Browse Source

build: disable kernel stack protector support for i386/x86_64

When stack protector support is disabled in libc (always the case for
!musl), gcc assumes that it needs to use __stack_chk_guard for the stack
canary.
This causes kernel build errors, because the kernel is only set up to
handle TLS stack canaries.

Signed-off-by: Felix Fietkau <[email protected]>

SVN-Revision: 46543
Felix Fietkau 10 years ago
parent
commit
bf82deff70
1 changed files with 1 additions and 0 deletions
  1. 1 0
      config/Config-build.in

+ 1 - 0
config/Config-build.in

@@ -239,6 +239,7 @@ menu "Global build settings"
 	choice
 		prompt "Kernel space Stack-Smashing Protection"
 		default KERNEL_CC_STACKPROTECTOR_REGULAR
+		depends on USE_MUSL || !(x86_64 || i386)
 		help
 		  Enable GCC Stack-Smashing Protection (SSP) for the kernel
 		config KERNEL_CC_STACKPROTECTOR_NONE