The quilt patch titled Subject: mm-kasan-kmsan-copy_from-to_kernel_nofault-fix has been removed from the -mm tree. Its filename was mm-kasan-kmsan-copy_from-to_kernel_nofault-fix.patch This patch was dropped because it was folded into mm-kasan-kmsan-copy_from-to_kernel_nofault.patch ------------------------------------------------------ From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> Subject: mm-kasan-kmsan-copy_from-to_kernel_nofault-fix Date: Tue Oct 15 04:53:38 PM PDT 2024 fix comment layout, per checkpatch Cc: Alexander Potapenko <glider@xxxxxxxxxx> Cc: Andrey Konovalov <andreyknvl@xxxxxxxxx> Cc: Andrey Ryabinin <ryabinin.a.a@xxxxxxxxx> Cc: Dmitry Vyukov <dvyukov@xxxxxxxxxx> Cc: Marco Elver <elver@xxxxxxxxxx> Cc: Sabyrzhan Tasbolatov <snovitoll@xxxxxxxxx> Cc: Vincenzo Frascino <vincenzo.frascino@xxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- mm/kasan/kasan_test_c.c | 26 ++++++++++++++------------ 1 file changed, 14 insertions(+), 12 deletions(-) --- a/mm/kasan/kasan_test_c.c~mm-kasan-kmsan-copy_from-to_kernel_nofault-fix +++ a/mm/kasan/kasan_test_c.c @@ -1934,8 +1934,10 @@ static void copy_to_kernel_nofault_oob(s char buf[128]; size_t size = sizeof(buf); - /* This test currently fails with the HW_TAGS mode. - * The reason is unknown and needs to be investigated. */ + /* + * This test currently fails with the HW_TAGS mode. The reason is + * unknown and needs to be investigated. + */ KASAN_TEST_NEEDS_CONFIG_OFF(test, CONFIG_KASAN_HW_TAGS); ptr = kmalloc(size - KASAN_GRANULE_SIZE, GFP_KERNEL); @@ -1943,16 +1945,16 @@ static void copy_to_kernel_nofault_oob(s OPTIMIZER_HIDE_VAR(ptr); /* - * We test copy_to_kernel_nofault() to detect corrupted memory that is - * being written into the kernel. In contrast, copy_from_kernel_nofault() - * is primarily used in kernel helper functions where the source address - * might be random or uninitialized. Applying KASAN instrumentation to - * copy_from_kernel_nofault() could lead to false positives. - * By focusing KASAN checks only on copy_to_kernel_nofault(), - * we ensure that only valid memory is written to the kernel, - * minimizing the risk of kernel corruption while avoiding - * false positives in the reverse case. - */ + * We test copy_to_kernel_nofault() to detect corrupted memory that is + * being written into the kernel. In contrast, + * copy_from_kernel_nofault() is primarily used in kernel helper + * functions where the source address might be random or uninitialized. + * Applying KASAN instrumentation to copy_from_kernel_nofault() could + * lead to false positives. By focusing KASAN checks only on + * copy_to_kernel_nofault(), we ensure that only valid memory is + * written to the kernel, minimizing the risk of kernel corruption + * while avoiding false positives in the reverse case. + */ KUNIT_EXPECT_KASAN_FAIL(test, copy_to_kernel_nofault(&buf[0], ptr, size)); KUNIT_EXPECT_KASAN_FAIL(test, _ Patches currently in -mm which might be from akpm@xxxxxxxxxxxxxxxxxxxx are mm-page_alloc-keep-track-of-free-highatomic-fix.patch mm-refactor-arch_calc_vm_flag_bits-and-arm64-mte-handling-fix.patch mm-fix-__wp_page_copy_user-fallback-path-for-remote-mm-fix.patch mm-memoryc-remove-stray-newline-at-top-of-file.patch mm-kasan-kmsan-copy_from-to_kernel_nofault.patch alloc_tag-load-module-tags-into-separate-contiguous-memory-fix-fix.patch tools-mm-free-the-allocated-memory-fix.patch memcg-v1-no-need-for-memcg-locking-for-mglru-fix.patch mm-vma-the-pgoff-is-correct-if-can_merge_right-fix.patch memcg-workingset-remove-folio_memcg_rcu-usage-fix.patch bootmem-stop-using-page-index-fix.patch vma-detect-infinite-loop-in-vma-tree-fix.patch maple_tree-add-a-test-checking-storing-null-fix.patch fs-proc-kcorec-fix-coccinelle-reported-error-instances-fix.patch