diff options
| author | Nick Hainke | 2023-05-10 01:53:34 +0000 |
|---|---|---|
| committer | Nick Hainke | 2025-11-23 08:33:15 +0000 |
| commit | 557c174a3c88bde4e096d9ed89758182266f7bb0 (patch) | |
| tree | 0c8475af7d92e1f549d90dd596e3de8a336209fd | |
| parent | 57e8eb6208af0d966262c024d0b7bf4d3423941c (diff) | |
| download | openwrt-557c174a3c88bde4e096d9ed89758182266f7bb0.tar.gz | |
toolchain: gcc: add fanalyzer config option
Add gcc config option for fanalyzer. As a result of this option, a static
analysis of the program flow is conducted, allowing interprocedural paths
to be identified and warnings to be issued if problems are identified.
Link: https://github.com/openwrt/openwrt/pull/12576
Signed-off-by: Nick Hainke <vincent@systemli.org>
| -rw-r--r-- | config/Config-build.in | 9 | ||||
| -rw-r--r-- | include/hardening.mk | 6 |
2 files changed, 15 insertions, 0 deletions
diff --git a/config/Config-build.in b/config/Config-build.in index caeae79944..5eaca5a945 100644 --- a/config/Config-build.in +++ b/config/Config-build.in @@ -250,6 +250,15 @@ menu "Global build settings" comment "Hardening build options" + config PKG_FANALYZER + bool + prompt "Enable gcc fanalyzer" + default n + help + Add -fanalyzer to the CFLAGS. As a result of this option, a static analysis + of the program flow is conducted, allowing interprocedural paths to be + identified and warnings to be issued if problems are identified. + config PKG_CHECK_FORMAT_SECURITY bool prompt "Enable gcc format-security" diff --git a/include/hardening.mk b/include/hardening.mk index 1565e5aa27..c5d836eec0 100644 --- a/include/hardening.mk +++ b/include/hardening.mk @@ -9,6 +9,7 @@ PKG_SSP ?= 1 PKG_FORTIFY_SOURCE ?= 1 PKG_RELRO ?= 1 PKG_DT_RELR ?= 1 +PKG_FANALYZER ?= 0 ifdef CONFIG_PKG_CHECK_FORMAT_SECURITY ifeq ($(strip $(PKG_CHECK_FORMAT_SECURITY)),1) @@ -77,3 +78,8 @@ ifdef CONFIG_PKG_DT_RELR endif endif +ifdef CONFIG_PKG_FANALYZER + ifeq ($(strip $(PKG_FANALYZER)),1) + TARGET_CFLAGS += -fanalyzer + endif +endif |