Commit ae033f08 authored by Josh Poimboeuf's avatar Josh Poimboeuf

objtool: Add check_kcov_mode() to the uaccess safelist

check_kcov_mode() is called by write_comp_data() and
__sanitizer_cov_trace_pc(), which are already on the uaccess safe list.
It's notrace and doesn't call out to anything else, so add it to the
list too.

This fixes the following warnings:

  kernel/kcov.o: warning: objtool: __sanitizer_cov_trace_pc()+0x15: call to check_kcov_mode() with UACCESS enabled
  kernel/kcov.o: warning: objtool: write_comp_data()+0x1b: call to check_kcov_mode() with UACCESS enabled
Reported-by: default avatarArnd Bergmann <arnd@arndb.de>
Signed-off-by: default avatarJosh Poimboeuf <jpoimboe@redhat.com>
Acked-by: default avatarPeter Zijlstra (Intel) <peterz@infradead.org>
parent 9d907f1a
...@@ -507,6 +507,7 @@ static const char *uaccess_safe_builtin[] = { ...@@ -507,6 +507,7 @@ static const char *uaccess_safe_builtin[] = {
"__asan_report_store16_noabort", "__asan_report_store16_noabort",
/* KCOV */ /* KCOV */
"write_comp_data", "write_comp_data",
"check_kcov_mode",
"__sanitizer_cov_trace_pc", "__sanitizer_cov_trace_pc",
"__sanitizer_cov_trace_const_cmp1", "__sanitizer_cov_trace_const_cmp1",
"__sanitizer_cov_trace_const_cmp2", "__sanitizer_cov_trace_const_cmp2",
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment