Author: nbd Date: 2015-08-02 09:40:12 +0200 (Sun, 02 Aug 2015) New Revision: 46543
Modified: trunk/config/Config-build.in Log: build: disable kernel stack protector support for i386/x86_64 When stack protector support is disabled in libc (always the case for !musl), gcc assumes that it needs to use __stack_chk_guard for the stack canary. This causes kernel build errors, because the kernel is only set up to handle TLS stack canaries. Signed-off-by: Felix Fietkau <[email protected]> Modified: trunk/config/Config-build.in =================================================================== --- trunk/config/Config-build.in 2015-08-01 15:52:54 UTC (rev 46542) +++ trunk/config/Config-build.in 2015-08-02 07:40:12 UTC (rev 46543) @@ -239,6 +239,7 @@ choice prompt "Kernel space Stack-Smashing Protection" default KERNEL_CC_STACKPROTECTOR_REGULAR + depends on USE_MUSL || !(x86_64 || i386) help Enable GCC Stack-Smashing Protection (SSP) for the kernel config KERNEL_CC_STACKPROTECTOR_NONE _______________________________________________ openwrt-commits mailing list [email protected] https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-commits
