[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202209240730.bSwmfvWD-lkp@intel.com>
Date: Sat, 24 Sep 2022 07:27:42 +0800
From: kernel test robot <lkp@...el.com>
To: Peter Zijlstra <peterz@...radead.org>
Cc: kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org
Subject: [peterz-queue:call-depth-tracking 8/60] vmlinux.o: warning: objtool:
print_graph_irq+0x49: relocation to !ENDBR: .entry.text+0x250
tree: https://git.kernel.org/pub/scm/linux/kernel/git/peterz/queue.git call-depth-tracking
head: 856304fc062b9ad34742a604b98cc775846c0cb3
commit: cc86e7128f9e6836285b5f86a039bb15a6a0c83a [8/60] arch: Introduce CONFIG_FUNCTION_ALIGNMENT
config: x86_64-allyesconfig
compiler: gcc-11 (Debian 11.3.0-5) 11.3.0
reproduce (this is a W=1 build):
# https://git.kernel.org/pub/scm/linux/kernel/git/peterz/queue.git/commit/?id=cc86e7128f9e6836285b5f86a039bb15a6a0c83a
git remote add peterz-queue https://git.kernel.org/pub/scm/linux/kernel/git/peterz/queue.git
git fetch --no-tags peterz-queue call-depth-tracking
git checkout cc86e7128f9e6836285b5f86a039bb15a6a0c83a
# save the config file
mkdir build_dir && cp config build_dir/.config
make W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash
If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@...el.com>
All warnings (new ones prefixed by >>):
vmlinux.o: warning: objtool: check_stackleak_irqoff+0x309: call to _printk() leaves .noinstr.text section
vmlinux.o: warning: objtool: filter_irq_stacks+0x24: relocation to !ENDBR: .entry.text+0x250
>> vmlinux.o: warning: objtool: print_graph_irq+0x49: relocation to !ENDBR: .entry.text+0x250
vmlinux.o: warning: objtool: print_graph_irq+0x59: relocation to !ENDBR: .entry.text+0x250
>> vmlinux.o: warning: objtool: print_graph_entry+0x135: relocation to !ENDBR: .entry.text+0x250
vmlinux.o: warning: objtool: print_graph_entry+0x144: relocation to !ENDBR: .entry.text+0x250
objdump-func vmlinux.o print_graph_irq:
0000 00000000007c0ac0 <print_graph_irq>:
0000 7c0ac0: 41 57 push %r15
0002 7c0ac2: 41 56 push %r14
0004 7c0ac4: 49 89 f6 mov %rsi,%r14
0007 7c0ac7: 41 55 push %r13
0009 7c0ac9: 41 54 push %r12
000b 7c0acb: 41 89 d4 mov %edx,%r12d
000e 7c0ace: 55 push %rbp
000f 7c0acf: 44 89 cd mov %r9d,%ebp
0012 7c0ad2: 53 push %rbx
0013 7c0ad3: 48 89 fb mov %rdi,%rbx
0016 7c0ad6: 48 83 ec 18 sub $0x18,%rsp
001a 7c0ada: 89 4c 24 08 mov %ecx,0x8(%rsp)
001e 7c0ade: 44 89 44 24 0c mov %r8d,0xc(%rsp)
0023 7c0ae3: e8 00 00 00 00 call 7c0ae8 <print_graph_irq+0x28> 7c0ae4: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0028 7c0ae8: 48 89 df mov %rbx,%rdi
002b 7c0aeb: e8 00 00 00 00 call 7c0af0 <print_graph_irq+0x30> 7c0aec: R_X86_64_PLT32 __asan_load8_noabort-0x4
0030 7c0af0: 48 8d bb 58 21 00 00 lea 0x2158(%rbx),%rdi
0037 7c0af7: 4c 8b 2b mov (%rbx),%r13
003a 7c0afa: e8 00 00 00 00 call 7c0aff <print_graph_irq+0x3f> 7c0afb: R_X86_64_PLT32 __asan_load8_noabort-0x4
003f 7c0aff: 48 8b 83 58 21 00 00 mov 0x2158(%rbx),%rax
0046 7c0b06: 4c 89 f6 mov %r14,%rsi
0049 7c0b09: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 7c0b0c: R_X86_64_32S __irqentry_text_start
0050 7c0b10: 48 89 04 24 mov %rax,(%rsp)
0054 7c0b14: e8 00 00 00 00 call 7c0b19 <print_graph_irq+0x59> 7c0b15: R_X86_64_PLT32 __sanitizer_cov_trace_cmp8-0x4
0059 7c0b19: 49 81 fe 00 00 00 00 cmp $0x0,%r14 7c0b1c: R_X86_64_32S __irqentry_text_start
0060 7c0b20: 0f 82 c6 01 00 00 jb 7c0cec <print_graph_irq+0x22c>
0066 7c0b26: e8 00 00 00 00 call 7c0b2b <print_graph_irq+0x6b> 7c0b27: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
006b 7c0b2b: 4c 89 f6 mov %r14,%rsi
006e 7c0b2e: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 7c0b31: R_X86_64_32S __irqentry_text_end
0075 7c0b35: e8 00 00 00 00 call 7c0b3a <print_graph_irq+0x7a> 7c0b36: R_X86_64_PLT32 __sanitizer_cov_trace_cmp8-0x4
007a 7c0b3a: 49 81 fe 00 00 00 00 cmp $0x0,%r14 7c0b3d: R_X86_64_32S __irqentry_text_end
0081 7c0b41: 0f 83 85 01 00 00 jae 7c0ccc <print_graph_irq+0x20c>
0087 7c0b47: 4d 8d bd 60 1d 00 00 lea 0x1d60(%r13),%r15
008e 7c0b4e: 4c 8d b3 30 11 00 00 lea 0x1130(%rbx),%r14
0095 7c0b55: e8 00 00 00 00 call 7c0b5a <print_graph_irq+0x9a> 7c0b56: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
009a 7c0b5a: 4c 89 ff mov %r15,%rdi
009d 7c0b5d: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0b65 <print_graph_irq+0xa5> 7c0b60: R_X86_64_PC32 .bss+0xdcfc2b
00a5 7c0b65: e8 00 00 00 00 call 7c0b6a <print_graph_irq+0xaa> 7c0b66: R_X86_64_PLT32 __asan_load4_noabort-0x4
00aa 7c0b6a: 41 8b 85 60 1d 00 00 mov 0x1d60(%r13),%eax
00b1 7c0b71: 31 ff xor %edi,%edi
00b3 7c0b73: 25 00 20 00 00 and $0x2000,%eax
00b8 7c0b78: 89 c6 mov %eax,%esi
00ba 7c0b7a: 89 44 24 10 mov %eax,0x10(%rsp)
00be 7c0b7e: e8 00 00 00 00 call 7c0b83 <print_graph_irq+0xc3> 7c0b7f: R_X86_64_PLT32 __sanitizer_cov_trace_const_cmp4-0x4
00c3 7c0b83: 8b 44 24 10 mov 0x10(%rsp),%eax
00c7 7c0b87: 85 c0 test %eax,%eax
00c9 7c0b89: 0f 84 af 00 00 00 je 7c0c3e <print_graph_irq+0x17e>
00cf 7c0b8f: e8 00 00 00 00 call 7c0b94 <print_graph_irq+0xd4> 7c0b90: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
00d4 7c0b94: 89 e8 mov %ebp,%eax
00d6 7c0b96: 31 ff xor %edi,%edi
00d8 7c0b98: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0ba0 <print_graph_irq+0xe0> 7c0b9b: R_X86_64_PC32 .bss+0xdcfc33
00e0 7c0ba0: 83 e0 20 and $0x20,%eax
00e3 7c0ba3: 89 c6 mov %eax,%esi
00e5 7c0ba5: 89 44 24 10 mov %eax,0x10(%rsp)
00e9 7c0ba9: e8 00 00 00 00 call 7c0bae <print_graph_irq+0xee> 7c0baa: R_X86_64_PLT32 __sanitizer_cov_trace_const_cmp4-0x4
00ee 7c0bae: 8b 44 24 10 mov 0x10(%rsp),%eax
00f2 7c0bb2: 85 c0 test %eax,%eax
00f4 7c0bb4: 0f 85 64 02 00 00 jne 7c0e1e <print_graph_irq+0x35e>
00fa 7c0bba: e8 00 00 00 00 call 7c0bbf <print_graph_irq+0xff> 7c0bbb: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
00ff 7c0bbf: 89 e8 mov %ebp,%eax
0101 7c0bc1: 31 ff xor %edi,%edi
0103 7c0bc3: 83 e0 40 and $0x40,%eax
0106 7c0bc6: 89 c6 mov %eax,%esi
0108 7c0bc8: 89 44 24 10 mov %eax,0x10(%rsp)
010c 7c0bcc: e8 00 00 00 00 call 7c0bd1 <print_graph_irq+0x111> 7c0bcd: R_X86_64_PLT32 __sanitizer_cov_trace_const_cmp4-0x4
0111 7c0bd1: 8b 44 24 10 mov 0x10(%rsp),%eax
0115 7c0bd5: 85 c0 test %eax,%eax
0117 7c0bd7: 0f 85 b4 01 00 00 jne 7c0d91 <print_graph_irq+0x2d1>
011d 7c0bdd: e8 00 00 00 00 call 7c0be2 <print_graph_irq+0x122> 7c0bde: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0122 7c0be2: 89 eb mov %ebp,%ebx
0124 7c0be4: 31 ff xor %edi,%edi
0126 7c0be6: 83 e3 02 and $0x2,%ebx
0129 7c0be9: 89 de mov %ebx,%esi
012b 7c0beb: e8 00 00 00 00 call 7c0bf0 <print_graph_irq+0x130> 7c0bec: R_X86_64_PLT32 __sanitizer_cov_trace_const_cmp4-0x4
0130 7c0bf0: 85 db test %ebx,%ebx
0132 7c0bf2: 0f 85 66 01 00 00 jne 7c0d5e <print_graph_irq+0x29e>
0138 7c0bf8: e8 00 00 00 00 call 7c0bfd <print_graph_irq+0x13d> 7c0bf9: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
013d 7c0bfd: 89 eb mov %ebp,%ebx
013f 7c0bff: 31 ff xor %edi,%edi
0141 7c0c01: 83 e3 08 and $0x8,%ebx
0144 7c0c04: 89 de mov %ebx,%esi
0146 7c0c06: e8 00 00 00 00 call 7c0c0b <print_graph_irq+0x14b> 7c0c07: R_X86_64_PLT32 __sanitizer_cov_trace_const_cmp4-0x4
014b 7c0c0b: 85 db test %ebx,%ebx
014d 7c0c0d: 0f 85 0e 01 00 00 jne 7c0d21 <print_graph_irq+0x261>
0153 7c0c13: e8 00 00 00 00 call 7c0c18 <print_graph_irq+0x158> 7c0c14: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0158 7c0c18: 4c 89 ff mov %r15,%rdi
015b 7c0c1b: e8 00 00 00 00 call 7c0c20 <print_graph_irq+0x160> 7c0c1c: R_X86_64_PLT32 __asan_load4_noabort-0x4
0160 7c0c20: 41 8b 9d 60 1d 00 00 mov 0x1d60(%r13),%ebx
0167 7c0c27: 31 ff xor %edi,%edi
0169 7c0c29: 81 e3 00 40 00 00 and $0x4000,%ebx
016f 7c0c2f: 89 de mov %ebx,%esi
0171 7c0c31: e8 00 00 00 00 call 7c0c36 <print_graph_irq+0x176> 7c0c32: R_X86_64_PLT32 __sanitizer_cov_trace_const_cmp4-0x4
0176 7c0c36: 85 db test %ebx,%ebx
0178 7c0c38: 0f 85 bd 00 00 00 jne 7c0cfb <print_graph_irq+0x23b>
017e 7c0c3e: e8 00 00 00 00 call 7c0c43 <print_graph_irq+0x183> 7c0c3f: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0183 7c0c43: 89 e9 mov %ebp,%ecx
0185 7c0c45: 31 f6 xor %esi,%esi
0187 7c0c47: 4c 89 ef mov %r13,%rdi
018a 7c0c4a: 81 c9 00 00 00 20 or $0x20000000,%ecx
0190 7c0c50: 4c 89 f2 mov %r14,%rdx
0193 7c0c53: e8 28 fc ff ff call 7c0880 <print_graph_duration>
0198 7c0c58: 44 89 e6 mov %r12d,%esi
019b 7c0c5b: bf 0b 00 00 00 mov $0xb,%edi
01a0 7c0c60: e8 00 00 00 00 call 7c0c65 <print_graph_irq+0x1a5> 7c0c61: R_X86_64_PLT32 __sanitizer_cov_trace_const_cmp4-0x4
01a5 7c0c65: 41 83 fc 0b cmp $0xb,%r12d
01a9 7c0c69: 0f 84 41 02 00 00 je 7c0eb0 <print_graph_irq+0x3f0>
01af 7c0c6f: e8 00 00 00 00 call 7c0c74 <print_graph_irq+0x1b4> 7c0c70: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
01b4 7c0c74: 48 c7 c6 00 00 00 00 mov $0x0,%rsi 7c0c77: R_X86_64_32S .rodata+0x5fc080
01bb 7c0c7b: 4c 89 f7 mov %r14,%rdi
01be 7c0c7e: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0c86 <print_graph_irq+0x1c6> 7c0c81: R_X86_64_PC32 .bss+0xdcfc9b
01c6 7c0c86: e8 00 00 00 00 call 7c0c8b <print_graph_irq+0x1cb> 7c0c87: R_X86_64_PLT32 trace_seq_puts-0x4
01cb 7c0c8b: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0c93 <print_graph_irq+0x1d3> 7c0c8e: R_X86_64_PC32 .bss+0xdcfcab
01d3 7c0c93: e8 00 00 00 00 call 7c0c98 <print_graph_irq+0x1d8> 7c0c94: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
01d8 7c0c98: 89 e9 mov %ebp,%ecx
01da 7c0c9a: 4c 89 f2 mov %r14,%rdx
01dd 7c0c9d: 31 f6 xor %esi,%esi
01df 7c0c9f: 81 c9 00 00 00 30 or $0x30000000,%ecx
01e5 7c0ca5: 4c 89 ef mov %r13,%rdi
01e8 7c0ca8: e8 d3 fb ff ff call 7c0880 <print_graph_duration>
01ed 7c0cad: be 0a 00 00 00 mov $0xa,%esi
01f2 7c0cb2: 4c 89 f7 mov %r14,%rdi
01f5 7c0cb5: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0cbd <print_graph_irq+0x1fd> 7c0cb8: R_X86_64_PC32 .bss+0xdcfcb3
01fd 7c0cbd: e8 00 00 00 00 call 7c0cc2 <print_graph_irq+0x202> 7c0cbe: R_X86_64_PLT32 trace_seq_putc-0x4
0202 7c0cc2: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0cca <print_graph_irq+0x20a> 7c0cc5: R_X86_64_PC32 .bss+0xdcfcbb
020a 7c0cca: eb 0d jmp 7c0cd9 <print_graph_irq+0x219>
020c 7c0ccc: e8 00 00 00 00 call 7c0cd1 <print_graph_irq+0x211> 7c0ccd: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0211 7c0cd1: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0cd9 <print_graph_irq+0x219> 7c0cd4: R_X86_64_PC32 .bss+0xdcfc23
0219 7c0cd9: 48 83 c4 18 add $0x18,%rsp
021d 7c0cdd: 5b pop %rbx
021e 7c0cde: 5d pop %rbp
021f 7c0cdf: 41 5c pop %r12
0221 7c0ce1: 41 5d pop %r13
0223 7c0ce3: 41 5e pop %r14
0225 7c0ce5: 41 5f pop %r15
0227 7c0ce7: e9 00 00 00 00 jmp 7c0cec <print_graph_irq+0x22c> 7c0ce8: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
022c 7c0cec: e8 00 00 00 00 call 7c0cf1 <print_graph_irq+0x231> 7c0ced: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0231 7c0cf1: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0cf9 <print_graph_irq+0x239> 7c0cf4: R_X86_64_PC32 .bss+0xdcfc1b
0239 7c0cf9: eb de jmp 7c0cd9 <print_graph_irq+0x219>
023b 7c0cfb: e8 00 00 00 00 call 7c0d00 <print_graph_irq+0x240> 7c0cfc: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0240 7c0d00: 48 8b 34 24 mov (%rsp),%rsi
0244 7c0d04: 4c 89 f7 mov %r14,%rdi
0247 7c0d07: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0d0f <print_graph_irq+0x24f> 7c0d0a: R_X86_64_PC32 .bss+0xdcfc83
024f 7c0d0f: e8 ac cc ff ff call 7bd9c0 <print_graph_lat_fmt>
0254 7c0d14: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0d1c <print_graph_irq+0x25c> 7c0d17: R_X86_64_PC32 .bss+0xdcfc8b
025c 7c0d1c: e9 1d ff ff ff jmp 7c0c3e <print_graph_irq+0x17e>
0261 7c0d21: e8 00 00 00 00 call 7c0d26 <print_graph_irq+0x266> 7c0d22: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0266 7c0d26: 8b 74 24 0c mov 0xc(%rsp),%esi
026a 7c0d2a: 4c 89 f7 mov %r14,%rdi
026d 7c0d2d: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0d35 <print_graph_irq+0x275> 7c0d30: R_X86_64_PC32 .bss+0xdcfc6b
0275 7c0d35: e8 86 c9 ff ff call 7bd6c0 <print_graph_proc>
027a 7c0d3a: 48 c7 c6 00 00 00 00 mov $0x0,%rsi 7c0d3d: R_X86_64_32S .rodata+0x5fb540
0281 7c0d41: 4c 89 f7 mov %r14,%rdi
0284 7c0d44: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0d4c <print_graph_irq+0x28c> 7c0d47: R_X86_64_PC32 .bss+0xdcfc73
028c 7c0d4c: e8 00 00 00 00 call 7c0d51 <print_graph_irq+0x291> 7c0d4d: R_X86_64_PLT32 trace_seq_puts-0x4
0291 7c0d51: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0d59 <print_graph_irq+0x299> 7c0d54: R_X86_64_PC32 .bss+0xdcfc7b
0299 7c0d59: e9 b5 fe ff ff jmp 7c0c13 <print_graph_irq+0x153>
029e 7c0d5e: e8 00 00 00 00 call 7c0d63 <print_graph_irq+0x2a3> 7c0d5f: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
02a3 7c0d63: 8b 15 00 00 00 00 mov 0x0(%rip),%edx # 7c0d69 <print_graph_irq+0x2a9> 7c0d65: R_X86_64_PC32 .bss+0xdd09fc
02a9 7c0d69: 8b 4c 24 08 mov 0x8(%rsp),%ecx
02ad 7c0d6d: 4c 89 f7 mov %r14,%rdi
02b0 7c0d70: 48 c7 c6 00 00 00 00 mov $0x0,%rsi 7c0d73: R_X86_64_32S .rodata+0x5fc000
02b7 7c0d77: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0d7f <print_graph_irq+0x2bf> 7c0d7a: R_X86_64_PC32 .bss+0xdcfc5b
02bf 7c0d7f: e8 00 00 00 00 call 7c0d84 <print_graph_irq+0x2c4> 7c0d80: R_X86_64_PLT32 trace_seq_printf-0x4
02c4 7c0d84: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0d8c <print_graph_irq+0x2cc> 7c0d87: R_X86_64_PC32 .bss+0xdcfc63
02cc 7c0d8c: e9 67 fe ff ff jmp 7c0bf8 <print_graph_irq+0x138>
02d1 7c0d91: e8 00 00 00 00 call 7c0d96 <print_graph_irq+0x2d6> 7c0d92: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
02d6 7c0d96: 48 8d 7b 10 lea 0x10(%rbx),%rdi
02da 7c0d9a: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0da2 <print_graph_irq+0x2e2> 7c0d9d: R_X86_64_PC32 .bss+0xdcfc4b
02e2 7c0da2: e8 00 00 00 00 call 7c0da7 <print_graph_irq+0x2e7> 7c0da3: R_X86_64_PLT32 __asan_load8_noabort-0x4
02e7 7c0da7: 48 8b 43 10 mov 0x10(%rbx),%rax
02eb 7c0dab: 48 8d bb 78 21 00 00 lea 0x2178(%rbx),%rdi
02f2 7c0db2: 48 89 44 24 10 mov %rax,0x10(%rsp)
02f7 7c0db7: e8 00 00 00 00 call 7c0dbc <print_graph_irq+0x2fc> 7c0db8: R_X86_64_PLT32 __asan_load8_noabort-0x4
02fc 7c0dbc: 48 8b 44 24 10 mov 0x10(%rsp),%rax
0301 7c0dc1: 48 8b 9b 78 21 00 00 mov 0x2178(%rbx),%rbx
0308 7c0dc8: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0dd0 <print_graph_irq+0x310> 7c0dcb: R_X86_64_PC32 .bss+0xdcfbdb
0310 7c0dd0: 48 8d 78 18 lea 0x18(%rax),%rdi
0314 7c0dd4: e8 00 00 00 00 call 7c0dd9 <print_graph_irq+0x319> 7c0dd5: R_X86_64_PLT32 __asan_load8_noabort-0x4
0319 7c0dd9: 48 8b 44 24 10 mov 0x10(%rsp),%rax
031e 7c0dde: 48 c7 c6 00 00 00 00 mov $0x0,%rsi 7c0de1: R_X86_64_32S .rodata+0x5fbfc0
0325 7c0de5: 4c 89 f7 mov %r14,%rdi
0328 7c0de8: 48 ba cf f7 53 e3 a5 9b c4 20 movabs $0x20c49ba5e353f7cf,%rdx
0332 7c0df2: 48 2b 58 18 sub 0x18(%rax),%rbx
0336 7c0df6: 48 c1 eb 03 shr $0x3,%rbx
033a 7c0dfa: 48 89 d8 mov %rbx,%rax
033d 7c0dfd: 48 f7 e2 mul %rdx
0340 7c0e00: 48 c1 ea 04 shr $0x4,%rdx
0344 7c0e04: e8 00 00 00 00 call 7c0e09 <print_graph_irq+0x349> 7c0e05: R_X86_64_PLT32 trace_seq_printf-0x4
0349 7c0e09: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0e11 <print_graph_irq+0x351> 7c0e0c: R_X86_64_PC32 .bss+0xdcfbe3
0351 7c0e11: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0e19 <print_graph_irq+0x359> 7c0e14: R_X86_64_PC32 .bss+0xdcfc53
0359 7c0e19: e9 bf fd ff ff jmp 7c0bdd <print_graph_irq+0x11d>
035e 7c0e1e: e8 00 00 00 00 call 7c0e23 <print_graph_irq+0x363> 7c0e1f: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0363 7c0e23: 48 8d bb 78 21 00 00 lea 0x2178(%rbx),%rdi
036a 7c0e2a: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0e32 <print_graph_irq+0x372> 7c0e2d: R_X86_64_PC32 .bss+0xdcfc3b
0372 7c0e32: e8 00 00 00 00 call 7c0e37 <print_graph_irq+0x377> 7c0e33: R_X86_64_PLT32 __asan_load8_noabort-0x4
0377 7c0e37: 48 8b 8b 78 21 00 00 mov 0x2178(%rbx),%rcx
037e 7c0e3e: 4c 89 f7 mov %r14,%rdi
0381 7c0e41: 48 be 53 5a 9b a0 2f b8 44 00 movabs $0x44b82fa09b5a53,%rsi
038b 7c0e4b: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0e53 <print_graph_irq+0x393> 7c0e4e: R_X86_64_PC32 .bss+0xdcfb9b
0393 7c0e53: 48 89 ca mov %rcx,%rdx
0396 7c0e56: 48 c1 ea 09 shr $0x9,%rdx
039a 7c0e5a: 48 89 d0 mov %rdx,%rax
039d 7c0e5d: 48 f7 e6 mul %rsi
03a0 7c0e60: 48 c7 c6 00 00 00 00 mov $0x0,%rsi 7c0e63: R_X86_64_32S .rodata+0x5fbf80
03a7 7c0e67: 48 c1 ea 0b shr $0xb,%rdx
03ab 7c0e6b: 48 69 c2 00 ca 9a 3b imul $0x3b9aca00,%rdx,%rax
03b2 7c0e72: 49 89 d0 mov %rdx,%r8
03b5 7c0e75: 48 ba cf f7 53 e3 a5 9b c4 20 movabs $0x20c49ba5e353f7cf,%rdx
03bf 7c0e7f: 48 29 c1 sub %rax,%rcx
03c2 7c0e82: 48 c1 e9 03 shr $0x3,%rcx
03c6 7c0e86: 48 89 c8 mov %rcx,%rax
03c9 7c0e89: 48 f7 e2 mul %rdx
03cc 7c0e8c: 48 c1 ea 04 shr $0x4,%rdx
03d0 7c0e90: 48 89 d1 mov %rdx,%rcx
03d3 7c0e93: 4c 89 c2 mov %r8,%rdx
03d6 7c0e96: e8 00 00 00 00 call 7c0e9b <print_graph_irq+0x3db> 7c0e97: R_X86_64_PLT32 trace_seq_printf-0x4
03db 7c0e9b: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0ea3 <print_graph_irq+0x3e3> 7c0e9e: R_X86_64_PC32 .bss+0xdcfba3
03e3 7c0ea3: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0eab <print_graph_irq+0x3eb> 7c0ea6: R_X86_64_PC32 .bss+0xdcfc43
03eb 7c0eab: e9 0a fd ff ff jmp 7c0bba <print_graph_irq+0xfa>
03f0 7c0eb0: e8 00 00 00 00 call 7c0eb5 <print_graph_irq+0x3f5> 7c0eb1: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
03f5 7c0eb5: 48 c7 c6 00 00 00 00 mov $0x0,%rsi 7c0eb8: R_X86_64_32S .rodata+0x5fc040
03fc 7c0ebc: 4c 89 f7 mov %r14,%rdi
03ff 7c0ebf: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0ec7 <print_graph_irq+0x407> 7c0ec2: R_X86_64_PC32 .bss+0xdcfc93
0407 7c0ec7: e8 00 00 00 00 call 7c0ecc <print_graph_irq+0x40c> 7c0ec8: R_X86_64_PLT32 trace_seq_puts-0x4
040c 7c0ecc: 48 83 05 00 00 00 00 01 addq $0x1,0x0(%rip) # 7c0ed4 <print_graph_irq+0x414> 7c0ecf: R_X86_64_PC32 .bss+0xdcfca3
0414 7c0ed4: e9 ba fd ff ff jmp 7c0c93 <print_graph_irq+0x1d3>
0419 7c0ed9: 66 66 2e 0f 1f 84 00 00 00 00 00 data16 cs nopw 0x0(%rax,%rax,1)
0424 7c0ee4: 66 66 2e 0f 1f 84 00 00 00 00 00 data16 cs nopw 0x0(%rax,%rax,1)
042f 7c0eef: 66 66 2e 0f 1f 84 00 00 00 00 00 data16 cs nopw 0x0(%rax,%rax,1)
043a 7c0efa: 66 0f 1f 44 00 00 nopw 0x0(%rax,%rax,1)
--
0-DAY CI Kernel Test Service
https://01.org/lkp
View attachment "config" of type "text/plain" (289660 bytes)
Powered by blists - more mailing lists