makes builds with e.g. Ubuntu gcc work, where stack protect is default
CPPFLAGS += -DVIRTIF_BASE=xenif
CFLAGS = -Wall -g
-CFLAGS += -fno-builtin -no-integrated-cpp
+CFLAGS += -fno-builtin -no-integrated-cpp -fno-stack-protector
# This is semi-duplicated from xen/arch/x86/arch.mk, can we avoid that?
TARGET_ARCH := $(shell uname -m | sed -e s/i.86/i386/)
case " $* " in
*" -v "*) set -x ;;
esac
-exec ${RUMP_APPTOOLS_CC:-cc} -no-integrated-cpp -specs=!APPTOOLS!/specs "$@"
+exec ${RUMP_APPTOOLS_CC:-cc} -fno-stack-protector -no-integrated-cpp -specs=!APPTOOLS!/specs "$@"
.PATH: $(pwd)
PTHREAD_MAKELWP=pthread_makelwp_rumprunxen.c
CPPFLAGS+= -D_PTHREAD_GETTCB_EXT=_lwp_rumpxen_gettcb
-.endif # LIB == pthread"
+.endif # LIB == pthread
+CFLAGS+=-fno-stack-protector
+USE_SSP=no"
unset IFS
export BUILDXENMETAL_MKCONF
CFLAGS += -isystem ../rump/include -I.. -nostdinc
CFLAGS += -I$(MINI-OS_ROOT)
CFLAGS += -no-integrated-cpp
+CFLAGS += -fno-stack-protector
LDARCHLIB := -l$(ARCH_LIB_NAME)
LDSCRIPT := $(TARGET_ARCH_DIR)/minios-$(XEN_TARGET_ARCH).lds