The patch titled Subject: kasan: disable stackleak plugin in report code has been added to the -mm mm-hotfixes-unstable branch. Its filename is kasan-disable-stackleak-plugin-in-report-code.patch This patch will shortly appear at https://git.kernel.org/pub/scm/linux/kernel/git/akpm/25-new.git/tree/patches/kasan-disable-stackleak-plugin-in-report-code.patch This patch will later appear in the mm-hotfixes-unstable branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next via the mm-everything branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm and is updated there every 2-3 working days ------------------------------------------------------ From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx> Subject: kasan: disable stackleak plugin in report code Date: Tue, 11 Oct 2022 12:05:48 -0700 kasan_report() has a uaccess critical section which can't have any instrumentation calls in the middle. Disable the stackleak plugin for the report code. Fixes the following warning: vmlinux.o: warning: objtool: kasan_report+0x12: call to stackleak_track_stack() with UACCESS enabled Link: https://lkml.kernel.org/r/20221011190548.blixlqj6dripitaf@treble Signed-off-by: Josh Poimboeuf <jpoimboe@xxxxxxxxxx> Reported-by: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx> Cc: Alexander Potapenko <glider@xxxxxxxxxx> Cc: Andrey Konovalov <andreyknvl@xxxxxxxxxx> Cc: Peter Zijlstra <peterz@xxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- mm/kasan/Makefile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/mm/kasan/Makefile~kasan-disable-stackleak-plugin-in-report-code +++ a/mm/kasan/Makefile @@ -27,7 +27,7 @@ CFLAGS_common.o := $(CC_FLAGS_KASAN_RUNT CFLAGS_generic.o := $(CC_FLAGS_KASAN_RUNTIME) CFLAGS_init.o := $(CC_FLAGS_KASAN_RUNTIME) CFLAGS_quarantine.o := $(CC_FLAGS_KASAN_RUNTIME) -CFLAGS_report.o := $(CC_FLAGS_KASAN_RUNTIME) +CFLAGS_report.o := $(CC_FLAGS_KASAN_RUNTIME) $(DISABLE_STACKLEAK_PLUGIN) CFLAGS_report_generic.o := $(CC_FLAGS_KASAN_RUNTIME) CFLAGS_report_hw_tags.o := $(CC_FLAGS_KASAN_RUNTIME) CFLAGS_report_sw_tags.o := $(CC_FLAGS_KASAN_RUNTIME) _ Patches currently in -mm which might be from jpoimboe@xxxxxxxxxx are kasan-disable-stackleak-plugin-in-report-code.patch