On Mon, 14 Jun 2021 22:09:07 +1000, Daniel Axtens wrote: > Make our stack-walking code KASAN-safe by using __no_sanitize_address. > Generic code, arm64, s390 and x86 all make accesses unchecked for similar > sorts of reasons: when unwinding a stack, we might touch memory that KASAN > has marked as being out-of-bounds. In ppc64 KASAN development, I hit this > sometimes when checking for an exception frame - because we're checking > an arbitrary offset into the stack frame. > > [...]
Applied to powerpc/next. [1/1] powerpc: make stack walking KASAN-safe https://git.kernel.org/powerpc/c/b112fb913b5b5705db22efa90ec60f42518934af cheers