Author: nbd
Date: 2015-08-02 09:40:12 +0200 (Sun, 02 Aug 2015)
New Revision: 46543

Modified:
   trunk/config/Config-build.in
Log:
build: disable kernel stack protector support for i386/x86_64

When stack protector support is disabled in libc (always the case for
!musl), gcc assumes that it needs to use __stack_chk_guard for the stack
canary.
This causes kernel build errors, because the kernel is only set up to
handle TLS stack canaries.

Signed-off-by: Felix Fietkau <[email protected]>

Modified: trunk/config/Config-build.in
===================================================================
--- trunk/config/Config-build.in        2015-08-01 15:52:54 UTC (rev 46542)
+++ trunk/config/Config-build.in        2015-08-02 07:40:12 UTC (rev 46543)
@@ -239,6 +239,7 @@
        choice
                prompt "Kernel space Stack-Smashing Protection"
                default KERNEL_CC_STACKPROTECTOR_REGULAR
+               depends on USE_MUSL || !(x86_64 || i386)
                help
                  Enable GCC Stack-Smashing Protection (SSP) for the kernel
                config KERNEL_CC_STACKPROTECTOR_NONE
_______________________________________________
openwrt-commits mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-commits

Reply via email to