hardening: disable user-space SSP for !musl

Signed-off-by: Steven Barth <steven@midlink.org>

SVN-Revision: 46146
master
Steven Barth 9 years ago
parent 6d48dcb8d5
commit efe03e5fc7
  1. 1
      config/Config-build.in

@ -219,6 +219,7 @@ menu "Global build settings"
choice
prompt "User space Stack-Smashing Protection"
depends on USE_MUSL
default PKG_CC_STACKPROTECTOR_REGULAR
help
Enable GCC Stack Smashing Protection (SSP) for userspace applications

Loading…
Cancel
Save