Skip to content
Commit b112fb91 authored by Daniel Axtens's avatar Daniel Axtens Committed by Michael Ellerman
Browse files

powerpc: make stack walking KASAN-safe



Make our stack-walking code KASAN-safe by using __no_sanitize_address.
Generic code, arm64, s390 and x86 all make accesses unchecked for similar
sorts of reasons: when unwinding a stack, we might touch memory that KASAN
has marked as being out-of-bounds. In ppc64 KASAN development, I hit this
sometimes when checking for an exception frame - because we're checking
an arbitrary offset into the stack frame.

See commit 20955746 ("s390/kasan: avoid false positives during stack
unwind"), commit bcaf669b ("arm64: disable kasan when accessing
frame->fp in unwind_frame"), commit 91e08ab0 ("x86/dumpstack:
Prevent KASAN false positive warnings") and commit 6e22c836
("tracing, kasan: Silence Kasan warning in check_stack of stack_tracer").

Signed-off-by: default avatarDaniel Axtens <dja@axtens.net>
Signed-off-by: default avatarMichael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20210614120907.1952321-1-dja@axtens.net
parent d81090ed
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment