From: Felix Fietkau Date: Sun, 2 Aug 2015 07:40:12 +0000 (+0000) Subject: build: disable kernel stack protector support for i386/x86_64 X-Git-Url: http://git.ozo.com/?a=commitdiff_plain;h=a4e7857a148e93d73413b7674f8537edc69001e7;p=openwrt-github%2F.git build: disable kernel stack protector support for i386/x86_64 When stack protector support is disabled in libc (always the case for !musl), gcc assumes that it needs to use __stack_chk_guard for the stack canary. This causes kernel build errors, because the kernel is only set up to handle TLS stack canaries. Signed-off-by: Felix Fietkau git-svn-id: svn://svn.openwrt.org/openwrt/trunk@46543 3c298f89-4303-0410-b956-a3cf2f4a3e73 --- diff --git a/config/Config-build.in b/config/Config-build.in index 4e2b0f583d..f2d292e453 100644 --- a/config/Config-build.in +++ b/config/Config-build.in @@ -239,6 +239,7 @@ menu "Global build settings" choice prompt "Kernel space Stack-Smashing Protection" default KERNEL_CC_STACKPROTECTOR_REGULAR + depends on USE_MUSL || !(x86_64 || i386) help Enable GCC Stack-Smashing Protection (SSP) for the kernel config KERNEL_CC_STACKPROTECTOR_NONE