Received: by 10.223.185.116 with SMTP id b49csp1013817wrg; Wed, 21 Feb 2018 10:34:21 -0800 (PST) X-Google-Smtp-Source: AH8x226HXdANzwJl6PoltjqoJX6IN0C1NCJFWUMo7Bc1AH2bOWlBT2HeRyK6UpS6ctLvfJKNz5V3 X-Received: by 10.99.124.25 with SMTP id x25mr3441617pgc.372.1519238061589; Wed, 21 Feb 2018 10:34:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519238061; cv=none; d=google.com; s=arc-20160816; b=FByBGjjTC17kL/Py0esYlKWR5oTQbRf5/zvAmftlKYFgVkJsxWVPK8Yo/CgM84Gajj IRR3fo/1KgYv5QBzgzucKBgAfROI00Cbyj0nMcWfTBVa7JMtXIAlll4uGFHSEokaOelp kpT7wfnyheHRaKD96zbHn7qpsW/pXpp+ssZ6eeuUNcNyPWQ8Pd/NlA0iWTIQIGEO3JQc TnUA91LD18wAQ6USG8xXr2wmsmMiASIKhpqFwSpRzDyJ9njT/+OKtZtd4nmM0mAAZyBr PH4E4LqlYuQ27Z4gyhhKiFWtguB83dwqGc4hAVQJoxz5dl8TwFQOCuNA48UVfngTbEDL JO4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=cMrPwaMQoiirOo8EXSJB3UC4yBjcZ5oF2sqPJ9VkKAY=; b=xEa3ZeD0HGTfIDvWuVp1PgitkXJbrT3+L7PUDdTuPcg3u5h6n0O+7Z08Umt16FHmE+ 55eZv394mel3W98GAhRnwOHnr602c+wLRh203/Q6TCJPi2F9lCgba9Azy2ZMbQX7hpXK AlscLpJiR/jvJ5kRfqka5pGlj1bmJK3pD7g/ZKe95N7EUtqtUMgisSesqZRI+2G20Qpk AdDVNNgV5BjzR992CWeFJ7H8npcM1guGfi2X9mH7CXPRHG+XLifxQgqU2o+DZ2NQ/xVm K3MmQ/EVT1Cwv7vBoVdK0E9Q8K8JYkbAEskDHNGJ6SVZ0MNHLQQqPkmjq6gTf3qtOXLt RnSA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z4si7292443pfh.138.2018.02.21.10.34.03; Wed, 21 Feb 2018 10:34:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936129AbeBUNIe (ORCPT + 99 others); Wed, 21 Feb 2018 08:08:34 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:42420 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965346AbeBUNIb (ORCPT ); Wed, 21 Feb 2018 08:08:31 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 3935EFA2; Wed, 21 Feb 2018 13:08:30 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, kbuild test robot , Josh Poimboeuf , Dominik Brodowski , Linus Torvalds , Peter Zijlstra , Thomas Gleixner , kbuild-all@01.org, tipbuild@zytor.com, Ingo Molnar Subject: [PATCH 4.15 066/163] x86/entry/64: Fix paranoid_entry() frame pointer warning Date: Wed, 21 Feb 2018 13:48:15 +0100 Message-Id: <20180221124534.102951733@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180221124529.931834518@linuxfoundation.org> References: <20180221124529.931834518@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Josh Poimboeuf commit b3ccefaed922529e6a67de7b30af5aa38c76ace9 upstream. With the following commit: f09d160992d1 ("x86/entry/64: Get rid of the ALLOC_PT_GPREGS_ON_STACK and SAVE_AND_CLEAR_REGS macros") ... one of my suggested improvements triggered a frame pointer warning: arch/x86/entry/entry_64.o: warning: objtool: paranoid_entry()+0x11: call without frame pointer save/setup The warning is correct for the build-time code, but it's actually not relevant at runtime because of paravirt patching. The paravirt swapgs call gets replaced with either a SWAPGS instruction or NOPs at runtime. Go back to the previous behavior by removing the ELF function annotation for paranoid_entry() and adding an unwind hint, which effectively silences the warning. Reported-by: kbuild test robot Signed-off-by: Josh Poimboeuf Cc: Dominik Brodowski Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: kbuild-all@01.org Cc: tipbuild@zytor.com Fixes: f09d160992d1 ("x86/entry/64: Get rid of the ALLOC_PT_GPREGS_ON_STACK and SAVE_AND_CLEAR_REGS macros") Link: http://lkml.kernel.org/r/20180212174503.5acbymg5z6p32snu@treble Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/entry_64.S | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -1128,6 +1128,7 @@ idtentry machine_check do_mce has_err * Return: ebx=0: need swapgs on exit, ebx=1: otherwise */ ENTRY(paranoid_entry) + UNWIND_HINT_FUNC cld movl $1, %ebx movl $MSR_GS_BASE, %ecx @@ -1141,7 +1142,7 @@ ENTRY(paranoid_entry) SAVE_AND_SWITCH_TO_KERNEL_CR3 scratch_reg=%rax save_reg=%r14 ret -ENDPROC(paranoid_entry) +END(paranoid_entry) /* * "Paranoid" exit path from exception stack. This is invoked