• Vasily Gorbik's avatar
    s390/kasan: avoid report in get_wchan · 2c7fa8a1
    Vasily Gorbik authored
    Reading other running task's stack can be a dangerous endeavor. Kasan
    stack memory access instrumentation includes special prologue and epilogue
    to mark/remove red zones in shadow memory between stack variables. For
    that reason there is always a race between a task reading value in other
    task's stack and that other task returning from a function and entering
    another one generating different red zones pattern.
    
    To avoid kasan reports simply perform uninstrumented memory reads.
    Acked-by: default avatarIlya Leoshkevich <iii@linux.ibm.com>
    Signed-off-by: default avatarVasily Gorbik <gor@linux.ibm.com>
    2c7fa8a1
process.c 6.23 KB