Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1588356ybv; Thu, 20 Feb 2020 23:50:00 -0800 (PST) X-Google-Smtp-Source: APXvYqxU4wnxw9uG+qNz+oatHy+n6istIKo2+/KOV36JFz6D2+/VnDchActJYLhPCAtkLSrSFvoJ X-Received: by 2002:aca:45c1:: with SMTP id s184mr937856oia.158.1582271400730; Thu, 20 Feb 2020 23:50:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582271400; cv=none; d=google.com; s=arc-20160816; b=FxyrpHBNjfYqFjEBJSSXRhzCRMeA7nTp9M3USH6oFZdBhtxeViqGZ3zpvwhkwKX/df Tl4xXXaAabrifgDsKHjg/U73kfx7sUjuw+oFPT2b9YlkURo0pj3KrmDUxHvKTGFy9xJh U0sv1Kc/l8gv8b1pZZdYo4flXHkXAOGIbN8UgjxDniRKfFhiz9GrAgd2fpAbfmcKOHNy wgeUy3tYrMYH1orPoc/lV2g6geKsoOLUeUlAERk5gp/CUukA3jDZpZen6r130v/wzarf gm+6R8efMfKLaqzZg9nKeP1/D31XW91aR+TNtwF7v/s/FUk3uXQLnlzK+L8Co4K5ovec sqSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rOiAxZ2Rjx0n7yDlxCyxK1l32NUqw9RK+2sJCoXruHM=; b=OBPLwZAH2ppqNv2vo4anbACkyNI4CIQfvzCw0tzr28PKPOmJgvwBu99xfGV4Q+f+KQ QhFUi1B1mP7bhEcgqodx1tGwoWDqH85Fzw1u4KPfJOCQ8js3ruVhKRo/dzdiY7CACLaI G2R57a70XQy+YJ2IyllPLmCud0XkemoxwIe8M3Cp4FU+tbwzhY99xKCERefTqDeYm4fE sByzUekbWfCJZSJaPflaIB0u5uI+uonNPJWgTKIK3ADd9aeEIeUBRnIGcw7HFdq0L7gB j3GbWkdCG1/25wYx0VbTiFt4lv5m47TayFY80wS/XlAFxdg4fPy4ufoOMGj1/5b5aoJM g8Pw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hvZL6mGY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f16si458760oib.269.2020.02.20.23.49.49; Thu, 20 Feb 2020 23:50:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hvZL6mGY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729411AbgBUHtp (ORCPT + 99 others); Fri, 21 Feb 2020 02:49:45 -0500 Received: from mail.kernel.org ([198.145.29.99]:46260 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729399AbgBUHtm (ORCPT ); Fri, 21 Feb 2020 02:49:42 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C6673208C4; Fri, 21 Feb 2020 07:49:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582271381; bh=AM/cxaMLSs+1tt+XbdmWhg83uD3mrehTan0F9wpp1Xs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hvZL6mGYig004T0QDMeDNhsDsYscQvxMXPvNq6tEPfJmLuzCU4lMllZYMRtmvMJo5 1sPA3PUT4sPKkaP9QxhoQh+RWso3krsC5ANdwg3uogR3r6Z+spgp6J1tq70bTXaCfo nOO6siT9D64VKSavSpnNbKaWkJKQ8xcyx5vfnILA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Toke=20H=C3=B8iland-J=C3=B8rgensen?= , Alexei Starovoitov , Sasha Levin Subject: [PATCH 5.5 143/399] samples/bpf: Set -fno-stack-protector when building BPF programs Date: Fri, 21 Feb 2020 08:37:48 +0100 Message-Id: <20200221072416.391366107@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072402.315346745@linuxfoundation.org> References: <20200221072402.315346745@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Toke Høiland-Jørgensen [ Upstream commit 450278977acbf494a20367c22fbb38729772d1fc ] It seems Clang can in some cases turn on stack protection by default, which doesn't work with BPF. This was reported once before[0], but it seems the flag to explicitly turn off the stack protector wasn't added to the Makefile, so do that now. The symptom of this is compile errors like the following: error: :0:0: in function bpf_prog1 i32 (%struct.__sk_buff*): A call to built-in function '__stack_chk_fail' is not supported. [0] https://www.spinics.net/lists/netdev/msg556400.html Signed-off-by: Toke Høiland-Jørgensen Signed-off-by: Alexei Starovoitov Link: https://lore.kernel.org/bpf/20191216103819.359535-1-toke@redhat.com Signed-off-by: Sasha Levin --- samples/bpf/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/samples/bpf/Makefile b/samples/bpf/Makefile index c0147a8cf1882..06ebe3104cc03 100644 --- a/samples/bpf/Makefile +++ b/samples/bpf/Makefile @@ -236,6 +236,7 @@ BTF_LLVM_PROBE := $(shell echo "int main() { return 0; }" | \ readelf -S ./llvm_btf_verify.o | grep BTF; \ /bin/rm -f ./llvm_btf_verify.o) +BPF_EXTRA_CFLAGS += -fno-stack-protector ifneq ($(BTF_LLVM_PROBE),) BPF_EXTRA_CFLAGS += -g else -- 2.20.1