Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752184AbeADCAy (ORCPT + 1 other); Wed, 3 Jan 2018 21:00:54 -0500 Received: from mga07.intel.com ([134.134.136.100]:37436 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752057AbeADCAr (ORCPT ); Wed, 3 Jan 2018 21:00:47 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.45,505,1508828400"; d="scan'208";a="8291989" From: Andi Kleen To: tglx@linutronix.de Cc: torvalds@linux-foundation.org, gregkh@linux-foundation.org, linux-kernel@vger.kernel.org, tim.c.chen@linux.intel.com, Andi Kleen Subject: [PATCH v2 11/12] retpoline/objtool: Disable some objtool warnings Date: Wed, 3 Jan 2018 18:00:18 -0800 Message-Id: <20180104020019.1173-12-andi@firstfloor.org> X-Mailer: git-send-email 2.14.3 In-Reply-To: <20180104020019.1173-1-andi@firstfloor.org> References: <20180104020019.1173-1-andi@firstfloor.org> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: From: Andi Kleen With the indirect call thunk enabled compiler two objtool warnings are triggered very frequently and make the build very noisy. I don't see a good way to avoid them, so just disable them for now. Signed-off-by: Andi Kleen --- tools/objtool/check.c | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 9b341584eb1b..435c71f944dc 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -503,8 +503,13 @@ static int add_call_destinations(struct objtool_file *file) insn->call_dest = find_symbol_by_offset(insn->sec, dest_off); if (!insn->call_dest) { +#if 0 + /* Compilers with -mindirect-branch=thunk-extern trigger + * this everywhere on x86. Disable for now. + */ WARN_FUNC("can't find call dest symbol at offset 0x%lx", insn->sec, insn->offset, dest_off); +#endif return -1; } } else if (rela->sym->type == STT_SECTION) { @@ -1716,8 +1721,14 @@ static int validate_branch(struct objtool_file *file, struct instruction *first, return 1; } else if (func && has_modified_stack_frame(&state)) { +#if 0 + /* Compilers with -mindirect-branch=thunk-extern trigger + * this everywhere on x86. Disable for now. + */ + WARN_FUNC("sibling call from callable instruction with modified stack frame", sec, insn->offset); +#endif return 1; } -- 2.14.3