Anyone able to tell me why kernel stack smashing protection is disabled on x86_64 when using glibc?
prompt "Kernel space Stack-Smashing Protection"
depends on USE_MUSL || !(x86_64 || i386)
Enable GCC Stack-Smashing Protection (SSP) for the kernel
You an use git blame to find the commit hash that affect that line and then you can find the commit message that should provide enough information about the reasoning.
Here's the reason if anyone else is looking for the same info
Author: Felix Fietkau <firstname.lastname@example.org>
Date: Sun Aug 2 07:40:12 2015 +0000
build: disable kernel stack protector support for i386/x86_64
When stack protector support is disabled in libc (always the case for
!musl), gcc assumes that it needs to use __stack_chk_guard for the stack
This causes kernel build errors, because the kernel is only set up to
handle TLS stack canaries.
Signed-off-by: Felix Fietkau <email@example.com>