[tglx-devel:depthtracking 31/38] arch/x86/entry/entry_64.S:265: Error: no such instruction: `call_thunks_debug_inc_ctxsw'

From: kernel test robot
Date: Thu Jul 14 2022 - 09:15:29 EST


tree: https://git.kernel.org/pub/scm/linux/kernel/git/tglx/devel.git depthtracking
head: 81d2c1b17a61bfeca4b92a5d6e1fb6f5ff464826
commit: 2732d9924d0ab04682c6cbc252e688e3e54b7847 [31/38] x86/calldepth: Add ret/call counting for debug
config: x86_64-randconfig-a013 (https://download.01.org/0day-ci/archive/20220714/202207142159.djfGNExM-lkp@xxxxxxxxx/config)
compiler: gcc-11 (Debian 11.3.0-3) 11.3.0
reproduce (this is a W=1 build):
# https://git.kernel.org/pub/scm/linux/kernel/git/tglx/devel.git/commit/?id=2732d9924d0ab04682c6cbc252e688e3e54b7847
git remote add tglx-devel https://git.kernel.org/pub/scm/linux/kernel/git/tglx/devel.git
git fetch --no-tags tglx-devel depthtracking
git checkout 2732d9924d0ab04682c6cbc252e688e3e54b7847
# save the config file
mkdir build_dir && cp config build_dir/.config
make W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash

If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <lkp@xxxxxxxxx>

All errors (new ones prefixed by >>):

arch/x86/entry/entry_64.S: Assembler messages:
>> arch/x86/entry/entry_64.S:265: Error: no such instruction: `call_thunks_debug_inc_ctxsw'


vim +265 arch/x86/entry/entry_64.S

1eeb207f870f74 arch/x86/kernel/entry_64.S Denys Vlasenko 2015-02-26 257
c995efd5a740d9 arch/x86/entry/entry_64.S David Woodhouse 2018-01-12 258 /*
c995efd5a740d9 arch/x86/entry/entry_64.S David Woodhouse 2018-01-12 259 * When switching from a shallower to a deeper call stack
c995efd5a740d9 arch/x86/entry/entry_64.S David Woodhouse 2018-01-12 260 * the RSB may either underflow or use entries populated
c995efd5a740d9 arch/x86/entry/entry_64.S David Woodhouse 2018-01-12 261 * with userspace addresses. On CPUs where those concerns
c995efd5a740d9 arch/x86/entry/entry_64.S David Woodhouse 2018-01-12 262 * exist, overwrite the RSB with entries which capture
c995efd5a740d9 arch/x86/entry/entry_64.S David Woodhouse 2018-01-12 263 * speculative execution to prevent attack.
c995efd5a740d9 arch/x86/entry/entry_64.S David Woodhouse 2018-01-12 264 */
d1c99108af3c59 arch/x86/entry/entry_64.S David Woodhouse 2018-02-19 @265 FILL_RETURN_BUFFER %r12, RSB_CLEAR_LOOPS, X86_FEATURE_RSB_CTXSW
c995efd5a740d9 arch/x86/entry/entry_64.S David Woodhouse 2018-01-12 266
0100301bfdf56a arch/x86/entry/entry_64.S Brian Gerst 2016-08-13 267 /* restore callee-saved registers */
0100301bfdf56a arch/x86/entry/entry_64.S Brian Gerst 2016-08-13 268 popq %r15
0100301bfdf56a arch/x86/entry/entry_64.S Brian Gerst 2016-08-13 269 popq %r14
0100301bfdf56a arch/x86/entry/entry_64.S Brian Gerst 2016-08-13 270 popq %r13
0100301bfdf56a arch/x86/entry/entry_64.S Brian Gerst 2016-08-13 271 popq %r12
0100301bfdf56a arch/x86/entry/entry_64.S Brian Gerst 2016-08-13 272 popq %rbx
0100301bfdf56a arch/x86/entry/entry_64.S Brian Gerst 2016-08-13 273 popq %rbp
1eeb207f870f74 arch/x86/kernel/entry_64.S Denys Vlasenko 2015-02-26 274
0100301bfdf56a arch/x86/entry/entry_64.S Brian Gerst 2016-08-13 275 jmp __switch_to
96c64806b4bf35 arch/x86/entry/entry_64.S Josh Poimboeuf 2020-04-25 276 SYM_FUNC_END(__switch_to_asm)
b9f6976bfb9491 arch/x86/entry/entry_64.S Thomas Gleixner 2020-03-25 277 .popsection
1eeb207f870f74 arch/x86/kernel/entry_64.S Denys Vlasenko 2015-02-26 278

:::::: The code at line 265 was first introduced by commit
:::::: d1c99108af3c5992640aa2afa7d2e88c3775c06e Revert "x86/retpoline: Simplify vmexit_fill_RSB()"

:::::: TO: David Woodhouse <dwmw@xxxxxxxxxxxx>
:::::: CC: Ingo Molnar <mingo@xxxxxxxxxx>

--
0-DAY CI Kernel Test Service
https://01.org/lkp