* [sudeep-holla:android13-5.10/ffa 2043/9999] mm/userfaultfd.o: warning: objtool: pfn_pte()+0xc1: unreachable instruction
@ 2024-09-14 18:07 kernel test robot
0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2024-09-14 18:07 UTC (permalink / raw)
Cc: oe-kbuild-all, llvm
TO: Axel Rasmussen <axelrasmussen@google.com>
CC: Suren Baghdasaryan <surenb@google.com>
CC: Peter Xu <peterx@redhat.com>
CC: Andrew Morton <akpm@linux-foundation.org>
CC: Linux Memory Management List <linux-mm@kvack.org>
CC: Lokesh Gidra <lokeshgidra@google.com>
tree: https://git.kernel.org/pub/scm/linux/kernel/git/sudeep.holla/linux.git android13-5.10/ffa
head: 9e12ac4f9c69befe08119567c073adc938aafc4d
commit: 0b161cf6fc3df505fc34731a732fa9dca3c3989e [2043/9999] FROMGIT: userfaultfd/shmem: modify shmem_mfill_atomic_pte to use install_pte()
config: x86_64-buildonly-randconfig-003-20240912 (https://download.01.org/0day-ci/archive/20240915/202409150234.w6OXxECf-lkp@intel.com/config)
compiler: clang version 18.1.8 (https://github.com/llvm/llvm-project 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff)
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240915/202409150234.w6OXxECf-lkp@intel.com/reproduce)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202409150234.w6OXxECf-lkp@intel.com/
All warnings (new ones prefixed by >>):
>> mm/userfaultfd.o: warning: objtool: pfn_pte()+0xc1: unreachable instruction
objdump-func vmlinux.o pfn_pte:
0000 0000000000030c50 <pfn_pte>:
0000 30c50: 55 push %rbp
0001 30c51: 48 89 e5 mov %rsp,%rbp
0004 30c54: 41 57 push %r15
0006 30c56: 41 56 push %r14
0008 30c58: 41 55 push %r13
000a 30c5a: 41 54 push %r12
000c 30c5c: 53 push %rbx
000d 30c5d: 49 89 f6 mov %rsi,%r14
0010 30c60: 31 f6 xor %esi,%esi
0012 30c62: 48 89 fb mov %rdi,%rbx
0015 30c65: 41 bd 00 00 00 00 mov $0x0,%r13d
001b 30c6b: 41 bc 00 00 00 00 mov $0x0,%r12d
0021 30c71: 41 f6 c6 01 test $0x1,%r14b
0025 30c75: 4d 89 f7 mov %r14,%r15
0028 30c78: 74 36 je 30cb0 <pfn_pte+0x60>
002a 30c7a: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 30c7d: R_X86_64_32S __supported_pte_mask
0031 30c81: e8 00 00 00 00 call 30c86 <pfn_pte+0x36> 30c82: R_X86_64_PLT32 __asan_load8_noabort-0x4
0036 30c86: 48 8b 05 00 00 00 00 mov 0x0(%rip),%rax # 30c8d <pfn_pte+0x3d> 30c89: R_X86_64_PC32 __supported_pte_mask-0x4
003d 30c8d: 31 f6 xor %esi,%esi
003f 30c8f: 4d 89 f7 mov %r14,%r15
0042 30c92: 4c 21 f0 and %r14,%rax
0045 30c95: 4c 39 f0 cmp %r14,%rax
0048 30c98: 74 16 je 30cb0 <pfn_pte+0x60>
004a 30c9a: 0f b6 35 00 00 00 00 movzbl 0x0(%rip),%esi # 30ca1 <pfn_pte+0x51> 30c9d: R_X86_64_PC32 .data.once+0x1
0051 30ca1: 41 bc 01 00 00 00 mov $0x1,%r12d
0057 30ca7: 49 89 c7 mov %rax,%r15
005a 30caa: 83 f6 01 xor $0x1,%esi
005d 30cad: 41 89 f5 mov %esi,%r13d
0060 30cb0: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 30cb3: R_X86_64_32S _ftrace_annotated_branch+0x4f80
0067 30cb7: 31 d2 xor %edx,%edx
0069 30cb9: 31 c9 xor %ecx,%ecx
006b 30cbb: e8 00 00 00 00 call 30cc0 <pfn_pte+0x70> 30cbc: R_X86_64_PLT32 ftrace_likely_update-0x4
0070 30cc0: 45 84 ed test %r13b,%r13b
0073 30cc3: 74 64 je 30d29 <pfn_pte+0xd9>
0075 30cc5: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 30cc8: R_X86_64_32S _ftrace_annotated_branch+0x4fb0
007c 30ccc: be 01 00 00 00 mov $0x1,%esi
0081 30cd1: 31 d2 xor %edx,%edx
0083 30cd3: b9 01 00 00 00 mov $0x1,%ecx
0088 30cd8: c6 05 00 00 00 00 01 movb $0x1,0x0(%rip) # 30cdf <pfn_pte+0x8f> 30cda: R_X86_64_PC32 .data.once
008f 30cdf: e8 00 00 00 00 call 30ce4 <pfn_pte+0x94> 30ce0: R_X86_64_PLT32 ftrace_likely_update-0x4
0094 30ce4: 4d 89 fd mov %r15,%r13
0097 30ce7: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 30cea: R_X86_64_32S __supported_pte_mask
009e 30cee: 4d 31 f5 xor %r14,%r13
00a1 30cf1: e8 00 00 00 00 call 30cf6 <pfn_pte+0xa6> 30cf2: R_X86_64_PLT32 __asan_load8_noabort-0x4
00a6 30cf6: 48 8b 0d 00 00 00 00 mov 0x0(%rip),%rcx # 30cfd <pfn_pte+0xad> 30cf9: R_X86_64_PC32 __supported_pte_mask-0x4
00ad 30cfd: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 30d00: R_X86_64_32S .rodata+0x138e0
00b4 30d04: 4c 89 f6 mov %r14,%rsi
00b7 30d07: 4c 89 ea mov %r13,%rdx
00ba 30d0a: e8 00 00 00 00 call 30d0f <pfn_pte+0xbf> 30d0b: R_X86_64_PLT32 __warn_printk-0x4
00bf 30d0f: 0f 0b ud2
00c1 30d11: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 30d14: R_X86_64_32S _ftrace_annotated_branch+0x4fe0
00c8 30d18: be 01 00 00 00 mov $0x1,%esi
00cd 30d1d: 31 d2 xor %edx,%edx
00cf 30d1f: b9 01 00 00 00 mov $0x1,%ecx
00d4 30d24: e8 00 00 00 00 call 30d29 <pfn_pte+0xd9> 30d25: R_X86_64_PLT32 ftrace_likely_update-0x4
00d9 30d29: 41 f6 c6 01 test $0x1,%r14b
00dd 30d2d: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 30d30: R_X86_64_32S _ftrace_annotated_branch+0x5010
00e4 30d34: 44 89 e6 mov %r12d,%esi
00e7 30d37: 0f 94 c0 sete %al
00ea 30d3a: 48 c1 e3 0c shl $0xc,%rbx
00ee 30d3e: 4d 85 f6 test %r14,%r14
00f1 30d41: 0f 95 c1 setne %cl
00f4 30d44: 31 d2 xor %edx,%edx
00f6 30d46: 20 c1 and %al,%cl
00f8 30d48: 0f b6 c1 movzbl %cl,%eax
00fb 30d4b: 31 c9 xor %ecx,%ecx
00fd 30d4d: 48 f7 d8 neg %rax
0100 30d50: 48 31 d8 xor %rbx,%rax
0103 30d53: 48 bb 00 f0 ff ff ff ff 0f 00 movabs $0xffffffffff000,%rbx
010d 30d5d: 48 21 c3 and %rax,%rbx
0110 30d60: e8 00 00 00 00 call 30d65 <pfn_pte+0x115> 30d61: R_X86_64_PLT32 ftrace_likely_update-0x4
0115 30d65: 49 09 df or %rbx,%r15
0118 30d68: 4c 89 f8 mov %r15,%rax
011b 30d6b: 5b pop %rbx
011c 30d6c: 41 5c pop %r12
011e 30d6e: 41 5d pop %r13
0120 30d70: 41 5e pop %r14
0122 30d72: 41 5f pop %r15
0124 30d74: 5d pop %rbp
0125 30d75: c3 ret
0126 30d76: 66 2e 0f 1f 84 00 00 00 00 00 cs nopw 0x0(%rax,%rax,1)
0000 00000000000691e0 <pfn_pte>:
0000 691e0: 55 push %rbp
0001 691e1: 48 89 e5 mov %rsp,%rbp
0004 691e4: 41 57 push %r15
0006 691e6: 41 56 push %r14
0008 691e8: 41 55 push %r13
000a 691ea: 41 54 push %r12
000c 691ec: 53 push %rbx
000d 691ed: 49 89 f6 mov %rsi,%r14
0010 691f0: 31 f6 xor %esi,%esi
0012 691f2: 48 89 fb mov %rdi,%rbx
0015 691f5: 41 bd 00 00 00 00 mov $0x0,%r13d
001b 691fb: 41 bc 00 00 00 00 mov $0x0,%r12d
0021 69201: 41 f6 c6 01 test $0x1,%r14b
0025 69205: 4d 89 f7 mov %r14,%r15
0028 69208: 74 2a je 69234 <pfn_pte+0x54>
002a 6920a: 48 8b 05 00 00 00 00 mov 0x0(%rip),%rax # 69211 <pfn_pte+0x31> 6920d: R_X86_64_PC32 __supported_pte_mask-0x4
0031 69211: 31 f6 xor %esi,%esi
0033 69213: 4d 89 f7 mov %r14,%r15
0036 69216: 4c 21 f0 and %r14,%rax
0039 69219: 4c 39 f0 cmp %r14,%rax
003c 6921c: 74 16 je 69234 <pfn_pte+0x54>
003e 6921e: 0f b6 35 00 00 00 00 movzbl 0x0(%rip),%esi # 69225 <pfn_pte+0x45> 69221: R_X86_64_PC32 .data.once+0x30
0045 69225: 41 bc 01 00 00 00 mov $0x1,%r12d
004b 6922b: 49 89 c7 mov %rax,%r15
004e 6922e: 83 f6 01 xor $0x1,%esi
0051 69231: 41 89 f5 mov %esi,%r13d
0054 69234: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 69237: R_X86_64_32S _ftrace_annotated_branch+0xc600
005b 6923b: 31 d2 xor %edx,%edx
005d 6923d: 31 c9 xor %ecx,%ecx
005f 6923f: e8 00 00 00 00 call 69244 <pfn_pte+0x64> 69240: R_X86_64_PLT32 ftrace_likely_update-0x4
0064 69244: 45 84 ed test %r13b,%r13b
0067 69247: 74 55 je 6929e <pfn_pte+0xbe>
0069 69249: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 6924c: R_X86_64_32S _ftrace_annotated_branch+0xc630
0070 69250: be 01 00 00 00 mov $0x1,%esi
0075 69255: 31 d2 xor %edx,%edx
0077 69257: b9 01 00 00 00 mov $0x1,%ecx
007c 6925c: c6 05 00 00 00 00 01 movb $0x1,0x0(%rip) # 69263 <pfn_pte+0x83> 6925e: R_X86_64_PC32 .data.once+0x2f
0083 69263: e8 00 00 00 00 call 69268 <pfn_pte+0x88> 69264: R_X86_64_PLT32 ftrace_likely_update-0x4
0088 69268: 4c 89 fa mov %r15,%rdx
008b 6926b: 48 8b 0d 00 00 00 00 mov 0x0(%rip),%rcx # 69272 <pfn_pte+0x92> 6926e: R_X86_64_PC32 __supported_pte_mask-0x4
0092 69272: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 69275: R_X86_64_32S .rodata+0x335e0
0099 69279: 4c 89 f6 mov %r14,%rsi
009c 6927c: 4c 31 f2 xor %r14,%rdx
009f 6927f: e8 00 00 00 00 call 69284 <pfn_pte+0xa4> 69280: R_X86_64_PLT32 __warn_printk-0x4
00a4 69284: 0f 0b ud2
00a6 69286: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 69289: R_X86_64_32S _ftrace_annotated_branch+0xc660
00ad 6928d: be 01 00 00 00 mov $0x1,%esi
00b2 69292: 31 d2 xor %edx,%edx
00b4 69294: b9 01 00 00 00 mov $0x1,%ecx
00b9 69299: e8 00 00 00 00 call 6929e <pfn_pte+0xbe> 6929a: R_X86_64_PLT32 ftrace_likely_update-0x4
00be 6929e: 41 f6 c6 01 test $0x1,%r14b
00c2 692a2: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 692a5: R_X86_64_32S _ftrace_annotated_branch+0xc690
00c9 692a9: 44 89 e6 mov %r12d,%esi
00cc 692ac: 0f 94 c0 sete %al
00cf 692af: 48 c1 e3 0c shl $0xc,%rbx
00d3 692b3: 4d 85 f6 test %r14,%r14
00d6 692b6: 0f 95 c1 setne %cl
00d9 692b9: 31 d2 xor %edx,%edx
00db 692bb: 20 c1 and %al,%cl
00dd 692bd: 0f b6 c1 movzbl %cl,%eax
00e0 692c0: 31 c9 xor %ecx,%ecx
00e2 692c2: 48 f7 d8 neg %rax
00e5 692c5: 48 31 d8 xor %rbx,%rax
00e8 692c8: 48 bb 00 f0 ff ff ff ff 0f 00 movabs $0xffffffffff000,%rbx
00f2 692d2: 48 21 c3 and %rax,%rbx
00f5 692d5: e8 00 00 00 00 call 692da <pfn_pte+0xfa> 692d6: R_X86_64_PLT32 ftrace_likely_update-0x4
00fa 692da: 49 09 df or %rbx,%r15
00fd 692dd: 4c 89 f8 mov %r15,%rax
0100 692e0: 5b pop %rbx
0101 692e1: 41 5c pop %r12
0103 692e3: 41 5d pop %r13
0105 692e5: 41 5e pop %r14
0107 692e7: 41 5f pop %r15
0109 692e9: 5d pop %rbp
010a 692ea: c3 ret
010b 692eb: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
0000 000000000006d630 <pfn_pte>:
0000 6d630: 55 push %rbp
0001 6d631: 48 89 e5 mov %rsp,%rbp
0004 6d634: 41 57 push %r15
0006 6d636: 41 56 push %r14
0008 6d638: 41 55 push %r13
000a 6d63a: 41 54 push %r12
000c 6d63c: 53 push %rbx
000d 6d63d: 49 89 f6 mov %rsi,%r14
0010 6d640: 31 f6 xor %esi,%esi
0012 6d642: 48 89 fb mov %rdi,%rbx
0015 6d645: 41 bd 00 00 00 00 mov $0x0,%r13d
001b 6d64b: 41 bc 00 00 00 00 mov $0x0,%r12d
0021 6d651: 41 f6 c6 01 test $0x1,%r14b
0025 6d655: 4d 89 f7 mov %r14,%r15
0028 6d658: 74 36 je 6d690 <pfn_pte+0x60>
002a 6d65a: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 6d65d: R_X86_64_32S __supported_pte_mask
0031 6d661: e8 00 00 00 00 call 6d666 <pfn_pte+0x36> 6d662: R_X86_64_PLT32 __asan_load8_noabort-0x4
0036 6d666: 48 8b 05 00 00 00 00 mov 0x0(%rip),%rax # 6d66d <pfn_pte+0x3d> 6d669: R_X86_64_PC32 __supported_pte_mask-0x4
003d 6d66d: 31 f6 xor %esi,%esi
003f 6d66f: 4d 89 f7 mov %r14,%r15
0042 6d672: 4c 21 f0 and %r14,%rax
0045 6d675: 4c 39 f0 cmp %r14,%rax
0048 6d678: 74 16 je 6d690 <pfn_pte+0x60>
004a 6d67a: 0f b6 35 00 00 00 00 movzbl 0x0(%rip),%esi # 6d681 <pfn_pte+0x51> 6d67d: R_X86_64_PC32 .data.once+0x38
0051 6d681: 41 bc 01 00 00 00 mov $0x1,%r12d
0057 6d687: 49 89 c7 mov %rax,%r15
005a 6d68a: 83 f6 01 xor $0x1,%esi
005d 6d68d: 41 89 f5 mov %esi,%r13d
0060 6d690: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 6d693: R_X86_64_32S _ftrace_annotated_branch+0xd710
0067 6d697: 31 d2 xor %edx,%edx
0069 6d699: 31 c9 xor %ecx,%ecx
006b 6d69b: e8 00 00 00 00 call 6d6a0 <pfn_pte+0x70> 6d69c: R_X86_64_PLT32 ftrace_likely_update-0x4
0070 6d6a0: 45 84 ed test %r13b,%r13b
0073 6d6a3: 74 64 je 6d709 <pfn_pte+0xd9>
0075 6d6a5: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 6d6a8: R_X86_64_32S _ftrace_annotated_branch+0xd740
007c 6d6ac: be 01 00 00 00 mov $0x1,%esi
0081 6d6b1: 31 d2 xor %edx,%edx
0083 6d6b3: b9 01 00 00 00 mov $0x1,%ecx
0088 6d6b8: c6 05 00 00 00 00 01 movb $0x1,0x0(%rip) # 6d6bf <pfn_pte+0x8f> 6d6ba: R_X86_64_PC32 .data.once+0x37
008f 6d6bf: e8 00 00 00 00 call 6d6c4 <pfn_pte+0x94> 6d6c0: R_X86_64_PLT32 ftrace_likely_update-0x4
0094 6d6c4: 4d 89 fd mov %r15,%r13
0097 6d6c7: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 6d6ca: R_X86_64_32S __supported_pte_mask
009e 6d6ce: 4d 31 f5 xor %r14,%r13
00a1 6d6d1: e8 00 00 00 00 call 6d6d6 <pfn_pte+0xa6> 6d6d2: R_X86_64_PLT32 __asan_load8_noabort-0x4
00a6 6d6d6: 48 8b 0d 00 00 00 00 mov 0x0(%rip),%rcx # 6d6dd <pfn_pte+0xad> 6d6d9: R_X86_64_PC32 __supported_pte_mask-0x4
00ad 6d6dd: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 6d6e0: R_X86_64_32S .rodata+0x356e0
00b4 6d6e4: 4c 89 f6 mov %r14,%rsi
00b7 6d6e7: 4c 89 ea mov %r13,%rdx
00ba 6d6ea: e8 00 00 00 00 call 6d6ef <pfn_pte+0xbf> 6d6eb: R_X86_64_PLT32 __warn_printk-0x4
00bf 6d6ef: 0f 0b ud2
00c1 6d6f1: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 6d6f4: R_X86_64_32S _ftrace_annotated_branch+0xd770
00c8 6d6f8: be 01 00 00 00 mov $0x1,%esi
00cd 6d6fd: 31 d2 xor %edx,%edx
00cf 6d6ff: b9 01 00 00 00 mov $0x1,%ecx
00d4 6d704: e8 00 00 00 00 call 6d709 <pfn_pte+0xd9> 6d705: R_X86_64_PLT32 ftrace_likely_update-0x4
00d9 6d709: 41 f6 c6 01 test $0x1,%r14b
00dd 6d70d: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 6d710: R_X86_64_32S _ftrace_annotated_branch+0xd7a0
00e4 6d714: 44 89 e6 mov %r12d,%esi
00e7 6d717: 0f 94 c0 sete %al
00ea 6d71a: 48 c1 e3 0c shl $0xc,%rbx
00ee 6d71e: 4d 85 f6 test %r14,%r14
00f1 6d721: 0f 95 c1 setne %cl
00f4 6d724: 31 d2 xor %edx,%edx
00f6 6d726: 20 c1 and %al,%cl
00f8 6d728: 0f b6 c1 movzbl %cl,%eax
00fb 6d72b: 31 c9 xor %ecx,%ecx
00fd 6d72d: 48 f7 d8 neg %rax
0100 6d730: 48 31 d8 xor %rbx,%rax
0103 6d733: 48 bb 00 f0 ff ff ff ff 0f 00 movabs $0xffffffffff000,%rbx
010d 6d73d: 48 21 c3 and %rax,%rbx
0110 6d740: e8 00 00 00 00 call 6d745 <pfn_pte+0x115> 6d741: R_X86_64_PLT32 ftrace_likely_update-0x4
0115 6d745: 49 09 df or %rbx,%r15
0118 6d748: 4c 89 f8 mov %r15,%rax
011b 6d74b: 5b pop %rbx
011c 6d74c: 41 5c pop %r12
011e 6d74e: 41 5d pop %r13
0120 6d750: 41 5e pop %r14
0122 6d752: 41 5f pop %r15
0124 6d754: 5d pop %rbp
0125 6d755: c3 ret
0126 6d756: 66 2e 0f 1f 84 00 00 00 00 00 cs nopw 0x0(%rax,%rax,1)
0000 0000000000073ff0 <pfn_pte>:
0000 73ff0: 55 push %rbp
0001 73ff1: 48 89 e5 mov %rsp,%rbp
0004 73ff4: 41 57 push %r15
0006 73ff6: 41 56 push %r14
0008 73ff8: 41 55 push %r13
000a 73ffa: 41 54 push %r12
000c 73ffc: 53 push %rbx
000d 73ffd: 49 89 f6 mov %rsi,%r14
0010 74000: 31 f6 xor %esi,%esi
0012 74002: 48 89 fb mov %rdi,%rbx
0015 74005: 41 bd 00 00 00 00 mov $0x0,%r13d
001b 7400b: 41 bc 00 00 00 00 mov $0x0,%r12d
0021 74011: 41 f6 c6 01 test $0x1,%r14b
0025 74015: 4d 89 f7 mov %r14,%r15
0028 74018: 74 36 je 74050 <pfn_pte+0x60>
002a 7401a: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 7401d: R_X86_64_32S __supported_pte_mask
0031 74021: e8 00 00 00 00 call 74026 <pfn_pte+0x36> 74022: R_X86_64_PLT32 __asan_load8_noabort-0x4
0036 74026: 48 8b 05 00 00 00 00 mov 0x0(%rip),%rax # 7402d <pfn_pte+0x3d> 74029: R_X86_64_PC32 __supported_pte_mask-0x4
003d 7402d: 31 f6 xor %esi,%esi
003f 7402f: 4d 89 f7 mov %r14,%r15
0042 74032: 4c 21 f0 and %r14,%rax
0045 74035: 4c 39 f0 cmp %r14,%rax
0048 74038: 74 16 je 74050 <pfn_pte+0x60>
004a 7403a: 0f b6 35 00 00 00 00 movzbl 0x0(%rip),%esi # 74041 <pfn_pte+0x51> 7403d: R_X86_64_PC32 .data.once+0x3a
0051 74041: 41 bc 01 00 00 00 mov $0x1,%r12d
0057 74047: 49 89 c7 mov %rax,%r15
005a 7404a: 83 f6 01 xor $0x1,%esi
005d 7404d: 41 89 f5 mov %esi,%r13d
0060 74050: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 74053: R_X86_64_32S _ftrace_annotated_branch+0xea90
0067 74057: 31 d2 xor %edx,%edx
0069 74059: 31 c9 xor %ecx,%ecx
006b 7405b: e8 00 00 00 00 call 74060 <pfn_pte+0x70> 7405c: R_X86_64_PLT32 ftrace_likely_update-0x4
0070 74060: 45 84 ed test %r13b,%r13b
0073 74063: 74 64 je 740c9 <pfn_pte+0xd9>
0075 74065: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 74068: R_X86_64_32S _ftrace_annotated_branch+0xeac0
007c 7406c: be 01 00 00 00 mov $0x1,%esi
0081 74071: 31 d2 xor %edx,%edx
0083 74073: b9 01 00 00 00 mov $0x1,%ecx
0088 74078: c6 05 00 00 00 00 01 movb $0x1,0x0(%rip) # 7407f <pfn_pte+0x8f> 7407a: R_X86_64_PC32 .data.once+0x39
008f 7407f: e8 00 00 00 00 call 74084 <pfn_pte+0x94> 74080: R_X86_64_PLT32 ftrace_likely_update-0x4
0094 74084: 4d 89 fd mov %r15,%r13
0097 74087: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 7408a: R_X86_64_32S __supported_pte_mask
009e 7408e: 4d 31 f5 xor %r14,%r13
00a1 74091: e8 00 00 00 00 call 74096 <pfn_pte+0xa6> 74092: R_X86_64_PLT32 __asan_load8_noabort-0x4
00a6 74096: 48 8b 0d 00 00 00 00 mov 0x0(%rip),%rcx # 7409d <pfn_pte+0xad> 74099: R_X86_64_PC32 __supported_pte_mask-0x4
00ad 7409d: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 740a0: R_X86_64_32S .rodata+0x36a20
00b4 740a4: 4c 89 f6 mov %r14,%rsi
00b7 740a7: 4c 89 ea mov %r13,%rdx
00ba 740aa: e8 00 00 00 00 call 740af <pfn_pte+0xbf> 740ab: R_X86_64_PLT32 __warn_printk-0x4
00bf 740af: 0f 0b ud2
00c1 740b1: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 740b4: R_X86_64_32S _ftrace_annotated_branch+0xeaf0
00c8 740b8: be 01 00 00 00 mov $0x1,%esi
00cd 740bd: 31 d2 xor %edx,%edx
00cf 740bf: b9 01 00 00 00 mov $0x1,%ecx
00d4 740c4: e8 00 00 00 00 call 740c9 <pfn_pte+0xd9> 740c5: R_X86_64_PLT32 ftrace_likely_update-0x4
00d9 740c9: 41 f6 c6 01 test $0x1,%r14b
00dd 740cd: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 740d0: R_X86_64_32S _ftrace_annotated_branch+0xeb20
00e4 740d4: 44 89 e6 mov %r12d,%esi
00e7 740d7: 0f 94 c0 sete %al
00ea 740da: 48 c1 e3 0c shl $0xc,%rbx
00ee 740de: 4d 85 f6 test %r14,%r14
00f1 740e1: 0f 95 c1 setne %cl
00f4 740e4: 31 d2 xor %edx,%edx
00f6 740e6: 20 c1 and %al,%cl
00f8 740e8: 0f b6 c1 movzbl %cl,%eax
00fb 740eb: 31 c9 xor %ecx,%ecx
00fd 740ed: 48 f7 d8 neg %rax
0100 740f0: 48 31 d8 xor %rbx,%rax
0103 740f3: 48 bb 00 f0 ff ff ff ff 0f 00 movabs $0xffffffffff000,%rbx
010d 740fd: 48 21 c3 and %rax,%rbx
0110 74100: e8 00 00 00 00 call 74105 <pfn_pte+0x115> 74101: R_X86_64_PLT32 ftrace_likely_update-0x4
0115 74105: 49 09 df or %rbx,%r15
0118 74108: 4c 89 f8 mov %r15,%rax
011b 7410b: 5b pop %rbx
011c 7410c: 41 5c pop %r12
011e 7410e: 41 5d pop %r13
0120 74110: 41 5e pop %r14
0122 74112: 41 5f pop %r15
0124 74114: 5d pop %rbp
0125 74115: c3 ret
0126 74116: 66 2e 0f 1f 84 00 00 00 00 00 cs nopw 0x0(%rax,%rax,1)
0000 00000000003404c0 <pfn_pte>:
0000 3404c0: 55 push %rbp
0001 3404c1: 48 89 e5 mov %rsp,%rbp
0004 3404c4: 41 57 push %r15
0006 3404c6: 41 56 push %r14
0008 3404c8: 41 55 push %r13
000a 3404ca: 41 54 push %r12
000c 3404cc: 53 push %rbx
000d 3404cd: 49 89 f6 mov %rsi,%r14
0010 3404d0: 31 f6 xor %esi,%esi
0012 3404d2: 48 89 fb mov %rdi,%rbx
0015 3404d5: 41 bd 00 00 00 00 mov $0x0,%r13d
001b 3404db: 41 bc 00 00 00 00 mov $0x0,%r12d
0021 3404e1: 41 f6 c6 01 test $0x1,%r14b
0025 3404e5: 4d 89 f7 mov %r14,%r15
0028 3404e8: 74 36 je 340520 <pfn_pte+0x60>
002a 3404ea: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 3404ed: R_X86_64_32S __supported_pte_mask
0031 3404f1: e8 00 00 00 00 call 3404f6 <pfn_pte+0x36> 3404f2: R_X86_64_PLT32 __asan_load8_noabort-0x4
0036 3404f6: 48 8b 05 00 00 00 00 mov 0x0(%rip),%rax # 3404fd <pfn_pte+0x3d> 3404f9: R_X86_64_PC32 __supported_pte_mask-0x4
003d 3404fd: 31 f6 xor %esi,%esi
003f 3404ff: 4d 89 f7 mov %r14,%r15
0042 340502: 4c 21 f0 and %r14,%rax
0045 340505: 4c 39 f0 cmp %r14,%rax
0048 340508: 74 16 je 340520 <pfn_pte+0x60>
004a 34050a: 0f b6 35 00 00 00 00 movzbl 0x0(%rip),%esi # 340511 <pfn_pte+0x51> 34050d: R_X86_64_PC32 .data.once+0xa1
0051 340511: 41 bc 01 00 00 00 mov $0x1,%r12d
0057 340517: 49 89 c7 mov %rax,%r15
005a 34051a: 83 f6 01 xor $0x1,%esi
005d 34051d: 41 89 f5 mov %esi,%r13d
0060 340520: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 340523: R_X86_64_32S _ftrace_annotated_branch+0x57cf0
0067 340527: 31 d2 xor %edx,%edx
0069 340529: 31 c9 xor %ecx,%ecx
006b 34052b: e8 00 00 00 00 call 340530 <pfn_pte+0x70> 34052c: R_X86_64_PLT32 ftrace_likely_update-0x4
0070 340530: 45 84 ed test %r13b,%r13b
0073 340533: 74 64 je 340599 <pfn_pte+0xd9>
0075 340535: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 340538: R_X86_64_32S _ftrace_annotated_branch+0x57d20
007c 34053c: be 01 00 00 00 mov $0x1,%esi
0081 340541: 31 d2 xor %edx,%edx
0083 340543: b9 01 00 00 00 mov $0x1,%ecx
0088 340548: c6 05 00 00 00 00 01 movb $0x1,0x0(%rip) # 34054f <pfn_pte+0x8f> 34054a: R_X86_64_PC32 .data.once+0xa0
008f 34054f: e8 00 00 00 00 call 340554 <pfn_pte+0x94> 340550: R_X86_64_PLT32 ftrace_likely_update-0x4
0094 340554: 4d 89 fd mov %r15,%r13
0097 340557: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 34055a: R_X86_64_32S __supported_pte_mask
009e 34055e: 4d 31 f5 xor %r14,%r13
00a1 340561: e8 00 00 00 00 call 340566 <pfn_pte+0xa6> 340562: R_X86_64_PLT32 __asan_load8_noabort-0x4
00a6 340566: 48 8b 0d 00 00 00 00 mov 0x0(%rip),%rcx # 34056d <pfn_pte+0xad> 340569: R_X86_64_PC32 __supported_pte_mask-0x4
00ad 34056d: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 340570: R_X86_64_32S .rodata+0x47a060
00b4 340574: 4c 89 f6 mov %r14,%rsi
00b7 340577: 4c 89 ea mov %r13,%rdx
00ba 34057a: e8 00 00 00 00 call 34057f <pfn_pte+0xbf> 34057b: R_X86_64_PLT32 __warn_printk-0x4
00bf 34057f: 0f 0b ud2
00c1 340581: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 340584: R_X86_64_32S _ftrace_annotated_branch+0x57d50
00c8 340588: be 01 00 00 00 mov $0x1,%esi
00cd 34058d: 31 d2 xor %edx,%edx
00cf 34058f: b9 01 00 00 00 mov $0x1,%ecx
00d4 340594: e8 00 00 00 00 call 340599 <pfn_pte+0xd9> 340595: R_X86_64_PLT32 ftrace_likely_update-0x4
00d9 340599: 41 f6 c6 01 test $0x1,%r14b
00dd 34059d: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 3405a0: R_X86_64_32S _ftrace_annotated_branch+0x57d80
00e4 3405a4: 44 89 e6 mov %r12d,%esi
00e7 3405a7: 0f 94 c0 sete %al
00ea 3405aa: 48 c1 e3 0c shl $0xc,%rbx
00ee 3405ae: 4d 85 f6 test %r14,%r14
00f1 3405b1: 0f 95 c1 setne %cl
00f4 3405b4: 31 d2 xor %edx,%edx
00f6 3405b6: 20 c1 and %al,%cl
00f8 3405b8: 0f b6 c1 movzbl %cl,%eax
00fb 3405bb: 31 c9 xor %ecx,%ecx
00fd 3405bd: 48 f7 d8 neg %rax
0100 3405c0: 48 31 d8 xor %rbx,%rax
0103 3405c3: 48 bb 00 f0 ff ff ff ff 0f 00 movabs $0xffffffffff000,%rbx
010d 3405cd: 48 21 c3 and %rax,%rbx
0110 3405d0: e8 00 00 00 00 call 3405d5 <pfn_pte+0x115> 3405d1: R_X86_64_PLT32 ftrace_likely_update-0x4
0115 3405d5: 49 09 df or %rbx,%r15
0118 3405d8: 4c 89 f8 mov %r15,%rax
011b 3405db: 5b pop %rbx
011c 3405dc: 41 5c pop %r12
011e 3405de: 41 5d pop %r13
0120 3405e0: 41 5e pop %r14
0122 3405e2: 41 5f pop %r15
0124 3405e4: 5d pop %rbp
0125 3405e5: c3 ret
0126 3405e6: 66 2e 0f 1f 84 00 00 00 00 00 cs nopw 0x0(%rax,%rax,1)
0000 00000000003a4fd0 <pfn_pte>:
0000 3a4fd0: 55 push %rbp
0001 3a4fd1: 48 89 e5 mov %rsp,%rbp
0004 3a4fd4: 41 57 push %r15
0006 3a4fd6: 41 56 push %r14
0008 3a4fd8: 41 55 push %r13
000a 3a4fda: 41 54 push %r12
000c 3a4fdc: 53 push %rbx
000d 3a4fdd: 49 89 f6 mov %rsi,%r14
0010 3a4fe0: 31 f6 xor %esi,%esi
0012 3a4fe2: 48 89 fb mov %rdi,%rbx
0015 3a4fe5: 41 bd 00 00 00 00 mov $0x0,%r13d
001b 3a4feb: 41 bc 00 00 00 00 mov $0x0,%r12d
0021 3a4ff1: 41 f6 c6 01 test $0x1,%r14b
0025 3a4ff5: 4d 89 f7 mov %r14,%r15
0028 3a4ff8: 74 36 je 3a5030 <pfn_pte+0x60>
002a 3a4ffa: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 3a4ffd: R_X86_64_32S __supported_pte_mask
0031 3a5001: e8 00 00 00 00 call 3a5006 <pfn_pte+0x36> 3a5002: R_X86_64_PLT32 __asan_load8_noabort-0x4
0036 3a5006: 48 8b 05 00 00 00 00 mov 0x0(%rip),%rax # 3a500d <pfn_pte+0x3d> 3a5009: R_X86_64_PC32 __supported_pte_mask-0x4
003d 3a500d: 31 f6 xor %esi,%esi
003f 3a500f: 4d 89 f7 mov %r14,%r15
0042 3a5012: 4c 21 f0 and %r14,%rax
0045 3a5015: 4c 39 f0 cmp %r14,%rax
0048 3a5018: 74 16 je 3a5030 <pfn_pte+0x60>
004a 3a501a: 0f b6 35 00 00 00 00 movzbl 0x0(%rip),%esi # 3a5021 <pfn_pte+0x51> 3a501d: R_X86_64_PC32 .data.once+0xb2
0051 3a5021: 41 bc 01 00 00 00 mov $0x1,%r12d
0057 3a5027: 49 89 c7 mov %rax,%r15
005a 3a502a: 83 f6 01 xor $0x1,%esi
005d 3a502d: 41 89 f5 mov %esi,%r13d
0060 3a5030: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 3a5033: R_X86_64_32S _ftrace_annotated_branch+0x66bd0
0067 3a5037: 31 d2 xor %edx,%edx
0069 3a5039: 31 c9 xor %ecx,%ecx
006b 3a503b: e8 00 00 00 00 call 3a5040 <pfn_pte+0x70> 3a503c: R_X86_64_PLT32 ftrace_likely_update-0x4
0070 3a5040: 45 84 ed test %r13b,%r13b
0073 3a5043: 74 64 je 3a50a9 <pfn_pte+0xd9>
0075 3a5045: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 3a5048: R_X86_64_32S _ftrace_annotated_branch+0x66c00
007c 3a504c: be 01 00 00 00 mov $0x1,%esi
0081 3a5051: 31 d2 xor %edx,%edx
0083 3a5053: b9 01 00 00 00 mov $0x1,%ecx
0088 3a5058: c6 05 00 00 00 00 01 movb $0x1,0x0(%rip) # 3a505f <pfn_pte+0x8f> 3a505a: R_X86_64_PC32 .data.once+0xb1
008f 3a505f: e8 00 00 00 00 call 3a5064 <pfn_pte+0x94> 3a5060: R_X86_64_PLT32 ftrace_likely_update-0x4
0094 3a5064: 4d 89 fd mov %r15,%r13
0097 3a5067: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 3a506a: R_X86_64_32S __supported_pte_mask
009e 3a506e: 4d 31 f5 xor %r14,%r13
00a1 3a5071: e8 00 00 00 00 call 3a5076 <pfn_pte+0xa6> 3a5072: R_X86_64_PLT32 __asan_load8_noabort-0x4
00a6 3a5076: 48 8b 0d 00 00 00 00 mov 0x0(%rip),%rcx # 3a507d <pfn_pte+0xad> 3a5079: R_X86_64_PC32 __supported_pte_mask-0x4
00ad 3a507d: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 3a5080: R_X86_64_32S .rodata+0x490640
00b4 3a5084: 4c 89 f6 mov %r14,%rsi
00b7 3a5087: 4c 89 ea mov %r13,%rdx
00ba 3a508a: e8 00 00 00 00 call 3a508f <pfn_pte+0xbf> 3a508b: R_X86_64_PLT32 __warn_printk-0x4
00bf 3a508f: 0f 0b ud2
00c1 3a5091: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 3a5094: R_X86_64_32S _ftrace_annotated_branch+0x66c30
00c8 3a5098: be 01 00 00 00 mov $0x1,%esi
00cd 3a509d: 31 d2 xor %edx,%edx
00cf 3a509f: b9 01 00 00 00 mov $0x1,%ecx
00d4 3a50a4: e8 00 00 00 00 call 3a50a9 <pfn_pte+0xd9> 3a50a5: R_X86_64_PLT32 ftrace_likely_update-0x4
00d9 3a50a9: 41 f6 c6 01 test $0x1,%r14b
00dd 3a50ad: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 3a50b0: R_X86_64_32S _ftrace_annotated_branch+0x66c60
00e4 3a50b4: 44 89 e6 mov %r12d,%esi
00e7 3a50b7: 0f 94 c0 sete %al
00ea 3a50ba: 48 c1 e3 0c shl $0xc,%rbx
00ee 3a50be: 4d 85 f6 test %r14,%r14
00f1 3a50c1: 0f 95 c1 setne %cl
00f4 3a50c4: 31 d2 xor %edx,%edx
00f6 3a50c6: 20 c1 and %al,%cl
00f8 3a50c8: 0f b6 c1 movzbl %cl,%eax
00fb 3a50cb: 31 c9 xor %ecx,%ecx
00fd 3a50cd: 48 f7 d8 neg %rax
0100 3a50d0: 48 31 d8 xor %rbx,%rax
0103 3a50d3: 48 bb 00 f0 ff ff ff ff 0f 00 movabs $0xffffffffff000,%rbx
010d 3a50dd: 48 21 c3 and %rax,%rbx
0110 3a50e0: e8 00 00 00 00 call 3a50e5 <pfn_pte+0x115> 3a50e1: R_X86_64_PLT32 ftrace_likely_update-0x4
0115 3a50e5: 49 09 df or %rbx,%r15
0118 3a50e8: 4c 89 f8 mov %r15,%rax
011b 3a50eb: 5b pop %rbx
011c 3a50ec: 41 5c pop %r12
011e 3a50ee: 41 5d pop %r13
0120 3a50f0: 41 5e pop %r14
0122 3a50f2: 41 5f pop %r15
0124 3a50f4: 5d pop %rbp
0125 3a50f5: c3 ret
0126 3a50f6: 66 2e 0f 1f 84 00 00 00 00 00 cs nopw 0x0(%rax,%rax,1)
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2024-09-14 18:08 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-09-14 18:07 [sudeep-holla:android13-5.10/ffa 2043/9999] mm/userfaultfd.o: warning: objtool: pfn_pte()+0xc1: unreachable instruction kernel test robot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox