From: Ard Biesheuvel Date: Tue, 17 Nov 2020 09:23:28 +0000 (+0100) Subject: ARM: 9028/1: disable KASAN in call stack capturing routines X-Git-Url: http://git.maquefel.me/?a=commitdiff_plain;h=4d576cab16f57e1f87978f6997a725179398341e;p=linux.git ARM: 9028/1: disable KASAN in call stack capturing routines KASAN uses the routines in stacktrace.c to capture the call stack each time memory gets allocated or freed. Some of these routines are also used to log CPU and memory context when exceptions are taken, and so in some cases, memory accesses may be made that are not strictly in line with the KASAN constraints, and may therefore trigger false KASAN positives. So follow the example set by other architectures, and simply disable KASAN instrumentation for these routines. Reviewed-by: Linus Walleij Signed-off-by: Ard Biesheuvel Signed-off-by: Russell King --- diff --git a/arch/arm/kernel/Makefile b/arch/arm/kernel/Makefile index 89e5d864e9234..f6431b46866e8 100644 --- a/arch/arm/kernel/Makefile +++ b/arch/arm/kernel/Makefile @@ -21,6 +21,9 @@ obj-y := elf.o entry-common.o irq.o opcodes.o \ setup.o signal.o sigreturn_codes.o \ stacktrace.o sys_arm.o time.o traps.o +KASAN_SANITIZE_stacktrace.o := n +KASAN_SANITIZE_traps.o := n + ifneq ($(CONFIG_ARM_UNWIND),y) obj-$(CONFIG_FRAME_POINTER) += return_address.o endif