hardening: disable user-space SSP for !musl
authorSteven Barth <cyrus@openwrt.org>
Mon, 29 Jun 2015 16:44:27 +0000 (16:44 +0000)
committerSteven Barth <cyrus@openwrt.org>
Mon, 29 Jun 2015 16:44:27 +0000 (16:44 +0000)
Signed-off-by: Steven Barth <steven@midlink.org>
SVN-Revision: 46146

config/Config-build.in

index aef03444c2893c68302fbadcb48c0a0b371234e1..4e2b0f583d4529159e464a7ba1c8126b1b8699ed 100644 (file)
@@ -219,6 +219,7 @@ menu "Global build settings"
 
        choice
                prompt "User space Stack-Smashing Protection"
 
        choice
                prompt "User space Stack-Smashing Protection"
+               depends on USE_MUSL
                default PKG_CC_STACKPROTECTOR_REGULAR
                help
                  Enable GCC Stack Smashing Protection (SSP) for userspace applications
                default PKG_CC_STACKPROTECTOR_REGULAR
                help
                  Enable GCC Stack Smashing Protection (SSP) for userspace applications