mm: kmemleak: scan .data.ro_after_init
authorJakub Kicinski <[email protected]>
Thu, 10 Nov 2016 18:46:44 +0000 (10:46 -0800)
committerLinus Torvalds <[email protected]>
Fri, 11 Nov 2016 16:12:37 +0000 (08:12 -0800)
commitd7c19b066dcf4bd19c4385e8065558d4e74f9e73
treebd0185782655c900a4fafd1f51219d46905c943b
parentf773e36de3d77c4000ca914c9d146f55f2fd51e8
mm: kmemleak: scan .data.ro_after_init

Limit the number of kmemleak false positives by including
.data.ro_after_init in memory scanning.  To achieve this we need to add
symbols for start and end of the section to the linker scripts.

The problem was been uncovered by commit 56989f6d8568 ("genetlink: mark
families as __ro_after_init").

Link: http://lkml.kernel.org/r/[email protected]
Reviewed-by: Catalin Marinas <[email protected]>
Signed-off-by: Jakub Kicinski <[email protected]>
Cc: Arnd Bergmann <[email protected]>
Cc: Cong Wang <[email protected]>
Cc: Johannes Berg <[email protected]>
Cc: Martin Schwidefsky <[email protected]>
Cc: Heiko Carstens <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
arch/s390/kernel/vmlinux.lds.S
include/asm-generic/sections.h
include/asm-generic/vmlinux.lds.h
mm/kmemleak.c