From mboxrd@z Thu Jan 1 00:00:00 1970 From: Marco Elver Subject: [PATCH v2 2/8] objtool, kcsan: Add __tsan_read_write to uaccess whitelist Date: Fri, 24 Jul 2020 09:00:02 +0200 Message-ID: <20200724070008.1389205-3-elver@google.com> References: <20200724070008.1389205-1-elver@google.com> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Return-path: In-Reply-To: <20200724070008.1389205-1-elver@google.com> Sender: linux-kernel-owner@vger.kernel.org To: elver@google.com, paulmck@kernel.org Cc: will@kernel.org, peterz@infradead.org, arnd@arndb.de, mark.rutland@arm.com, dvyukov@google.com, glider@google.com, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org List-Id: linux-arch.vger.kernel.org Adds the new __tsan_read_write compound instrumentation to objtool's uaccess whitelist. Signed-off-by: Marco Elver Acked-by: Peter Zijlstra (Intel) --- tools/objtool/check.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 63d8b630c67a..38d82e705c93 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -528,6 +528,11 @@ static const char *uaccess_safe_builtin[] = { "__tsan_write4", "__tsan_write8", "__tsan_write16", + "__tsan_read_write1", + "__tsan_read_write2", + "__tsan_read_write4", + "__tsan_read_write8", + "__tsan_read_write16", "__tsan_atomic8_load", "__tsan_atomic16_load", "__tsan_atomic32_load", -- 2.28.0.rc0.142.g3c755180ce-goog From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33468 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726882AbgGXHA1 (ORCPT ); Fri, 24 Jul 2020 03:00:27 -0400 Received: from mail-yb1-xb4a.google.com (mail-yb1-xb4a.google.com [IPv6:2607:f8b0:4864:20::b4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 917D0C0619D3 for ; Fri, 24 Jul 2020 00:00:27 -0700 (PDT) Received: by mail-yb1-xb4a.google.com with SMTP id a185so7297316ybg.8 for ; Fri, 24 Jul 2020 00:00:27 -0700 (PDT) Date: Fri, 24 Jul 2020 09:00:02 +0200 In-Reply-To: <20200724070008.1389205-1-elver@google.com> Message-ID: <20200724070008.1389205-3-elver@google.com> Mime-Version: 1.0 References: <20200724070008.1389205-1-elver@google.com> Subject: [PATCH v2 2/8] objtool, kcsan: Add __tsan_read_write to uaccess whitelist From: Marco Elver Content-Type: text/plain; charset="UTF-8" Sender: linux-arch-owner@vger.kernel.org List-ID: To: elver@google.com, paulmck@kernel.org Cc: will@kernel.org, peterz@infradead.org, arnd@arndb.de, mark.rutland@arm.com, dvyukov@google.com, glider@google.com, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org Message-ID: <20200724070002.VkPu70YS9wKMYlH_n5Zu1oI20lU9WynvESPTZQAt76Y@z> Adds the new __tsan_read_write compound instrumentation to objtool's uaccess whitelist. Signed-off-by: Marco Elver Acked-by: Peter Zijlstra (Intel) --- tools/objtool/check.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 63d8b630c67a..38d82e705c93 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -528,6 +528,11 @@ static const char *uaccess_safe_builtin[] = { "__tsan_write4", "__tsan_write8", "__tsan_write16", + "__tsan_read_write1", + "__tsan_read_write2", + "__tsan_read_write4", + "__tsan_read_write8", + "__tsan_read_write16", "__tsan_atomic8_load", "__tsan_atomic16_load", "__tsan_atomic32_load", -- 2.28.0.rc0.142.g3c755180ce-goog