From: Steven Barth Date: Wed, 17 Jun 2015 13:13:48 +0000 (+0000) Subject: hardening: enable regular SSP support by default X-Git-Tag: reboot~2753 X-Git-Url: http://git.lede-project.org./?a=commitdiff_plain;h=19810a5145bcb9d9520df76abacf41adb195d54d;p=openwrt%2Fstaging%2Fxback.git hardening: enable regular SSP support by default Signed-off-by: Steven Barth SVN-Revision: 46020 --- diff --git a/config/Config-build.in b/config/Config-build.in index 0584820cdd..42b8e8e5e3 100644 --- a/config/Config-build.in +++ b/config/Config-build.in @@ -219,7 +219,7 @@ menu "Global build settings" choice prompt "User space Stack-Smashing Protection" - default PKG_CC_STACKPROTECTOR_NONE + default PKG_CC_STACKPROTECTOR_REGULAR help Enable GCC Stack Smashing Protection (SSP) for userspace applications config PKG_CC_STACKPROTECTOR_NONE @@ -237,7 +237,7 @@ menu "Global build settings" choice prompt "Kernel space Stack-Smashing Protection" - default KERNEL_CC_STACKPROTECTOR_NONE + default KERNEL_CC_STACKPROTECTOR_REGULAR help Enable GCC Stack-Smashing Protection (SSP) for the kernel config KERNEL_CC_STACKPROTECTOR_NONE diff --git a/toolchain/gcc/Config.in b/toolchain/gcc/Config.in index d8141815fb..274b97c9b8 100644 --- a/toolchain/gcc/Config.in +++ b/toolchain/gcc/Config.in @@ -41,7 +41,7 @@ config EXTRA_GCC_CONFIG_OPTIONS config SSP_SUPPORT bool prompt "Enable Stack-Smashing Protection support" if TOOLCHAINOPTS - default n + default y help Enable Stack-Smashing Protection support