[PATCH 09/13] powerpc: Disable KMSAN checks on functions which walk the stack
Aneesh Kumar K.V
aneesh.kumar at kernel.org
Fri Dec 15 20:02:02 AEDT 2023
Nicholas Miehlbradt <nicholas at linux.ibm.com> writes:
> Functions which walk the stack read parts of the stack which cannot be
> instrumented by KMSAN e.g. the backchain. Disable KMSAN sanitization of
> these functions to prevent false positives.
>
Is the annotation needed to avoid uninitialized access check when
reading parts of the stack? Can you provide a false positive example for
the commit message?
-aneesh
More information about the Linuxppc-dev
mailing list