aboutsummaryrefslogtreecommitdiffstats
path: root/config
diff options
context:
space:
mode:
authorFelix Fietkau <nbd@openwrt.org>2015-08-02 07:40:12 +0000
committerFelix Fietkau <nbd@openwrt.org>2015-08-02 07:40:12 +0000
commita4e7857a148e93d73413b7674f8537edc69001e7 (patch)
tree316a8b627a127d9e7d985ee69f808480481c71e8 /config
parent720f3636158d423e0cf8ab69f799ca660bbec2c7 (diff)
downloadmaster-187ad058-a4e7857a148e93d73413b7674f8537edc69001e7.tar.gz
master-187ad058-a4e7857a148e93d73413b7674f8537edc69001e7.tar.bz2
master-187ad058-a4e7857a148e93d73413b7674f8537edc69001e7.zip
build: disable kernel stack protector support for i386/x86_64
When stack protector support is disabled in libc (always the case for !musl), gcc assumes that it needs to use __stack_chk_guard for the stack canary. This causes kernel build errors, because the kernel is only set up to handle TLS stack canaries. Signed-off-by: Felix Fietkau <nbd@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/trunk@46543 3c298f89-4303-0410-b956-a3cf2f4a3e73
Diffstat (limited to 'config')
-rw-r--r--config/Config-build.in1
1 files changed, 1 insertions, 0 deletions
diff --git a/config/Config-build.in b/config/Config-build.in
index 4e2b0f583d..f2d292e453 100644
--- a/config/Config-build.in
+++ b/config/Config-build.in
@@ -239,6 +239,7 @@ menu "Global build settings"
choice
prompt "Kernel space Stack-Smashing Protection"
default KERNEL_CC_STACKPROTECTOR_REGULAR
+ depends on USE_MUSL || !(x86_64 || i386)
help
Enable GCC Stack-Smashing Protection (SSP) for the kernel
config KERNEL_CC_STACKPROTECTOR_NONE