diff options
-rw-r--r-- | config.h.in | 3 | ||||
-rwxr-xr-x | configure | 16 | ||||
-rw-r--r-- | configure.ac | 9 |
3 files changed, 0 insertions, 28 deletions
diff --git a/config.h.in b/config.h.in index 99036b887f..d54c8c5d13 100644 --- a/config.h.in +++ b/config.h.in @@ -160,9 +160,6 @@ /* Define if your compiler defaults to -msecure-plt mode on ppc. */ #undef HAVE_PPC_SECURE_PLT -/* Define if __stack_chk_guard canary should be randomized at program startup. */ -#undef ENABLE_STACKGUARD_RANDOMIZE - /* Define if memory tagging support should be enabled. */ #undef USE_MTAG @@ -770,7 +770,6 @@ enable_profile enable_static_pie enable_timezone_tools enable_hardcoded_path_in_tests -enable_stackguard_randomization enable_hidden_plt enable_bind_now enable_stack_protector @@ -1430,9 +1429,6 @@ Optional Features: --enable-hardcoded-path-in-tests hardcode newly built glibc path in tests [default=no] - --enable-stackguard-randomization - initialize __stack_chk_guard canary with a random - number at program start --disable-hidden-plt do not hide internal function calls to avoid PLT --enable-bind-now disable lazy relocations in DSOs --enable-stack-protector=[yes|no|all|strong] @@ -3397,18 +3393,6 @@ fi -# Check whether --enable-stackguard-randomization was given. -if test "${enable_stackguard_randomization+set}" = set; then : - enableval=$enable_stackguard_randomization; enable_stackguard_randomize=$enableval -else - enable_stackguard_randomize=no -fi - -if test "$enable_stackguard_randomize" = yes; then - $as_echo "#define ENABLE_STACKGUARD_RANDOMIZE 1" >>confdefs.h - -fi - # Check whether --enable-hidden-plt was given. if test "${enable_hidden_plt+set}" = set; then : enableval=$enable_hidden_plt; hidden=$enableval diff --git a/configure.ac b/configure.ac index 64be29d877..19051b8ee0 100644 --- a/configure.ac +++ b/configure.ac @@ -198,15 +198,6 @@ AC_ARG_ENABLE([hardcoded-path-in-tests], [hardcoded_path_in_tests=no]) AC_SUBST(hardcoded_path_in_tests) -AC_ARG_ENABLE([stackguard-randomization], - AS_HELP_STRING([--enable-stackguard-randomization], - [initialize __stack_chk_guard canary with a random number at program start]), - [enable_stackguard_randomize=$enableval], - [enable_stackguard_randomize=no]) -if test "$enable_stackguard_randomize" = yes; then - AC_DEFINE(ENABLE_STACKGUARD_RANDOMIZE) -fi - AC_ARG_ENABLE([hidden-plt], AS_HELP_STRING([--disable-hidden-plt], [do not hide internal function calls to avoid PLT]), |