summaryrefslogtreecommitdiff
path: root/Mk/Features
diff options
context:
space:
mode:
Diffstat (limited to 'Mk/Features')
-rw-r--r--Mk/Features/pie.mk8
-rw-r--r--Mk/Features/ssp.mk6
2 files changed, 7 insertions, 7 deletions
diff --git a/Mk/Features/pie.mk b/Mk/Features/pie.mk
index 7ecefa9eb611..3a8a95b93aea 100644
--- a/Mk/Features/pie.mk
+++ b/Mk/Features/pie.mk
@@ -1,13 +1,13 @@
# PIE Support
#
-# Produce a Position-Independent Executable (PIE) instead of a “normal”
-# fixed‐address ELF.
+# Produce a Position-Independent Executable (PIE) instead of a "normal"
+# fixed-address ELF.
# A PIE is an executable whose code sections are compiled and linked so that,
# at runtime, they can be loaded at any base address in memory.
#
# Because it can be loaded at unpredictable addresses, PIE enables full Address
-# Space Layout Randomization (ASLR) for your main executable—making certain
-# classes of memory‐corruption exploits much harder.
+# Space Layout Randomization (ASLR) for your main executable-making certain
+# classes of memory-corruption exploits much harder.
.if !defined(_PIE_MK_INCLUDED)
_PIE_MK_INCLUDED= yes
diff --git a/Mk/Features/ssp.mk b/Mk/Features/ssp.mk
index 631104da9f6c..2af92acd1d8e 100644
--- a/Mk/Features/ssp.mk
+++ b/Mk/Features/ssp.mk
@@ -1,10 +1,10 @@
# SSP Support
#
-# The -fstack-protector-strong flag enables “stack smashing” protection on a
+# The -fstack-protector-strong flag enables "stack smashing" protection on a
# wider set of functions than the default -fstack-protector, but without the
# full performance cost of -fstack-protector-all. Under the hood it inserts a
-# small “canary” value on the stack just before the saved return address; at
-# function exit it checks that the canary hasn’t been overwritten by a buffer
+# small "canary" value on the stack just before the saved return address; at
+# function exit it checks that the canary hasn't been overwritten by a buffer
# overflow. If it has been clobbered, the runtime aborts the program rather
# than returning into corrupted code.