build: disable kernel stack protector support for i386/x86_64

When stack protector support is disabled in libc (always the case for
!musl), gcc assumes that it needs to use __stack_chk_guard for the stack
canary.
This causes kernel build errors, because the kernel is only set up to
handle TLS stack canaries.

Signed-off-by: Felix Fietkau <nbd@openwrt.org>

SVN-Revision: 46543
v19.07.3_mercusys_ac12_duma
Felix Fietkau 9 years ago
parent 9c59b3035f
commit bf82deff70

@ -239,6 +239,7 @@ menu "Global build settings"
choice
prompt "Kernel space Stack-Smashing Protection"
default KERNEL_CC_STACKPROTECTOR_REGULAR
depends on USE_MUSL || !(x86_64 || i386)
help
Enable GCC Stack-Smashing Protection (SSP) for the kernel
config KERNEL_CC_STACKPROTECTOR_NONE

Loading…
Cancel
Save