diff options
author | Josh Poimboeuf <jpoimboe@kernel.org> | 2023-04-12 20:29:35 +0300 |
---|---|---|
committer | Peter Zijlstra <peterz@infradead.org> | 2023-04-14 17:08:27 +0300 |
commit | 7f530fba1123edcad00d59e1a73019814935f0c1 (patch) | |
tree | c9562ed4b88025f4dafa64ad396de0f0ff037fbc /tools/objtool | |
parent | e18398e80c73e3cc7d9c3d2e0bc06a4af8f4f1cb (diff) | |
download | linux-7f530fba1123edcad00d59e1a73019814935f0c1.tar.xz |
objtool: Add stackleak instrumentation to uaccess safe list
If a function has a large stack frame, the stackleak plugin adds a call
to stackleak_track_stack() after the prologue.
This function may be called in uaccess-enabled code. Add it to the
uaccess safe list.
Fixes the following warning:
vmlinux.o: warning: objtool: kasan_report+0x12: call to stackleak_track_stack() with UACCESS enabled
Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lkml.kernel.org/r/42e9b487ef89e9b237fd5220ad1c7cf1a2ad7eb8.1681320562.git.jpoimboe@kernel.org
Diffstat (limited to 'tools/objtool')
-rw-r--r-- | tools/objtool/check.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 9440b07cd3b6..4c8ef8173a79 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -1279,6 +1279,8 @@ static const char *uaccess_safe_builtin[] = { "__ubsan_handle_type_mismatch_v1", "__ubsan_handle_shift_out_of_bounds", "__ubsan_handle_load_invalid_value", + /* STACKLEAK */ + "stackleak_track_stack", /* misc */ "csum_partial_copy_generic", "copy_mc_fragile", |