[folded-merged] kasan-initialize-shadow-to-0xff-for-tag-based-mode-fix.patch removed from -mm tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The patch titled
     Subject: arm64: skip kmemleak for KASAN again
has been removed from the -mm tree.  Its filename was
     kasan-initialize-shadow-to-0xff-for-tag-based-mode-fix.patch

This patch was dropped because it was folded into kasan-initialize-shadow-to-0xff-for-tag-based-mode.patch

------------------------------------------------------
From: Qian Cai <cai@xxxxxx>
Subject: arm64: skip kmemleak for KASAN again

Due to 871ac3d540f (kasan: initialize shadow to 0xff for tag-based mode),
kmemleak is broken again with KASAN.  It needs a similar fix from
e55058c2983 (mm/memblock.c: skip kmemleak for kasan_init()).

Link: http://lkml.kernel.org/r/20181226020550.63712-1-cai@xxxxxx
Signed-off-by: Qian Cai <cai@xxxxxx>
Acked-by: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
---


--- a/arch/arm64/mm/kasan_init.c~kasan-initialize-shadow-to-0xff-for-tag-based-mode-fix
+++ a/arch/arm64/mm/kasan_init.c
@@ -47,8 +47,7 @@ static phys_addr_t __init kasan_alloc_ra
 {
 	void *p = memblock_alloc_try_nid_raw(PAGE_SIZE, PAGE_SIZE,
 						__pa(MAX_DMA_ADDRESS),
-						MEMBLOCK_ALLOC_ACCESSIBLE,
-						node);
+						MEMBLOCK_ALLOC_KASAN, node);
 	return __pa(p);
 }
 
_

Patches currently in -mm which might be from cai@xxxxxx are

kasan-initialize-shadow-to-0xff-for-tag-based-mode.patch
checkstackpl-dynamic-stack-growth-for-aarch64.patch




[Index of Archives]     [Kernel Archive]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]

  Powered by Linux