Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4810596pxj; Wed, 12 May 2021 13:53:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy1+gQXHMDg6rgxrSVZllX+B1Qv/2oc506gOe6APhBO3FPAAz4PHKgdCygh0syB3zic9jDg X-Received: by 2002:a05:6e02:2189:: with SMTP id j9mr12457921ila.3.1620852793311; Wed, 12 May 2021 13:53:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620852793; cv=none; d=google.com; s=arc-20160816; b=Ox0yQY+fbzOzFyYxhz5m0p2I49PmVg7ny3jbUC2263pNBujtpCQNPPn734SC0PdbB7 4AOtQBsf0+FDCSt0OphIcEuUs57O6G1p7zYCiVd9ROZxLQQvegqVrUyutozBaM4qeG7p mztbx2RecDxOpNe1uqVWiJRi5t9RFLjg0iSsYIOsIfrIp0S5QveEWmdYYLaIOj3LLISA PzjKm0nMMk2rM4y7XVWwzFZz9uuCSTTg1gikqmViBeM5HQ0Viw2YTHBEmhF4ynhbWYVS UEfIw6/dI2KDSPIw57yNdfuUGTKFs+GVEMbxyLV7qPXKxdpzwctsQnO4yPNouwwlAj0x npRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=ZaEkJ8fGv0tA4S/kHxzfb5VSTTf5w3Mw5QxFn0WQDRI=; b=A7Z6AEyrA204fDX9gmLGBzwK8YWDTIgbAHCMxmbnK7I3FjvYOBxYFuVaxkpOCLK6Zs l/L8We3GDFWAGqwlTEouCaOVcAodPAYLzx54Wy0izb9iAKwrLMepfDyzvypUDjYLIlB7 SdqaqR4wYNcfVjag4H5S6hlOiwNx2O8W+UX/GodqFYxtSAFzEC1Y3bzb1OdtM/b9HQ54 6BveGQ9WTgJJRpTbQoavWfuydyBMyR5qK/bO4+0lYMCXI/t0Wu1DghQN6c5t0KWQsYQ+ dC1IitE+NKYq/01uo2WhiGmE/oPU23gKFLJWOZV9AYQgFXSuyuKu9yOmFflbQMNdyVY1 K9ow== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x7si1163110jat.98.2021.05.12.13.53.00; Wed, 12 May 2021 13:53:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1387853AbhELUkU (ORCPT + 99 others); Wed, 12 May 2021 16:40:20 -0400 Received: from www62.your-server.de ([213.133.104.62]:39052 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1386840AbhELUWY (ORCPT ); Wed, 12 May 2021 16:22:24 -0400 Received: from sslproxy03.your-server.de ([88.198.220.132]) by www62.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from ) id 1lgvLx-000DTY-Em; Wed, 12 May 2021 22:21:09 +0200 Received: from [85.7.101.30] (helo=linux.home) by sslproxy03.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1lgvLx-000Mnz-8N; Wed, 12 May 2021 22:21:09 +0200 Subject: Re: linux-next: Tree for May 12 (arch/x86/net/bpf_jit_comp32.o) To: Randy Dunlap , Stephen Rothwell , Linux Next Mailing List , Alexei Starovoitov , Andrii Nakryiko Cc: Linux Kernel Mailing List , "netdev@vger.kernel.org" , bpf References: <20210512175623.2687ac6f@canb.auug.org.au> <08f677a5-7634-b5d2-a532-ea6d3f35200c@infradead.org> <751025d2-9c46-a4b9-4f54-fbe5fa7a2564@infradead.org> From: Daniel Borkmann Message-ID: Date: Wed, 12 May 2021 22:21:08 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <751025d2-9c46-a4b9-4f54-fbe5fa7a2564@infradead.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.103.2/26168/Wed May 12 13:07:33 2021) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/12/21 9:26 PM, Randy Dunlap wrote: > On 5/12/21 11:53 AM, Daniel Borkmann wrote: >> On 5/12/21 8:01 PM, Randy Dunlap wrote: >>> On 5/12/21 12:56 AM, Stephen Rothwell wrote: >>> on i386: >>> >>> ld: arch/x86/net/bpf_jit_comp32.o: in function `do_jit': >>> bpf_jit_comp32.c:(.text+0x28c9): undefined reference to `__bpf_call_base' >>> ld: arch/x86/net/bpf_jit_comp32.o: in function `bpf_int_jit_compile': >>> bpf_jit_comp32.c:(.text+0x3694): undefined reference to `bpf_jit_blind_constants' >>> ld: bpf_jit_comp32.c:(.text+0x3719): undefined reference to `bpf_jit_binary_free' >>> ld: bpf_jit_comp32.c:(.text+0x3745): undefined reference to `bpf_jit_binary_alloc' >>> ld: bpf_jit_comp32.c:(.text+0x37d3): undefined reference to `bpf_jit_prog_release_other' >>> ld: kernel/extable.o: in function `search_exception_tables': >>> extable.c:(.text+0x42): undefined reference to `search_bpf_extables' >>> ld: kernel/extable.o: in function `kernel_text_address': >>> extable.c:(.text+0xee): undefined reference to `is_bpf_text_address' >>> ld: kernel/kallsyms.o: in function `kallsyms_lookup_size_offset': >>> kallsyms.c:(.text+0x254): undefined reference to `__bpf_address_lookup' >>> ld: kernel/kallsyms.o: in function `kallsyms_lookup_buildid': >>> kallsyms.c:(.text+0x2ee): undefined reference to `__bpf_address_lookup' >> >> Thanks for reporting, could you double check the following diff: >> >> diff --git a/kernel/bpf/Kconfig b/kernel/bpf/Kconfig >> index 26b591e23f16..bd04f4a44c01 100644 >> --- a/kernel/bpf/Kconfig >> +++ b/kernel/bpf/Kconfig >> @@ -37,6 +37,7 @@ config BPF_SYSCALL >> >> config BPF_JIT >>     bool "Enable BPF Just In Time compiler" >> +    depends on BPF >>     depends on HAVE_CBPF_JIT || HAVE_EBPF_JIT >>     depends on MODULES >>     help > > That's good. Thanks. Thanks, pushed fix to bpf tree.