s390/dumpstack: disable __dump_trace kasan instrumentation
authorVasily Gorbik <gor@linux.ibm.com>
Mon, 20 Nov 2017 11:17:19 +0000 (12:17 +0100)
committerMartin Schwidefsky <schwidefsky@de.ibm.com>
Tue, 9 Oct 2018 09:21:27 +0000 (11:21 +0200)
Walking async_stack produces false positives. Disable __dump_trace
function instrumentation for now.

Signed-off-by: Vasily Gorbik <gor@linux.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
arch/s390/kernel/dumpstack.c

index ef85a00442cdb0116f9ce9e60bc060d059c239fd..d4c88e119e1f8632f4abfa6a8c745d2d7b5e5084 100644 (file)
@@ -30,7 +30,7 @@
  * The stack trace can start at any of the three stacks and can potentially
  * touch all of them. The order is: panic stack, async stack, sync stack.
  */
-static unsigned long
+static unsigned long __no_sanitize_address
 __dump_trace(dump_trace_func_t func, void *data, unsigned long sp,
             unsigned long low, unsigned long high)
 {