X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=config%2FConfig-build.in;h=61a9265ad78d68b2c713191369049b46b3956e01;hb=4e535d81ee9502947fb3f49aad9c1ddf3da010cf;hp=35341833e35f39284679b048fb954d8498606d3a;hpb=454021581f630d5d04afeb8ff6581c1bda295c87;p=oweals%2Fopenwrt.git diff --git a/config/Config-build.in b/config/Config-build.in index 35341833e3..61a9265ad7 100644 --- a/config/Config-build.in +++ b/config/Config-build.in @@ -7,6 +7,14 @@ menu "Global build settings" + config JSON_OVERVIEW_IMAGE_INFO + bool "Create JSON info file overview per target" + default BUILDBOT + help + Create a JSON info file called profiles.json in the target + directory containing machine readable list of built profiles + and resulting images. + config ALL_NONSHARED bool "Select all target specific packages by default" select ALL_KMODS @@ -93,7 +101,7 @@ menu "Global build settings" bool "Include build configuration in firmware" if DEVEL default n help - If enabled, config.buildinfo will be stored in /etc/build.config of firmware. + If enabled, buildinfo files will be stored in /etc/build.* of firmware. config COLLECT_KERNEL_DEBUG bool @@ -190,6 +198,10 @@ menu "Global build settings" config USE_UCLIBCXX bool "uClibc++" + config USE_LIBCXX + bool "libc++" + depends on !USE_UCLIBC + config USE_LIBSTDCXX bool "libstdc++" endchoice @@ -205,11 +217,10 @@ menu "Global build settings" this per package by adding PKG_CHECK_FORMAT_SECURITY:=0 in the package Makefile. - config PKG_ASLR_PIE - bool + choice prompt "User space ASLR PIE compilation" - select BUSYBOX_DEFAULT_PIE - default n + default PKG_ASLR_PIE_NONE if ((SMALL_FLASH || LOW_MEMORY_FOOTPRINT) && !SDK) + default PKG_ASLR_PIE_REGULAR help Add -fPIC to CFLAGS and -specs=hardened-build-ld to LDFLAGS. This enables package build as Position Independent Executables (PIE) @@ -220,6 +231,21 @@ menu "Global build settings" to predict when an attacker is attempting a memory-corruption exploit. You can disable this per package by adding PKG_ASLR_PIE:=0 in the package Makefile. + Be ware that ASLR increases the binary size. + config PKG_ASLR_PIE_NONE + bool "None" + help + PIE is deactivated for all applications + config PKG_ASLR_PIE_REGULAR + bool "Regular" + help + PIE is activated for some binaries, mostly network exposed applications + config PKG_ASLR_PIE_ALL + bool "All" + select BUSYBOX_DEFAULT_PIE + help + PIE is activated for all applications + endchoice choice prompt "User space Stack-Smashing Protection" @@ -236,7 +262,6 @@ menu "Global build settings" config PKG_CC_STACKPROTECTOR_STRONG bool "Strong" select GCC_LIBSSP if !USE_MUSL - depends on !GCC_VERSION_4_8 depends on KERNEL_CC_STACKPROTECTOR_STRONG endchoice @@ -251,7 +276,6 @@ menu "Global build settings" config KERNEL_CC_STACKPROTECTOR_REGULAR bool "Regular" config KERNEL_CC_STACKPROTECTOR_STRONG - depends on !GCC_VERSION_4_8 bool "Strong" endchoice