Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp796236pxb; Tue, 3 Nov 2020 12:46:48 -0800 (PST) X-Google-Smtp-Source: ABdhPJz3q4hblWHZGyRqgzVXnlht7I+VqNx9GvHM7dh5/RJZtcVEU4wfgHv8gagWI5CHQCLPI1CT X-Received: by 2002:a17:906:7844:: with SMTP id p4mr21601293ejm.26.1604436408384; Tue, 03 Nov 2020 12:46:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604436408; cv=none; d=google.com; s=arc-20160816; b=S0m+ncp+fGPJlcwcj5CsLFx6ALUj56nJWykF3ProL6v2r0xbj/4N9jWGQ9W0wgKwcx +htCzWphZYoID6M3cxGScIOG3OPHJNKbMjh8fMmupH9Bb5n3KiyzmC2ffrusalE2auJs KBX51HyCv6HpWAroCc/1jt8vHfsiqELflJ6y/VwYnqGZiVG/ybB6cWFx7/DaHOc7/qai Y/UPmIzHdbvlHAKHXn2JSSAHPEiEmY+g3J3WCbQMHi7z7JDnsbUgxL1skiBB3pa2ZHDR HTfxQJxp+/FKZGKPdBycrw1MnuIVk/Pmi9G1pyLYm/65qI8+lB7fXx4oqT+jdbScpTNF Xgfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4fPtX0rVaWl6Vih21hMcxoB4x9rAdCU/+F9s+B2CpK4=; b=OQgJb9V6XBZPgXcA4YuW9L6PkvIoN5U7l2muv/1eqtRWk5udHIk1Z2HRUPaR1YPL+h 8iRSMaG+3XeBqjauZXNdHCemS+/l4UivahIdHQHMb1BBBK85CCamgP6yYXwZ4baZFVCM odobhkHUyrTLrz833aOb18hs6FGG33cYplyaw+iXSFmGaQQpLaDvyGzUVw5qeXdjau+Y 38ocuHqMoWy+rfI7DW9O2MULMspv4Y4ao4SzgZdDY3u00i5KWdUcW2c1f/nC2cF0dJ5S vchKw+e7ZR3Hare++e0Ry2gmeS0C20Km0FlYWc+E6aVQKQz2x1n8ZR5wxoXp6MGP3A+e RyFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SxL78fDZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l19si11238491edr.128.2020.11.03.12.46.25; Tue, 03 Nov 2020 12:46:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SxL78fDZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730424AbgKCUlv (ORCPT + 99 others); Tue, 3 Nov 2020 15:41:51 -0500 Received: from mail.kernel.org ([198.145.29.99]:53736 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730430AbgKCUls (ORCPT ); Tue, 3 Nov 2020 15:41:48 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6038E223AC; Tue, 3 Nov 2020 20:41:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604436107; bh=MEA3fYY7orHTZa76wElIUpLcS7Hu5gXbG/cvEpgn5V4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SxL78fDZVVEFOSkcIvcdz44YMWDqRoPjDAkBWLn6X0zT0vF3MthQJfBJT75kOTisx st2+FXSEQUPr3LNU0At1OlLg+JDxoLGynqh+Uh3mFXZTM88o0vSOvlogdDEtwGGp0m ezyvT7lHH8jkP8RWdk/RwInWHWXYKK+6zFUmjkl4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yonghong Song , Alexei Starovoitov , Andrii Nakryiko , Sasha Levin Subject: [PATCH 5.9 107/391] selftests/bpf: Define string const as global for test_sysctl_prog.c Date: Tue, 3 Nov 2020 21:32:38 +0100 Message-Id: <20201103203354.042754189@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203348.153465465@linuxfoundation.org> References: <20201103203348.153465465@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yonghong Song [ Upstream commit 6e057fc15a2da4ee03eb1fa6889cf687e690106e ] When tweaking llvm optimizations, I found that selftest build failed with the following error: libbpf: elf: skipping unrecognized data section(6) .rodata.str1.1 libbpf: prog 'sysctl_tcp_mem': bad map relo against '.L__const.is_tcp_mem.tcp_mem_name' in section '.rodata.str1.1' Error: failed to open BPF object file: Relocation failed make: *** [/work/net-next/tools/testing/selftests/bpf/test_sysctl_prog.skel.h] Error 255 make: *** Deleting file `/work/net-next/tools/testing/selftests/bpf/test_sysctl_prog.skel.h' The local string constant "tcp_mem_name" is put into '.rodata.str1.1' section which libbpf cannot handle. Using untweaked upstream llvm, "tcp_mem_name" is completely inlined after loop unrolling. Commit 7fb5eefd7639 ("selftests/bpf: Fix test_sysctl_loop{1, 2} failure due to clang change") solved a similar problem by defining the string const as a global. Let us do the same here for test_sysctl_prog.c so it can weather future potential llvm changes. Signed-off-by: Yonghong Song Signed-off-by: Alexei Starovoitov Acked-by: Andrii Nakryiko Link: https://lore.kernel.org/bpf/20200910202718.956042-1-yhs@fb.com Signed-off-by: Sasha Levin --- tools/testing/selftests/bpf/progs/test_sysctl_prog.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/bpf/progs/test_sysctl_prog.c b/tools/testing/selftests/bpf/progs/test_sysctl_prog.c index 50525235380e8..5489823c83fc2 100644 --- a/tools/testing/selftests/bpf/progs/test_sysctl_prog.c +++ b/tools/testing/selftests/bpf/progs/test_sysctl_prog.c @@ -19,11 +19,11 @@ #define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0])) #endif +const char tcp_mem_name[] = "net/ipv4/tcp_mem"; static __always_inline int is_tcp_mem(struct bpf_sysctl *ctx) { - char tcp_mem_name[] = "net/ipv4/tcp_mem"; unsigned char i; - char name[64]; + char name[sizeof(tcp_mem_name)]; int ret; memset(name, 0, sizeof(name)); -- 2.27.0