build: disable kernel stack protector support for i386/x86_64
When stack protector support is disabled in libc (always the case for !musl), gcc assumes that it needs to use __stack_chk_guard for the stack canary. This causes kernel build errors, because the kernel is only set up to handle TLS stack canaries. Signed-off-by: Felix Fietkau <nbd@openwrt.org> SVN-Revision: 46543
This commit is contained in:
parent
9c59b3035f
commit
bf82deff70
@ -239,6 +239,7 @@ menu "Global build settings"
|
|||||||
choice
|
choice
|
||||||
prompt "Kernel space Stack-Smashing Protection"
|
prompt "Kernel space Stack-Smashing Protection"
|
||||||
default KERNEL_CC_STACKPROTECTOR_REGULAR
|
default KERNEL_CC_STACKPROTECTOR_REGULAR
|
||||||
|
depends on USE_MUSL || !(x86_64 || i386)
|
||||||
help
|
help
|
||||||
Enable GCC Stack-Smashing Protection (SSP) for the kernel
|
Enable GCC Stack-Smashing Protection (SSP) for the kernel
|
||||||
config KERNEL_CC_STACKPROTECTOR_NONE
|
config KERNEL_CC_STACKPROTECTOR_NONE
|
||||||
|
Loading…
Reference in New Issue
Block a user