Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1657745rwl; Wed, 12 Apr 2023 16:51:44 -0700 (PDT) X-Google-Smtp-Source: AKy350b4tqBGJ3C0WZmFp5GcjxpXXL80Au27UzlVu9M1TlkMCZDEvXHd7OgJcsmwYqnSB66g6u48 X-Received: by 2002:a05:6a00:99a:b0:63b:4313:f8af with SMTP id u26-20020a056a00099a00b0063b4313f8afmr132404pfg.14.1681343504525; Wed, 12 Apr 2023 16:51:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681343504; cv=none; d=google.com; s=arc-20160816; b=kaRw/IEGUcwniwgfbq1FtiRTt4Gzt9nkOh1myAojKOAbAmbXrFhMwp8eqAYdCBatYK NG6qWFxMnPtrXYA4ot2DGbKkc5LKpUKjv9kR3ysL+WCtZQRS2HEVOm7VS8vfosHjaLMw WHKSVoqT357sfRimSBgxMUKvc7QZadmlPjhS4YAqiyyHIgZtjQHNiQSNhLSJvXRYm1uP OqIaHXrd+/kiaNY7Hh7X7AgVIhMzQmBX8Jd/H6uOl5GQ6n4kWVkYKXq5dWPrreJh+P0C YDrn6bZXljyf+bOUJd3ID5EG3EB5eoNoFUxJxzy8ItGBAx4N5jMeig5QxPJ/89nptDgs B7UQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Uf1mLDRunCQhKqPADYV0uIERIGRijtPP+etK39sVUTw=; b=D7rFMLPXHeVanOW/V+5E9cW3j1MKmm89qj3zQcIsSf43mlMTZPVyMZ6Nrs233gVyKs D4MPvAPXrBryyv5EzsC7rizAfp3yVeY2Djh2ADbAfX2AklzAbHYwhuA6HXsu6GIWga39 azKEveYh8HJymSvoF1TpNhLyb2PZDGhFkbhTHTd8er44VfCI6+Ui+PSuniYizOfiOLwR WmarDMeI2TUq4xBfSpWyk+bKGS6wPbUaNyIifHAtsfhOpLBf2lUjHjH+nc6Add2mnxVL 9rvRx7pS2r2L/r/y3ttsyrpLnzIgstS7IS3KSFQWESBjv1x8PAXxoUQrXNJ3JZP7/+iT 03oA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bqy+Mp3Y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id bs193-20020a6328ca000000b0051a650b8f62si362958pgb.836.2023.04.12.16.51.33; Wed, 12 Apr 2023 16:51:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bqy+Mp3Y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229520AbjDLXuR (ORCPT + 99 others); Wed, 12 Apr 2023 19:50:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45624 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229887AbjDLXuF (ORCPT ); Wed, 12 Apr 2023 19:50:05 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B0B016591; Wed, 12 Apr 2023 16:50:03 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 9207863A39; Wed, 12 Apr 2023 23:50:03 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 82751C4339E; Wed, 12 Apr 2023 23:50:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1681343403; bh=WcmvupRwpbJp5sb6WicMjnYrCS9HnOD5+y3zwejbCrQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bqy+Mp3YRnhT9iW1USJg1dD69mNFG2C8uDFMjUW5P3BR1YEeAr+flscDtxvNO+Mzm 11Yu1m6xYIF5eYDdRj7IiC01nPMZ3MrqNmOFETBeeU01Jz0Fcyskxv4VHwb9BOsDFD pBV8zfvsJ70mIUgLvy9L6k8jF4T2f1pmmCV9/w4Q3GjYKzQapktCO2kxehM83nYTfa mnDer59waswZniXNhspDEMgR23R2wToN9q6ulxb4/bAvpDuVtFsM5eRxKbkWZ/R3uo OTk39AWvvkEo3FwnLIE9yUCvovKwa08+gKVr1JQ221ZIZiNDdhSiaCE4lwmG4m3F2J 0EmRNgyssWneQ== From: Josh Poimboeuf To: x86@kernel.org Cc: linux-kernel@vger.kernel.org, Peter Zijlstra , Miroslav Benes , linux-btrfs@vger.kernel.org, Mark Rutland , linux-scsi@vger.kernel.org, linux-hyperv@vger.kernel.org, Arnd Bergmann , "Guilherme G . Piccoli" , Michael Kelley , Nick Desaulniers , Nathan Chancellor , kernel test robot Subject: [PATCH v2 08/11] btrfs: Mark btrfs_assertfail() __noreturn Date: Wed, 12 Apr 2023 16:49:38 -0700 Message-Id: <960bd9c0c9e3cfc409ba9c35a17644b11b832956.1681342859.git.jpoimboe@kernel.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 Content-type: text/plain Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fixes a bunch of warnings including: vmlinux.o: warning: objtool: select_reloc_root+0x314: unreachable instruction vmlinux.o: warning: objtool: finish_inode_if_needed+0x15b1: unreachable instruction vmlinux.o: warning: objtool: get_bio_sector_nr+0x259: unreachable instruction vmlinux.o: warning: objtool: raid_wait_read_end_io+0xc26: unreachable instruction vmlinux.o: warning: objtool: raid56_parity_alloc_scrub_rbio+0x37b: unreachable instruction ... Reported-by: kernel test robot Link: https://lore.kernel.org/oe-kbuild-all/202302210709.IlXfgMpX-lkp@intel.com/ Signed-off-by: Josh Poimboeuf --- fs/btrfs/messages.c | 2 +- fs/btrfs/messages.h | 2 +- tools/objtool/check.c | 1 + 3 files changed, 3 insertions(+), 2 deletions(-) diff --git a/fs/btrfs/messages.c b/fs/btrfs/messages.c index fde5aaa6e7c9..310a05cf95ef 100644 --- a/fs/btrfs/messages.c +++ b/fs/btrfs/messages.c @@ -253,7 +253,7 @@ void __cold _btrfs_printk(const struct btrfs_fs_info *fs_info, const char *fmt, #endif #ifdef CONFIG_BTRFS_ASSERT -void __cold btrfs_assertfail(const char *expr, const char *file, int line) +void __cold __noreturn btrfs_assertfail(const char *expr, const char *file, int line) { pr_err("assertion failed: %s, in %s:%d\n", expr, file, line); BUG(); diff --git a/fs/btrfs/messages.h b/fs/btrfs/messages.h index 8c516ee58ff9..ac2d1982ba3d 100644 --- a/fs/btrfs/messages.h +++ b/fs/btrfs/messages.h @@ -160,7 +160,7 @@ do { \ } while (0) #ifdef CONFIG_BTRFS_ASSERT -void __cold btrfs_assertfail(const char *expr, const char *file, int line); +void __cold __noreturn btrfs_assertfail(const char *expr, const char *file, int line); #define ASSERT(expr) \ (likely(expr) ? (void)0 : btrfs_assertfail(#expr, __FILE__, __LINE__)) diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 94c16436d990..0b3522d66ddf 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -204,6 +204,7 @@ static bool __dead_end_function(struct objtool_file *file, struct symbol *func, "__ubsan_handle_builtin_unreachable", "arch_call_rest_init", "arch_cpu_idle_dead", + "btrfs_assertfail", "cpu_bringup_and_idle", "cpu_startup_entry", "do_exit", -- 2.39.2