:::::: 
:::::: Manual check reason: "low confidence static check first_new_problem: 
vmlinux.o: warning: objtool: vmx_vcpu_enter_exit+0x41: call to 
context_tracking_enabled_this_cpu() leaves .noinstr.text section"
:::::: 

BCC: [email protected]
CC: [email protected]
CC: [email protected]
TO: Peter Zijlstra <[email protected]>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 
master
head:   2ae08b36c06ea8df73a79f6b80ff7964e006e9e3
commit: 656d054e0a15ec327bd82801ccd58201e59f6896 jump_label,noinstr: Avoid 
instrumentation for JUMP_LABEL=n builds
date:   3 months ago
:::::: branch date: 70 minutes ago
:::::: commit date: 3 months ago
config: x86_64-randconfig-s022-20220808 
(https://download.01.org/0day-ci/archive/20220812/[email protected]/config)
compiler: gcc-11 (Debian 11.3.0-3) 11.3.0
reproduce:
        # apt-get install sparse
        # sparse version: v0.6.4-39-gce1a6720-dirty
        # 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=656d054e0a15ec327bd82801ccd58201e59f6896
        git remote add linus 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
        git fetch --no-tags linus master
        git checkout 656d054e0a15ec327bd82801ccd58201e59f6896
        # save the config file
        mkdir build_dir && cp config build_dir/.config
        make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir 
ARCH=x86_64 SHELL=/bin/bash

If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <[email protected]>

All warnings (new ones prefixed by >>):

>> vmlinux.o: warning: objtool: vmx_vcpu_enter_exit+0x41: call to 
>> context_tracking_enabled_this_cpu() leaves .noinstr.text section


objdump-func vmlinux.o vmx_vcpu_enter_exit:
0000 0000000000001300 <vmx_vcpu_enter_exit>:
0000     1300:  55                      push   %rbp
0001     1301:  48 89 e5                mov    %rsp,%rbp
0004     1304:  41 56                   push   %r14
0006     1306:  41 55                   push   %r13
0008     1308:  41 54                   push   %r12
000a     130a:  49 89 f4                mov    %rsi,%r12
000d     130d:  53                      push   %rbx
000e     130e:  48 89 fb                mov    %rdi,%rbx
0011     1311:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 1312: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
0016     1316:  90                      nop
0017     1317:  e8 00 00 00 00          call   131c <vmx_vcpu_enter_exit+0x1c>  
1318: R_X86_64_PLT32    trace_hardirqs_on_prepare-0x4
001c     131c:  e8 00 00 00 00          call   1321 <vmx_vcpu_enter_exit+0x21>  
131d: R_X86_64_PLT32    lockdep_hardirqs_on_prepare-0x4
0021     1321:  90                      nop
0022     1322:  44 8b 2d 00 00 00 00    mov    0x0(%rip),%r13d        # 1329 
<vmx_vcpu_enter_exit+0x29> 1325: R_X86_64_PC32     context_tracking_key-0x4
0029     1329:  31 ff                   xor    %edi,%edi
002b     132b:  44 89 ee                mov    %r13d,%esi
002e     132e:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 132f: 
R_X86_64_NONE     __sanitizer_cov_trace_const_cmp4-0x4
0033     1333:  45 85 ed                test   %r13d,%r13d
0036     1336:  0f 8f f5 00 00 00       jg     1431 <vmx_vcpu_enter_exit+0x131>
003c     133c:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 133d: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
0041     1341:  e8 00 00 00 00          call   1346 <vmx_vcpu_enter_exit+0x46>  
1342: R_X86_64_PC32     .text+0x1e89bc
0046     1346:  31 ff                   xor    %edi,%edi
0048     1348:  41 89 c5                mov    %eax,%r13d
004b     134b:  89 c6                   mov    %eax,%esi
004d     134d:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 134e: 
R_X86_64_NONE     __sanitizer_cov_trace_const_cmp1-0x4
0052     1352:  45 84 ed                test   %r13b,%r13b
0055     1355:  75 07                   jne    135e <vmx_vcpu_enter_exit+0x5e>
0057     1357:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 1358: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
005c     135c:  90                      nop
005d     135d:  90                      nop
005e     135e:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 135f: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
0063     1363:  48 8b 7d 08             mov    0x8(%rbp),%rdi
0067     1367:  e8 00 00 00 00          call   136c <vmx_vcpu_enter_exit+0x6c>  
1368: R_X86_64_PLT32    lockdep_hardirqs_on-0x4
006c     136c:  44 8b 2d 00 00 00 00    mov    0x0(%rip),%r13d        # 1373 
<vmx_vcpu_enter_exit+0x73> 136f: R_X86_64_PC32     .bss+0x5dbc
0073     1373:  31 ff                   xor    %edi,%edi
0075     1375:  44 89 ee                mov    %r13d,%esi
0078     1378:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 1379: 
R_X86_64_NONE     __sanitizer_cov_trace_const_cmp4-0x4
007d     137d:  45 85 ed                test   %r13d,%r13d
0080     1380:  0f 8f bf 00 00 00       jg     1445 <vmx_vcpu_enter_exit+0x145>
0086     1386:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 1387: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
008b     138b:  44 8b 2d 00 00 00 00    mov    0x0(%rip),%r13d        # 1392 
<vmx_vcpu_enter_exit+0x92> 138e: R_X86_64_PC32     mds_user_clear-0x4
0092     1392:  31 ff                   xor    %edi,%edi
0094     1394:  44 89 ee                mov    %r13d,%esi
0097     1397:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 1398: 
R_X86_64_NONE     __sanitizer_cov_trace_const_cmp4-0x4
009c     139c:  45 85 ed                test   %r13d,%r13d
009f     139f:  0f 8f c3 00 00 00       jg     1468 <vmx_vcpu_enter_exit+0x168>
00a5     13a5:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 13a6: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
00aa     13aa:  4c 8b ab 58 02 00 00    mov    0x258(%rbx),%r13
00b1     13b1:  41 0f 20 d6             mov    %cr2,%r14
00b5     13b5:  4c 89 f6                mov    %r14,%rsi
00b8     13b8:  4c 89 ef                mov    %r13,%rdi
00bb     13bb:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 13bc: 
R_X86_64_NONE     __sanitizer_cov_trace_cmp8-0x4
00c0     13c0:  4d 39 f5                cmp    %r14,%r13
00c3     13c3:  74 09                   je     13ce <vmx_vcpu_enter_exit+0xce>
00c5     13c5:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 13c6: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
00ca     13ca:  41 0f 22 d5             mov    %r13,%cr2
00ce     13ce:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 13cf: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
00d3     13d3:  49 8b 84 24 80 25 00 00         mov    0x2580(%r12),%rax
00db     13db:  48 8d b3 b8 01 00 00    lea    0x1b8(%rbx),%rsi
00e2     13e2:  4c 89 e7                mov    %r12,%rdi
00e5     13e5:  0f b6 50 14             movzbl 0x14(%rax),%edx
00e9     13e9:  e8 00 00 00 00          call   13ee <vmx_vcpu_enter_exit+0xee>  
13ea: R_X86_64_PLT32    __vmx_vcpu_run-0x4
00ee     13ee:  41 88 84 24 f8 23 00 00         mov    %al,0x23f8(%r12)
00f6     13f6:  0f 20 d0                mov    %cr2,%rax
00f9     13f9:  48 89 83 58 02 00 00    mov    %rax,0x258(%rbx)
0100     1400:  48 8b 7d 08             mov    0x8(%rbp),%rdi
0104     1404:  e8 00 00 00 00          call   1409 <vmx_vcpu_enter_exit+0x109> 
1405: R_X86_64_PLT32    lockdep_hardirqs_off-0x4
0109     1409:  8b 1d 00 00 00 00       mov    0x0(%rip),%ebx        # 140f 
<vmx_vcpu_enter_exit+0x10f> 140b: R_X86_64_PC32     context_tracking_key-0x4
010f     140f:  31 ff                   xor    %edi,%edi
0111     1411:  89 de                   mov    %ebx,%esi
0113     1413:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 1414: 
R_X86_64_NONE     __sanitizer_cov_trace_const_cmp4-0x4
0118     1418:  85 db                   test   %ebx,%ebx
011a     141a:  7f 3b                   jg     1457 <vmx_vcpu_enter_exit+0x157>
011c     141c:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 141d: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
0121     1421:  90                      nop
0122     1422:  e8 00 00 00 00          call   1427 <vmx_vcpu_enter_exit+0x127> 
1423: R_X86_64_PLT32    trace_hardirqs_off_finish-0x4
0127     1427:  90                      nop
0128     1428:  5b                      pop    %rbx
0129     1429:  41 5c                   pop    %r12
012b     142b:  41 5d                   pop    %r13
012d     142d:  41 5e                   pop    %r14
012f     142f:  5d                      pop    %rbp
0130     1430:  c3                      ret    
0131     1431:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 1432: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
0136     1436:  bf 02 00 00 00          mov    $0x2,%edi
013b     143b:  e8 00 00 00 00          call   1440 <vmx_vcpu_enter_exit+0x140> 
143c: R_X86_64_PLT32    __context_tracking_enter-0x4
0140     1440:  e9 f7 fe ff ff          jmp    133c <vmx_vcpu_enter_exit+0x3c>
0145     1445:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 1446: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
014a     144a:  48 89 df                mov    %rbx,%rdi
014d     144d:  e8 ae fd ff ff          call   1200 <vmx_l1d_flush>
0152     1452:  e9 4e ff ff ff          jmp    13a5 <vmx_vcpu_enter_exit+0xa5>
0157     1457:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 1458: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
015c     145c:  bf 02 00 00 00          mov    $0x2,%edi
0161     1461:  e8 00 00 00 00          call   1466 <vmx_vcpu_enter_exit+0x166> 
1462: R_X86_64_PLT32    __context_tracking_exit-0x4
0166     1466:  eb b4                   jmp    141c <vmx_vcpu_enter_exit+0x11c>
0168     1468:  0f 1f 44 00 00          nopl   0x0(%rax,%rax,1) 1469: 
R_X86_64_NONE     __sanitizer_cov_trace_pc-0x4
016d     146d:  0f 00 2d 00 00 00 00    verw   0x0(%rip)        # 1474 
<vmx_vcpu_enter_exit+0x174>      1470: R_X86_64_PC32     .rodata+0x48a9c
0174     1474:  e9 2c ff ff ff          jmp    13a5 <vmx_vcpu_enter_exit+0xa5>
0179     1479:  0f 1f 80 00 00 00 00    nopl   0x0(%rax)

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp
_______________________________________________
kbuild mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to