hardening: disable user-space SSP for !musl

Signed-off-by: Steven Barth <steven@midlink.org>

SVN-Revision: 46146
v19.07.3_mercusys_ac12_duma
Steven Barth 9 years ago
parent 6d48dcb8d5
commit efe03e5fc7

@ -219,6 +219,7 @@ menu "Global build settings"
choice
prompt "User space Stack-Smashing Protection"
depends on USE_MUSL
default PKG_CC_STACKPROTECTOR_REGULAR
help
Enable GCC Stack Smashing Protection (SSP) for userspace applications

Loading…
Cancel
Save