CFLAGS. You can disable
  210. this per package by adding PKG_CHECK_FORMAT_SECURITY:=0 in the package
  211. Makefile.
  212. choice
  213. prompt "User space ASLR PIE compilation"
  214. default PKG_ASLR_PIE_NONE if ((SMALL_FLASH || LOW_MEMORY_FOOTPRINT) && !SDK)
  215. default PKG_ASLR_PIE_REGULAR
  216. help
  217. Add -fPIC to CFLAGS and -specs=hardened-build-ld to LDFLAGS.
  218. This enables package build as Position Independent Executables (PIE)
  219. to protect against "return-to-text" attacks. This belongs to the
  220. feature of Address Space Layout Randomisation (ASLR), which is
  221. implemented by the kernel and the ELF loader by randomising the
  222. location of memory allocations. This makes memory addresses harder
  223. to predict when an attacker is attempting a memory-corruption exploit.
  224. You can disable this per package by adding PKG_ASLR_PIE:=0 in the package
  225. Makefile.
  226. Be ware that ASLR increases the binary size.
  227. config PKG_ASLR_PIE_NONE
  228. bool "None"
  229. help
  230. PIE is deactivated for all applications
  231. config PKG_ASLR_PIE_REGULAR
  232. bool "Regular"
  233. help
  234. PIE is activated for some binaries, mostly network exposed applications
  235. config PKG_ASLR_PIE_ALL
  236. bool "All"
  237. select BUSYBOX_DEFAULT_PIE
  238. help
  239. PIE is activated for all applications
  240. endchoice
  241. choice
  242. prompt "User space Stack-Smashing Protection"
  243. default PKG_CC_STACKPROTECTOR_REGULAR
  244. help
  245. Enable GCC Stack Smashing Protection (SSP) for userspace applications
  246. config PKG_CC_STACKPROTECTOR_NONE
  247. bool "None"
  248. config PKG_CC_STACKPROTECTOR_REGULAR
  249. bool "Regular"
  250. config PKG_CC_STACKPROTECTOR_STRONG
  251. bool "Strong"
  252. config PKG_CC_STACKPROTECTOR_ALL
  253. bool "All"
  254. endchoice
  255. choice
  256. prompt "Kernel space Stack-Smashing Protection"
  257. default KERNEL_CC_STACKPROTECTOR_REGULAR
  258. help
  259. Enable GCC Stack-Smashing Protection (SSP) for the kernel
  260. config KERNEL_CC_STACKPROTECTOR_NONE
  261. bool "None"
  262. config KERNEL_CC_STACKPROTECTOR_REGULAR
  263. bool "Regular"
  264. config KERNEL_CC_STACKPROTECTOR_STRONG
  265. bool "Strong"
  266. endchoice
  267. config KERNEL_STACKPROTECTOR
  268. bool
  269. default KERNEL_CC_STACKPROTECTOR_REGULAR || KERNEL_CC_STACKPROTECTOR_STRONG
  270. config KERNEL_STACKPROTECTOR_STRONG
  271. bool
  272. default KERNEL_CC_STACKPROTECTOR_STRONG
  273. choice
  274. prompt "Enable buffer-overflows detection (FORTIFY_SOURCE)"
  275. default PKG_FORTIFY_SOURCE_1
  276. help
  277. Enable the _FORTIFY_SOURCE macro which introduces additional
  278. checks to detect buffer-overflows in the following standard library
  279. functions: memcpy, mempcpy, memmove, memset, strcpy, stpcpy,
  280. strncpy, strcat, strncat, sprintf, vsprintf, snprintf, vsnprintf,
  281. gets. "Conservative" (_FORTIFY_SOURCE set to 1) only introduces
  282. checks that shouldn't change the behavior of conforming programs,
  283. while "aggressive" (_FORTIFY_SOURCES set to 2) some more checking is
  284. added, but some conforming programs might fail.
  285. config PKG_FORTIFY_SOURCE_NONE
  286. bool "None"
  287. config PKG_FORTIFY_SOURCE_1
  288. bool "Conservative"
  289. config PKG_FORTIFY_SOURCE_2
  290. bool "Aggressive"
  291. endchoice
  292. choice
  293. prompt "Enable RELRO protection"
  294. default PKG_RELRO_FULL
  295. help
  296. Enable a link-time protection known as RELRO (Relocation Read Only)
  297. which helps to protect from certain type of exploitation techniques
  298. altering the content of some ELF sections. "Partial" RELRO makes the
  299. .dynamic section not writeable after initialization, introducing
  300. almost no performance penalty, while "full" RELRO also marks the GOT
  301. as read-only at the cost of initializing all of it at startup.
  302. config PKG_RELRO_NONE
  303. bool "None"
  304. config PKG_RELRO_PARTIAL
  305. bool "Partial"
  306. config PKG_RELRO_FULL
  307. bool "Full"
  308. endchoice
  309. config TARGET_ROOTFS_SECURITY_LABELS
  310. bool
  311. select KERNEL_SQUASHFS_XATTR
  312. select KERNEL_EXT4_FS_SECURITY
  313. select KERNEL_F2FS_FS_SECURITY
  314. select KERNEL_UBIFS_FS_SECURITY
  315. select KERNEL_JFFS2_FS_SECURITY
  316. config SELINUX
  317. bool "Enable SELinux"
  318. select KERNEL_SECURITY_SELINUX
  319. select TARGET_ROOTFS_SECURITY_LABELS
  320. select PACKAGE_procd-selinux
  321. select PACKAGE_busybox-selinux
  322. help
  323. This option enables SELinux kernel features, applies security labels
  324. in squashfs rootfs and selects the selinux-variants of busybox and procd.
  325. Selecting this option results in about 0.5MiB of additional flash space
  326. usage accounting for increased kernel and rootfs size.
  327. choice
  328. prompt "default SELinux type"
  329. depends on TARGET_ROOTFS_SECURITY_LABELS
  330. default SELINUXTYPE_dssp
  331. help
  332. Select SELinux policy to be installed and used for applying rootfs labels.
  333. config SELINUXTYPE_targeted
  334. bool "targeted"
  335. select PACKAGE_refpolicy
  336. help
  337. SELinux Reference Policy (refpolicy)
  338. config SELINUXTYPE_dssp
  339. bool "dssp"
  340. select PACKAGE_selinux-policy
  341. help
  342. Defensec SELinux Security Policy -- OpenWrt edition
  343. endchoice
  344. config SECCOMP
  345. bool "Enable SECCOMP"
  346. select KERNEL_SECCOMP
  347. select PACKAGE_procd-seccomp
  348. depends on (aarch64 || arm || armeb || mips || mipsel || mips64 || mips64el || i386 || powerpc || x86_64)
  349. depends on !TARGET_uml
  350. default y
  351. help
  352. This option enables seccomp kernel features to safely
  353. execute untrusted bytecode and selects the seccomp-variants
  354. of procd
  355. endmenu