objtool, kcsan: Add KCSAN runtime functions to whitelist
authorMarco Elver <elver@google.com>
Thu, 14 Nov 2019 18:02:57 +0000 (19:02 +0100)
committerPaul E. McKenney <paulmck@kernel.org>
Sat, 16 Nov 2019 15:23:14 +0000 (07:23 -0800)
This patch adds KCSAN runtime functions to the objtool whitelist.

Signed-off-by: Marco Elver <elver@google.com>
Acked-by: Paul E. McKenney <paulmck@kernel.org>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
tools/objtool/check.c

index 044c9a3cb2472354d3a78b77e43793e5a9043360..e022a9a00ca127c6692f78546c5599869bfe1f7f 100644 (file)
@@ -466,6 +466,24 @@ static const char *uaccess_safe_builtin[] = {
        "__asan_report_store4_noabort",
        "__asan_report_store8_noabort",
        "__asan_report_store16_noabort",
+       /* KCSAN */
+       "kcsan_found_watchpoint",
+       "kcsan_setup_watchpoint",
+       /* KCSAN/TSAN */
+       "__tsan_func_entry",
+       "__tsan_func_exit",
+       "__tsan_read_range",
+       "__tsan_write_range",
+       "__tsan_read1",
+       "__tsan_read2",
+       "__tsan_read4",
+       "__tsan_read8",
+       "__tsan_read16",
+       "__tsan_write1",
+       "__tsan_write2",
+       "__tsan_write4",
+       "__tsan_write8",
+       "__tsan_write16",
        /* KCOV */
        "write_comp_data",
        "__sanitizer_cov_trace_pc",