summaryrefslogtreecommitdiffstats
path: root/samples
diff options
context:
space:
mode:
authorToke Høiland-Jørgensen <toke@redhat.com>2019-12-16 11:38:19 +0100
committerAlexei Starovoitov <ast@kernel.org>2019-12-16 07:03:12 -0800
commit450278977acbf494a20367c22fbb38729772d1fc (patch)
tree2102b52a97c2a2ad6d167a3269ed394df385826a /samples
parent5615ed472dc04e38a1affca69059f17c1178f770 (diff)
downloadlinux-stable-450278977acbf494a20367c22fbb38729772d1fc.tar.gz
linux-stable-450278977acbf494a20367c22fbb38729772d1fc.tar.bz2
linux-stable-450278977acbf494a20367c22fbb38729772d1fc.zip
samples/bpf: Set -fno-stack-protector when building BPF programs
It seems Clang can in some cases turn on stack protection by default, which doesn't work with BPF. This was reported once before[0], but it seems the flag to explicitly turn off the stack protector wasn't added to the Makefile, so do that now. The symptom of this is compile errors like the following: error: <unknown>:0:0: in function bpf_prog1 i32 (%struct.__sk_buff*): A call to built-in function '__stack_chk_fail' is not supported. [0] https://www.spinics.net/lists/netdev/msg556400.html Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Link: https://lore.kernel.org/bpf/20191216103819.359535-1-toke@redhat.com
Diffstat (limited to 'samples')
-rw-r--r--samples/bpf/Makefile1
1 files changed, 1 insertions, 0 deletions
diff --git a/samples/bpf/Makefile b/samples/bpf/Makefile
index 227077ae66ed..5b89c0370f33 100644
--- a/samples/bpf/Makefile
+++ b/samples/bpf/Makefile
@@ -236,6 +236,7 @@ BTF_LLVM_PROBE := $(shell echo "int main() { return 0; }" | \
readelf -S ./llvm_btf_verify.o | grep BTF; \
/bin/rm -f ./llvm_btf_verify.o)
+BPF_EXTRA_CFLAGS += -fno-stack-protector
ifneq ($(BTF_LLVM_PROBE),)
BPF_EXTRA_CFLAGS += -g
else