diff options
Diffstat (limited to '')
-rw-r--r-- | Mk/Features/pie.mk | 8 | ||||
-rw-r--r-- | Mk/Features/ssp.mk | 7 | ||||
-rw-r--r-- | Mk/Features/stack_autoinit.mk | 2 |
3 files changed, 8 insertions, 9 deletions
diff --git a/Mk/Features/pie.mk b/Mk/Features/pie.mk index 7ecefa9eb611..3a8a95b93aea 100644 --- a/Mk/Features/pie.mk +++ b/Mk/Features/pie.mk @@ -1,13 +1,13 @@ # PIE Support # -# Produce a Position-Independent Executable (PIE) instead of a “normal” -# fixed‐address ELF. +# Produce a Position-Independent Executable (PIE) instead of a "normal" +# fixed-address ELF. # A PIE is an executable whose code sections are compiled and linked so that, # at runtime, they can be loaded at any base address in memory. # # Because it can be loaded at unpredictable addresses, PIE enables full Address -# Space Layout Randomization (ASLR) for your main executable—making certain -# classes of memory‐corruption exploits much harder. +# Space Layout Randomization (ASLR) for your main executable-making certain +# classes of memory-corruption exploits much harder. .if !defined(_PIE_MK_INCLUDED) _PIE_MK_INCLUDED= yes diff --git a/Mk/Features/ssp.mk b/Mk/Features/ssp.mk index 631104da9f6c..b6be18ce35e8 100644 --- a/Mk/Features/ssp.mk +++ b/Mk/Features/ssp.mk @@ -1,10 +1,10 @@ # SSP Support # -# The -fstack-protector-strong flag enables “stack smashing” protection on a +# The -fstack-protector-strong flag enables "stack smashing" protection on a # wider set of functions than the default -fstack-protector, but without the # full performance cost of -fstack-protector-all. Under the hood it inserts a -# small “canary” value on the stack just before the saved return address; at -# function exit it checks that the canary hasn’t been overwritten by a buffer +# small "canary" value on the stack just before the saved return address; at +# function exit it checks that the canary hasn't been overwritten by a buffer # overflow. If it has been clobbered, the runtime aborts the program rather # than returning into corrupted code. @@ -17,6 +17,5 @@ SSP_Include_MAINTAINER= portmgr@FreeBSD.org # Overridable as a user may want to use -fstack-protector-all SSP_CFLAGS?= -fstack-protector-strong CFLAGS+= ${SSP_CFLAGS} -LDFLAGS+= ${SSP_CFLAGS} . endif .endif diff --git a/Mk/Features/stack_autoinit.mk b/Mk/Features/stack_autoinit.mk index 4d79416dbcce..627b785b6ee0 100644 --- a/Mk/Features/stack_autoinit.mk +++ b/Mk/Features/stack_autoinit.mk @@ -7,7 +7,7 @@ # # WITH_STACK_AUTOINIT Enable for all ports. # WITH_STACK_AUTOINIT_PORTS Enable for specified category/port-name -# STACK_AUTOINIT_TYPE Valid options: zero (default), pattern, unitialized +# STACK_AUTOINIT_TYPE Valid options: zero (default), pattern, uninitialized # .if !defined(_STACK_AUTOINIT_MK_INCLUDED) |