Received: by 10.223.185.116 with SMTP id b49csp740913wrg; Wed, 21 Feb 2018 06:14:08 -0800 (PST) X-Google-Smtp-Source: AH8x2250aFxLPFusPxGHW3kxkQIHadNjgzDRQsKJzRlbjUwKe2ADJQpncv70KvC2YFOGjYErc90W X-Received: by 10.167.128.143 with SMTP id v15mr3527484pff.36.1519222448173; Wed, 21 Feb 2018 06:14:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519222448; cv=none; d=google.com; s=arc-20160816; b=xHpaA5KS9G+d2w1LFIUtrJfFrI1ohokMrPDnnmX4FsziN/Fr6aZj4wxwbtuhWTgP58 aoh7dOu9oi8MfzIEWwlr/TzuO6FxIEM4riua3ey40SOsLnITwXHIl6YSuPiDlQ75L5Jv Rx1pIHL1K03eivoK2uyvUkKB6eV8+QLTETh0xVZjQ3pSh2ZMks+NMOic9Vs2RqKf/eic 8Mykg1/6jdYLQVJoqLR5OKTgRjQXoatTvAh/Kr/xZdSQJH/ijonPK1JcmSSzHQ+T2DK4 xRYbEH6cTfITmcmzUk5z+Z0QhVb6TgVvP29Y1j/C7P11o42MoJraKLBtYCq5Vt0QdIZM Us9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=gnSwNIoMBZJcF7o4xhBfLuNubPpdV/rtB2N5JhQ1AOU=; b=v+g/yACNaCmA1LbQfKTkhUYWOIIXOFog6bMX3R79R8UGPF0WJNTXFva2+Xpn8mJ0ja nF6gvoQ4rQMZQbj2I8o/zK2UQ9NQBNDBbEP/0G3crfes4ouBaNxjCM8EYM9zDkHCkRp0 3TO8O2XWDKsemkxGiFMmrmsL9iYwdXAzCLBq2b0PGt8RL0hTaAAFGetNZh0UHvsSx8nm xATrd37ilVjaFwUBOehrivvfxy0h0rFbIcm7RFQ4DNmrUS5T+B1vD1J8ZyApYzOAmhos XvHijFL8kbPA/hlHMvm14B28p0iF2sD2qhlW3oR34iJhHscAKx2G62khvZVZeVS+VjGy MyDg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z4si6989045pfh.138.2018.02.21.06.13.53; Wed, 21 Feb 2018 06:14:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935400AbeBUNBJ (ORCPT + 99 others); Wed, 21 Feb 2018 08:01:09 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:37740 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933066AbeBUNBE (ORCPT ); Wed, 21 Feb 2018 08:01:04 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id BE78E1078; Wed, 21 Feb 2018 13:00:36 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, kbuild test robot , Josh Poimboeuf , Dominik Brodowski , Linus Torvalds , Peter Zijlstra , Thomas Gleixner , kbuild-all@01.org, tipbuild@zytor.com, Ingo Molnar Subject: [PATCH 4.14 065/167] x86/entry/64: Fix paranoid_entry() frame pointer warning Date: Wed, 21 Feb 2018 13:47:56 +0100 Message-Id: <20180221124528.068393172@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180221124524.639039577@linuxfoundation.org> References: <20180221124524.639039577@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Josh Poimboeuf commit b3ccefaed922529e6a67de7b30af5aa38c76ace9 upstream. With the following commit: f09d160992d1 ("x86/entry/64: Get rid of the ALLOC_PT_GPREGS_ON_STACK and SAVE_AND_CLEAR_REGS macros") ... one of my suggested improvements triggered a frame pointer warning: arch/x86/entry/entry_64.o: warning: objtool: paranoid_entry()+0x11: call without frame pointer save/setup The warning is correct for the build-time code, but it's actually not relevant at runtime because of paravirt patching. The paravirt swapgs call gets replaced with either a SWAPGS instruction or NOPs at runtime. Go back to the previous behavior by removing the ELF function annotation for paranoid_entry() and adding an unwind hint, which effectively silences the warning. Reported-by: kbuild test robot Signed-off-by: Josh Poimboeuf Cc: Dominik Brodowski Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: kbuild-all@01.org Cc: tipbuild@zytor.com Fixes: f09d160992d1 ("x86/entry/64: Get rid of the ALLOC_PT_GPREGS_ON_STACK and SAVE_AND_CLEAR_REGS macros") Link: http://lkml.kernel.org/r/20180212174503.5acbymg5z6p32snu@treble Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/entry_64.S | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -1122,6 +1122,7 @@ idtentry machine_check do_mce has_err * Return: ebx=0: need swapgs on exit, ebx=1: otherwise */ ENTRY(paranoid_entry) + UNWIND_HINT_FUNC cld movl $1, %ebx movl $MSR_GS_BASE, %ecx @@ -1135,7 +1136,7 @@ ENTRY(paranoid_entry) SAVE_AND_SWITCH_TO_KERNEL_CR3 scratch_reg=%rax save_reg=%r14 ret -ENDPROC(paranoid_entry) +END(paranoid_entry) /* * "Paranoid" exit path from exception stack. This is invoked