diff options
author | Ian Cooper <iancooper@hotmail.com> | 2020-06-15 22:14:04 +0100 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2020-06-17 23:57:07 +0200 |
commit | b933f9cf0cb254e368027cad6d5799e45b237df5 (patch) | |
tree | 26bbaa3322a276dac5d7cf456d51c328baac9a7e /config | |
parent | ba7ddae9a9d0aae9aaf00cfb2438286c2ee21098 (diff) | |
download | upstream-b933f9cf0cb254e368027cad6d5799e45b237df5.tar.gz upstream-b933f9cf0cb254e368027cad6d5799e45b237df5.tar.bz2 upstream-b933f9cf0cb254e368027cad6d5799e45b237df5.zip |
toolchain: remove gcc libssp and use libc variant
Removes the standalone implementation of stack smashing protection
in gcc's libssp in favour of the native implementation available
in glibc and uclibc. Musl libc already uses its native ssp, so this
patch does not affect musl-based toolchains.
Stack smashing protection configuration options are now uniform
across all supported libc variants.
This also makes kernel-level stack smashing protection available
for x86_64 and i386 builds using non-musl libc.
Signed-off-by: Ian Cooper <iancooper@hotmail.com>
Diffstat (limited to 'config')
-rw-r--r-- | config/Config-build.in | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/config/Config-build.in b/config/Config-build.in index 61a9265ad7..ac1e05d2ff 100644 --- a/config/Config-build.in +++ b/config/Config-build.in @@ -249,7 +249,6 @@ menu "Global build settings" choice prompt "User space Stack-Smashing Protection" - depends on USE_MUSL default PKG_CC_STACKPROTECTOR_REGULAR help Enable GCC Stack Smashing Protection (SSP) for userspace applications @@ -257,18 +256,15 @@ menu "Global build settings" bool "None" config PKG_CC_STACKPROTECTOR_REGULAR bool "Regular" - select GCC_LIBSSP if !USE_MUSL depends on KERNEL_CC_STACKPROTECTOR_REGULAR config PKG_CC_STACKPROTECTOR_STRONG bool "Strong" - select GCC_LIBSSP if !USE_MUSL depends on KERNEL_CC_STACKPROTECTOR_STRONG endchoice choice prompt "Kernel space Stack-Smashing Protection" default KERNEL_CC_STACKPROTECTOR_REGULAR - depends on USE_MUSL || !(x86_64 || i386) help Enable GCC Stack-Smashing Protection (SSP) for the kernel config KERNEL_CC_STACKPROTECTOR_NONE |