Skip to content

Commit 63646fc

Browse files
melverpaulmckrcu
authored andcommitted
objtool, kcsan: Add volatile read/write instrumentation to whitelist
Adds KCSAN's volatile instrumentation to objtool's uaccess whitelist. Recent kernel change have shown that this was missing from the uaccess whitelist (since the first upstreamed version of KCSAN): mm/gup.o: warning: objtool: fault_in_readable+0x101: call to __tsan_volatile_write1() with UACCESS enabled Fixes: 75d75b7 ("kcsan: Support distinguishing volatile accesses") Signed-off-by: Marco Elver <[email protected]> Reviewed-by: Dmitry Vyukov <[email protected]> Signed-off-by: Paul E. McKenney <[email protected]>
1 parent 7c20173 commit 63646fc

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

tools/objtool/check.c

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -999,6 +999,16 @@ static const char *uaccess_safe_builtin[] = {
999999
"__tsan_read_write4",
10001000
"__tsan_read_write8",
10011001
"__tsan_read_write16",
1002+
"__tsan_volatile_read1",
1003+
"__tsan_volatile_read2",
1004+
"__tsan_volatile_read4",
1005+
"__tsan_volatile_read8",
1006+
"__tsan_volatile_read16",
1007+
"__tsan_volatile_write1",
1008+
"__tsan_volatile_write2",
1009+
"__tsan_volatile_write4",
1010+
"__tsan_volatile_write8",
1011+
"__tsan_volatile_write16",
10021012
"__tsan_atomic8_load",
10031013
"__tsan_atomic16_load",
10041014
"__tsan_atomic32_load",

0 commit comments

Comments
 (0)