Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1240532pxk; Mon, 31 Aug 2020 13:49:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyi4xoZCmQWHX9ojQyqBf3TfBNXdmFtjJEsTQOinoam8Lk3TFsdLZLVwofKjZ6IT2GsYQ0B X-Received: by 2002:a17:906:1909:: with SMTP id a9mr2570881eje.127.1598906982958; Mon, 31 Aug 2020 13:49:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598906982; cv=none; d=google.com; s=arc-20160816; b=nld7clvFFG/HdZvdF2XQfgoDoP9yklPT42TXv6KqSToddUPH0qN6FP9wtgKQnw8Omy BzyJ8HAquRDQcjVDAKQVmgR9AvNbR5Evi8h4HxIpb47hb2D/jEK9Plzl8GvemEFpx2OV 5kJDOFbZS3+VBSbFhDmdefGnzCxvsK66E6Ffo9vLUj6zSo1BtWnDjKPWDX0CE7CkSvfI 3rEimOK5rt5b19XC5q1xebKH0OAAeX56JfEyFkTB+wOSXAnHq5PGH0I9b1A0Vm8n35RF Y3SuHVFKioil5YhUV6ROkC8wZgSXmNkViQmVbrTGT9qO5Osg2XW/6JgYGVRhV8Wqy3fb WM3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=YzKQsArZyOImPEGVDzjccDM15+XaFRehj51u1kHRAtM=; b=vrwqqqO7umsIfX2as2UE6B59EvJvxX6yrdLvfeQ5u6eP1yoqFq7c3uXWsF0YJVLdj5 7NOtVKg7Cqo8VqsXlYRKwy44ut0PcEjyg+uus8o45NhUgBvhu5dm7VO9JoKybgtZvnks Mngw6qpGaoISOtapCnseih9mOpk8iPBQYDJLJJt9aeXB/B05J5I3mUGkGhC6iD/FNyqI PIrIMcOhB5eKEArhp14OvNgN2ZJvlrARf88ZWYCyGGbAHElsE/PK88HR7WQ9hYSs+grT 01gOIx2eMPmVRJGkFxDkGD9t27uaCw/z441ImuMExplnV71OveMmLyRA2r6Z1uh4WliA /KpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bU7A0k8F; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bh4si6168666ejb.193.2020.08.31.13.49.20; Mon, 31 Aug 2020 13:49:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bU7A0k8F; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729556AbgHaSSK (ORCPT + 99 others); Mon, 31 Aug 2020 14:18:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:51648 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729390AbgHaSSH (ORCPT ); Mon, 31 Aug 2020 14:18:07 -0400 Received: from paulmck-ThinkPad-P72.home (unknown [50.45.173.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F1383208DB; Mon, 31 Aug 2020 18:18:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1598897887; bh=kn4a4eecMtJj2Z5DiTMtbFxEcnjYmSoEoMQiSwT9L2k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bU7A0k8F9Byj1RiyxAEESz+Pa7Iyhjlt/j3evzuafytReytYsXq+P+jyCGLV6j5eC rjjD1zewoj3uFZGVYJcxuflLxtMqSnfx9LFrM5KV8ArH+Qo4y3yC/hAfi5DJ4U5Sfo 41uGpdsqy7CEQLDLi29oyLbO5hAjX18OHBl1Rkqs= From: paulmck@kernel.org To: linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, kernel-team@fb.com, mingo@kernel.org Cc: elver@google.com, andreyknvl@google.com, glider@google.com, dvyukov@google.com, cai@lca.pw, boqun.feng@gmail.com, Josh Poimboeuf , "Paul E . McKenney" Subject: [PATCH kcsan 05/19] objtool, kcsan: Add __tsan_read_write to uaccess whitelist Date: Mon, 31 Aug 2020 11:17:51 -0700 Message-Id: <20200831181805.1833-5-paulmck@kernel.org> X-Mailer: git-send-email 2.9.5 In-Reply-To: <20200831181715.GA1530@paulmck-ThinkPad-P72> References: <20200831181715.GA1530@paulmck-ThinkPad-P72> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Marco Elver Adds the new __tsan_read_write compound instrumentation to objtool's uaccess whitelist. Acked-by: Peter Zijlstra (Intel) Cc: Josh Poimboeuf Signed-off-by: Marco Elver Signed-off-by: Paul E. McKenney --- tools/objtool/check.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 7546a9d..5eee156 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -528,6 +528,11 @@ static const char *uaccess_safe_builtin[] = { "__tsan_write4", "__tsan_write8", "__tsan_write16", + "__tsan_read_write1", + "__tsan_read_write2", + "__tsan_read_write4", + "__tsan_read_write8", + "__tsan_read_write16", "__tsan_atomic8_load", "__tsan_atomic16_load", "__tsan_atomic32_load", -- 2.9.5