Your message dated Thu, 20 Feb 2025 14:33:30 +0100 (CET) with message-id <20250220133330.89309BE2EE7@eldamar.lan> and subject line Closing this bug (BTS maintenance for src:linux bugs) has caused the Debian Bug report #1007864, regarding linux-source-4.19: Kernel compilation error when CONFIG_BPF_SYSCALL not set to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1007864: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007864 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: linux-source-4.19: Kernel compilation error when CONFIG_BPF_SYSCALL not set
- From: David McIntosh <david.mcintosh@gmail.com>
- Date: Thu, 17 Mar 2022 12:14:19 -0700
- Message-id: <CAPw0PDZA_5miL6h7sOA2RyVoyh+EFUFpBy_ag+rJVZxzcDuG3Q@mail.gmail.com>
Package: linux-source-4.19Version: 4.19.232-1When attempting to build the kernel without enabling CONFIG_BPF_SYSCALL I run into the following compilation error:CC arch/x86/kernel/cpu/bugs.o
arch/x86/kernel/cpu/bugs.c: In function 'spectre_v2_select_mitigation':
arch/x86/kernel/cpu/bugs.c:973:34: error: implicit declaration of function 'unprivileged_ebpf_enabled' [-Werror=implicit-function-declaration]
if (mode == SPECTRE_V2_EIBRS && unprivileged_ebpf_enabled())
^~~~~~~~~~~~~~~~~~~~~~~~~
cc1: some warnings being treated as errors
make[3]: *** [scripts/Makefile.build:309: arch/x86/kernel/cpu/bugs.o] Error 1
make[2]: *** [scripts/Makefile.build:549: arch/x86/kernel/cpu] Error 2
make[1]: *** [scripts/Makefile.build:549: arch/x86/kernel] Error 2
make: *** [Makefile:1060: arch/x86] Error 2The issue appears to be the security patches applied to include/linux/bpf.h.In the upstream version of the source the unprivileged_ebpf_enabled function has a 2nd definition that is included when CONFIG_BPF_SYSCALL is not set: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/include/linux/bpf.h?id=v4.19.234#n653In the debian version of this file the 2nd definition is present but is omitted unless CONFIG_BPF_SYSCALL is set so it's never included.
--- End Message ---
--- Begin Message ---
- To: 1007864-done@bugs.debian.org
- Cc: 1007864-submitter@bugs.debian.org
- Subject: Closing this bug (BTS maintenance for src:linux bugs)
- From: carnil@debian.org
- Date: Thu, 20 Feb 2025 14:33:30 +0100 (CET)
- Message-id: <20250220133330.89309BE2EE7@eldamar.lan>
Hi This bug was filed for a very old kernel or the bug is old itself without resolution. If you can reproduce it with - the current version in unstable/testing - the latest kernel from backports please reopen the bug, see https://www.debian.org/Bugs/server-control for details. Regards, Salvatore
--- End Message ---