Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1587376ybv; Thu, 20 Feb 2020 23:48:47 -0800 (PST) X-Google-Smtp-Source: APXvYqzIShOrYu91DGRIOzyc5ykqfrG+Nx+u2WYgGHvuS/TmVoon9UyMK4cjJPIbDmjOwjhJ28NV X-Received: by 2002:a9d:20a:: with SMTP id 10mr26131723otb.319.1582271327346; Thu, 20 Feb 2020 23:48:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582271327; cv=none; d=google.com; s=arc-20160816; b=hti8kdiJO/g8BpTBAtpuPOhpGl3p+oV7lBm86fneNH5r+KRy9m0Ug3ObJZ+j98u8kd qA7NRHae8SToww9/e35YAjMaBX9cO2JhzRn7DOyECR67lmsfaJ9GlF2gEcWIM9tzMWjs fshjqZXPmgwVQnnMaDFbr9lE05b+erNnKjhHPvCV/m/D+7vYyUDowa4dUK56jIQW56e0 BnRN9AHBeKu8mtVkH1clif3jdJeXvhAfGpvyZCjEivkQSvSser2HICB4FkxdLuOSMPVY 7CGOso/iuGi3m1oGwmErx8E9WarvKP55KKSfyHMEno4KAKquHrY1FuSShACFvWfibkAH Rseg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fkNMCxlFW6wZskVyc1aDn7sQI+7zEjcS/amZYNQ1K8g=; b=aSGLO3KxnBCihOsno/T9R0OH3R7mKS6iABYnX2Z27osLUjwooJ40kwpdgxi/I0p96e LA/fjtKYDifgIHMEBiINyQAHLjNcY+rMaa+hFBHsgdYDUZH7CJKaiYbnPEvsLErCU2PB 45Sql+Z0He11HM4r1GGkYyLGECfQ46D2JoIJGMMKLQd1GoHokXQLh+iqLUe2FNlXEB/w q9EfnsoVwU0j420KAernn4EUKhujww2CA/yBlp28AQgOAifTCnk0NrHhpSqBoVZuDGoX eLI0o7+sX/au6tW6u6urVCg8CU1/VFQ4C15vcB83cgQSN4rmWAsHykQxPmEi8qacvDL2 vxyQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TNysK6Cf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v18si399189oic.188.2020.02.20.23.48.35; Thu, 20 Feb 2020 23:48:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TNysK6Cf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727616AbgBUHrI (ORCPT + 99 others); Fri, 21 Feb 2020 02:47:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:42766 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728829AbgBUHrC (ORCPT ); Fri, 21 Feb 2020 02:47:02 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 35A5524676; Fri, 21 Feb 2020 07:47:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582271221; bh=YHz7O6G/jmkaVCvMuEpPsNeQD/iCyedN0ScyPG8tI5s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TNysK6CfZxjRTIM3lkvUxMnOlLkVA2YYGCGGHVsXRbxG7HqnCp4lYr85+b8CMExQ6 5o21D+RVDjecB6iv3KlRw/ngGuLcF86uJargXyWzg6ryRfWTXUs7U5nT7wvTTcefBq zjyVi8PKu50Ro4UN7lirxjMqk6eSVLQLjhEYr3Qw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vincenzo Frascino , Russell King , Sasha Levin Subject: [PATCH 5.5 085/399] ARM: 8952/1: Disable kmemleak on XIP kernels Date: Fri, 21 Feb 2020 08:36:50 +0100 Message-Id: <20200221072410.601248586@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072402.315346745@linuxfoundation.org> References: <20200221072402.315346745@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vincenzo Frascino [ Upstream commit bc420c6ceefbb86cbbc8c00061bd779c17fa6997 ] Kmemleak relies on specific symbols to register the read only data during init (e.g. __start_ro_after_init). Trying to build an XIP kernel on arm results in the linking error reported below because when this option is selected read only data after init are not allowed since .data is read only (.rodata). arm-linux-gnueabihf-ld: mm/kmemleak.o: in function `kmemleak_init': kmemleak.c:(.init.text+0x148): undefined reference to `__end_ro_after_init' arm-linux-gnueabihf-ld: kmemleak.c:(.init.text+0x14c): undefined reference to `__end_ro_after_init' arm-linux-gnueabihf-ld: kmemleak.c:(.init.text+0x150): undefined reference to `__start_ro_after_init' arm-linux-gnueabihf-ld: kmemleak.c:(.init.text+0x156): undefined reference to `__start_ro_after_init' arm-linux-gnueabihf-ld: kmemleak.c:(.init.text+0x162): undefined reference to `__start_ro_after_init' arm-linux-gnueabihf-ld: kmemleak.c:(.init.text+0x16a): undefined reference to `__start_ro_after_init' linux/Makefile:1078: recipe for target 'vmlinux' failed Fix the issue enabling kmemleak only on non XIP kernels. Signed-off-by: Vincenzo Frascino Signed-off-by: Russell King Signed-off-by: Sasha Levin --- arch/arm/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm/Kconfig b/arch/arm/Kconfig index 96dab76da3b39..2c3a9fd05f571 100644 --- a/arch/arm/Kconfig +++ b/arch/arm/Kconfig @@ -74,7 +74,7 @@ config ARM select HAVE_CONTEXT_TRACKING select HAVE_COPY_THREAD_TLS select HAVE_C_RECORDMCOUNT - select HAVE_DEBUG_KMEMLEAK + select HAVE_DEBUG_KMEMLEAK if !XIP_KERNEL select HAVE_DMA_CONTIGUOUS if MMU select HAVE_DYNAMIC_FTRACE if !XIP_KERNEL && !CPU_ENDIAN_BE32 && MMU select HAVE_DYNAMIC_FTRACE_WITH_REGS if HAVE_DYNAMIC_FTRACE -- 2.20.1