recipes: kernel/headers: avoid usage of stack protector strong here
commitd70e528bf289c87e15b5a4da155181d0a40b0a07
authorMatías Fonzo <selk@dragora.org>
Tue, 11 Sep 2018 14:52:02 +0000 (11 11:52 -0300)
committerMatías Fonzo <selk@dragora.org>
Tue, 11 Sep 2018 14:52:02 +0000 (11 11:52 -0300)
tree24d4bf156db4f1a950f8f254df0d8d73404e3bb4
parent58ef0f582133dcd74473a6174539055de0ac83c7
recipes: kernel/headers: avoid usage of stack protector strong here

The GCC provided on the stage 1 is built with the SSP enabled by default.
We avoid here passing it here, because is causing troubles on i386 (x86),
also in other architectures.  For more information, see:

http://www.openwall.com/lists/musl/2018/09/11/2
recipes/kernel/headers/recipe