[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202211142027.0E3ISIZr-lkp@intel.com>
Date: Mon, 14 Nov 2022 20:26:17 +0800
From: kernel test robot <lkp@...el.com>
To: Peter Zijlstra <peterz@...radead.org>
Cc: oe-kbuild-all@...ts.linux.dev, linux-kernel@...r.kernel.org
Subject: vmlinux.o: warning: objtool: lkdtm_UNSET_SMEP+0x1c3: relocation to
!ENDBR: native_write_cr4+0x41
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: 094226ad94f471a9f19e8f8e7140a09c2625abaa
commit: 656d054e0a15ec327bd82801ccd58201e59f6896 jump_label,noinstr: Avoid instrumentation for JUMP_LABEL=n builds
date: 6 months ago
config: x86_64-buildonly-randconfig-r001-20221114
compiler: gcc-11 (Debian 11.3.0-8) 11.3.0
reproduce (this is a W=1 build):
# https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=656d054e0a15ec327bd82801ccd58201e59f6896
git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
git fetch --no-tags linus master
git checkout 656d054e0a15ec327bd82801ccd58201e59f6896
# save the config file
mkdir build_dir && cp config build_dir/.config
make W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash
If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@...el.com>
All warnings (new ones prefixed by >>):
ld: warning: arch/x86/lib/csum-copy_64.o: missing .note.GNU-stack section implies executable stack
ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
>> vmlinux.o: warning: objtool: lkdtm_UNSET_SMEP+0x1c3: relocation to !ENDBR: native_write_cr4+0x41
ld: warning: vmlinux.o: requires executable stack (because the .note.GNU-stack section is executable)
ld: warning: .tmp_vmlinux.kallsyms1 has a LOAD segment with RWX permissions
ld: warning: vmlinux.o: requires executable stack (because the .note.GNU-stack section is executable)
ld: warning: .tmp_vmlinux.kallsyms2 has a LOAD segment with RWX permissions
ld: warning: vmlinux.o: requires executable stack (because the .note.GNU-stack section is executable)
ld: warning: vmlinux has a LOAD segment with RWX permissions
objdump-func vmlinux.o lkdtm_UNSET_SMEP:
0000 0000000001060509 <lkdtm_UNSET_SMEP>:
0000 1060509: f3 0f 1e fa endbr64
0004 106050d: 41 56 push %r14
0006 106050f: 41 55 push %r13
0008 1060511: 41 54 push %r12
000a 1060513: 55 push %rbp
000b 1060514: 53 push %rbx
000c 1060515: 0f 20 e5 mov %cr4,%rbp
000f 1060518: 0f ba e5 14 bt $0x14,%ebp
0013 106051c: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 106051f: R_X86_64_32S .rodata+0x7ada80
001a 1060523: 0f 83 0d 02 00 00 jae 1060736 <lkdtm_UNSET_SMEP+0x22d>
0020 1060529: 48 81 e5 ff ff ef ff and $0xffffffffffefffff,%rbp
0027 1060530: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 1060533: R_X86_64_32S .rodata+0x7adac0
002e 1060537: e8 00 00 00 00 call 106053c <lkdtm_UNSET_SMEP+0x33> 1060538: R_X86_64_PLT32 _printk-0x4
0033 106053c: 48 89 ef mov %rbp,%rdi
0036 106053f: e8 00 00 00 00 call 1060544 <lkdtm_UNSET_SMEP+0x3b> 1060540: R_X86_64_PLT32 native_write_cr4-0x4
003b 1060544: 0f 20 e0 mov %cr4,%rax
003e 1060547: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 106054a: R_X86_64_32S .rodata+0x7adb20
0045 106054e: 48 39 c5 cmp %rax,%rbp
0048 1060551: 0f 84 92 01 00 00 je 10606e9 <lkdtm_UNSET_SMEP+0x1e0>
004e 1060557: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 106055a: R_X86_64_32S .rodata+0x7adbc0
0055 106055e: 48 c7 c3 00 00 00 00 mov $0x0,%rbx 1060561: R_X86_64_32S native_write_cr4+0x1
005c 1060565: 49 bc 00 00 00 00 00 fc ff df movabs $0xdffffc0000000000,%r12
0066 106056f: e8 00 00 00 00 call 1060574 <lkdtm_UNSET_SMEP+0x6b> 1060570: R_X86_64_PLT32 _printk-0x4
006b 1060574: 4c 8d 73 ff lea -0x1(%rbx),%r14
006f 1060578: 4c 89 f0 mov %r14,%rax
0072 106057b: 4c 89 f2 mov %r14,%rdx
0075 106057e: 48 c1 e8 03 shr $0x3,%rax
0079 1060582: 83 e2 07 and $0x7,%edx
007c 1060585: 42 8a 04 20 mov (%rax,%r12,1),%al
0080 1060589: 38 d0 cmp %dl,%al
0082 106058b: 7f 0c jg 1060599 <lkdtm_UNSET_SMEP+0x90>
0084 106058d: 84 c0 test %al,%al
0086 106058f: 74 08 je 1060599 <lkdtm_UNSET_SMEP+0x90>
0088 1060591: 4c 89 f7 mov %r14,%rdi
008b 1060594: e8 00 00 00 00 call 1060599 <lkdtm_UNSET_SMEP+0x90> 1060595: R_X86_64_PLT32 __asan_report_load1_noabort-0x4
0090 1060599: 8a 43 ff mov -0x1(%rbx),%al
0093 106059c: 4c 8d 6b 01 lea 0x1(%rbx),%r13
0097 10605a0: 3c 0f cmp $0xf,%al
0099 10605a2: 75 54 jne 10605f8 <lkdtm_UNSET_SMEP+0xef>
009b 10605a4: 48 89 d8 mov %rbx,%rax
009e 10605a7: 48 89 da mov %rbx,%rdx
00a1 10605aa: 48 c1 e8 03 shr $0x3,%rax
00a5 10605ae: 83 e2 07 and $0x7,%edx
00a8 10605b1: 42 8a 04 20 mov (%rax,%r12,1),%al
00ac 10605b5: 38 d0 cmp %dl,%al
00ae 10605b7: 7f 0c jg 10605c5 <lkdtm_UNSET_SMEP+0xbc>
00b0 10605b9: 84 c0 test %al,%al
00b2 10605bb: 74 08 je 10605c5 <lkdtm_UNSET_SMEP+0xbc>
00b4 10605bd: 48 89 df mov %rbx,%rdi
00b7 10605c0: e8 00 00 00 00 call 10605c5 <lkdtm_UNSET_SMEP+0xbc> 10605c1: R_X86_64_PLT32 __asan_report_load1_noabort-0x4
00bc 10605c5: 80 3b 22 cmpb $0x22,(%rbx)
00bf 10605c8: 0f 85 fb 00 00 00 jne 10606c9 <lkdtm_UNSET_SMEP+0x1c0>
00c5 10605ce: 4c 89 e8 mov %r13,%rax
00c8 10605d1: 4c 89 ea mov %r13,%rdx
00cb 10605d4: 48 c1 e8 03 shr $0x3,%rax
00cf 10605d8: 83 e2 07 and $0x7,%edx
00d2 10605db: 42 8a 04 20 mov (%rax,%r12,1),%al
00d6 10605df: 38 d0 cmp %dl,%al
00d8 10605e1: 7f 0c jg 10605ef <lkdtm_UNSET_SMEP+0xe6>
00da 10605e3: 84 c0 test %al,%al
00dc 10605e5: 74 08 je 10605ef <lkdtm_UNSET_SMEP+0xe6>
00de 10605e7: 4c 89 ef mov %r13,%rdi
00e1 10605ea: e8 00 00 00 00 call 10605ef <lkdtm_UNSET_SMEP+0xe6> 10605eb: R_X86_64_PLT32 __asan_report_load1_noabort-0x4
00e6 10605ef: 80 7b 01 e7 cmpb $0xe7,0x1(%rbx)
00ea 10605f3: e9 cf 00 00 00 jmp 10606c7 <lkdtm_UNSET_SMEP+0x1be>
00ef 10605f8: 3c 48 cmp $0x48,%al
00f1 10605fa: 0f 85 c9 00 00 00 jne 10606c9 <lkdtm_UNSET_SMEP+0x1c0>
00f7 1060600: 48 89 d8 mov %rbx,%rax
00fa 1060603: 48 89 da mov %rbx,%rdx
00fd 1060606: 48 c1 e8 03 shr $0x3,%rax
0101 106060a: 83 e2 07 and $0x7,%edx
0104 106060d: 42 8a 04 20 mov (%rax,%r12,1),%al
0108 1060611: 38 d0 cmp %dl,%al
010a 1060613: 7f 0c jg 1060621 <lkdtm_UNSET_SMEP+0x118>
010c 1060615: 84 c0 test %al,%al
010e 1060617: 74 08 je 1060621 <lkdtm_UNSET_SMEP+0x118>
0110 1060619: 48 89 df mov %rbx,%rdi
0113 106061c: e8 00 00 00 00 call 1060621 <lkdtm_UNSET_SMEP+0x118> 106061d: R_X86_64_PLT32 __asan_report_load1_noabort-0x4
0118 1060621: 80 3b 89 cmpb $0x89,(%rbx)
011b 1060624: 0f 85 9f 00 00 00 jne 10606c9 <lkdtm_UNSET_SMEP+0x1c0>
0121 106062a: 4c 89 e8 mov %r13,%rax
0124 106062d: 4c 89 ea mov %r13,%rdx
0127 1060630: 48 c1 e8 03 shr $0x3,%rax
012b 1060634: 83 e2 07 and $0x7,%edx
012e 1060637: 42 8a 04 20 mov (%rax,%r12,1),%al
0132 106063b: 38 d0 cmp %dl,%al
0134 106063d: 7f 0c jg 106064b <lkdtm_UNSET_SMEP+0x142>
0136 106063f: 84 c0 test %al,%al
0138 1060641: 74 08 je 106064b <lkdtm_UNSET_SMEP+0x142>
013a 1060643: 4c 89 ef mov %r13,%rdi
013d 1060646: e8 00 00 00 00 call 106064b <lkdtm_UNSET_SMEP+0x142> 1060647: R_X86_64_PLT32 __asan_report_load1_noabort-0x4
0142 106064b: 80 7b 01 f8 cmpb $0xf8,0x1(%rbx)
0146 106064f: 75 78 jne 10606c9 <lkdtm_UNSET_SMEP+0x1c0>
0148 1060651: 48 8d 7b 02 lea 0x2(%rbx),%rdi
014c 1060655: 48 89 f8 mov %rdi,%rax
014f 1060658: 48 89 fa mov %rdi,%rdx
0152 106065b: 48 c1 e8 03 shr $0x3,%rax
0156 106065f: 83 e2 07 and $0x7,%edx
0159 1060662: 42 8a 04 20 mov (%rax,%r12,1),%al
015d 1060666: 38 d0 cmp %dl,%al
015f 1060668: 7f 09 jg 1060673 <lkdtm_UNSET_SMEP+0x16a>
0161 106066a: 84 c0 test %al,%al
0163 106066c: 74 05 je 1060673 <lkdtm_UNSET_SMEP+0x16a>
0165 106066e: e8 00 00 00 00 call 1060673 <lkdtm_UNSET_SMEP+0x16a> 106066f: R_X86_64_PLT32 __asan_report_load1_noabort-0x4
016a 1060673: 80 7b 02 0f cmpb $0xf,0x2(%rbx)
016e 1060677: 75 50 jne 10606c9 <lkdtm_UNSET_SMEP+0x1c0>
0170 1060679: 48 8d 7b 03 lea 0x3(%rbx),%rdi
0174 106067d: 48 89 f8 mov %rdi,%rax
0177 1060680: 48 89 fa mov %rdi,%rdx
017a 1060683: 48 c1 e8 03 shr $0x3,%rax
017e 1060687: 83 e2 07 and $0x7,%edx
0181 106068a: 42 8a 04 20 mov (%rax,%r12,1),%al
0185 106068e: 38 d0 cmp %dl,%al
0187 1060690: 7f 09 jg 106069b <lkdtm_UNSET_SMEP+0x192>
0189 1060692: 84 c0 test %al,%al
018b 1060694: 74 05 je 106069b <lkdtm_UNSET_SMEP+0x192>
018d 1060696: e8 00 00 00 00 call 106069b <lkdtm_UNSET_SMEP+0x192> 1060697: R_X86_64_PLT32 __asan_report_load1_noabort-0x4
0192 106069b: 80 7b 03 22 cmpb $0x22,0x3(%rbx)
0196 106069f: 75 28 jne 10606c9 <lkdtm_UNSET_SMEP+0x1c0>
0198 10606a1: 48 8d 7b 04 lea 0x4(%rbx),%rdi
019c 10606a5: 48 89 f8 mov %rdi,%rax
019f 10606a8: 48 89 fa mov %rdi,%rdx
01a2 10606ab: 48 c1 e8 03 shr $0x3,%rax
01a6 10606af: 83 e2 07 and $0x7,%edx
01a9 10606b2: 42 8a 04 20 mov (%rax,%r12,1),%al
01ad 10606b6: 38 d0 cmp %dl,%al
01af 10606b8: 7f 09 jg 10606c3 <lkdtm_UNSET_SMEP+0x1ba>
01b1 10606ba: 84 c0 test %al,%al
01b3 10606bc: 74 05 je 10606c3 <lkdtm_UNSET_SMEP+0x1ba>
01b5 10606be: e8 00 00 00 00 call 10606c3 <lkdtm_UNSET_SMEP+0x1ba> 10606bf: R_X86_64_PLT32 __asan_report_load1_noabort-0x4
01ba 10606c3: 80 7b 04 e0 cmpb $0xe0,0x4(%rbx)
01be 10606c7: 74 48 je 1060711 <lkdtm_UNSET_SMEP+0x208>
01c0 10606c9: 4c 89 eb mov %r13,%rbx
01c3 10606cc: 49 81 fd 00 00 00 00 cmp $0x0,%r13 10606cf: R_X86_64_32S native_write_cr4+0x41
01ca 10606d3: 0f 85 9b fe ff ff jne 1060574 <lkdtm_UNSET_SMEP+0x6b>
01d0 10606d9: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 10606dc: R_X86_64_32S .rodata+0x7adce0
01d7 10606e0: eb 54 jmp 1060736 <lkdtm_UNSET_SMEP+0x22d>
01d9 10606e2: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 10606e5: R_X86_64_32S .rodata+0x7adc80
01e0 10606e9: e8 00 00 00 00 call 10606ee <lkdtm_UNSET_SMEP+0x1e5> 10606ea: R_X86_64_PLT32 _printk-0x4
01e5 10606ee: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 10606f1: R_X86_64_32S .rodata+0x7adb80
01ec 10606f5: e8 00 00 00 00 call 10606fa <lkdtm_UNSET_SMEP+0x1f1> 10606f6: R_X86_64_PLT32 _printk-0x4
01f1 10606fa: 48 89 ef mov %rbp,%rdi
01f4 10606fd: 5b pop %rbx
01f5 10606fe: 5d pop %rbp
01f6 10606ff: 48 81 cf 00 00 10 00 or $0x100000,%rdi
01fd 1060706: 41 5c pop %r12
01ff 1060708: 41 5d pop %r13
0201 106070a: 41 5e pop %r14
0203 106070c: e9 00 00 00 00 jmp 1060711 <lkdtm_UNSET_SMEP+0x208> 106070d: R_X86_64_PLT32 native_write_cr4-0x4
0208 1060711: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 1060714: R_X86_64_32S .rodata+0x7add40
020f 1060718: e8 00 00 00 00 call 106071d <lkdtm_UNSET_SMEP+0x214> 1060719: R_X86_64_PLT32 _printk-0x4
0214 106071d: 48 89 ef mov %rbp,%rdi
0217 1060720: 2e e8 00 00 00 00 cs call 1060726 <lkdtm_UNSET_SMEP+0x21d> 1060722: R_X86_64_PLT32 __x86_indirect_thunk_r14-0x4
021d 1060726: 0f 20 e0 mov %cr4,%rax
0220 1060729: 0f ba e0 14 bt $0x14,%eax
0224 106072d: 73 b3 jae 10606e2 <lkdtm_UNSET_SMEP+0x1d9>
0226 106072f: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 1060732: R_X86_64_32S .rodata+0x7adc20
022d 1060736: 5b pop %rbx
022e 1060737: 5d pop %rbp
022f 1060738: 41 5c pop %r12
0231 106073a: 41 5d pop %r13
0233 106073c: 41 5e pop %r14
0235 106073e: e9 00 00 00 00 jmp 1060743 <ctor_double_free> 106073f: R_X86_64_PLT32 _printk-0x4
--
0-DAY CI Kernel Test Service
https://01.org/lkp
View attachment "config" of type "text/plain" (125359 bytes)
Powered by blists - more mailing lists