diff options
| author | Felix Fietkau <nbd@openwrt.org> | 2015-08-02 07:40:12 +0000 |
|---|---|---|
| committer | Felix Fietkau <nbd@openwrt.org> | 2015-08-02 07:40:12 +0000 |
| commit | bf82deff7069599c9f130f5bb0222acd171fd19d (patch) | |
| tree | 04dad9bb3c7081b1a213bb46c7a9490451415019 | |
| parent | 9c59b3035f0b3b3025eb025010e00375e783407c (diff) | |
| download | upstream-bf82deff7069599c9f130f5bb0222acd171fd19d.tar.gz upstream-bf82deff7069599c9f130f5bb0222acd171fd19d.tar.bz2 upstream-bf82deff7069599c9f130f5bb0222acd171fd19d.zip | |
build: disable kernel stack protector support for i386/x86_64
When stack protector support is disabled in libc (always the case for
!musl), gcc assumes that it needs to use __stack_chk_guard for the stack
canary.
This causes kernel build errors, because the kernel is only set up to
handle TLS stack canaries.
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
SVN-Revision: 46543
| -rw-r--r-- | config/Config-build.in | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/config/Config-build.in b/config/Config-build.in index 4e2b0f583d4..f2d292e453a 100644 --- a/config/Config-build.in +++ b/config/Config-build.in @@ -239,6 +239,7 @@ menu "Global build settings" choice prompt "Kernel space Stack-Smashing Protection" default KERNEL_CC_STACKPROTECTOR_REGULAR + depends on USE_MUSL || !(x86_64 || i386) help Enable GCC Stack-Smashing Protection (SSP) for the kernel config KERNEL_CC_STACKPROTECTOR_NONE |
