diff options
author | Marco Elver <elver@google.com> | 2022-09-12 11:45:41 +0200 |
---|---|---|
committer | Paul E. McKenney <paulmck@kernel.org> | 2022-10-18 15:07:33 -0700 |
commit | 63646fcba5bb4b59a19031c21913f94e46a3d0d4 (patch) | |
tree | 11a753152aaaa3acc55dde1329c49862105e9170 /tools/objtool | |
parent | 7c201739beef1a586d806463f1465429cdce34c5 (diff) | |
download | linux-stable-63646fcba5bb4b59a19031c21913f94e46a3d0d4.tar.gz linux-stable-63646fcba5bb4b59a19031c21913f94e46a3d0d4.tar.bz2 linux-stable-63646fcba5bb4b59a19031c21913f94e46a3d0d4.zip |
objtool, kcsan: Add volatile read/write instrumentation to whitelist
Adds KCSAN's volatile instrumentation to objtool's uaccess whitelist.
Recent kernel change have shown that this was missing from the uaccess
whitelist (since the first upstreamed version of KCSAN):
mm/gup.o: warning: objtool: fault_in_readable+0x101: call to __tsan_volatile_write1() with UACCESS enabled
Fixes: 75d75b7a4d54 ("kcsan: Support distinguishing volatile accesses")
Signed-off-by: Marco Elver <elver@google.com>
Reviewed-by: Dmitry Vyukov <dvyukov@google.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
Diffstat (limited to 'tools/objtool')
-rw-r--r-- | tools/objtool/check.c | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 43ec14c29a60..a7f1e6c8bb0a 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -999,6 +999,16 @@ static const char *uaccess_safe_builtin[] = { "__tsan_read_write4", "__tsan_read_write8", "__tsan_read_write16", + "__tsan_volatile_read1", + "__tsan_volatile_read2", + "__tsan_volatile_read4", + "__tsan_volatile_read8", + "__tsan_volatile_read16", + "__tsan_volatile_write1", + "__tsan_volatile_write2", + "__tsan_volatile_write4", + "__tsan_volatile_write8", + "__tsan_volatile_write16", "__tsan_atomic8_load", "__tsan_atomic16_load", "__tsan_atomic32_load", |