Patch Series

Subject mm/kasan: make kasan=on|off work for all three modes
Author bhe@redhat.com
Date 2025-11-28 03:33:09 +0000 UTC
Version 4
Cc akpm@linux-foundation.org andreyknvl@gmail.com bhe@redhat.com chris@zankel.net christophe.leroy@csgroup.eu dvyukov@google.com elver@google.com glider@google.com jcmvbkbc@gmail.com kasan-dev@googlegroups.com kexec@lists.infradead.org linux-arm-kernel@lists.infradead.org linux-kernel@vger.kernel.org linux-mm@kvack.org linux-riscv@lists.infradead.org linux-um@lists.infradead.org linuxppc-dev@lists.ozlabs.org loongarch@lists.linux.dev lorenzo.stoakes@oracle.com ryabinin.a.a@gmail.com sj@kernel.org snovitoll@gmail.com vincenzo.frascino@arm.com x86@kernel.org

Patches (12)

Name Content [All]
[PATCH v4 01/12] mm/kasan: add conditional checks in functions to return directly if kasan is disabled [Body]
[PATCH v4 02/12] mm/kasan: move kasan= code to common place [Body]
[PATCH v4 03/12] mm/kasan/sw_tags: don't initialize kasan if it's disabled [Body]
[PATCH v4 04/12] arch/arm: don't initialize kasan if it's disabled [Body]
[PATCH v4 05/12] arch/arm64: don't initialize kasan if it's disabled [Body]
[PATCH v4 06/12] arch/loongarch: don't initialize kasan if it's disabled [Body]
[PATCH v4 07/12] arch/powerpc: don't initialize kasan if it's disabled [Body]
[PATCH v4 08/12] arch/riscv: don't initialize kasan if it's disabled [Body]
[PATCH v4 09/12] arch/x86: don't initialize kasan if it's disabled [Body]
[PATCH v4 10/12] arch/xtensa: don't initialize kasan if it's disabled [Body]
[PATCH v4 11/12] arch/um: don't initialize kasan if it's disabled [Body]
[PATCH v4 12/12] mm/kasan: make kasan=on|off take effect for all three modes [Body]

Session 2025-11-28

ID (for dev) ea0ca7f0-66cb-409e-baee-1e00f4424398
Status in progress
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 8ad78d36c2877966b6a5507987ae072b5b8456c0 [Config] passed [Log]
[KASAN] Boot test: Base 8ad78d36c2877966b6a5507987ae072b5b8456c0 [Config] passed [Log]
[KASAN] Build Patched 8ad78d36c2877966b6a5507987ae072b5b8456c0 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 8ad78d36c2877966b6a5507987ae072b5b8456c0 [Config] [patched] passed [Log]
[KASAN] Fuzzing 8ad78d36c2877966b6a5507987ae072b5b8456c0 [Config] 8ad78d36c2877966b6a5507987ae072b5b8456c0 [Config] [patched] running [Log] [Artifacts]