[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1007864: marked as done (linux-source-4.19: Kernel compilation error when CONFIG_BPF_SYSCALL not set)



Your message dated Thu, 20 Feb 2025 14:33:30 +0100 (CET)
with message-id <20250220133330.89309BE2EE7@eldamar.lan>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #1007864,
regarding linux-source-4.19: Kernel compilation error when CONFIG_BPF_SYSCALL not set
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1007864: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007864
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-source-4.19
Version: 4.19.232-1

When attempting to build the kernel without enabling CONFIG_BPF_SYSCALL I run into the following compilation error:

  CC      arch/x86/kernel/cpu/bugs.o
arch/x86/kernel/cpu/bugs.c: In function 'spectre_v2_select_mitigation':
arch/x86/kernel/cpu/bugs.c:973:34: error: implicit declaration of function 'unprivileged_ebpf_enabled' [-Werror=implicit-function-declaration]
  if (mode == SPECTRE_V2_EIBRS && unprivileged_ebpf_enabled())
                                  ^~~~~~~~~~~~~~~~~~~~~~~~~
cc1: some warnings being treated as errors
make[3]: *** [scripts/Makefile.build:309: arch/x86/kernel/cpu/bugs.o] Error 1
make[2]: *** [scripts/Makefile.build:549: arch/x86/kernel/cpu] Error 2
make[1]: *** [scripts/Makefile.build:549: arch/x86/kernel] Error 2
make: *** [Makefile:1060: arch/x86] Error 2

The issue appears to be the security patches applied to include/linux/bpf.h.

In the upstream version of the source the unprivileged_ebpf_enabled function has a 2nd definition that is included when CONFIG_BPF_SYSCALL is not set: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/include/linux/bpf.h?id=v4.19.234#n653

In the debian version of this file the 2nd definition is present but is omitted unless CONFIG_BPF_SYSCALL is set so it's never included.

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply to: