build: disable kernel stack protector support for i386/x86_64
authorFelix Fietkau <nbd@openwrt.org>
Sun, 2 Aug 2015 07:40:12 +0000 (07:40 +0000)
committerFelix Fietkau <nbd@openwrt.org>
Sun, 2 Aug 2015 07:40:12 +0000 (07:40 +0000)
When stack protector support is disabled in libc (always the case for
!musl), gcc assumes that it needs to use __stack_chk_guard for the stack
canary.
This causes kernel build errors, because the kernel is only set up to
handle TLS stack canaries.

Signed-off-by: Felix Fietkau <nbd@openwrt.org>
SVN-Revision: 46543

config/Config-build.in

index 4e2b0f5..f2d292e 100644 (file)
@@ -239,6 +239,7 @@ menu "Global build settings"
        choice
                prompt "Kernel space Stack-Smashing Protection"
                default KERNEL_CC_STACKPROTECTOR_REGULAR
+               depends on USE_MUSL || !(x86_64 || i386)
                help
                  Enable GCC Stack-Smashing Protection (SSP) for the kernel
                config KERNEL_CC_STACKPROTECTOR_NONE