Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp4201682imm; Mon, 18 Jun 2018 10:47:47 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIhlvBuqH6gJYLO14g8/SmGj8ycsL3JUFWLI3ZP9Eq3u60ILpRuqtHh+K6I4frY9ccGsnhN X-Received: by 2002:a63:920c:: with SMTP id o12-v6mr11895502pgd.233.1529344067615; Mon, 18 Jun 2018 10:47:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529344067; cv=none; d=google.com; s=arc-20160816; b=MJZINEWDMRjjA0yZVIHIDHuQO8LKjNkHoG73Hqq7PWjOlav3oAFnxfU/jM7Cq/sGgs B6z5Ba4dXxB904A3I1X2PjqhbRGMqOn78sJkyiLDvifUfvqNZWNPRXC7aD0qaL7oUZN4 Vp3niysclB8ilnFV90LN6L/W7T824abTCXhPXAkUYtOAes50pdp7gp5L0zQZROqBwquq 1v7ueBDRtx8+iLVJJudZ6Kz1fuzttxsk2vuW09BAzFmXX4/XDH5O0QacnZtXfNP+Ilcw mNqwAYRSb8wJUNIgimQvJdgF4pnwav/bg+B1dfn5kE/IKQTA6xufFkk33NjF5qGi9vx4 76IQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id:date :subject:cc:to:from:arc-authentication-results; bh=In2HrlpHiVrNZVg6OsOlV1gcXdDcx+YbLdFNtBaCoFg=; b=xDoURiQnXhJG05JG9FqpOYfI/h8Db0eGWClAzSxO4KW3jeRvd5LE67R+TtDB4Ou4kM J3u0cp7u7+S386ldJ1NSe3acD4seR8XwuQPSymryYaUl+nZOJokFxnrOeZKGLHhFbQcD ZcyxpWX0I6vODVrFdxT/EHiBGQrdkWW/DT8c6pSWUfadKph4Ib0Euso9bJskFAzgPNQd 8vC2dX6puvOc2pXotMNK594bFqKe3mgQXuiVJQvlDye6rXr71BtAPtQrOl6tjKAbr1Gn 2WrLTmDBzhymOtsvk+P3EoSI5vjwh/NqWU+oeGiCU1hWkZsQ5B0G3c4xoz/fhBa+1fOK 8Kvw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l12-v6si12511149pgp.683.2018.06.18.10.47.34; Mon, 18 Jun 2018 10:47:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935591AbeFRRpd (ORCPT + 99 others); Mon, 18 Jun 2018 13:45:33 -0400 Received: from mout.gmx.net ([212.227.17.22]:37407 "EHLO mout.gmx.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S935127AbeFRRpc (ORCPT ); Mon, 18 Jun 2018 13:45:32 -0400 Received: from localhost.localdomain ([79.223.58.86]) by mail.gmx.com (mrgmx102 [212.227.17.168]) with ESMTPSA (Nemesis) id 0Lv8hi-1gCArt2mHK-010N3z; Mon, 18 Jun 2018 19:45:27 +0200 Received: by localhost.localdomain (Postfix, from userid 1000) id 581DF80086; Mon, 18 Jun 2018 19:45:25 +0200 (CEST) From: Sven Joachim To: Masahiro Yamada , linux-kbuild@vger.kernel.org Cc: linux-kernel@vger.kernel.org Subject: [PATCH] stack-protector: Fix test with 32-bit userland and CONFIG_64BIT=y Date: Mon, 18 Jun 2018 19:45:25 +0200 Message-ID: <874li0vvii.fsf@turtle.gmx.de> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1.50 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Provags-ID: V03:K1:IN6nUA+QVZukyq9YCHyDGeJDh4lM5NQgTAfrNCow300piJ6HFdn z794e82z7fS/KuZnLBMlPR2Cv20bTUdMIdwwspuxs+BX9v8ldMbhGRQva5uHXYfUJ/fX6Ua 1SgknFaq8xRGSj3mlhXZSiKJqhP/JXOB0DoAqcIpi/crwQ0Tn9AN7fqFVRiL7QCqJQFPkjM gEoDAeweJnQybiFqHnozQ== X-UI-Out-Filterresults: notjunk:1;V01:K0:M2HWkV7eP2k=:peVJ+dj+YAEuaXhAPc3Yek 1IDRK7IaGjQHxF0eQKvcV4yNkZT/MyFYVIMggxTfCAeF0E3u7n80jlT9EqueJYXNzdrjxOpXC 8X4DLaYmUym0m4bGG0sAuHREVNCHwJoa2j8Ar3qHu8h348H0OFF1bE9gFuldDTgImhVrMI3UU EF5FGZnF2PiRbY0iF7e1O4Wm7kJm4W42jMXem+V6+enhl7ywuRkyy9H5rQ1y/zH70fAXcqJ1z +qhHgjwH5epbJk1qv4yCA1CrtrTOiwtKwg2oSQmmy8UQpgnzml/zviQcaIS5qgAwmx+DsyeQ/ NMB50u9YC3LT5hwnnWaotwOAFe5XjUY+tJ9gtPmH5D3eLQ7wyRjFvuXrbaxXYCEVrDzf3YdTX UkobTsz7PiftuqBl4UQqUW710QVoD6LIObJCel6N4ieSL+VDYHtRS7Kq1E6vp+rjQV0YZZHkn 2cHcgdgFFN9a+5vO+tZtiTtJWjef/8/njQ4C2QFd2ULyNn7TjKzT141zNJE0iJ23fpQf7HSrq TdYSG0Xf6UaZ+z7PeoofBHzuzs+dnipCru5nS/iaA/rZBpMIBx+A8OXffsiNGBNJjRfL2hy2n +KZF5S8k466r0A+dqq8oH3iy4QF/GOoSB8Z4NHq/+XBLKNwwSZVOgwJujh7j/ZKiV0LptbK68 WFuNb+KfoRa7deumPZPfGJ0+aAXifv1vfg9kT5AKgXKibVyiKBqAlKrxbM3tFAI+PpQ7nTagj zGOWb/lfoQXnrzdPdwg84qCsK9/jedc9zCpa0CEGOnIkMZnGqN4KaJ3dStPeaJT72dXAofsQZ 1E6Np7y Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When building a 64-bit 4.18-rc1 kernel with a 32-bit userland, I noticed that stack protection was silently disabled. Adding -m64 in gcc-x86_64-has-stack-protector.sh fixed that, similar to what has been noticed in commit 2a61f4747eea ("stack-protector: test compiler capability in Kconfig and drop AUTO mode") for gcc-x86_32-has-stack-protector.sh. Signed-off-by: Sven Joachim --- scripts/gcc-x86_64-has-stack-protector.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/gcc-x86_64-has-stack-protector.sh b/scripts/gcc-x86_64-has-stack-protector.sh index 3755af0cd9f7..75e4e22b986a 100755 --- a/scripts/gcc-x86_64-has-stack-protector.sh +++ b/scripts/gcc-x86_64-has-stack-protector.sh @@ -1,4 +1,4 @@ #!/bin/sh # SPDX-License-Identifier: GPL-2.0 -echo "int foo(void) { char X[200]; return 3; }" | $* -S -x c -c -O0 -mcmodel=kernel -fno-PIE -fstack-protector - -o - 2> /dev/null | grep -q "%gs" +echo "int foo(void) { char X[200]; return 3; }" | $* -S -x c -c -m64 -O0 -mcmodel=kernel -fno-PIE -fstack-protector - -o - 2> /dev/null | grep -q "%gs" -- 2.17.1