build: disable kernel stack protector support for i386/x86_64
authornbd <nbd@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Sun, 2 Aug 2015 07:40:12 +0000 (07:40 +0000)
committernbd <nbd@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Sun, 2 Aug 2015 07:40:12 +0000 (07:40 +0000)
commitdaa6cffad5f1c8f2443207839a23e6b4e56b86a8
tree316a8b627a127d9e7d985ee69f808480481c71e8
parent2d5ed22d05b45cd33804dba9fd64294de947e84e
build: disable kernel stack protector support for i386/x86_64

When stack protector support is disabled in libc (always the case for
!musl), gcc assumes that it needs to use __stack_chk_guard for the stack
canary.
This causes kernel build errors, because the kernel is only set up to
handle TLS stack canaries.

Signed-off-by: Felix Fietkau <nbd@openwrt.org>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@46543 3c298f89-4303-0410-b956-a3cf2f4a3e73
config/Config-build.in