From e6c086bb348b85d8008f61fa0b3d50a1d3e380cf Mon Sep 17 00:00:00 2001 From: fche Date: Sat, 12 Jan 2008 18:31:00 +0000 Subject: add --enable-ssp configure option so developers can build like fedora does 2008-01-12 Frank Ch. Eigler PR 5603. * configure.ac: Add "--enable-ssp" to select -fstack-protector-all and similar runtime checking directives. * configure: Regenerated. --- configure | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) (limited to 'configure') diff --git a/configure b/configure index b26fb390..ccca2d7f 100755 --- a/configure +++ b/configure @@ -1312,6 +1312,7 @@ Optional Features: --enable-dependency-tracking do not reject slow dependency extractors --enable-perfmon enable perfmon support (default is disabled) --enable-prologues make -P prologue-searching default + --enable-ssp enable gcc stack-protector Optional Packages: --with-PACKAGE[=ARG] use PACKAGE [ARG=yes] @@ -5822,6 +5823,8 @@ fi + + # Check whether --enable-perfmon was given. if test "${enable_perfmon+set}" = set; then enableval=$enable_perfmon; perfmon_support=$enableval @@ -6033,6 +6036,20 @@ sqlite3_LIBS="$LIBS" LIBS="$SAVE_LIBS" + +# Check whether --enable-ssp was given. +if test "${enable_ssp+set}" = set; then + enableval=$enable_ssp; +fi + +if test "x$enable_ssp" == xyes; then + CFLAGS="$CFLAGS -fstack-protector-all -D_FORTIFY_SOURCE=2" + CXXFLAGS="$CXXFLAGS -fstack-protector-all -D_FORTIFY_SOURCE=2" + { echo "$as_me:$LINENO: Compiling with gcc -fstack-protector-all et al." >&5 +echo "$as_me: Compiling with gcc -fstack-protector-all et al." >&6;} +fi + + build_elfutils=no # Check whether --with-elfutils was given. -- cgit