Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp1281019ybi; Wed, 3 Jul 2019 12:46:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqzCfWe/lf3x7c0/LpVuZAagNpGRaEerzVLpzcMZyp0d0kpTDm28CZrUcFjTDb5qzpO43A/G X-Received: by 2002:a17:90a:206a:: with SMTP id n97mr14779540pjc.10.1562183168516; Wed, 03 Jul 2019 12:46:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562183168; cv=none; d=google.com; s=arc-20160816; b=ihstvIUiWqZebW3P8Az+/lpl55SR/KtNzu1cICP6IZQbqLd4jV2qQyK3nJ7mDJDMdJ k9At8KUk3o/VWRreQQbUWtQWZNeZb4KaXRaQtihmfA4sdWYSsxbP3n/VcJdf9aI+soyF b86q0Q8yTldqGDvpT+O03OCPAVZ9W6NsSTE4K+pEgEB1IjjF7iF8efZe/G7v9TaKpiLl vWiNNUnUiptVK42Cv+T+nkK1jZwPFZI6ZvmOG7VG1iXvRgOxJtvTsrOlTwkgYkSsjnzI vTeUWx0IfZfwIcU1GhtGl5mRagQ1ISUMN6lf5PaRewAJEVChVr9+XU0ekKz8oAZ4MMVU nlog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=pnEcfACQQbSHA3v1wGhz630O8ysARb+1NQHP1rsz8Y8=; b=NYl9IhIKy3ZFHApNfZzBns706bpSKP/jOFYqAnDWgfGB+TUkfKxx3uFLO9OoMDG/xQ oXmsnn8rnUAX6dRMtwBSwny0xHp+K5wLbTjr4GfHN98W+XjNFaQ0zvaSWI6ccTYtSkKM wwuAAwvY5FDgK+hK1qs/rBpr7xKUQDx+4giBbQhFlb7zzL19XynlaOfHb43HSOPx74m+ g0CVTlAc5etn+aJenlHGvZcQCfOo7xVxSZPq4g5vE56F78MLz2lEMgO3v9gInhLNSoh6 unm7+Vt4fuFTINhloEs3KlUQsbAS2JDkjvYvoAuj9BdopHEsZoqVz2Ja8h0/itP5b1Xn LT9Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a20si3030547pgw.306.2019.07.03.12.45.53; Wed, 03 Jul 2019 12:46:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726885AbfGCTpe (ORCPT + 99 others); Wed, 3 Jul 2019 15:45:34 -0400 Received: from mx1.redhat.com ([209.132.183.28]:55388 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726574AbfGCTpe (ORCPT ); Wed, 3 Jul 2019 15:45:34 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id CF25387620; Wed, 3 Jul 2019 19:45:33 +0000 (UTC) Received: from treble (ovpn-112-31.rdu2.redhat.com [10.10.112.31]) by smtp.corp.redhat.com (Postfix) with ESMTPS id AF0F86013C; Wed, 3 Jul 2019 19:45:30 +0000 (UTC) Date: Wed, 3 Jul 2019 14:45:28 -0500 From: Josh Poimboeuf To: Randy Dunlap Cc: Stephen Rothwell , Linux Next Mailing List , Linux Kernel Mailing List , Peter Zijlstra Subject: Re: linux-next: Tree for Jul 2 (objtool) Message-ID: <20190703194528.7kk7v44whdp7ol5a@treble> References: <20190702195158.79aa5517@canb.auug.org.au> <20190703164458.imjawnoczygb2vvd@treble> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20180716 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Wed, 03 Jul 2019 19:45:34 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 03, 2019 at 10:23:21AM -0700, Randy Dunlap wrote: > On 7/3/19 9:44 AM, Josh Poimboeuf wrote: > > On Tue, Jul 02, 2019 at 11:47:02AM -0700, Randy Dunlap wrote: > >> On 7/2/19 2:51 AM, Stephen Rothwell wrote: > >>> Hi all, > >>> > >>> Changes since 20190701: > >>> > >> > >> on x86_64: > >> > >> kernel/bpf/core.o: warning: objtool: ___bpf_prog_run()+0x22: can't find switch jump table > > > > I don't see it on current linux-next/master. Can you share the config > > and .o? > > > > This warning happened in 6 of 10 builds for 20190702. > > Today (20190703) I don't see it at all, but I see this instead: > kernel/bpf/core.o: warning: objtool: ___bpf_prog_run()+0xa3: sibling call from callable instruction with modified stack frame > > Kernel (rand)config file and .o file for 20190702 are attached. Thanks, I'm able to recreate the sibling call warning with a randconfig on today's linux-next. GCC is doing some funky stuff. With my randconfig, ___bpf_prog_run() has 166 indirect calls to its jump table. Seems (a bit!) excessive. I'll need to look into it. -- Josh