hardening: disable user-space SSP for !musl

Signed-off-by: Steven Barth <steven@midlink.org>

SVN-Revision: 46146
This commit is contained in:
Steven Barth 2015-06-29 16:44:27 +00:00
parent 6d48dcb8d5
commit efe03e5fc7

View file

@ -219,6 +219,7 @@ menu "Global build settings"
choice choice
prompt "User space Stack-Smashing Protection" prompt "User space Stack-Smashing Protection"
depends on USE_MUSL
default PKG_CC_STACKPROTECTOR_REGULAR default PKG_CC_STACKPROTECTOR_REGULAR
help help
Enable GCC Stack Smashing Protection (SSP) for userspace applications Enable GCC Stack Smashing Protection (SSP) for userspace applications