llvm.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
* [linux-next:master 10262/13297] vmlinux.o: warning: objtool: set_ftrace_ops_ro+0x33: relocation to !ENDBR: machine_kexec+0x152
@ 2023-08-29  8:44 kernel test robot
  0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2023-08-29  8:44 UTC (permalink / raw)
  Cc: oe-kbuild-all, llvm

CC: Linux Memory Management List <linux-mm@kvack.org>
TO: Pengfei Xu <pengfei.xu@intel.com>
CC: Andrew Morton <akpm@linux-foundation.org>
CC: Linux Memory Management List <linux-mm@kvack.org>
CC: Dmitry Vyukov <dvyukov@google.com>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head:   2ee82481c392eec06a7ef28df61b7f0d8e45be2e
commit: 0d345996e4cb573f8cc81d49b3ee9a7fd2035bef [10262/13297] x86/kernel: increase kcov coverage under arch/x86/kernel folder
config: x86_64-randconfig-004-20230826 (https://download.01.org/0day-ci/archive/20230829/202308291620.kR3ZENbY-lkp@intel.com/config)
compiler: clang version 16.0.4 (https://github.com/llvm/llvm-project.git ae42196bc493ffe877a7e3dff8be32035dea4d07)
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20230829/202308291620.kR3ZENbY-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202308291620.kR3ZENbY-lkp@intel.com/

All warnings (new ones prefixed by >>):

   vmlinux.o: warning: objtool: ibt_selftest+0x1a: sibling call from callable instruction with modified stack frame
   vmlinux.o: warning: objtool: amd_spi_master_transfer() falls through to next function __cfi_amd_spi_max_transfer_size()
>> vmlinux.o: warning: objtool: set_ftrace_ops_ro+0x33: relocation to !ENDBR: machine_kexec+0x152
   vmlinux.o: warning: objtool: bad call to elf_init_reloc_text_sym() for data symbol .rodata


objdump-func vmlinux.o set_ftrace_ops_ro:
0000 00000000001325f0 <set_ftrace_ops_ro>:
0000   1325f0:	f3 0f 1e fa          	endbr64
0004   1325f4:	55                   	push   %rbp
0005   1325f5:	48 89 e5             	mov    %rsp,%rbp
0008   1325f8:	41 57                	push   %r15
000a   1325fa:	41 56                	push   %r14
000c   1325fc:	41 55                	push   %r13
000e   1325fe:	41 54                	push   %r12
0010   132600:	53                   	push   %rbx
0011   132601:	e8 00 00 00 00       	call   132606 <set_ftrace_ops_ro+0x16>	132602: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0016   132606:	4c 8b 3d 00 00 00 00 	mov    0x0(%rip),%r15        # 13260d <set_ftrace_ops_ro+0x1d>	132609: R_X86_64_PC32	ftrace_ops_list-0x4
001d   13260d:	e8 00 00 00 00       	call   132612 <set_ftrace_ops_ro+0x22>	13260e: R_X86_64_PLT32	debug_lockdep_rcu_enabled-0x4
0022   132612:	49 c7 c6 00 00 00 00 	mov    $0x0,%r14	132615: R_X86_64_32S	ftrace_list_end
0029   132619:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	13261c: R_X86_64_32S	ftrace_regs_caller
0030   132620:	48 f7 d8             	neg    %rax
0033   132623:	4c 8d 2c 05 00 00 00 00 	lea    0x0(,%rax,1),%r13	132627: R_X86_64_32S	ftrace_regs_caller_end+0x100c
003b   13262b:	49 c1 ed 0c          	shr    $0xc,%r13
003f   13262f:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	132632: R_X86_64_32S	ftrace_caller
0046   132636:	48 f7 d8             	neg    %rax
0049   132639:	4c 8d 24 05 00 00 00 00 	lea    0x0(,%rax,1),%r12	13263d: R_X86_64_32S	ftrace_caller_end+0x100c
0051   132641:	49 c1 ec 0c          	shr    $0xc,%r12
0055   132645:	49 8b 5f 10          	mov    0x10(%r15),%rbx
0059   132649:	48 89 de             	mov    %rbx,%rsi
005c   13264c:	48 81 e6 00 08 00 00 	and    $0x800,%rsi
0063   132653:	31 ff                	xor    %edi,%edi
0065   132655:	e8 00 00 00 00       	call   13265a <set_ftrace_ops_ro+0x6a>	132656: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
006a   13265a:	48 89 d8             	mov    %rbx,%rax
006d   13265d:	48 25 00 08 00 00    	and    $0x800,%rax
0073   132663:	75 07                	jne    13266c <set_ftrace_ops_ro+0x7c>
0075   132665:	e8 00 00 00 00       	call   13266a <set_ftrace_ops_ro+0x7a>	132666: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
007a   13266a:	eb 30                	jmp    13269c <set_ftrace_ops_ro+0xac>
007c   13266c:	e8 00 00 00 00       	call   132671 <set_ftrace_ops_ro+0x81>	13266d: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0081   132671:	48 83 e3 04          	and    $0x4,%rbx
0085   132675:	45 89 ee             	mov    %r13d,%r14d
0088   132678:	45 0f 44 f4          	cmove  %r12d,%r14d
008c   13267c:	31 ff                	xor    %edi,%edi
008e   13267e:	48 89 de             	mov    %rbx,%rsi
0091   132681:	e8 00 00 00 00       	call   132686 <set_ftrace_ops_ro+0x96>	132682: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
0096   132686:	49 8b bf 80 01 00 00 	mov    0x180(%r15),%rdi
009d   13268d:	44 89 f6             	mov    %r14d,%esi
00a0   132690:	49 c7 c6 00 00 00 00 	mov    $0x0,%r14	132693: R_X86_64_32S	ftrace_list_end
00a7   132697:	e8 00 00 00 00       	call   13269c <set_ftrace_ops_ro+0xac>	132698: R_X86_64_PLT32	set_memory_ro-0x4
00ac   13269c:	4d 8b 7f 08          	mov    0x8(%r15),%r15
00b0   1326a0:	e8 00 00 00 00       	call   1326a5 <set_ftrace_ops_ro+0xb5>	1326a1: R_X86_64_PLT32	debug_lockdep_rcu_enabled-0x4
00b5   1326a5:	4d 85 ff             	test   %r15,%r15
00b8   1326a8:	74 0c                	je     1326b6 <set_ftrace_ops_ro+0xc6>
00ba   1326aa:	4d 39 f7             	cmp    %r14,%r15
00bd   1326ad:	74 07                	je     1326b6 <set_ftrace_ops_ro+0xc6>
00bf   1326af:	e8 00 00 00 00       	call   1326b4 <set_ftrace_ops_ro+0xc4>	1326b0: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
00c4   1326b4:	eb 8f                	jmp    132645 <set_ftrace_ops_ro+0x55>
00c6   1326b6:	e8 00 00 00 00       	call   1326bb <set_ftrace_ops_ro+0xcb>	1326b7: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
00cb   1326bb:	5b                   	pop    %rbx
00cc   1326bc:	41 5c                	pop    %r12
00ce   1326be:	41 5d                	pop    %r13
00d0   1326c0:	41 5e                	pop    %r14
00d2   1326c2:	41 5f                	pop    %r15
00d4   1326c4:	5d                   	pop    %rbp
00d5   1326c5:	c3                   	ret
00d6   1326c6:	cc                   	int3
00d7   1326c7:	66 0f 1f 84 00 00 00 00 00 	nopw   0x0(%rax,%rax,1)

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2023-08-29  8:45 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-08-29  8:44 [linux-next:master 10262/13297] vmlinux.o: warning: objtool: set_ftrace_ops_ro+0x33: relocation to !ENDBR: machine_kexec+0x152 kernel test robot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).