Commit 72370f2a authored by Ingo Molnar's avatar Ingo Molnar Committed by Thomas Gleixner

x86: if stackprotector is enabled, thn use stack-protector-all by default

also enable the rodata and nx tests.
Signed-off-by: default avatarIngo Molnar <mingo@elte.hu>
Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
parent 5cb27301
......@@ -1142,7 +1142,7 @@ config SECCOMP
config CC_STACKPROTECTOR
bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)"
depends on X86_64 && EXPERIMENTAL && BROKEN
depends on X86_64
help
This option turns on the -fstack-protector GCC feature. This
feature puts, at the beginning of critical functions, a canary
......@@ -1159,6 +1159,7 @@ config CC_STACKPROTECTOR
config CC_STACKPROTECTOR_ALL
bool "Use stack-protector for all functions"
depends on CC_STACKPROTECTOR
default y
help
Normally, GCC only inserts the canary value protection for
functions that use large-ish on-stack buffers. By enabling
......
......@@ -102,6 +102,7 @@ config DIRECT_GBPAGES
config DEBUG_RODATA_TEST
bool "Testcase for the DEBUG_RODATA feature"
depends on DEBUG_RODATA
default y
help
This option enables a testcase for the DEBUG_RODATA
feature as well as for the change_page_attr() infrastructure.
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment