When debugging a relocated kernel, the addresses of the relocated symbols and the offset applied is essential information. If the kernel is compiled with debugging information, then print this information during bootup using the same function as the panic notifer. Signed-off-by: Matt Redfearn <matt.redfearn@xxxxxxxxxx> --- Changes in v2: None arch/mips/kernel/setup.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/arch/mips/kernel/setup.c b/arch/mips/kernel/setup.c index d8376d7b3345..ae71f8d9b555 100644 --- a/arch/mips/kernel/setup.c +++ b/arch/mips/kernel/setup.c @@ -477,9 +477,18 @@ static void __init bootmem_init(void) */ if (__pa_symbol(_text) > __pa_symbol(VMLINUX_LOAD_ADDRESS)) { unsigned long offset; + extern void show_kernel_relocation(const char *level); offset = __pa_symbol(_text) - __pa_symbol(VMLINUX_LOAD_ADDRESS); free_bootmem(__pa_symbol(VMLINUX_LOAD_ADDRESS), offset); + +#if (defined CONFIG_DEBUG_KERNEL) && (defined CONFIG_DEBUG_INFO) + /* + * This information is necessary when debugging the kernel + * But is a security vulnerability otherwise! + */ + show_kernel_relocation(KERN_INFO); +#endif } #endif -- 2.5.0