Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp951735ybn; Wed, 25 Sep 2019 10:02:38 -0700 (PDT) X-Google-Smtp-Source: APXvYqzZOg/elHZ3+3Tq+BvbFK+5zuoHplb+B5bORAbBy3seY+VYUHGnAH8GcyPRR8QxdnjhkSGx X-Received: by 2002:a50:fa09:: with SMTP id b9mr4090505edq.165.1569430957987; Wed, 25 Sep 2019 10:02:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569430957; cv=none; d=google.com; s=arc-20160816; b=KYL5gONxI4FWyny2a66DM5Zzc1rDuszHli1uufb4Gdp5zoBvFpWTjTZUSD4339qw47 iLtZjDY3qZgMRT/WLnNawoQ2W+OPLU9hbl7GSpSZu/C8JVohQEfyZUa8Nk7jGvUfoVXo 3GbX43NG0x9ne4VfmSdmKOlq/zOjn4ehdeRxOermzsXECVZqTaDifOtDxvRvpcdUDUQE TFkFGSG4eJipz+gb55fgY5o7HKd/nG5PVIS/iOe9VaNB08EJflMy3LcLz7ECmJTypoTG hneg0fORk19xkA68C9ByWSb35qLr+UFSbZP4XIt6o/t/1+6tk5qd4cgRhbefQl+ZqFxV /Hgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :robot-unsubscribe:robot-id:message-id:mime-version:references :in-reply-to:cc:subject:to:reply-to:from:date; bh=LPXisKvIQyxVGLKLva3anOUj+nGPvBPRQLo/5lP6pRI=; b=FOS/K6u3s771UdZDxFycSzkYG82L9ObGzBeCOBgOsvkkWHpC/20/CB7vlof0qik+l7 CQ9TIyilKlRNfTadqg0E6vwhbzc11sZje4HfhqzWNXnffcSXhiKEZLniNT2PKleEXvOW dqFFf2mE1PA9YvXie7eE5+oIepRNldGEBmPMQ5Cig4Wy1i1sRUCND/FzLUZ5FJnYm0g5 ep1NB3F51rz3qFvcK/t/mXvCJg7ivC+t+oBhbfERuREC0f+CC1wQ8ahSjclvf5gdigeY UCJnetBIhqA0QwG1kWp5TUr+Dh4X8NbN7ow7QH2B4XrD10s8nKBN4DQ4JeUas6grJboO 2Czw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id gg17si57626ejb.294.2019.09.25.10.02.14; Wed, 25 Sep 2019 10:02:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2502194AbfIWRwy (ORCPT + 99 others); Mon, 23 Sep 2019 13:52:54 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:59281 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2502167AbfIWRww (ORCPT ); Mon, 23 Sep 2019 13:52:52 -0400 Received: from [5.158.153.53] (helo=tip-bot2.lab.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1iCSVw-0002Ku-Mm; Mon, 23 Sep 2019 19:52:44 +0200 Received: from [127.0.1.1] (localhost [IPv6:::1]) by tip-bot2.lab.linutronix.de (Postfix) with ESMTP id 45A451C04A9; Mon, 23 Sep 2019 19:52:44 +0200 (CEST) Date: Mon, 23 Sep 2019 17:52:44 -0000 From: "tip-bot2 for Arvind Sankar" Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/urgent] x86/purgatory: Disable the stackleak GCC plugin for the purgatory Cc: Arvind Sankar , Nick Desaulniers , Borislav Petkov , "H. Peter Anvin" , Linus Torvalds , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , linux-kernel@vger.kernel.org In-Reply-To: <20190923171753.GA2252517@rani.riverdale.lan> References: <20190923171753.GA2252517@rani.riverdale.lan> MIME-Version: 1.0 Message-ID: <156926116417.4511.12565628052114033194.tip-bot2@tip-bot2> X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following commit has been merged into the x86/urgent branch of tip: Commit-ID: ca14c996afe7228ff9b480cf225211cc17212688 Gitweb: https://git.kernel.org/tip/ca14c996afe7228ff9b480cf225211cc17212688 Author: Arvind Sankar AuthorDate: Mon, 23 Sep 2019 13:17:54 -04:00 Committer: Ingo Molnar CommitterDate: Mon, 23 Sep 2019 19:48:02 +02:00 x86/purgatory: Disable the stackleak GCC plugin for the purgatory Since commit: b059f801a937 ("x86/purgatory: Use CFLAGS_REMOVE rather than reset KBUILD_CFLAGS") kexec breaks if GCC_PLUGIN_STACKLEAK=y is enabled, as the purgatory contains undefined references to stackleak_track_stack. Attempting to load a kexec kernel results in this failure: kexec: Undefined symbol: stackleak_track_stack kexec-bzImage64: Loading purgatory failed Fix this by disabling the stackleak plugin for the purgatory. Signed-off-by: Arvind Sankar Reviewed-by: Nick Desaulniers Cc: Borislav Petkov Cc: H. Peter Anvin Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Fixes: b059f801a937 ("x86/purgatory: Use CFLAGS_REMOVE rather than reset KBUILD_CFLAGS") Link: https://lkml.kernel.org/r/20190923171753.GA2252517@rani.riverdale.lan Signed-off-by: Ingo Molnar --- arch/x86/purgatory/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/purgatory/Makefile b/arch/x86/purgatory/Makefile index 10fb42d..b81b517 100644 --- a/arch/x86/purgatory/Makefile +++ b/arch/x86/purgatory/Makefile @@ -23,6 +23,7 @@ KCOV_INSTRUMENT := n PURGATORY_CFLAGS_REMOVE := -mcmodel=kernel PURGATORY_CFLAGS := -mcmodel=large -ffreestanding -fno-zero-initialized-in-bss +PURGATORY_CFLAGS += $(DISABLE_STACKLEAK_PLUGIN) # Default KBUILD_CFLAGS can have -pg option set when FTRACE is enabled. That # in turn leaves some undefined symbols like __fentry__ in purgatory and not