[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202207141806.sAnxdROf-lkp@intel.com>
Date: Thu, 14 Jul 2022 19:02:53 +0800
From: kernel test robot <lkp@...el.com>
To: Thomas Gleixner <tglx@...utronix.de>
Cc: kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org
Subject: [tglx-devel:depthtracking 31/38] arch/x86/entry/entry_32.S:708:
Error: no such instruction: `call_thunks_debug_inc_ctxsw'
tree: https://git.kernel.org/pub/scm/linux/kernel/git/tglx/devel.git depthtracking
head: 81d2c1b17a61bfeca4b92a5d6e1fb6f5ff464826
commit: 2732d9924d0ab04682c6cbc252e688e3e54b7847 [31/38] x86/calldepth: Add ret/call counting for debug
config: i386-defconfig
compiler: gcc-11 (Debian 11.3.0-3) 11.3.0
reproduce (this is a W=1 build):
# https://git.kernel.org/pub/scm/linux/kernel/git/tglx/devel.git/commit/?id=2732d9924d0ab04682c6cbc252e688e3e54b7847
git remote add tglx-devel https://git.kernel.org/pub/scm/linux/kernel/git/tglx/devel.git
git fetch --no-tags tglx-devel depthtracking
git checkout 2732d9924d0ab04682c6cbc252e688e3e54b7847
# save the config file
mkdir build_dir && cp config build_dir/.config
make W=1 O=build_dir ARCH=i386 SHELL=/bin/bash
If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <lkp@...el.com>
All errors (new ones prefixed by >>):
arch/x86/entry/entry_32.S: Assembler messages:
>> arch/x86/entry/entry_32.S:708: Error: no such instruction: `call_thunks_debug_inc_ctxsw'
vim +708 arch/x86/entry/entry_32.S
0100301bfdf56a Brian Gerst 2016-08-13 700
c995efd5a740d9 David Woodhouse 2018-01-12 701 /*
c995efd5a740d9 David Woodhouse 2018-01-12 702 * When switching from a shallower to a deeper call stack
c995efd5a740d9 David Woodhouse 2018-01-12 703 * the RSB may either underflow or use entries populated
c995efd5a740d9 David Woodhouse 2018-01-12 704 * with userspace addresses. On CPUs where those concerns
c995efd5a740d9 David Woodhouse 2018-01-12 705 * exist, overwrite the RSB with entries which capture
c995efd5a740d9 David Woodhouse 2018-01-12 706 * speculative execution to prevent attack.
c995efd5a740d9 David Woodhouse 2018-01-12 707 */
d1c99108af3c59 David Woodhouse 2018-02-19 @708 FILL_RETURN_BUFFER %ebx, RSB_CLEAR_LOOPS, X86_FEATURE_RSB_CTXSW
c995efd5a740d9 David Woodhouse 2018-01-12 709
a3ba966066afbe Thomas Gleixner 2019-11-16 710 /* Restore flags or the incoming task to restore AC state. */
6690e86be83ac7 Peter Zijlstra 2019-02-14 711 popfl
a3ba966066afbe Thomas Gleixner 2019-11-16 712 /* restore callee-saved registers */
0100301bfdf56a Brian Gerst 2016-08-13 713 popl %esi
0100301bfdf56a Brian Gerst 2016-08-13 714 popl %edi
0100301bfdf56a Brian Gerst 2016-08-13 715 popl %ebx
0100301bfdf56a Brian Gerst 2016-08-13 716 popl %ebp
0100301bfdf56a Brian Gerst 2016-08-13 717
0100301bfdf56a Brian Gerst 2016-08-13 718 jmp __switch_to
5e63306f162952 Jiri Slaby 2019-10-11 719 SYM_CODE_END(__switch_to_asm)
8c0fa8a036cd9c Thomas Gleixner 2020-03-25 720 .popsection
0100301bfdf56a Brian Gerst 2016-08-13 721
:::::: The code at line 708 was first introduced by commit
:::::: d1c99108af3c5992640aa2afa7d2e88c3775c06e Revert "x86/retpoline: Simplify vmexit_fill_RSB()"
:::::: TO: David Woodhouse <dwmw@...zon.co.uk>
:::::: CC: Ingo Molnar <mingo@...nel.org>
--
0-DAY CI Kernel Test Service
https://01.org/lkp
View attachment "config" of type "text/plain" (132910 bytes)
Powered by blists - more mailing lists