summaryrefslogtreecommitdiff
path: root/Mk/Features
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--Mk/Features/pie.mk8
-rw-r--r--Mk/Features/ssp.mk7
-rw-r--r--Mk/Features/stack_autoinit.mk2
3 files changed, 8 insertions, 9 deletions
diff --git a/Mk/Features/pie.mk b/Mk/Features/pie.mk
index 7ecefa9eb611..3a8a95b93aea 100644
--- a/Mk/Features/pie.mk
+++ b/Mk/Features/pie.mk
@@ -1,13 +1,13 @@
# PIE Support
#
-# Produce a Position-Independent Executable (PIE) instead of a “normal”
-# fixed‐address ELF.
+# Produce a Position-Independent Executable (PIE) instead of a "normal"
+# fixed-address ELF.
# A PIE is an executable whose code sections are compiled and linked so that,
# at runtime, they can be loaded at any base address in memory.
#
# Because it can be loaded at unpredictable addresses, PIE enables full Address
-# Space Layout Randomization (ASLR) for your main executable—making certain
-# classes of memory‐corruption exploits much harder.
+# Space Layout Randomization (ASLR) for your main executable-making certain
+# classes of memory-corruption exploits much harder.
.if !defined(_PIE_MK_INCLUDED)
_PIE_MK_INCLUDED= yes
diff --git a/Mk/Features/ssp.mk b/Mk/Features/ssp.mk
index 631104da9f6c..b6be18ce35e8 100644
--- a/Mk/Features/ssp.mk
+++ b/Mk/Features/ssp.mk
@@ -1,10 +1,10 @@
# SSP Support
#
-# The -fstack-protector-strong flag enables “stack smashing” protection on a
+# The -fstack-protector-strong flag enables "stack smashing" protection on a
# wider set of functions than the default -fstack-protector, but without the
# full performance cost of -fstack-protector-all. Under the hood it inserts a
-# small “canary” value on the stack just before the saved return address; at
-# function exit it checks that the canary hasn’t been overwritten by a buffer
+# small "canary" value on the stack just before the saved return address; at
+# function exit it checks that the canary hasn't been overwritten by a buffer
# overflow. If it has been clobbered, the runtime aborts the program rather
# than returning into corrupted code.
@@ -17,6 +17,5 @@ SSP_Include_MAINTAINER= portmgr@FreeBSD.org
# Overridable as a user may want to use -fstack-protector-all
SSP_CFLAGS?= -fstack-protector-strong
CFLAGS+= ${SSP_CFLAGS}
-LDFLAGS+= ${SSP_CFLAGS}
. endif
.endif
diff --git a/Mk/Features/stack_autoinit.mk b/Mk/Features/stack_autoinit.mk
index 4d79416dbcce..627b785b6ee0 100644
--- a/Mk/Features/stack_autoinit.mk
+++ b/Mk/Features/stack_autoinit.mk
@@ -7,7 +7,7 @@
#
# WITH_STACK_AUTOINIT Enable for all ports.
# WITH_STACK_AUTOINIT_PORTS Enable for specified category/port-name
-# STACK_AUTOINIT_TYPE Valid options: zero (default), pattern, unitialized
+# STACK_AUTOINIT_TYPE Valid options: zero (default), pattern, uninitialized
#
.if !defined(_STACK_AUTOINIT_MK_INCLUDED)