hardening: disable user-space SSP for !musl
Signed-off-by: Steven Barth <steven@midlink.org> SVN-Revision: 46146
This commit is contained in:
		| @@ -219,6 +219,7 @@ menu "Global build settings" | |||||||
|  |  | ||||||
| 	choice | 	choice | ||||||
| 		prompt "User space Stack-Smashing Protection" | 		prompt "User space Stack-Smashing Protection" | ||||||
|  | 		depends on USE_MUSL | ||||||
| 		default PKG_CC_STACKPROTECTOR_REGULAR | 		default PKG_CC_STACKPROTECTOR_REGULAR | ||||||
| 		help | 		help | ||||||
| 		  Enable GCC Stack Smashing Protection (SSP) for userspace applications | 		  Enable GCC Stack Smashing Protection (SSP) for userspace applications | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Steven Barth
					Steven Barth