[PATCH 09/13] powerpc: Disable KMSAN checks on functions which walk the stack

Aneesh Kumar K.V aneesh.kumar at kernel.org
Fri Dec 15 20:02:02 AEDT 2023


Nicholas Miehlbradt <nicholas at linux.ibm.com> writes:

> Functions which walk the stack read parts of the stack which cannot be
> instrumented by KMSAN e.g. the backchain. Disable KMSAN sanitization of
> these functions to prevent false positives.
>

Is the annotation needed to avoid uninitialized access check when
reading parts of the stack? Can you provide a false positive example for
the commit message?

-aneesh


More information about the Linuxppc-dev mailing list