Files
android_kernel_xiaomi_sm8450/arch/s390/kernel
Vasily Gorbik 2c7fa8a11c s390/kasan: avoid report in get_wchan
Reading other running task's stack can be a dangerous endeavor. Kasan
stack memory access instrumentation includes special prologue and epilogue
to mark/remove red zones in shadow memory between stack variables. For
that reason there is always a race between a task reading value in other
task's stack and that other task returning from a function and entering
another one generating different red zones pattern.

To avoid kasan reports simply perform uninstrumented memory reads.

Acked-by: Ilya Leoshkevich <iii@linux.ibm.com>
Signed-off-by: Vasily Gorbik <gor@linux.ibm.com>
2019-08-21 12:58:53 +02:00
..
2019-07-23 10:45:53 +02:00
2012-05-16 14:42:41 +02:00
2019-04-29 10:47:10 +02:00
2019-06-04 15:03:58 +02:00
2019-06-07 10:09:37 +02:00
2019-06-07 10:09:37 +02:00
2019-05-02 13:54:11 +02:00
2019-04-29 10:47:10 +02:00
2019-05-02 13:54:11 +02:00
2019-04-23 21:51:40 +02:00
2019-06-15 12:25:52 +02:00
2018-02-27 08:05:23 +01:00
2019-06-07 10:09:37 +02:00
2018-07-20 00:02:41 +02:00
2019-04-11 13:36:49 +02:00