From 40d646170a7473c7b2eda28eb94bd3e23accf83d Mon Sep 17 00:00:00 2001 From: Steven Barth Date: Mon, 29 Jun 2015 16:44:27 +0000 Subject: hardening: disable user-space SSP for !musl Signed-off-by: Steven Barth git-svn-id: svn://svn.openwrt.org/openwrt/trunk@46146 3c298f89-4303-0410-b956-a3cf2f4a3e73 --- config/Config-build.in | 1 + 1 file changed, 1 insertion(+) (limited to 'config') diff --git a/config/Config-build.in b/config/Config-build.in index aef03444c2..4e2b0f583d 100644 --- a/config/Config-build.in +++ b/config/Config-build.in @@ -219,6 +219,7 @@ menu "Global build settings" choice prompt "User space Stack-Smashing Protection" + depends on USE_MUSL default PKG_CC_STACKPROTECTOR_REGULAR help Enable GCC Stack Smashing Protection (SSP) for userspace applications -- cgit v1.2.3