hardening: enable regular SSP support by default

Signed-off-by: Steven Barth <steven@midlink.org>

SVN-Revision: 46020
This commit is contained in:
Steven Barth 2015-06-17 13:13:48 +00:00
parent 6585c532bd
commit 19810a5145
2 changed files with 3 additions and 3 deletions

View file

@ -219,7 +219,7 @@ menu "Global build settings"
choice choice
prompt "User space Stack-Smashing Protection" prompt "User space Stack-Smashing Protection"
default PKG_CC_STACKPROTECTOR_NONE default PKG_CC_STACKPROTECTOR_REGULAR
help help
Enable GCC Stack Smashing Protection (SSP) for userspace applications Enable GCC Stack Smashing Protection (SSP) for userspace applications
config PKG_CC_STACKPROTECTOR_NONE config PKG_CC_STACKPROTECTOR_NONE
@ -237,7 +237,7 @@ menu "Global build settings"
choice choice
prompt "Kernel space Stack-Smashing Protection" prompt "Kernel space Stack-Smashing Protection"
default KERNEL_CC_STACKPROTECTOR_NONE default KERNEL_CC_STACKPROTECTOR_REGULAR
help help
Enable GCC Stack-Smashing Protection (SSP) for the kernel Enable GCC Stack-Smashing Protection (SSP) for the kernel
config KERNEL_CC_STACKPROTECTOR_NONE config KERNEL_CC_STACKPROTECTOR_NONE

View file

@ -41,7 +41,7 @@ config EXTRA_GCC_CONFIG_OPTIONS
config SSP_SUPPORT config SSP_SUPPORT
bool bool
prompt "Enable Stack-Smashing Protection support" if TOOLCHAINOPTS prompt "Enable Stack-Smashing Protection support" if TOOLCHAINOPTS
default n default y
help help
Enable Stack-Smashing Protection support Enable Stack-Smashing Protection support