diff options
author | Alexey Neyman <stilor@att.net> | 2018-12-05 03:12:59 (GMT) |
---|---|---|
committer | GitHub <noreply@github.com> | 2018-12-05 03:12:59 (GMT) |
commit | f8874f447e40852d33d65c1f443a90b0760901df (patch) | |
tree | f506cfa723b6e3baa28ac30e2be4a314516f5950 /config/libc/glibc.in | |
parent | dc9fa6ad64f81e3314a469fc434f1dd4abcff0cc (diff) | |
parent | 1e5c48f190f5f0da9177a1137113b8d4a836ab9e (diff) |
Merge pull request #1108 from stilor/config-fixes
Config fixes
Diffstat (limited to 'config/libc/glibc.in')
-rw-r--r-- | config/libc/glibc.in | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/config/libc/glibc.in b/config/libc/glibc.in index 5916a83..527063f 100644 --- a/config/libc/glibc.in +++ b/config/libc/glibc.in @@ -320,6 +320,45 @@ config GLIBC_MIN_KERNEL default LINUX_VERSION if GLIBC_KERNEL_VERSION_AS_HEADERS default GLIBC_MIN_KERNEL_VERSION if GLIBC_KERNEL_VERSION_CHOSEN + +choice + bool "Stack-smashing protection (SSP) in glibc" + default GLIBC_SSP_DEFAULT + +config GLIBC_SSP_DEFAULT + bool "default" + help + Glibc's configure script determines the stack protection level. + +config GLIBC_SSP_NO + bool "no" + help + Glibc functions are not protected against stack-smashing. + +config GLIBC_SSP_YES + bool "yes" + help + Glibc is compiled with -fstack-protector option. + +config GLIBC_SSP_ALL + bool "all" + help + Glibc is compiled with -fstack-protector-all option. + +config GLIBC_SSP_STRONG + bool "strong" + help + Glibc is compiled with -fstack-protector-strong option. + +endchoice + +config GLIBC_SSP + string + default "no" if GLIBC_SSP_NO + default "yes" if GLIBC_SSP_YES + default "all" if GLIBC_SSP_ALL + default "strong" if GLIBC_SSP_STRONG + # All supported versions of glibc build cleanly with GCC7 and earlier. # GCC8-related fixes were only available in glibc 2.27. config GLIBC_ENABLE_WERROR |