mirror of
https://sourceware.org/git/glibc.git
synced 2024-12-24 03:31:07 +00:00
Remove --enable-stackguard-randomization (BZ #27872)
Last ENABLE_STACKGUARD_RANDOMIZE usage was removed by 4a103975c4
.
This commit is contained in:
parent
1805bf753f
commit
f294306ba1
@ -160,9 +160,6 @@
|
||||
/* Define if your compiler defaults to -msecure-plt mode on ppc. */
|
||||
#undef HAVE_PPC_SECURE_PLT
|
||||
|
||||
/* Define if __stack_chk_guard canary should be randomized at program startup. */
|
||||
#undef ENABLE_STACKGUARD_RANDOMIZE
|
||||
|
||||
/* Define if memory tagging support should be enabled. */
|
||||
#undef USE_MTAG
|
||||
|
||||
|
16
configure
vendored
16
configure
vendored
@ -770,7 +770,6 @@ enable_profile
|
||||
enable_static_pie
|
||||
enable_timezone_tools
|
||||
enable_hardcoded_path_in_tests
|
||||
enable_stackguard_randomization
|
||||
enable_hidden_plt
|
||||
enable_bind_now
|
||||
enable_stack_protector
|
||||
@ -1430,9 +1429,6 @@ Optional Features:
|
||||
--enable-hardcoded-path-in-tests
|
||||
hardcode newly built glibc path in tests
|
||||
[default=no]
|
||||
--enable-stackguard-randomization
|
||||
initialize __stack_chk_guard canary with a random
|
||||
number at program start
|
||||
--disable-hidden-plt do not hide internal function calls to avoid PLT
|
||||
--enable-bind-now disable lazy relocations in DSOs
|
||||
--enable-stack-protector=[yes|no|all|strong]
|
||||
@ -3397,18 +3393,6 @@ fi
|
||||
|
||||
|
||||
|
||||
# Check whether --enable-stackguard-randomization was given.
|
||||
if test "${enable_stackguard_randomization+set}" = set; then :
|
||||
enableval=$enable_stackguard_randomization; enable_stackguard_randomize=$enableval
|
||||
else
|
||||
enable_stackguard_randomize=no
|
||||
fi
|
||||
|
||||
if test "$enable_stackguard_randomize" = yes; then
|
||||
$as_echo "#define ENABLE_STACKGUARD_RANDOMIZE 1" >>confdefs.h
|
||||
|
||||
fi
|
||||
|
||||
# Check whether --enable-hidden-plt was given.
|
||||
if test "${enable_hidden_plt+set}" = set; then :
|
||||
enableval=$enable_hidden_plt; hidden=$enableval
|
||||
|
@ -198,15 +198,6 @@ AC_ARG_ENABLE([hardcoded-path-in-tests],
|
||||
[hardcoded_path_in_tests=no])
|
||||
AC_SUBST(hardcoded_path_in_tests)
|
||||
|
||||
AC_ARG_ENABLE([stackguard-randomization],
|
||||
AS_HELP_STRING([--enable-stackguard-randomization],
|
||||
[initialize __stack_chk_guard canary with a random number at program start]),
|
||||
[enable_stackguard_randomize=$enableval],
|
||||
[enable_stackguard_randomize=no])
|
||||
if test "$enable_stackguard_randomize" = yes; then
|
||||
AC_DEFINE(ENABLE_STACKGUARD_RANDOMIZE)
|
||||
fi
|
||||
|
||||
AC_ARG_ENABLE([hidden-plt],
|
||||
AS_HELP_STRING([--disable-hidden-plt],
|
||||
[do not hide internal function calls to avoid PLT]),
|
||||
|
Loading…
Reference in New Issue
Block a user