Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1615032ybv; Fri, 21 Feb 2020 00:19:40 -0800 (PST) X-Google-Smtp-Source: APXvYqyVCkwo0Wp58yCirNSWoRWPnI4Tp/s83/yv0XYl44FljZZ5q5WQReucw7Q6VhBkwuLgeRD6 X-Received: by 2002:aca:ba55:: with SMTP id k82mr992366oif.94.1582273180383; Fri, 21 Feb 2020 00:19:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582273180; cv=none; d=google.com; s=arc-20160816; b=MGR+W8sBx16aWyGvA9dkzCrISmbcNMP9GHlP/OUz+XDLjAIEk2+OTz5+0F50vHYRXd NZQWneAXG/JDjEfGBi+TOg/fqQDr1SdENKSIIjc6Uz706kcj0GTrDXKnAuhT7DXPZFxB SOj6TA69VZ+i9RnX7Sv7TLWaEk9Rd2jYLQKAjSApgc5vKkZqLM+J78yFocvacS0gpxM9 yucz+yFZVbDPPYsc9kj8F9hJ5pe9j6H57XGJnon+m2fNa1exsI5VcrMMrC69QDu7aBhm 6/Gb1s3XNllx+2e8afuuFvvbCn2HUDjYkOwciUfu72KLbRnKl5H603u2CiU6NVeuw/Qh 7FnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mVhyeioUs6/CzcFBg4L1onc9qnGqAiddZZK+AOQ+KFE=; b=Ekdt0Y0ei5zHc9xe+lxHM0M1b6jVy7rFQtw9Yamok77STLA+D8BDC21uqm+BxL/l9l tONUJ1LzMFWEmoKVzufNeNriMGjMJE3nRt4gVMbiw/55h68RoemuBanviLvoU+d3cTqx hvF7xM0+qlgDX/XfHQXt6TvuHhrHZwDYQk1Ir1WRY9tfrj7ZeFdJ5tx+4L+f37xi+jdE Q/fUNYxakU0j5z9fENNIjUUSNuLEwndcROf3IN2QYTvaWqFzQAGdndqmNORY4+cmG1rG YSqRmFAmomnHas4NmNy7n+rSK00VkB+Di9SLy4LekKrf0B3N6by+HUOXcdSAHNwc0si2 4kcA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ir0RE0xx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x207si436505oif.193.2020.02.21.00.19.28; Fri, 21 Feb 2020 00:19:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ir0RE0xx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387811AbgBUISS (ORCPT + 99 others); Fri, 21 Feb 2020 03:18:18 -0500 Received: from mail.kernel.org ([198.145.29.99]:56090 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387795AbgBUISO (ORCPT ); Fri, 21 Feb 2020 03:18:14 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8F3F424696; Fri, 21 Feb 2020 08:18:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582273094; bh=lWAgD2Omqn54//9A3l2dvEl/1ZU//HbLZ4rJgI2VEQo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ir0RE0xxBVWS9cvQs/S3Kuohn0DEmTbT8+qFKs3a0Wb343Gn11ar1Rm5R1sHTQXXz 8cWSp0RK/hLXxQOCN0tOWW9XF31iP4+496VaCOqWz7mbBCiqSX91MCZzp1FHlp9KJn ykwhgbm/5DbrAiU0S22YbJ0p00euE70K7na1fCv0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vincenzo Frascino , Russell King , Sasha Levin Subject: [PATCH 4.19 043/191] ARM: 8952/1: Disable kmemleak on XIP kernels Date: Fri, 21 Feb 2020 08:40:16 +0100 Message-Id: <20200221072257.058524321@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072250.732482588@linuxfoundation.org> References: <20200221072250.732482588@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vincenzo Frascino [ Upstream commit bc420c6ceefbb86cbbc8c00061bd779c17fa6997 ] Kmemleak relies on specific symbols to register the read only data during init (e.g. __start_ro_after_init). Trying to build an XIP kernel on arm results in the linking error reported below because when this option is selected read only data after init are not allowed since .data is read only (.rodata). arm-linux-gnueabihf-ld: mm/kmemleak.o: in function `kmemleak_init': kmemleak.c:(.init.text+0x148): undefined reference to `__end_ro_after_init' arm-linux-gnueabihf-ld: kmemleak.c:(.init.text+0x14c): undefined reference to `__end_ro_after_init' arm-linux-gnueabihf-ld: kmemleak.c:(.init.text+0x150): undefined reference to `__start_ro_after_init' arm-linux-gnueabihf-ld: kmemleak.c:(.init.text+0x156): undefined reference to `__start_ro_after_init' arm-linux-gnueabihf-ld: kmemleak.c:(.init.text+0x162): undefined reference to `__start_ro_after_init' arm-linux-gnueabihf-ld: kmemleak.c:(.init.text+0x16a): undefined reference to `__start_ro_after_init' linux/Makefile:1078: recipe for target 'vmlinux' failed Fix the issue enabling kmemleak only on non XIP kernels. Signed-off-by: Vincenzo Frascino Signed-off-by: Russell King Signed-off-by: Sasha Levin --- arch/arm/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm/Kconfig b/arch/arm/Kconfig index 185e552f14610..9f03befdfbf06 100644 --- a/arch/arm/Kconfig +++ b/arch/arm/Kconfig @@ -61,7 +61,7 @@ config ARM select HAVE_EBPF_JIT if !CPU_ENDIAN_BE32 select HAVE_CONTEXT_TRACKING select HAVE_C_RECORDMCOUNT - select HAVE_DEBUG_KMEMLEAK + select HAVE_DEBUG_KMEMLEAK if !XIP_KERNEL select HAVE_DMA_CONTIGUOUS if MMU select HAVE_DYNAMIC_FTRACE if (!XIP_KERNEL) && !CPU_ENDIAN_BE32 && MMU select HAVE_DYNAMIC_FTRACE_WITH_REGS if HAVE_DYNAMIC_FTRACE -- 2.20.1