df0bd42fde
Introduce a configuration option to build a "hardened" OpenWrt with ASLR PIE support. Add new option PKG_ASLR_PIE to enable Address Space Layout Randomization (ASLR) by building Position Independent Executables (PIE). This new option protects against "return-to-text" attacks. Busybox need a special care, link is done with ld, not gcc, leading to unknown flags. Set BUSYBOX_DEFAULT_PIE instead and disable PKG_ASLR_PIE. If other failing packages were found, PKG_ASLR_PIE:=0 should be added to their Makefiles. Original Work by: Yongkui Han <yonhan@cisco.com> Signed-off-by: Julien Dusser <julien.dusser@free.fr> |
||
---|---|---|
.. | ||
site | ||
autotools.mk | ||
cmake.mk | ||
debug.mk | ||
depends.mk | ||
device_table.txt | ||
download.mk | ||
feeds.mk | ||
hardened-ld-pie.specs | ||
hardening.mk | ||
host-build.mk | ||
image-commands.mk | ||
image-legacy.mk | ||
image.mk | ||
kernel-build.mk | ||
kernel-defaults.mk | ||
kernel-version.mk | ||
kernel.mk | ||
netfilter.mk | ||
nls.mk | ||
package-bin.mk | ||
package-defaults.mk | ||
package-dumpinfo.mk | ||
package-ipkg.mk | ||
package-seccomp.mk | ||
package.mk | ||
prereq-build.mk | ||
prereq.mk | ||
quilt.mk | ||
rootfs.mk | ||
scan.awk | ||
scan.mk | ||
scons.mk | ||
shell.sh | ||
subdir.mk | ||
target.mk | ||
toolchain-build.mk | ||
toplevel.mk | ||
u-boot.mk | ||
uclibc++.mk | ||
unpack.mk | ||
verbose.mk | ||
version.mk |