oe-kbuild-all.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: kernel test robot <lkp@intel.com>
To: Mark Rutland <mark.rutland@arm.com>
Cc: oe-kbuild-all@lists.linux.dev, Sasha Levin <sashal@kernel.org>,
	Catalin Marinas <catalin.marinas@arm.com>
Subject: [linux-stable-rc:queue/6.2 657/745] vmlinux.o: warning: objtool: btrfs_unfreeze+0x3e1: unreachable instruction
Date: Sun, 5 Mar 2023 14:05:08 +0800	[thread overview]
Message-ID: <202303051302.FSTuNchQ-lkp@intel.com> (raw)

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git queue/6.2
head:   adfadd03a8b460e75b9dd9fbedc2875f000417a8
commit: 54b3db8f985d6ad6cde2f9a3e53f88ef4ebd1b45 [657/745] Compiler attributes: GCC cold function alignment workarounds
config: x86_64-randconfig-a006 (https://download.01.org/0day-ci/archive/20230305/202303051302.FSTuNchQ-lkp@intel.com/config)
compiler: gcc-11 (Debian 11.3.0-8) 11.3.0
reproduce (this is a W=1 build):
        # https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/commit/?id=54b3db8f985d6ad6cde2f9a3e53f88ef4ebd1b45
        git remote add linux-stable-rc https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
        git fetch --no-tags linux-stable-rc queue/6.2
        git checkout 54b3db8f985d6ad6cde2f9a3e53f88ef4ebd1b45
        # save the config file
        mkdir build_dir && cp config build_dir/.config
        make W=1 O=build_dir ARCH=x86_64 olddefconfig
        make W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash

If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@intel.com>
| Link: https://lore.kernel.org/oe-kbuild-all/202303051302.FSTuNchQ-lkp@intel.com/

All warnings (new ones prefixed by >>):

>> vmlinux.o: warning: objtool: btrfs_unfreeze+0x3e1: unreachable instruction


objdump-func vmlinux.o btrfs_unfreeze:
0000 0000000000dd1ca0 <btrfs_unfreeze>:
0000   dd1ca0:	f3 0f 1e fa          	endbr64
0004   dd1ca4:	e8 00 00 00 00       	call   dd1ca9 <btrfs_unfreeze+0x9>	dd1ca5: R_X86_64_PLT32	__fentry__-0x4
0009   dd1ca9:	41 57                	push   %r15
000b   dd1cab:	41 56                	push   %r14
000d   dd1cad:	41 55                	push   %r13
000f   dd1caf:	41 54                	push   %r12
0011   dd1cb1:	55                   	push   %rbp
0012   dd1cb2:	53                   	push   %rbx
0013   dd1cb3:	48 83 ec 18          	sub    $0x18,%rsp
0017   dd1cb7:	48 89 fb             	mov    %rdi,%rbx
001a   dd1cba:	48 81 c7 70 06 00 00 	add    $0x670,%rdi
0021   dd1cc1:	48 89 fa             	mov    %rdi,%rdx
0024   dd1cc4:	48 c1 ea 03          	shr    $0x3,%rdx
0028   dd1cc8:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0032   dd1cd2:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
0036   dd1cd6:	0f 85 aa 04 00 00    	jne    dd2186 <btrfs_unfreeze+0x4e6>
003c   dd1cdc:	4c 8b ab 70 06 00 00 	mov    0x670(%rbx),%r13
0043   dd1ce3:	49 8d 85 20 11 00 00 	lea    0x1120(%r13),%rax
004a   dd1cea:	48 89 44 24 08       	mov    %rax,0x8(%rsp)
004f   dd1cef:	48 89 c2             	mov    %rax,%rdx
0052   dd1cf2:	48 c1 ea 03          	shr    $0x3,%rdx
0056   dd1cf6:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0060   dd1d00:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
0064   dd1d04:	0f 85 6d 04 00 00    	jne    dd2177 <btrfs_unfreeze+0x4d7>
006a   dd1d0a:	49 8b 9d 20 11 00 00 	mov    0x1120(%r13),%rbx
0071   dd1d11:	48 8d ab 08 01 00 00 	lea    0x108(%rbx),%rbp
0078   dd1d18:	48 89 ea             	mov    %rbp,%rdx
007b   dd1d1b:	48 c1 ea 03          	shr    $0x3,%rdx
007f   dd1d1f:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0089   dd1d29:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
008d   dd1d2d:	0f 85 04 04 00 00    	jne    dd2137 <btrfs_unfreeze+0x497>
0093   dd1d33:	48 8b 9b 08 01 00 00 	mov    0x108(%rbx),%rbx
009a   dd1d3a:	48 39 eb             	cmp    %rbp,%rbx
009d   dd1d3d:	0f 84 e3 01 00 00    	je     dd1f26 <btrfs_unfreeze+0x286>
00a3   dd1d43:	48 bd 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rbp
00ad   dd1d4d:	4c 8b 74 24 08       	mov    0x8(%rsp),%r14
00b2   dd1d52:	49 c1 ee 03          	shr    $0x3,%r14
00b6   dd1d56:	49 01 ee             	add    %rbp,%r14
00b9   dd1d59:	48 8d 7b 38          	lea    0x38(%rbx),%rdi
00bd   dd1d5d:	48 89 f8             	mov    %rdi,%rax
00c0   dd1d60:	48 c1 e8 03          	shr    $0x3,%rax
00c4   dd1d64:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1)
00c8   dd1d68:	0f 85 57 03 00 00    	jne    dd20c5 <btrfs_unfreeze+0x425>
00ce   dd1d6e:	4c 8b 7b 38          	mov    0x38(%rbx),%r15
00d2   dd1d72:	4d 8d 67 10          	lea    0x10(%r15),%r12
00d6   dd1d76:	be 08 00 00 00       	mov    $0x8,%esi
00db   dd1d7b:	4c 89 e7             	mov    %r12,%rdi
00de   dd1d7e:	e8 00 00 00 00       	call   dd1d83 <btrfs_unfreeze+0xe3>	dd1d7f: R_X86_64_PLT32	__kasan_check_read-0x4
00e3   dd1d83:	4c 89 e0             	mov    %r12,%rax
00e6   dd1d86:	48 c1 e8 03          	shr    $0x3,%rax
00ea   dd1d8a:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1)
00ee   dd1d8e:	0f 85 21 03 00 00    	jne    dd20b5 <btrfs_unfreeze+0x415>
00f4   dd1d94:	49 8b 47 10          	mov    0x10(%r15),%rax
00f8   dd1d98:	f6 c4 08             	test   $0x8,%ah
00fb   dd1d9b:	0f 84 c8 02 00 00    	je     dd2069 <btrfs_unfreeze+0x3c9>
0101   dd1da1:	48 8d 7b 50          	lea    0x50(%rbx),%rdi
0105   dd1da5:	48 89 f8             	mov    %rdi,%rax
0108   dd1da8:	48 c1 e8 03          	shr    $0x3,%rax
010c   dd1dac:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1)
0110   dd1db0:	0f 85 f4 02 00 00    	jne    dd20aa <btrfs_unfreeze+0x40a>
0116   dd1db6:	48 8b 7b 50          	mov    0x50(%rbx),%rdi
011a   dd1dba:	48 85 ff             	test   %rdi,%rdi
011d   dd1dbd:	0f 84 4c 02 00 00    	je     dd200f <btrfs_unfreeze+0x36f>
0123   dd1dc3:	ba 01 00 00 00       	mov    $0x1,%edx
0128   dd1dc8:	31 f6                	xor    %esi,%esi
012a   dd1dca:	e8 00 00 00 00       	call   dd1dcf <btrfs_unfreeze+0x12f>	dd1dcb: R_X86_64_PLT32	btrfs_read_dev_one_super-0x4
012f   dd1dcf:	49 89 c4             	mov    %rax,%r12
0132   dd1dd2:	89 c1                	mov    %eax,%ecx
0134   dd1dd4:	48 3d 00 f0 ff ff    	cmp    $0xfffffffffffff000,%rax
013a   dd1dda:	0f 87 27 02 00 00    	ja     dd2007 <btrfs_unfreeze+0x367>
0140   dd1de0:	48 8d b8 c4 00 00 00 	lea    0xc4(%rax),%rdi
0147   dd1de7:	48 89 f8             	mov    %rdi,%rax
014a   dd1dea:	48 c1 e8 03          	shr    $0x3,%rax
014e   dd1dee:	0f b6 0c 28          	movzbl (%rax,%rbp,1),%ecx
0152   dd1df2:	49 8d 84 24 c5 00 00 00 	lea    0xc5(%r12),%rax
015a   dd1dfa:	48 89 c2             	mov    %rax,%rdx
015d   dd1dfd:	48 c1 ea 03          	shr    $0x3,%rdx
0161   dd1e01:	0f b6 14 2a          	movzbl (%rdx,%rbp,1),%edx
0165   dd1e05:	48 89 fe             	mov    %rdi,%rsi
0168   dd1e08:	83 e6 07             	and    $0x7,%esi
016b   dd1e0b:	40 38 f1             	cmp    %sil,%cl
016e   dd1e0e:	40 0f 9e c6          	setle  %sil
0172   dd1e12:	84 c9                	test   %cl,%cl
0174   dd1e14:	0f 95 c1             	setne  %cl
0177   dd1e17:	40 84 ce             	test   %cl,%sil
017a   dd1e1a:	0f 85 e7 02 00 00    	jne    dd2107 <btrfs_unfreeze+0x467>
0180   dd1e20:	83 e0 07             	and    $0x7,%eax
0183   dd1e23:	38 c2                	cmp    %al,%dl
0185   dd1e25:	0f 9e c1             	setle  %cl
0188   dd1e28:	84 d2                	test   %dl,%dl
018a   dd1e2a:	0f 95 c0             	setne  %al
018d   dd1e2d:	84 c1                	test   %al,%cl
018f   dd1e2f:	0f 85 d2 02 00 00    	jne    dd2107 <btrfs_unfreeze+0x467>
0195   dd1e35:	41 0f b7 94 24 c4 00 00 00 	movzwl 0xc4(%r12),%edx
019e   dd1e3e:	49 8d bf c0 06 00 00 	lea    0x6c0(%r15),%rdi
01a5   dd1e45:	48 89 f8             	mov    %rdi,%rax
01a8   dd1e48:	48 c1 e8 03          	shr    $0x3,%rax
01ac   dd1e4c:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1)
01b0   dd1e50:	0f 85 9f 02 00 00    	jne    dd20f5 <btrfs_unfreeze+0x455>
01b6   dd1e56:	49 8b 8f c0 06 00 00 	mov    0x6c0(%r15),%rcx
01bd   dd1e5d:	48 8d b9 c4 00 00 00 	lea    0xc4(%rcx),%rdi
01c4   dd1e64:	48 89 f8             	mov    %rdi,%rax
01c7   dd1e67:	48 c1 e8 03          	shr    $0x3,%rax
01cb   dd1e6b:	44 0f b6 0c 28       	movzbl (%rax,%rbp,1),%r9d
01d0   dd1e70:	48 8d 81 c5 00 00 00 	lea    0xc5(%rcx),%rax
01d7   dd1e77:	48 89 c6             	mov    %rax,%rsi
01da   dd1e7a:	48 c1 ee 03          	shr    $0x3,%rsi
01de   dd1e7e:	0f b6 34 2e          	movzbl (%rsi,%rbp,1),%esi
01e2   dd1e82:	49 89 fa             	mov    %rdi,%r10
01e5   dd1e85:	41 83 e2 07          	and    $0x7,%r10d
01e9   dd1e89:	45 38 d1             	cmp    %r10b,%r9b
01ec   dd1e8c:	41 0f 9e c2          	setle  %r10b
01f0   dd1e90:	45 84 c9             	test   %r9b,%r9b
01f3   dd1e93:	41 0f 95 c1          	setne  %r9b
01f7   dd1e97:	45 84 ca             	test   %r9b,%r10b
01fa   dd1e9a:	0f 85 76 02 00 00    	jne    dd2116 <btrfs_unfreeze+0x476>
0200   dd1ea0:	83 e0 07             	and    $0x7,%eax
0203   dd1ea3:	40 38 c6             	cmp    %al,%sil
0206   dd1ea6:	41 0f 9e c1          	setle  %r9b
020a   dd1eaa:	40 84 f6             	test   %sil,%sil
020d   dd1ead:	0f 95 c0             	setne  %al
0210   dd1eb0:	41 84 c1             	test   %al,%r9b
0213   dd1eb3:	0f 85 5d 02 00 00    	jne    dd2116 <btrfs_unfreeze+0x476>
0219   dd1eb9:	0f b7 89 c4 00 00 00 	movzwl 0xc4(%rcx),%ecx
0220   dd1ec0:	66 39 ca             	cmp    %cx,%dx
0223   dd1ec3:	0f 84 82 00 00 00    	je     dd1f4b <btrfs_unfreeze+0x2ab>
0229   dd1ec9:	0f b7 d2             	movzwl %dx,%edx
022c   dd1ecc:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi	dd1ecf: R_X86_64_32S	.rodata+0x213580
0233   dd1ed3:	4c 89 ff             	mov    %r15,%rdi
0236   dd1ed6:	e8 00 00 00 00       	call   dd1edb <btrfs_unfreeze+0x23b>	dd1ed7: R_X86_64_PLT32	_btrfs_printk-0x4
023b   dd1edb:	4c 89 e7             	mov    %r12,%rdi
023e   dd1ede:	e8 00 00 00 00       	call   dd1ee3 <btrfs_unfreeze+0x243>	dd1edf: R_X86_64_PLT32	btrfs_release_disk_super-0x4
0243   dd1ee3:	b9 8b ff ff ff       	mov    $0xffffff8b,%ecx
0248   dd1ee8:	48 8d 7b 78          	lea    0x78(%rbx),%rdi
024c   dd1eec:	48 89 fa             	mov    %rdi,%rdx
024f   dd1eef:	48 c1 ea 03          	shr    $0x3,%rdx
0253   dd1ef3:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
025d   dd1efd:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
0261   dd1f01:	0f 85 8e 02 00 00    	jne    dd2195 <btrfs_unfreeze+0x4f5>
0267   dd1f07:	4c 8b 4b 78          	mov    0x78(%rbx),%r9
026b   dd1f0b:	49 c7 c0 00 00 00 00 	mov    $0x0,%r8	dd1f0e: R_X86_64_32S	.rodata+0x2136a0
0272   dd1f12:	ba 09 09 00 00       	mov    $0x909,%edx
0277   dd1f17:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi	dd1f1a: R_X86_64_32S	.rodata+0x216180
027e   dd1f1e:	4c 89 ef             	mov    %r13,%rdi
0281   dd1f21:	e8 00 00 00 00       	call   dd1f26 <btrfs_unfreeze+0x286>	dd1f22: R_X86_64_PLT32	__btrfs_handle_fs_error-0x4
0286   dd1f26:	49 8d 7d 10          	lea    0x10(%r13),%rdi
028a   dd1f2a:	be 08 00 00 00       	mov    $0x8,%esi
028f   dd1f2f:	e8 00 00 00 00       	call   dd1f34 <btrfs_unfreeze+0x294>	dd1f30: R_X86_64_PLT32	__kasan_check_write-0x4
0294   dd1f34:	f0 41 80 65 11 f7    	lock andb $0xf7,0x11(%r13)
029a   dd1f3a:	31 c0                	xor    %eax,%eax
029c   dd1f3c:	48 83 c4 18          	add    $0x18,%rsp
02a0   dd1f40:	5b                   	pop    %rbx
02a1   dd1f41:	5d                   	pop    %rbp
02a2   dd1f42:	41 5c                	pop    %r12
02a4   dd1f44:	41 5d                	pop    %r13
02a6   dd1f46:	41 5e                	pop    %r14
02a8   dd1f48:	41 5f                	pop    %r15
02aa   dd1f4a:	c3                   	ret
02ab   dd1f4b:	4c 89 e6             	mov    %r12,%rsi
02ae   dd1f4e:	4c 89 ff             	mov    %r15,%rdi
02b1   dd1f51:	e8 00 00 00 00       	call   dd1f56 <btrfs_unfreeze+0x2b6>	dd1f52: R_X86_64_PLT32	btrfs_check_super_csum-0x4
02b6   dd1f56:	85 c0                	test   %eax,%eax
02b8   dd1f58:	0f 85 ea 00 00 00    	jne    dd2048 <btrfs_unfreeze+0x3a8>
02be   dd1f5e:	31 d2                	xor    %edx,%edx
02c0   dd1f60:	4c 89 e6             	mov    %r12,%rsi
02c3   dd1f63:	4c 89 ff             	mov    %r15,%rdi
02c6   dd1f66:	e8 00 00 00 00       	call   dd1f6b <btrfs_unfreeze+0x2cb>	dd1f67: R_X86_64_PLT32	btrfs_validate_super-0x4
02cb   dd1f6b:	89 c1                	mov    %eax,%ecx
02cd   dd1f6d:	85 c0                	test   %eax,%eax
02cf   dd1f6f:	0f 88 82 00 00 00    	js     dd1ff7 <btrfs_unfreeze+0x357>
02d5   dd1f75:	49 8d 7c 24 48       	lea    0x48(%r12),%rdi
02da   dd1f7a:	48 89 f8             	mov    %rdi,%rax
02dd   dd1f7d:	48 c1 e8 03          	shr    $0x3,%rax
02e1   dd1f81:	0f b6 34 28          	movzbl (%rax,%rbp,1),%esi
02e5   dd1f85:	49 8d 44 24 4f       	lea    0x4f(%r12),%rax
02ea   dd1f8a:	48 89 c2             	mov    %rax,%rdx
02ed   dd1f8d:	48 c1 ea 03          	shr    $0x3,%rdx
02f1   dd1f91:	0f b6 14 2a          	movzbl (%rdx,%rbp,1),%edx
02f5   dd1f95:	49 89 f9             	mov    %rdi,%r9
02f8   dd1f98:	41 83 e1 07          	and    $0x7,%r9d
02fc   dd1f9c:	44 38 ce             	cmp    %r9b,%sil
02ff   dd1f9f:	41 0f 9e c1          	setle  %r9b
0303   dd1fa3:	40 84 f6             	test   %sil,%sil
0306   dd1fa6:	40 0f 95 c6          	setne  %sil
030a   dd1faa:	41 84 f1             	test   %sil,%r9b
030d   dd1fad:	0f 85 91 01 00 00    	jne    dd2144 <btrfs_unfreeze+0x4a4>
0313   dd1fb3:	83 e0 07             	and    $0x7,%eax
0316   dd1fb6:	38 c2                	cmp    %al,%dl
0318   dd1fb8:	40 0f 9e c6          	setle  %sil
031c   dd1fbc:	84 d2                	test   %dl,%dl
031e   dd1fbe:	0f 95 c0             	setne  %al
0321   dd1fc1:	40 84 c6             	test   %al,%sil
0324   dd1fc4:	0f 85 7a 01 00 00    	jne    dd2144 <btrfs_unfreeze+0x4a4>
032a   dd1fca:	49 8b 54 24 48       	mov    0x48(%r12),%rdx
032f   dd1fcf:	49 8d bf f8 04 00 00 	lea    0x4f8(%r15),%rdi
0336   dd1fd6:	48 89 f8             	mov    %rdi,%rax
0339   dd1fd9:	48 c1 e8 03          	shr    $0x3,%rax
033d   dd1fdd:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1)
0341   dd1fe1:	0f 85 74 01 00 00    	jne    dd215b <btrfs_unfreeze+0x4bb>
0347   dd1fe7:	4d 8b 8f f8 04 00 00 	mov    0x4f8(%r15),%r9
034e   dd1fee:	4c 39 ca             	cmp    %r9,%rdx
0351   dd1ff1:	0f 85 8f 00 00 00    	jne    dd2086 <btrfs_unfreeze+0x3e6>
0357   dd1ff7:	89 4c 24 04          	mov    %ecx,0x4(%rsp)
035b   dd1ffb:	4c 89 e7             	mov    %r12,%rdi
035e   dd1ffe:	e8 00 00 00 00       	call   dd2003 <btrfs_unfreeze+0x363>	dd1fff: R_X86_64_PLT32	btrfs_release_disk_super-0x4
0363   dd2003:	8b 4c 24 04          	mov    0x4(%rsp),%ecx
0367   dd2007:	85 c9                	test   %ecx,%ecx
0369   dd2009:	0f 88 d9 fe ff ff    	js     dd1ee8 <btrfs_unfreeze+0x248>
036f   dd200f:	48 89 d8             	mov    %rbx,%rax
0372   dd2012:	48 c1 e8 03          	shr    $0x3,%rax
0376   dd2016:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1)
037a   dd201a:	0f 85 c5 00 00 00    	jne    dd20e5 <btrfs_unfreeze+0x445>
0380   dd2020:	48 8b 1b             	mov    (%rbx),%rbx
0383   dd2023:	41 80 3e 00          	cmpb   $0x0,(%r14)
0387   dd2027:	0f 85 a8 00 00 00    	jne    dd20d5 <btrfs_unfreeze+0x435>
038d   dd202d:	49 8b 85 20 11 00 00 	mov    0x1120(%r13),%rax
0394   dd2034:	48 05 08 01 00 00    	add    $0x108,%rax
039a   dd203a:	48 39 c3             	cmp    %rax,%rbx
039d   dd203d:	0f 85 16 fd ff ff    	jne    dd1d59 <btrfs_unfreeze+0xb9>
03a3   dd2043:	e9 de fe ff ff       	jmp    dd1f26 <btrfs_unfreeze+0x286>
03a8   dd2048:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi	dd204b: R_X86_64_32S	.rodata+0x2135e0
03af   dd204f:	4c 89 ff             	mov    %r15,%rdi
03b2   dd2052:	e8 00 00 00 00       	call   dd2057 <btrfs_unfreeze+0x3b7>	dd2053: R_X86_64_PLT32	_btrfs_printk-0x4
03b7   dd2057:	4c 89 e7             	mov    %r12,%rdi
03ba   dd205a:	e8 00 00 00 00       	call   dd205f <btrfs_unfreeze+0x3bf>	dd205b: R_X86_64_PLT32	btrfs_release_disk_super-0x4
03bf   dd205f:	b9 8b ff ff ff       	mov    $0xffffff8b,%ecx
03c4   dd2064:	e9 7f fe ff ff       	jmp    dd1ee8 <btrfs_unfreeze+0x248>
03c9   dd2069:	ba cd 08 00 00       	mov    $0x8cd,%edx
03ce   dd206e:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi	dd2071: R_X86_64_32S	.rodata+0x2134a0
03d5   dd2075:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	dd2078: R_X86_64_32S	.rodata+0x213520
03dc   dd207c:	e8 00 00 00 00       	call   dd2081 <btrfs_unfreeze+0x3e1>	dd207d: R_X86_64_PLT32	btrfs_assertfail-0x4
03e1   dd2081:	e9 1b fd ff ff       	jmp    dd1da1 <btrfs_unfreeze+0x101>
03e6   dd2086:	4c 89 c9             	mov    %r9,%rcx
03e9   dd2089:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi	dd208c: R_X86_64_32S	.rodata+0x213640
03f0   dd2090:	4c 89 ff             	mov    %r15,%rdi
03f3   dd2093:	e8 00 00 00 00       	call   dd2098 <btrfs_unfreeze+0x3f8>	dd2094: R_X86_64_PLT32	_btrfs_printk-0x4
03f8   dd2098:	4c 89 e7             	mov    %r12,%rdi
03fb   dd209b:	e8 00 00 00 00       	call   dd20a0 <btrfs_unfreeze+0x400>	dd209c: R_X86_64_PLT32	btrfs_release_disk_super-0x4
0400   dd20a0:	b9 8b ff ff ff       	mov    $0xffffff8b,%ecx
0405   dd20a5:	e9 3e fe ff ff       	jmp    dd1ee8 <btrfs_unfreeze+0x248>
040a   dd20aa:	e8 00 00 00 00       	call   dd20af <btrfs_unfreeze+0x40f>	dd20ab: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
040f   dd20af:	90                   	nop
0410   dd20b0:	e9 01 fd ff ff       	jmp    dd1db6 <btrfs_unfreeze+0x116>
0415   dd20b5:	4c 89 e7             	mov    %r12,%rdi
0418   dd20b8:	e8 00 00 00 00       	call   dd20bd <btrfs_unfreeze+0x41d>	dd20b9: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
041d   dd20bd:	0f 1f 00             	nopl   (%rax)
0420   dd20c0:	e9 cf fc ff ff       	jmp    dd1d94 <btrfs_unfreeze+0xf4>
0425   dd20c5:	e8 00 00 00 00       	call   dd20ca <btrfs_unfreeze+0x42a>	dd20c6: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
042a   dd20ca:	66 0f 1f 44 00 00    	nopw   0x0(%rax,%rax,1)
0430   dd20d0:	e9 99 fc ff ff       	jmp    dd1d6e <btrfs_unfreeze+0xce>
0435   dd20d5:	48 8b 7c 24 08       	mov    0x8(%rsp),%rdi
043a   dd20da:	e8 00 00 00 00       	call   dd20df <btrfs_unfreeze+0x43f>	dd20db: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
043f   dd20df:	90                   	nop
0440   dd20e0:	e9 48 ff ff ff       	jmp    dd202d <btrfs_unfreeze+0x38d>
0445   dd20e5:	48 89 df             	mov    %rbx,%rdi
0448   dd20e8:	e8 00 00 00 00       	call   dd20ed <btrfs_unfreeze+0x44d>	dd20e9: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
044d   dd20ed:	0f 1f 00             	nopl   (%rax)
0450   dd20f0:	e9 2b ff ff ff       	jmp    dd2020 <btrfs_unfreeze+0x380>
0455   dd20f5:	89 54 24 04          	mov    %edx,0x4(%rsp)
0459   dd20f9:	e8 00 00 00 00       	call   dd20fe <btrfs_unfreeze+0x45e>	dd20fa: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
045e   dd20fe:	8b 54 24 04          	mov    0x4(%rsp),%edx
0462   dd2102:	e9 4f fd ff ff       	jmp    dd1e56 <btrfs_unfreeze+0x1b6>
0467   dd2107:	be 02 00 00 00       	mov    $0x2,%esi
046c   dd210c:	e8 00 00 00 00       	call   dd2111 <btrfs_unfreeze+0x471>	dd210d: R_X86_64_PLT32	__asan_report_load_n_noabort-0x4
0471   dd2111:	e9 1f fd ff ff       	jmp    dd1e35 <btrfs_unfreeze+0x195>
0476   dd2116:	48 89 4c 24 10       	mov    %rcx,0x10(%rsp)
047b   dd211b:	89 54 24 04          	mov    %edx,0x4(%rsp)
047f   dd211f:	be 02 00 00 00       	mov    $0x2,%esi
0484   dd2124:	e8 00 00 00 00       	call   dd2129 <btrfs_unfreeze+0x489>	dd2125: R_X86_64_PLT32	__asan_report_load_n_noabort-0x4
0489   dd2129:	48 8b 4c 24 10       	mov    0x10(%rsp),%rcx
048e   dd212e:	8b 54 24 04          	mov    0x4(%rsp),%edx
0492   dd2132:	e9 82 fd ff ff       	jmp    dd1eb9 <btrfs_unfreeze+0x219>
0497   dd2137:	48 89 ef             	mov    %rbp,%rdi
049a   dd213a:	e8 00 00 00 00       	call   dd213f <btrfs_unfreeze+0x49f>	dd213b: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
049f   dd213f:	e9 ef fb ff ff       	jmp    dd1d33 <btrfs_unfreeze+0x93>
04a4   dd2144:	89 4c 24 04          	mov    %ecx,0x4(%rsp)
04a8   dd2148:	be 08 00 00 00       	mov    $0x8,%esi
04ad   dd214d:	e8 00 00 00 00       	call   dd2152 <btrfs_unfreeze+0x4b2>	dd214e: R_X86_64_PLT32	__asan_report_load_n_noabort-0x4
04b2   dd2152:	8b 4c 24 04          	mov    0x4(%rsp),%ecx
04b6   dd2156:	e9 6f fe ff ff       	jmp    dd1fca <btrfs_unfreeze+0x32a>
04bb   dd215b:	48 89 54 24 10       	mov    %rdx,0x10(%rsp)
04c0   dd2160:	89 4c 24 04          	mov    %ecx,0x4(%rsp)
04c4   dd2164:	e8 00 00 00 00       	call   dd2169 <btrfs_unfreeze+0x4c9>	dd2165: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
04c9   dd2169:	48 8b 54 24 10       	mov    0x10(%rsp),%rdx
04ce   dd216e:	8b 4c 24 04          	mov    0x4(%rsp),%ecx
04d2   dd2172:	e9 70 fe ff ff       	jmp    dd1fe7 <btrfs_unfreeze+0x347>
04d7   dd2177:	48 8b 7c 24 08       	mov    0x8(%rsp),%rdi
04dc   dd217c:	e8 00 00 00 00       	call   dd2181 <btrfs_unfreeze+0x4e1>	dd217d: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
04e1   dd2181:	e9 84 fb ff ff       	jmp    dd1d0a <btrfs_unfreeze+0x6a>
04e6   dd2186:	e8 00 00 00 00       	call   dd218b <btrfs_unfreeze+0x4eb>	dd2187: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
04eb   dd218b:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
04f0   dd2190:	e9 47 fb ff ff       	jmp    dd1cdc <btrfs_unfreeze+0x3c>
04f5   dd2195:	89 4c 24 04          	mov    %ecx,0x4(%rsp)
04f9   dd2199:	e8 00 00 00 00       	call   dd219e <btrfs_unfreeze+0x4fe>	dd219a: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
04fe   dd219e:	8b 4c 24 04          	mov    0x4(%rsp),%ecx
0502   dd21a2:	e9 60 fd ff ff       	jmp    dd1f07 <btrfs_unfreeze+0x267>
0507   dd21a7:	66 0f 1f 84 00 00 00 00 00 	nopw   0x0(%rax,%rax,1)

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests

                 reply	other threads:[~2023-03-05  6:05 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=202303051302.FSTuNchQ-lkp@intel.com \
    --to=lkp@intel.com \
    --cc=catalin.marinas@arm.com \
    --cc=mark.rutland@arm.com \
    --cc=oe-kbuild-all@lists.linux.dev \
    --cc=sashal@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).