diff options
author | Federico Pellegrin <fede@evolware.org> | 2025-07-18 06:12:24 +0200 |
---|---|---|
committer | Namhyung Kim <namhyung@kernel.org> | 2025-07-20 20:49:35 -0700 |
commit | e9fdf0d2ecc095ce9f078588c7ce06967e0138b2 (patch) | |
tree | c26b6c1b638b31159451c73de82ead39065d27bd /tools/perf/util/scripting-engines/trace-event-python.c | |
parent | 39f473f6d0b24cf375893f2110b1cc9d8a079a42 (diff) |
perf build: Always disable stack protection for BPF skeleton objects
When the clang toolchain has stack protection enabled, the bpf
skeletons build fails with:
error: A call to built-in function '__stack_chk_fail' is not supported.
Since stack-protector makes no sense for the BPF bits, just unconditionally
disable it.
See also similar case at 878625e1c7a10dfbb1fdaaaae2c4d2a58fbce627
Signed-off-by: Federico Pellegrin <fede@evolware.org>
Link: https://lore.kernel.org/r/20250718041224.12389-1-fede@evolware.org
[ rearrange long lines ]
Signed-off-by: Namhyung Kim <namhyung@kernel.org>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions