hardening: disable user-space SSP for !musl
Signed-off-by: Steven Barth <steven@midlink.org> SVN-Revision: 46146
This commit is contained in:
parent
6d48dcb8d5
commit
efe03e5fc7
1 changed files with 1 additions and 0 deletions
|
@ -219,6 +219,7 @@ menu "Global build settings"
|
||||||
|
|
||||||
choice
|
choice
|
||||||
prompt "User space Stack-Smashing Protection"
|
prompt "User space Stack-Smashing Protection"
|
||||||
|
depends on USE_MUSL
|
||||||
default PKG_CC_STACKPROTECTOR_REGULAR
|
default PKG_CC_STACKPROTECTOR_REGULAR
|
||||||
help
|
help
|
||||||
Enable GCC Stack Smashing Protection (SSP) for userspace applications
|
Enable GCC Stack Smashing Protection (SSP) for userspace applications
|
||||||
|
|
Loading…
Reference in a new issue