From efe03e5fc7ed653cc7f5a41a34600061bd1fc010 Mon Sep 17 00:00:00 2001
From: Steven Barth <cyrus@openwrt.org>
Date: Mon, 29 Jun 2015 16:44:27 +0000
Subject: hardening: disable user-space SSP for !musl

Signed-off-by: Steven Barth <steven@midlink.org>

SVN-Revision: 46146
---
 config/Config-build.in | 1 +
 1 file changed, 1 insertion(+)

(limited to 'config')

diff --git a/config/Config-build.in b/config/Config-build.in
index aef03444c2..4e2b0f583d 100644
--- a/config/Config-build.in
+++ b/config/Config-build.in
@@ -219,6 +219,7 @@ menu "Global build settings"
 
 	choice
 		prompt "User space Stack-Smashing Protection"
+		depends on USE_MUSL
 		default PKG_CC_STACKPROTECTOR_REGULAR
 		help
 		  Enable GCC Stack Smashing Protection (SSP) for userspace applications
-- 
cgit v1.2.3