From: Marco Elver Date: Mon, 12 Sep 2022 09:45:41 +0000 (+0200) Subject: objtool, kcsan: Add volatile read/write instrumentation to whitelist X-Git-Tag: v6.6.17~6053^2~1 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=63646fcba5bb4b59a19031c21913f94e46a3d0d4;p=platform%2Fkernel%2Flinux-rpi.git objtool, kcsan: Add volatile read/write instrumentation to whitelist Adds KCSAN's volatile instrumentation to objtool's uaccess whitelist. Recent kernel change have shown that this was missing from the uaccess whitelist (since the first upstreamed version of KCSAN): mm/gup.o: warning: objtool: fault_in_readable+0x101: call to __tsan_volatile_write1() with UACCESS enabled Fixes: 75d75b7a4d54 ("kcsan: Support distinguishing volatile accesses") Signed-off-by: Marco Elver Reviewed-by: Dmitry Vyukov Signed-off-by: Paul E. McKenney --- diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 43ec14c..a7f1e6c 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -999,6 +999,16 @@ static const char *uaccess_safe_builtin[] = { "__tsan_read_write4", "__tsan_read_write8", "__tsan_read_write16", + "__tsan_volatile_read1", + "__tsan_volatile_read2", + "__tsan_volatile_read4", + "__tsan_volatile_read8", + "__tsan_volatile_read16", + "__tsan_volatile_write1", + "__tsan_volatile_write2", + "__tsan_volatile_write4", + "__tsan_volatile_write8", + "__tsan_volatile_write16", "__tsan_atomic8_load", "__tsan_atomic16_load", "__tsan_atomic32_load",