hardening: enable regular SSP support by default
authorSteven Barth <cyrus@openwrt.org>
Wed, 17 Jun 2015 13:13:48 +0000 (13:13 +0000)
committerSteven Barth <cyrus@openwrt.org>
Wed, 17 Jun 2015 13:13:48 +0000 (13:13 +0000)
Signed-off-by: Steven Barth <steven@midlink.org>
SVN-Revision: 46020

config/Config-build.in
toolchain/gcc/Config.in

index 0584820cddfd8bd6285c1a52fcb0088e9cd5d16e..42b8e8e5e3acb27e17a832ef6359b43ccc38b955 100644 (file)
@@ -219,7 +219,7 @@ menu "Global build settings"
 
        choice
                prompt "User space Stack-Smashing Protection"
-               default PKG_CC_STACKPROTECTOR_NONE
+               default PKG_CC_STACKPROTECTOR_REGULAR
                help
                  Enable GCC Stack Smashing Protection (SSP) for userspace applications
                config PKG_CC_STACKPROTECTOR_NONE
@@ -237,7 +237,7 @@ menu "Global build settings"
 
        choice
                prompt "Kernel space Stack-Smashing Protection"
-               default KERNEL_CC_STACKPROTECTOR_NONE
+               default KERNEL_CC_STACKPROTECTOR_REGULAR
                help
                  Enable GCC Stack-Smashing Protection (SSP) for the kernel
                config KERNEL_CC_STACKPROTECTOR_NONE
index d8141815fb802d075fb0ff542ce19206445aafc4..274b97c9b8ca0732df9e85aa5eefd9da8163767d 100644 (file)
@@ -41,7 +41,7 @@ config EXTRA_GCC_CONFIG_OPTIONS
 config SSP_SUPPORT
        bool
        prompt "Enable Stack-Smashing Protection support" if TOOLCHAINOPTS
-       default n
+       default y
        help
            Enable Stack-Smashing Protection support