Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-ports
Path: blob/main/Mk/Features/ssp.mk
18157 views
# SSP Support
#
# The -fstack-protector-strong flag enables "stack smashing" protection on a
# wider set of functions than the default -fstack-protector, but without the
# full performance cost of -fstack-protector-all. Under the hood it inserts a
# small "canary" value on the stack just before the saved return address; at
# function exit it checks that the canary hasn't been overwritten by a buffer
# overflow. If it has been clobbered, the runtime aborts the program rather
# than returning into corrupted code.

.if !defined(_SSP_MK_INCLUDED)
_SSP_MK_INCLUDED=	yes
SSP_Include_MAINTAINER=	[email protected]

.  if !defined(SSP_UNSAFE) && \
    (! ${ARCH:Mmips*})
# Overridable as a user may want to use -fstack-protector-all
SSP_CFLAGS?=	-fstack-protector-strong
CFLAGS+=	${SSP_CFLAGS}
.  endif
.endif