/* Define if your compiler defaults to -msecure-plt mode on ppc. */
#undef HAVE_PPC_SECURE_PLT
-/* Define if __stack_chk_guard canary should be randomized at program startup. */
-#undef ENABLE_STACKGUARD_RANDOMIZE
-
/* Define if memory tagging support should be enabled. */
#undef USE_MTAG
enable_static_pie
enable_timezone_tools
enable_hardcoded_path_in_tests
-enable_stackguard_randomization
enable_hidden_plt
enable_bind_now
enable_stack_protector
--enable-hardcoded-path-in-tests
hardcode newly built glibc path in tests
[default=no]
- --enable-stackguard-randomization
- initialize __stack_chk_guard canary with a random
- number at program start
--disable-hidden-plt do not hide internal function calls to avoid PLT
--enable-bind-now disable lazy relocations in DSOs
--enable-stack-protector=[yes|no|all|strong]
-# Check whether --enable-stackguard-randomization was given.
-if test "${enable_stackguard_randomization+set}" = set; then :
- enableval=$enable_stackguard_randomization; enable_stackguard_randomize=$enableval
-else
- enable_stackguard_randomize=no
-fi
-
-if test "$enable_stackguard_randomize" = yes; then
- $as_echo "#define ENABLE_STACKGUARD_RANDOMIZE 1" >>confdefs.h
-
-fi
-
# Check whether --enable-hidden-plt was given.
if test "${enable_hidden_plt+set}" = set; then :
enableval=$enable_hidden_plt; hidden=$enableval
[hardcoded_path_in_tests=no])
AC_SUBST(hardcoded_path_in_tests)
-AC_ARG_ENABLE([stackguard-randomization],
- AS_HELP_STRING([--enable-stackguard-randomization],
- [initialize __stack_chk_guard canary with a random number at program start]),
- [enable_stackguard_randomize=$enableval],
- [enable_stackguard_randomize=no])
-if test "$enable_stackguard_randomize" = yes; then
- AC_DEFINE(ENABLE_STACKGUARD_RANDOMIZE)
-fi
-
AC_ARG_ENABLE([hidden-plt],
AS_HELP_STRING([--disable-hidden-plt],
[do not hide internal function calls to avoid PLT]),