Received: by 2002:a05:7208:9594:b0:7e:5202:c8b4 with SMTP id gs20csp89607rbb; Fri, 23 Feb 2024 12:49:54 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCVqdnl1+lc10kf9K9LAdg63Ll3rGxUIa3hZ3u9Kyg973s3eXnRan4eWQcfWMlPOhaR65JPFf6DWzn21FDka32FiLBqpWTf1vEEh4SZ+4g== X-Google-Smtp-Source: AGHT+IGPouo5B+IEjgO/MU1jSzTnvdL9VpDBuwJKEb7zBx7kgKX8yn0lFK7VtK1QMtCeavD6yJoT X-Received: by 2002:aa7:8edd:0:b0:6e4:1a29:7332 with SMTP id b29-20020aa78edd000000b006e41a297332mr791000pfr.8.1708721394419; Fri, 23 Feb 2024 12:49:54 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708721394; cv=pass; d=google.com; s=arc-20160816; b=W/oRkyfk3JRQ6J9v+ZtvjbqGFMsXeNwJj1/YGjnxGt492v0n0zKKv40KDCF3xUUudG Mr48H4NuAldutjj+tFkIToV4X0xxBpZ2RqhBq0V0SSboDy+2t4iYxyjyno401JBSDR74 u7lMWzuhVk7RJv2ItRI216IDl9Gy7vQ0gA8jekU/iqmwy3nwSWbRGwm6V5WV9JZb1r4R c1/ndZ7mRDpfJOxpN53v/jtw9jyVBXJZnzpxX+LdxaCHPa5CQ+kfCzG+i/cJ7IkKy79D 7FRBxdcLZI0Xvl2iGDjoMCHhzwhiAlylAXlFb4+1Se43NsHrr9g0T8ESIIs4mgaAepYP boZg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:from:subject:message-id:references:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:in-reply-to:date :reply-to:dkim-signature; bh=vufYXRT9nLolRxc38rSYg/MmpkjAZM5KmaatkmS8vks=; fh=qNZq4eRA852oN9ugCnPbtwM6GzdZVh4sat8J//haGd4=; b=eK6H+zqrXcU0Iks4eE/wBn/Dbh+NOCnruxk9QuYmqQzcXRtaNN2LPomlgmNzXptZFx p5Ae0r4rTZ9Yaup9RZMwCZMxX1BDB2WBX1V0pJhs1EQldAZPQWgbieZlhtEZIEcFQZv7 diqsbjF9EZEeeH8Jnq9ew7GGCFpnwcx/mjYJEQZUNDbl8mWFSgzGrVSYorYGoBjtQL/D mrMPjgTsQkeUl2otFPCtJ/YwKjfOCmMvQ1y9w5jorXnMi3g8nayTc4dbyAcYAXSOdv5g RvZIBvqoTAsvsnU6wf8mD/W2AxsIWvC6OgoHOc/VzbPQi56ib6gcha0o+KZwwBS282iI 3OmA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=4nQsW9sa; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-79135-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-79135-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id e15-20020a63744f000000b005ce06ca3538si12507922pgn.873.2024.02.23.12.49.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 23 Feb 2024 12:49:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-79135-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=4nQsW9sa; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-79135-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-79135-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id C993AB246F8 for ; Fri, 23 Feb 2024 20:47:12 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 513F915A49C; Fri, 23 Feb 2024 20:42:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="4nQsW9sa" Received: from mail-yw1-f201.google.com (mail-yw1-f201.google.com [209.85.128.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E4346159580 for ; Fri, 23 Feb 2024 20:42:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708720974; cv=none; b=NHExLM+o4F+RcL81NUL1at+AFnFkV6ExiDYYRf5plk1FPwXgO1sg4s6Q6fbREHxNvyPZN/gGdPRuhBXgYvg3rKJP4tjjpmm4PetJ9e9IiBbXiCOxG4tPcuVlisf0EHWWIM7YXabAO9L/qRNfWZRxbl7ec2ZE6uGBkmYYy1665E8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708720974; c=relaxed/simple; bh=7J6KDtGQ/ff8P3w9jb/vWmofOgEnYMuO6+24o5qqEFQ=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=r6qP4ABFkyxSFB/FFRrD1RYvsHFA/+DeM44bygU51vqMeWCosUpkpCldmo9REZpm0neQCzN24QEcE84bxTGSvvH4z96sUaGdwssoGNSUG+qsShEtTjzZc6OWdU9kqhYjsWPT86NXmZ3xdUzggDlsURViJy36nrJFFU4/iYIscTU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=4nQsW9sa; arc=none smtp.client-ip=209.85.128.201 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Received: by mail-yw1-f201.google.com with SMTP id 00721157ae682-608a1a2723cso19512977b3.0 for ; Fri, 23 Feb 2024 12:42:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1708720972; x=1709325772; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=vufYXRT9nLolRxc38rSYg/MmpkjAZM5KmaatkmS8vks=; b=4nQsW9sa4h4EWu7++5cltY8XMcbWe5A10jC/XMx5DneIDsQTOYtm6DkPDnd2pWH0ZK 6UJNSmbqSwj6OUVHqhWjcM4a9FUmKhINnBmt1spcRxqkF4NRn77DAvu5orh2bbAOehVH WEBgkHjoia0ykJpjFKKW6mYIfnaP58TTvDwe3kz/CubNhAdoQbujUtkTeS3EpZY17Brz 7yXExos4ZP2qSUumMeNfsc67UZ23RDMEfst2NNu+KT+BA1xMMbsJ8d/398VH2LYV1jyS h20rEhHK5DAnya4IICVWgo66y6A27VBqJS7glRW+qrrGJ9pfyKLyfytz8lPu3eFx1LUw XaAA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708720972; x=1709325772; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=vufYXRT9nLolRxc38rSYg/MmpkjAZM5KmaatkmS8vks=; b=F/cYEYuM/V7WPZxFBVp0D7wxQ5PurmyveKU3hYCEo5K1A0yLjJqyKWzq0JYUoxWPhJ a4pSeMYSCgDhBvymxIBOAM1S95Dax04o4d48KJOEzWZmCsSBu/bDQMtn/3zdXaC8pfsU zyEo0zH2Vpl7JOurpC66SMtVBwR21Y2YolW7uV+E/b4EL+jQQ5fW+mjyBvvYNPrx4AUt KMoZhbojS3scleuUpC7d2Q+lEeFBOwYWbf/7F+UI4SlPZ6mU9PSCBhmVOARQrXjNv5do gLU5rMia2bQLD4zFunxhfly0WRhw+zL/ZmBEVVWJhp4Q0xP+JCOnrDNP3atnCZJ04t/R Ji/Q== X-Forwarded-Encrypted: i=1; AJvYcCUdjwbXX3OTOQurOR6I6P2lsE0ayTNrFkxTK5msvMubftkXMls77v/kVq0ceZPRNc7BGNEreH0+VrllKFbAqevUNXvAwkvndTMj/zMt X-Gm-Message-State: AOJu0YwCurU0dx85ATifLq6U83fTQdG2OaF2mNDljh2I14D8FsKczVDP 1CNqcRm9uUf/DkXZ7nvcZzslL72WIFXf5j6kSj0OS4Wbg+EmKGcPwRHNblnYZ63fgMJiDgTSu1L tNw== X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a81:8452:0:b0:608:cde3:107b with SMTP id u79-20020a818452000000b00608cde3107bmr131247ywf.2.1708720971999; Fri, 23 Feb 2024 12:42:51 -0800 (PST) Reply-To: Sean Christopherson Date: Fri, 23 Feb 2024 12:42:33 -0800 In-Reply-To: <20240223204233.3337324-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20240223204233.3337324-1-seanjc@google.com> X-Mailer: git-send-email 2.44.0.rc0.258.g7320e95886-goog Message-ID: <20240223204233.3337324-9-seanjc@google.com> Subject: [PATCH 8/8] KVM: x86: Stop compiling vmenter.S with OBJECT_FILES_NON_STANDARD From: Sean Christopherson To: Sean Christopherson , Paolo Bonzini Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Tom Lendacky , Michael Roth , Alexey Kardashevskiy Content-Type: text/plain; charset="UTF-8" Stop compiling vmenter.S with OBJECT_FILES_NON_STANDARD to skip objtool's stack validation now that __svm_vcpu_run() and __svm_sev_es_vcpu_run() create stack frames (thoughthe former's effectiveness is dubious). Note, due to a quirk in how OBJECT_FILES_NON_STANDARD is handled by the build system, this also affects vmx/vmenter.S. But __vmx_vcpu_run() already plays nice with frame pointers, i.e. it was collateral damage when commit 7f4b5cde2409 ("kvm: Disable objtool frame pointer checking for vmenter.S") added the OBJECT_FILES_NON_STANDARD hack-a-fix. Link: https://lore.kernel.org/all/20240217055504.2059803-1-masahiroy@kernel.org Signed-off-by: Sean Christopherson --- arch/x86/kvm/Makefile | 4 ---- 1 file changed, 4 deletions(-) diff --git a/arch/x86/kvm/Makefile b/arch/x86/kvm/Makefile index 475b5fa917a6..addc44fc7187 100644 --- a/arch/x86/kvm/Makefile +++ b/arch/x86/kvm/Makefile @@ -3,10 +3,6 @@ ccflags-y += -I $(srctree)/arch/x86/kvm ccflags-$(CONFIG_KVM_WERROR) += -Werror -ifeq ($(CONFIG_FRAME_POINTER),y) -OBJECT_FILES_NON_STANDARD_vmenter.o := y -endif - include $(srctree)/virt/kvm/Makefile.kvm kvm-y += x86.o emulate.o i8259.o irq.o lapic.o \ -- 2.44.0.rc0.258.g7320e95886-goog