86417dca4e
git-svn-id: svn://svn.openwrt.org/openwrt/packages@15455 3c298f89-4303-0410-b956-a3cf2f4a3e73
63 lines
1.8 KiB
Diff
63 lines
1.8 KiB
Diff
--- a/configure
|
|
+++ b/configure
|
|
@@ -10146,59 +10146,6 @@ if test -n "$GCC"; then
|
|
OPTIM="-fPIC $OPTIM"
|
|
fi
|
|
|
|
- # The -fstack-protector option is available with some versions of
|
|
- # GCC and adds "stack canaries" which detect when the return address
|
|
- # has been overwritten, preventing many types of exploit attacks.
|
|
- { echo "$as_me:$LINENO: checking if GCC supports -fstack-protector" >&5
|
|
-echo $ECHO_N "checking if GCC supports -fstack-protector... $ECHO_C" >&6; }
|
|
- OLDCFLAGS="$CFLAGS"
|
|
- CFLAGS="$CFLAGS -fstack-protector"
|
|
- cat >conftest.$ac_ext <<_ACEOF
|
|
-/* confdefs.h. */
|
|
-_ACEOF
|
|
-cat confdefs.h >>conftest.$ac_ext
|
|
-cat >>conftest.$ac_ext <<_ACEOF
|
|
-/* end confdefs.h. */
|
|
-
|
|
-int
|
|
-main ()
|
|
-{
|
|
-
|
|
- ;
|
|
- return 0;
|
|
-}
|
|
-_ACEOF
|
|
-rm -f conftest.$ac_objext
|
|
-if { (ac_try="$ac_compile"
|
|
-case "(($ac_try" in
|
|
- *\"* | *\`* | *\\*) ac_try_echo=\$ac_try;;
|
|
- *) ac_try_echo=$ac_try;;
|
|
-esac
|
|
-eval "echo \"\$as_me:$LINENO: $ac_try_echo\"") >&5
|
|
- (eval "$ac_compile") 2>conftest.er1
|
|
- ac_status=$?
|
|
- grep -v '^ *+' conftest.er1 >conftest.err
|
|
- rm -f conftest.er1
|
|
- cat conftest.err >&5
|
|
- echo "$as_me:$LINENO: \$? = $ac_status" >&5
|
|
- (exit $ac_status); } && {
|
|
- test -z "$ac_c_werror_flag" ||
|
|
- test ! -s conftest.err
|
|
- } && test -s conftest.$ac_objext; then
|
|
- OPTIM="$OPTIM -fstack-protector"
|
|
- { echo "$as_me:$LINENO: result: yes" >&5
|
|
-echo "${ECHO_T}yes" >&6; }
|
|
-else
|
|
- echo "$as_me: failed program was:" >&5
|
|
-sed 's/^/| /' conftest.$ac_ext >&5
|
|
-
|
|
- { echo "$as_me:$LINENO: result: no" >&5
|
|
-echo "${ECHO_T}no" >&6; }
|
|
-fi
|
|
-
|
|
-rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext
|
|
- CFLAGS="$OLDCFLAGS"
|
|
-
|
|
# The -pie option is available with some versions of GCC and adds
|
|
# randomization of addresses, which avoids another class of exploits
|
|
# that depend on a fixed address for common functions.
|