diff options
author | Josh Poimboeuf <jpoimboe@kernel.org> | 2023-04-12 10:29:35 -0700 |
---|---|---|
committer | Peter Zijlstra <peterz@infradead.org> | 2023-04-14 16:08:27 +0200 |
commit | 7f530fba1123edcad00d59e1a73019814935f0c1 (patch) | |
tree | c9562ed4b88025f4dafa64ad396de0f0ff037fbc /scripts/gdb/linux/modules.py | |
parent | e18398e80c73e3cc7d9c3d2e0bc06a4af8f4f1cb (diff) |
objtool: Add stackleak instrumentation to uaccess safe list
If a function has a large stack frame, the stackleak plugin adds a call
to stackleak_track_stack() after the prologue.
This function may be called in uaccess-enabled code. Add it to the
uaccess safe list.
Fixes the following warning:
vmlinux.o: warning: objtool: kasan_report+0x12: call to stackleak_track_stack() with UACCESS enabled
Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lkml.kernel.org/r/42e9b487ef89e9b237fd5220ad1c7cf1a2ad7eb8.1681320562.git.jpoimboe@kernel.org
Diffstat (limited to 'scripts/gdb/linux/modules.py')
0 files changed, 0 insertions, 0 deletions