Re: [PATCH 09/13] powerpc: Disable KMSAN checks on functions which walk the stack

2024-01-09 Thread Nicholas Miehlbradt
On 14/12/2023 8:00 pm, Christophe Leroy wrote: Le 14/12/2023 à 06:55, Nicholas Miehlbradt a écrit : Functions which walk the stack read parts of the stack which cannot be instrumented by KMSAN e.g. the backchain. Disable KMSAN sanitization of these functions to prevent false positives. Do

Re: [PATCH 09/13] powerpc: Disable KMSAN checks on functions which walk the stack

2023-12-15 Thread Aneesh Kumar K . V
Nicholas Miehlbradt writes: > Functions which walk the stack read parts of the stack which cannot be > instrumented by KMSAN e.g. the backchain. Disable KMSAN sanitization of > these functions to prevent false positives. > Is the annotation needed to avoid uninitialized access check when reading

Re: [PATCH 09/13] powerpc: Disable KMSAN checks on functions which walk the stack

2023-12-14 Thread Christophe Leroy
Le 14/12/2023 à 06:55, Nicholas Miehlbradt a écrit : > Functions which walk the stack read parts of the stack which cannot be > instrumented by KMSAN e.g. the backchain. Disable KMSAN sanitization of > these functions to prevent false positives. Do other architectures have to do it as well ? I

[PATCH 09/13] powerpc: Disable KMSAN checks on functions which walk the stack

2023-12-13 Thread Nicholas Miehlbradt
Functions which walk the stack read parts of the stack which cannot be instrumented by KMSAN e.g. the backchain. Disable KMSAN sanitization of these functions to prevent false positives. Signed-off-by: Nicholas Miehlbradt --- arch/powerpc/kernel/process.c| 6 +++--- arch/powerpc/kernel/stac