kbuild: Remove stack protector flags

-fstack-protector-strong is controlled by the in-tree
CONFIG_STACKPROTECTOR_STRONG config option.  If the flag is set without
the config option, scst fails to build:
ERROR: modpost: "__stack_chk_fail" [scst/src/scst.ko] undefined!

-fstack-clash-protection is disabled in the kernel's Makefile due to an
incompatibility with randomize_kstack_offset.

Fixes: 86d3d4bb1d ("kbuild: Enable additional compiler warnings")
Signed-off-by: Tony Battersby <tonyb@cybernetics.com>
This commit is contained in:
Tony Battersby
2025-09-08 16:00:19 +03:00
committed by Gleb Chesnokov
parent 189ab46a97
commit 63f2375fe4
11 changed files with 0 additions and 22 deletions

View File

@@ -14,8 +14,6 @@ ccflags-y += -Wall \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
obj-$(CONFIG_FCST) += fcst.o

View File

@@ -30,8 +30,6 @@ ccflags-y := -I$(src)/../include \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
ccflags-y += $(CONFTEST_CFLAGS)

View File

@@ -35,8 +35,6 @@ ccflags-y := -I$(src)/../../../scst/include \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
obj-m += isert-scst.o

View File

@@ -11,8 +11,6 @@ ccflags-y := -I$(src)/../scst/include \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
ifneq ($(CONFIG_SCSI_QLA2XXX_TARGET),)

View File

@@ -14,8 +14,6 @@ ccflags-y := -I$(src)/../../scst/include \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
#ccflags-y += -DCONFIG_QLA_TGT_DEBUG_WORK_IN_THREAD

View File

@@ -11,8 +11,6 @@ ccflags-y := -I$(src)/../scst/include \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
ifneq ($(CONFIG_SCSI_QLA2XXX_TARGET),)

View File

@@ -14,8 +14,6 @@ ccflags-y := -I$(src)/../../scst/include \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
#ccflags-y += -DCONFIG_QLA_TGT_DEBUG_WORK_IN_THREAD

View File

@@ -11,8 +11,6 @@ ccflags-y := -I$(src)/../include \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
ccflags-y += $(shell [ -n "${BUILD_DATE}" ] && echo -DSCST_BUILD_DATE=${BUILD_DATE}) \

View File

@@ -13,8 +13,6 @@ ccflags-y := -I$(src)/../../include \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
#ccflags-y += -DCONFIG_DEBUG_EXT_COPY_REMAP

View File

@@ -13,8 +13,6 @@ ccflags-y := -I$(src)/../scst/include \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
obj-m := scst_local.o

View File

@@ -16,8 +16,6 @@ ccflags-y += -I$(src)/../../scst/include \
-pipe \
-g \
-grecord-gcc-switches \
-fstack-clash-protection \
-fstack-protector-strong \
-Wstrict-prototypes
obj-m += ib_srpt.o