diff options
-rw-r--r-- | arch/x86/kernel/Makefile | 18 |
1 files changed, 0 insertions, 18 deletions
diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile index b1f8be33300d..37fa30bada17 100644 --- a/arch/x86/kernel/Makefile +++ b/arch/x86/kernel/Makefile | |||
@@ -24,24 +24,6 @@ CFLAGS_vsyscall_64.o := $(PROFILING) -g0 $(nostackp) | |||
24 | CFLAGS_hpet.o := $(nostackp) | 24 | CFLAGS_hpet.o := $(nostackp) |
25 | CFLAGS_tsc.o := $(nostackp) | 25 | CFLAGS_tsc.o := $(nostackp) |
26 | CFLAGS_paravirt.o := $(nostackp) | 26 | CFLAGS_paravirt.o := $(nostackp) |
27 | # | ||
28 | # On x86_32, register frame is passed verbatim on stack as struct | ||
29 | # pt_regs. gcc considers the parameter to belong to the callee and | ||
30 | # with -fstack-protector it copies pt_regs to the callee's stack frame | ||
31 | # to put the structure after the stack canary causing changes made by | ||
32 | # the exception handlers to be lost. Turn off stack protector for all | ||
33 | # files containing functions which take struct pt_regs from register | ||
34 | # frame. | ||
35 | # | ||
36 | # The proper way to fix this is to teach gcc that the argument belongs | ||
37 | # to the caller for these functions, oh well... | ||
38 | # | ||
39 | ifdef CONFIG_X86_32 | ||
40 | CFLAGS_process_32.o := $(nostackp) | ||
41 | CFLAGS_vm86_32.o := $(nostackp) | ||
42 | CFLAGS_signal.o := $(nostackp) | ||
43 | CFLAGS_traps.o := $(nostackp) | ||
44 | endif | ||
45 | 27 | ||
46 | obj-y := process_$(BITS).o signal.o entry_$(BITS).o | 28 | obj-y := process_$(BITS).o signal.o entry_$(BITS).o |
47 | obj-y += traps.o irq.o irq_$(BITS).o dumpstack_$(BITS).o | 29 | obj-y += traps.o irq.o irq_$(BITS).o dumpstack_$(BITS).o |