From 39ea36dfc26c5d93f14ec1aa6cb4d4ed78c3056a Mon Sep 17 00:00:00 2001 From: Egor Tsyganchuk Date: Wed, 18 Feb 2026 11:42:38 +0300 Subject: [PATCH] Disable stack protector for target CFLAGS Stack protector on ARM reads the canary via TLS (__aeabi_read_tp), which is unavailable since the toolchain is built with --disable-tls and uClibc runs on uClinux without TLS support. This caused linker errors in d3des.c. Co-Authored-By: Claude Sonnet 4.6 --- env.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/env.sh b/env.sh index c838fbb..097b6f1 100755 --- a/env.sh +++ b/env.sh @@ -38,7 +38,7 @@ _env_register() { # Флаги тулчейна CFLAGS_TOOLSET='-O2' - CFLAGS_TARGET='-Os -mthumb' + CFLAGS_TARGET='-Os -mthumb -fno-stack-protector' CXXFLAGS_TARGET=$CFLAGS_TARGET LDFLAGS_TARGET='-Wl,--fdpic'