hardening: disable user-space SSP for !musl
Signed-off-by: Steven Barth <steven@midlink.org> SVN-Revision: 46146
This commit is contained in:
@@ -219,6 +219,7 @@ menu "Global build settings"
|
|||||||
|
|
||||||
choice
|
choice
|
||||||
prompt "User space Stack-Smashing Protection"
|
prompt "User space Stack-Smashing Protection"
|
||||||
|
depends on USE_MUSL
|
||||||
default PKG_CC_STACKPROTECTOR_REGULAR
|
default PKG_CC_STACKPROTECTOR_REGULAR
|
||||||
help
|
help
|
||||||
Enable GCC Stack Smashing Protection (SSP) for userspace applications
|
Enable GCC Stack Smashing Protection (SSP) for userspace applications
|
||||||
|
|||||||
Reference in New Issue
Block a user