The patch titled Subject: mm-kasan-introduce-__kasan_check_readwrite-v5 has been added to the -mm tree. Its filename is mm-kasan-introduce-__kasan_check_readwrite-v5.patch This patch should soon appear at http://ozlabs.org/~akpm/mmots/broken-out/mm-kasan-introduce-__kasan_check_readwrite-v5.patch and later at http://ozlabs.org/~akpm/mmotm/broken-out/mm-kasan-introduce-__kasan_check_readwrite-v5.patch Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next and is updated there every 3-4 working days ------------------------------------------------------ From: Marco Elver <elver@xxxxxxxxxx> Subject: mm-kasan-introduce-__kasan_check_readwrite-v5 Use #define for kasan_check_* in the __SANITIZE_ADDRESS__ case, as the inline functions conflict with the __no_sanitize_address attribute. Link: http://lkml.kernel.org/r/20190708170706.174189-2-elver@xxxxxxxxxx Signed-off-by: Marco Elver <elver@xxxxxxxxxx> Acked-by: Mark Rutland <mark.rutland@xxxxxxx> Reported-by: kbuild test robot <lkp@xxxxxxxxx> Cc: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx> Cc: Dmitry Vyukov <dvyukov@xxxxxxxxxx> Cc: Alexander Potapenko <glider@xxxxxxxxxx> Cc: Andrey Konovalov <andreyknvl@xxxxxxxxxx> Cc: Christoph Lameter <cl@xxxxxxxxx> Cc: Pekka Enberg <penberg@xxxxxxxxxx> Cc: David Rientjes <rientjes@xxxxxxxxxx> Cc: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx> Cc: Mark Rutland <mark.rutland@xxxxxxx> Cc: Qian Cai <cai@xxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- include/linux/kasan-checks.h | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) --- a/include/linux/kasan-checks.h~mm-kasan-introduce-__kasan_check_readwrite-v5 +++ a/include/linux/kasan-checks.h @@ -22,14 +22,8 @@ static inline void __kasan_check_write(c * instrumentation enabled. May be used in header files. */ #ifdef __SANITIZE_ADDRESS__ -static inline void kasan_check_read(const volatile void *p, unsigned int size) -{ - __kasan_check_read(p, size); -} -static inline void kasan_check_write(const volatile void *p, unsigned int size) -{ - __kasan_check_read(p, size); -} +#define kasan_check_read __kasan_check_read +#define kasan_check_write __kasan_check_write #else static inline void kasan_check_read(const volatile void *p, unsigned int size) { } _ Patches currently in -mm which might be from elver@xxxxxxxxxx are mm-kasan-print-frame-description-for-stack-bugs.patch lib-test_kasan-add-bitops-tests.patch x86-use-static_cpu_has-in-uaccess-region-to-avoid-instrumentation.patch asm-generic-x86-add-bitops-instrumentation-for-kasan.patch mm-kasan-introduce-__kasan_check_readwrite.patch mm-kasan-introduce-__kasan_check_readwrite-v5.patch mm-kasan-change-kasan_check_readwrite-to-return-boolean.patch lib-test_kasan-add-test-for-double-kzfree-detection.patch mm-slab-refactor-common-ksize-kasan-logic-into-slab_commonc.patch mm-kasan-add-object-validation-in-ksize.patch mm-kasan-add-object-validation-in-ksize-v4.patch