Skip to content

Commit

Permalink
menuconfig: add help description for Stack Smashing Protection options
Browse files Browse the repository at this point in the history
Descriptions taken from:
https://wiki.osdev.org/Stack_Smashing_Protector

Signed-off-by: Marius Dinu <[email protected]>
Link: openwrt/openwrt#16897
Signed-off-by: Christian Marangi <[email protected]>
  • Loading branch information
M95D authored and Ansuel committed Nov 10, 2024
1 parent 79f0682 commit cbf7be9
Showing 1 changed file with 18 additions and 0 deletions.
18 changes: 18 additions & 0 deletions config/Config-build.in
Original file line number Diff line number Diff line change
Expand Up @@ -295,12 +295,22 @@ menu "Global build settings"
Enable GCC Stack Smashing Protection (SSP) for userspace applications
config PKG_CC_STACKPROTECTOR_NONE
bool "None"
help
No stack smashing protection.
config PKG_CC_STACKPROTECTOR_REGULAR
bool "Regular"
help
Protects functions with vulnerable objects.
This includes functions with buffers larger than 8 bytes or calls to alloca.
config PKG_CC_STACKPROTECTOR_STRONG
bool "Strong"
help
Like Regular, but also protects functions with
local arrays or references to local frame addresses.
config PKG_CC_STACKPROTECTOR_ALL
bool "All"
help
Protects all functions.
endchoice

choice
Expand All @@ -310,10 +320,18 @@ menu "Global build settings"
Enable GCC Stack-Smashing Protection (SSP) for the kernel
config KERNEL_CC_STACKPROTECTOR_NONE
bool "None"
help
No stack smashing protection.
config KERNEL_CC_STACKPROTECTOR_REGULAR
bool "Regular"
help
Protects functions with vulnerable objects.
This includes functions with buffers larger than 8 bytes or calls to alloca.
config KERNEL_CC_STACKPROTECTOR_STRONG
bool "Strong"
help
Like Regular, but also protects functions with
local arrays or references to local frame addresses.
endchoice

config KERNEL_STACKPROTECTOR
Expand Down

0 comments on commit cbf7be9

Please sign in to comment.