objtool, kcsan: Add volatile read/write instrumentation to whitelist
authorMarco Elver <elver@google.com>
Mon, 12 Sep 2022 09:45:41 +0000 (11:45 +0200)
committerPaul E. McKenney <paulmck@kernel.org>
Tue, 18 Oct 2022 22:07:33 +0000 (15:07 -0700)
commit63646fcba5bb4b59a19031c21913f94e46a3d0d4
tree11a753152aaaa3acc55dde1329c49862105e9170
parent7c201739beef1a586d806463f1465429cdce34c5
objtool, kcsan: Add volatile read/write instrumentation to whitelist

Adds KCSAN's volatile instrumentation to objtool's uaccess whitelist.

Recent kernel change have shown that this was missing from the uaccess
whitelist (since the first upstreamed version of KCSAN):

  mm/gup.o: warning: objtool: fault_in_readable+0x101: call to __tsan_volatile_write1() with UACCESS enabled

Fixes: 75d75b7a4d54 ("kcsan: Support distinguishing volatile accesses")
Signed-off-by: Marco Elver <elver@google.com>
Reviewed-by: Dmitry Vyukov <dvyukov@google.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
tools/objtool/check.c