Config-build.in 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250
  1. # Copyright (C) 2006-2013 OpenWrt.org
  2. # Copyright (C) 2016 LEDE Project
  3. #
  4. # This is free software, licensed under the GNU General Public License v2.
  5. # See /LICENSE for more information.
  6. #
  7. menu "Global build settings"
  8. config ALL_NONSHARED
  9. bool "Select all target specific packages by default"
  10. default ALL || BUILDBOT
  11. config ALL_KMODS
  12. bool "Select all kernel module packages by default"
  13. default ALL
  14. config ALL
  15. bool "Select all userspace packages by default"
  16. default n
  17. config BUILDBOT
  18. bool "Set build defaults for automatic builds (e.g. via buildbot)"
  19. default n
  20. help
  21. This option changes several defaults to be more suitable for
  22. automatic builds. This includes the following changes:
  23. - Deleting build directories after compiling (to save space)
  24. - Enabling per-device rootfs support
  25. ...
  26. config SIGNED_PACKAGES
  27. bool "Cryptographically signed package lists"
  28. default y
  29. comment "General build options"
  30. config DISPLAY_SUPPORT
  31. bool "Show packages that require graphics support (local or remote)"
  32. default n
  33. config BUILD_PATENTED
  34. default y
  35. bool "Compile with support for patented functionality"
  36. help
  37. When this option is disabled, software which provides patented functionality
  38. will not be built. In case software provides optional support for patented
  39. functionality, this optional support will get disabled for this package.
  40. config BUILD_NLS
  41. default n
  42. bool "Compile with full language support"
  43. help
  44. When this option is enabled, packages are built with the full versions of
  45. iconv and GNU gettext instead of the default OpenWrt stubs. If uClibc is
  46. used, it is also built with locale support.
  47. config SHADOW_PASSWORDS
  48. bool
  49. default y
  50. config CLEAN_IPKG
  51. bool
  52. prompt "Remove ipkg/opkg status data files in final images"
  53. default n
  54. help
  55. This removes all ipkg/opkg status data files from the target directory
  56. before building the root filesystem.
  57. config COLLECT_KERNEL_DEBUG
  58. bool
  59. prompt "Collect kernel debug information"
  60. select KERNEL_DEBUG_INFO
  61. default BUILDBOT
  62. help
  63. This collects debugging symbols from the kernel and all compiled modules.
  64. Useful for release builds, so that kernel issues can be debugged offline
  65. later.
  66. comment "Kernel build options"
  67. source "config/Config-kernel.in"
  68. comment "Package build options"
  69. config DEBUG
  70. bool
  71. prompt "Compile packages with debugging info"
  72. default n
  73. help
  74. Adds -g3 to the CFLAGS.
  75. config IPV6
  76. bool
  77. prompt "Enable IPv6 support in packages"
  78. default y
  79. help
  80. Enables IPv6 support in kernel (builtin) and packages.
  81. comment "Stripping options"
  82. choice
  83. prompt "Binary stripping method"
  84. default USE_STRIP if EXTERNAL_TOOLCHAIN
  85. default USE_STRIP if USE_GLIBC
  86. default USE_SSTRIP
  87. help
  88. Select the binary stripping method you wish to use.
  89. config NO_STRIP
  90. bool "none"
  91. help
  92. This will install unstripped binaries (useful for native
  93. compiling/debugging).
  94. config USE_STRIP
  95. bool "strip"
  96. help
  97. This will install binaries stripped using strip from binutils.
  98. config USE_SSTRIP
  99. bool "sstrip"
  100. depends on !USE_GLIBC
  101. help
  102. This will install binaries stripped using sstrip.
  103. endchoice
  104. config STRIP_ARGS
  105. string
  106. prompt "Strip arguments"
  107. depends on USE_STRIP
  108. default "--strip-unneeded --remove-section=.comment --remove-section=.note" if DEBUG
  109. default "--strip-all"
  110. help
  111. Specifies arguments passed to the strip command when stripping binaries.
  112. config STRIP_KERNEL_EXPORTS
  113. bool "Strip unnecessary exports from the kernel image"
  114. help
  115. Reduces kernel size by stripping unused kernel exports from the kernel
  116. image. Note that this might make the kernel incompatible with any kernel
  117. modules that were not selected at the time the kernel image was created.
  118. config USE_MKLIBS
  119. bool "Strip unnecessary functions from libraries"
  120. help
  121. Reduces libraries to only those functions that are necessary for using all
  122. selected packages (including those selected as <M>). Note that this will
  123. make the system libraries incompatible with most of the packages that are
  124. not selected during the build process.
  125. choice
  126. prompt "Preferred standard C++ library"
  127. default USE_LIBSTDCXX if USE_GLIBC
  128. default USE_UCLIBCXX
  129. help
  130. Select the preferred standard C++ library for all packages that support this.
  131. config USE_UCLIBCXX
  132. bool "uClibc++"
  133. config USE_LIBSTDCXX
  134. bool "libstdc++"
  135. endchoice
  136. comment "Hardening build options"
  137. config PKG_CHECK_FORMAT_SECURITY
  138. bool
  139. prompt "Enable gcc format-security"
  140. default y
  141. help
  142. Add -Wformat -Werror=format-security to the CFLAGS. You can disable
  143. this per package by adding PKG_CHECK_FORMAT_SECURITY:=0 in the package
  144. Makefile.
  145. choice
  146. prompt "User space Stack-Smashing Protection"
  147. depends on USE_MUSL
  148. default PKG_CC_STACKPROTECTOR_REGULAR
  149. help
  150. Enable GCC Stack Smashing Protection (SSP) for userspace applications
  151. config PKG_CC_STACKPROTECTOR_NONE
  152. bool "None"
  153. config PKG_CC_STACKPROTECTOR_REGULAR
  154. bool "Regular"
  155. select SSP_SUPPORT if !USE_MUSL
  156. depends on KERNEL_CC_STACKPROTECTOR_REGULAR
  157. config PKG_CC_STACKPROTECTOR_STRONG
  158. bool "Strong"
  159. select SSP_SUPPORT if !USE_MUSL
  160. depends on !GCC_VERSION_4_8
  161. depends on KERNEL_CC_STACKPROTECTOR_STRONG
  162. endchoice
  163. choice
  164. prompt "Kernel space Stack-Smashing Protection"
  165. default KERNEL_CC_STACKPROTECTOR_REGULAR
  166. depends on USE_MUSL || !(x86_64 || i386)
  167. help
  168. Enable GCC Stack-Smashing Protection (SSP) for the kernel
  169. config KERNEL_CC_STACKPROTECTOR_NONE
  170. bool "None"
  171. config KERNEL_CC_STACKPROTECTOR_REGULAR
  172. bool "Regular"
  173. config KERNEL_CC_STACKPROTECTOR_STRONG
  174. depends on !GCC_VERSION_4_8
  175. bool "Strong"
  176. endchoice
  177. choice
  178. prompt "Enable buffer-overflows detection (FORTIFY_SOURCE)"
  179. default PKG_FORTIFY_SOURCE_1
  180. help
  181. Enable the _FORTIFY_SOURCE macro which introduces additional
  182. checks to detect buffer-overflows in the following standard library
  183. functions: memcpy, mempcpy, memmove, memset, strcpy, stpcpy,
  184. strncpy, strcat, strncat, sprintf, vsprintf, snprintf, vsnprintf,
  185. gets. "Conservative" (_FORTIFY_SOURCE set to 1) only introduces
  186. checks that shouldn't change the behavior of conforming programs,
  187. while "aggressive" (_FORTIFY_SOURCES set to 2) some more checking is
  188. added, but some conforming programs might fail.
  189. config PKG_FORTIFY_SOURCE_NONE
  190. bool "None"
  191. config PKG_FORTIFY_SOURCE_1
  192. bool "Conservative"
  193. config PKG_FORTIFY_SOURCE_2
  194. bool "Aggressive"
  195. endchoice
  196. choice
  197. prompt "Enable RELRO protection"
  198. default PKG_RELRO_FULL
  199. help
  200. Enable a link-time protection known as RELRO (Relocation Read Only)
  201. which helps to protect from certain type of exploitation techniques
  202. altering the content of some ELF sections. "Partial" RELRO makes the
  203. .dynamic section not writeable after initialization, introducing
  204. almost no performance penalty, while "full" RELRO also marks the GOT
  205. as read-only at the cost of initializing all of it at startup.
  206. config PKG_RELRO_NONE
  207. bool "None"
  208. config PKG_RELRO_PARTIAL
  209. bool "Partial"
  210. config PKG_RELRO_FULL
  211. bool "Full"
  212. endchoice
  213. endmenu