hardening: disable user-space SSP for !musl
authorcyrus <cyrus@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Mon, 29 Jun 2015 16:44:27 +0000 (16:44 +0000)
committercyrus <cyrus@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Mon, 29 Jun 2015 16:44:27 +0000 (16:44 +0000)
Signed-off-by: Steven Barth <steven@midlink.org>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@46146 3c298f89-4303-0410-b956-a3cf2f4a3e73

config/Config-build.in

index aef0344..4e2b0f5 100644 (file)
@@ -219,6 +219,7 @@ menu "Global build settings"
 
        choice
                prompt "User space Stack-Smashing Protection"
+               depends on USE_MUSL
                default PKG_CC_STACKPROTECTOR_REGULAR
                help
                  Enable GCC Stack Smashing Protection (SSP) for userspace applications