The patch titled Subject: arm64: skip kmemleak for KASAN again has been removed from the -mm tree. Its filename was kasan-initialize-shadow-to-0xff-for-tag-based-mode-fix.patch This patch was dropped because it was folded into kasan-initialize-shadow-to-0xff-for-tag-based-mode.patch ------------------------------------------------------ From: Qian Cai <cai@xxxxxx> Subject: arm64: skip kmemleak for KASAN again Due to 871ac3d540f (kasan: initialize shadow to 0xff for tag-based mode), kmemleak is broken again with KASAN. It needs a similar fix from e55058c2983 (mm/memblock.c: skip kmemleak for kasan_init()). Link: http://lkml.kernel.org/r/20181226020550.63712-1-cai@xxxxxx Signed-off-by: Qian Cai <cai@xxxxxx> Acked-by: Andrey Konovalov <andreyknvl@xxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- --- a/arch/arm64/mm/kasan_init.c~kasan-initialize-shadow-to-0xff-for-tag-based-mode-fix +++ a/arch/arm64/mm/kasan_init.c @@ -47,8 +47,7 @@ static phys_addr_t __init kasan_alloc_ra { void *p = memblock_alloc_try_nid_raw(PAGE_SIZE, PAGE_SIZE, __pa(MAX_DMA_ADDRESS), - MEMBLOCK_ALLOC_ACCESSIBLE, - node); + MEMBLOCK_ALLOC_KASAN, node); return __pa(p); } _ Patches currently in -mm which might be from cai@xxxxxx are kasan-initialize-shadow-to-0xff-for-tag-based-mode.patch checkstackpl-dynamic-stack-growth-for-aarch64.patch