lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202211142027.0E3ISIZr-lkp@intel.com>
Date:   Mon, 14 Nov 2022 20:26:17 +0800
From:   kernel test robot <lkp@...el.com>
To:     Peter Zijlstra <peterz@...radead.org>
Cc:     oe-kbuild-all@...ts.linux.dev, linux-kernel@...r.kernel.org
Subject: vmlinux.o: warning: objtool: lkdtm_UNSET_SMEP+0x1c3: relocation to
 !ENDBR: native_write_cr4+0x41

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   094226ad94f471a9f19e8f8e7140a09c2625abaa
commit: 656d054e0a15ec327bd82801ccd58201e59f6896 jump_label,noinstr: Avoid instrumentation for JUMP_LABEL=n builds
date:   6 months ago
config: x86_64-buildonly-randconfig-r001-20221114
compiler: gcc-11 (Debian 11.3.0-8) 11.3.0
reproduce (this is a W=1 build):
        # https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=656d054e0a15ec327bd82801ccd58201e59f6896
        git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
        git fetch --no-tags linus master
        git checkout 656d054e0a15ec327bd82801ccd58201e59f6896
        # save the config file
        mkdir build_dir && cp config build_dir/.config
        make W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash

If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@...el.com>

All warnings (new ones prefixed by >>):

   ld: warning: arch/x86/lib/csum-copy_64.o: missing .note.GNU-stack section implies executable stack
   ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
>> vmlinux.o: warning: objtool: lkdtm_UNSET_SMEP+0x1c3: relocation to !ENDBR: native_write_cr4+0x41
   ld: warning: vmlinux.o: requires executable stack (because the .note.GNU-stack section is executable)
   ld: warning: .tmp_vmlinux.kallsyms1 has a LOAD segment with RWX permissions
   ld: warning: vmlinux.o: requires executable stack (because the .note.GNU-stack section is executable)
   ld: warning: .tmp_vmlinux.kallsyms2 has a LOAD segment with RWX permissions
   ld: warning: vmlinux.o: requires executable stack (because the .note.GNU-stack section is executable)
   ld: warning: vmlinux has a LOAD segment with RWX permissions


objdump-func vmlinux.o lkdtm_UNSET_SMEP:
0000 0000000001060509 <lkdtm_UNSET_SMEP>:
0000  1060509:	f3 0f 1e fa          	endbr64
0004  106050d:	41 56                	push   %r14
0006  106050f:	41 55                	push   %r13
0008  1060511:	41 54                	push   %r12
000a  1060513:	55                   	push   %rbp
000b  1060514:	53                   	push   %rbx
000c  1060515:	0f 20 e5             	mov    %cr4,%rbp
000f  1060518:	0f ba e5 14          	bt     $0x14,%ebp
0013  106051c:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	106051f: R_X86_64_32S	.rodata+0x7ada80
001a  1060523:	0f 83 0d 02 00 00    	jae    1060736 <lkdtm_UNSET_SMEP+0x22d>
0020  1060529:	48 81 e5 ff ff ef ff 	and    $0xffffffffffefffff,%rbp
0027  1060530:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1060533: R_X86_64_32S	.rodata+0x7adac0
002e  1060537:	e8 00 00 00 00       	call   106053c <lkdtm_UNSET_SMEP+0x33>	1060538: R_X86_64_PLT32	_printk-0x4
0033  106053c:	48 89 ef             	mov    %rbp,%rdi
0036  106053f:	e8 00 00 00 00       	call   1060544 <lkdtm_UNSET_SMEP+0x3b>	1060540: R_X86_64_PLT32	native_write_cr4-0x4
003b  1060544:	0f 20 e0             	mov    %cr4,%rax
003e  1060547:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	106054a: R_X86_64_32S	.rodata+0x7adb20
0045  106054e:	48 39 c5             	cmp    %rax,%rbp
0048  1060551:	0f 84 92 01 00 00    	je     10606e9 <lkdtm_UNSET_SMEP+0x1e0>
004e  1060557:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	106055a: R_X86_64_32S	.rodata+0x7adbc0
0055  106055e:	48 c7 c3 00 00 00 00 	mov    $0x0,%rbx	1060561: R_X86_64_32S	native_write_cr4+0x1
005c  1060565:	49 bc 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r12
0066  106056f:	e8 00 00 00 00       	call   1060574 <lkdtm_UNSET_SMEP+0x6b>	1060570: R_X86_64_PLT32	_printk-0x4
006b  1060574:	4c 8d 73 ff          	lea    -0x1(%rbx),%r14
006f  1060578:	4c 89 f0             	mov    %r14,%rax
0072  106057b:	4c 89 f2             	mov    %r14,%rdx
0075  106057e:	48 c1 e8 03          	shr    $0x3,%rax
0079  1060582:	83 e2 07             	and    $0x7,%edx
007c  1060585:	42 8a 04 20          	mov    (%rax,%r12,1),%al
0080  1060589:	38 d0                	cmp    %dl,%al
0082  106058b:	7f 0c                	jg     1060599 <lkdtm_UNSET_SMEP+0x90>
0084  106058d:	84 c0                	test   %al,%al
0086  106058f:	74 08                	je     1060599 <lkdtm_UNSET_SMEP+0x90>
0088  1060591:	4c 89 f7             	mov    %r14,%rdi
008b  1060594:	e8 00 00 00 00       	call   1060599 <lkdtm_UNSET_SMEP+0x90>	1060595: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
0090  1060599:	8a 43 ff             	mov    -0x1(%rbx),%al
0093  106059c:	4c 8d 6b 01          	lea    0x1(%rbx),%r13
0097  10605a0:	3c 0f                	cmp    $0xf,%al
0099  10605a2:	75 54                	jne    10605f8 <lkdtm_UNSET_SMEP+0xef>
009b  10605a4:	48 89 d8             	mov    %rbx,%rax
009e  10605a7:	48 89 da             	mov    %rbx,%rdx
00a1  10605aa:	48 c1 e8 03          	shr    $0x3,%rax
00a5  10605ae:	83 e2 07             	and    $0x7,%edx
00a8  10605b1:	42 8a 04 20          	mov    (%rax,%r12,1),%al
00ac  10605b5:	38 d0                	cmp    %dl,%al
00ae  10605b7:	7f 0c                	jg     10605c5 <lkdtm_UNSET_SMEP+0xbc>
00b0  10605b9:	84 c0                	test   %al,%al
00b2  10605bb:	74 08                	je     10605c5 <lkdtm_UNSET_SMEP+0xbc>
00b4  10605bd:	48 89 df             	mov    %rbx,%rdi
00b7  10605c0:	e8 00 00 00 00       	call   10605c5 <lkdtm_UNSET_SMEP+0xbc>	10605c1: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
00bc  10605c5:	80 3b 22             	cmpb   $0x22,(%rbx)
00bf  10605c8:	0f 85 fb 00 00 00    	jne    10606c9 <lkdtm_UNSET_SMEP+0x1c0>
00c5  10605ce:	4c 89 e8             	mov    %r13,%rax
00c8  10605d1:	4c 89 ea             	mov    %r13,%rdx
00cb  10605d4:	48 c1 e8 03          	shr    $0x3,%rax
00cf  10605d8:	83 e2 07             	and    $0x7,%edx
00d2  10605db:	42 8a 04 20          	mov    (%rax,%r12,1),%al
00d6  10605df:	38 d0                	cmp    %dl,%al
00d8  10605e1:	7f 0c                	jg     10605ef <lkdtm_UNSET_SMEP+0xe6>
00da  10605e3:	84 c0                	test   %al,%al
00dc  10605e5:	74 08                	je     10605ef <lkdtm_UNSET_SMEP+0xe6>
00de  10605e7:	4c 89 ef             	mov    %r13,%rdi
00e1  10605ea:	e8 00 00 00 00       	call   10605ef <lkdtm_UNSET_SMEP+0xe6>	10605eb: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
00e6  10605ef:	80 7b 01 e7          	cmpb   $0xe7,0x1(%rbx)
00ea  10605f3:	e9 cf 00 00 00       	jmp    10606c7 <lkdtm_UNSET_SMEP+0x1be>
00ef  10605f8:	3c 48                	cmp    $0x48,%al
00f1  10605fa:	0f 85 c9 00 00 00    	jne    10606c9 <lkdtm_UNSET_SMEP+0x1c0>
00f7  1060600:	48 89 d8             	mov    %rbx,%rax
00fa  1060603:	48 89 da             	mov    %rbx,%rdx
00fd  1060606:	48 c1 e8 03          	shr    $0x3,%rax
0101  106060a:	83 e2 07             	and    $0x7,%edx
0104  106060d:	42 8a 04 20          	mov    (%rax,%r12,1),%al
0108  1060611:	38 d0                	cmp    %dl,%al
010a  1060613:	7f 0c                	jg     1060621 <lkdtm_UNSET_SMEP+0x118>
010c  1060615:	84 c0                	test   %al,%al
010e  1060617:	74 08                	je     1060621 <lkdtm_UNSET_SMEP+0x118>
0110  1060619:	48 89 df             	mov    %rbx,%rdi
0113  106061c:	e8 00 00 00 00       	call   1060621 <lkdtm_UNSET_SMEP+0x118>	106061d: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
0118  1060621:	80 3b 89             	cmpb   $0x89,(%rbx)
011b  1060624:	0f 85 9f 00 00 00    	jne    10606c9 <lkdtm_UNSET_SMEP+0x1c0>
0121  106062a:	4c 89 e8             	mov    %r13,%rax
0124  106062d:	4c 89 ea             	mov    %r13,%rdx
0127  1060630:	48 c1 e8 03          	shr    $0x3,%rax
012b  1060634:	83 e2 07             	and    $0x7,%edx
012e  1060637:	42 8a 04 20          	mov    (%rax,%r12,1),%al
0132  106063b:	38 d0                	cmp    %dl,%al
0134  106063d:	7f 0c                	jg     106064b <lkdtm_UNSET_SMEP+0x142>
0136  106063f:	84 c0                	test   %al,%al
0138  1060641:	74 08                	je     106064b <lkdtm_UNSET_SMEP+0x142>
013a  1060643:	4c 89 ef             	mov    %r13,%rdi
013d  1060646:	e8 00 00 00 00       	call   106064b <lkdtm_UNSET_SMEP+0x142>	1060647: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
0142  106064b:	80 7b 01 f8          	cmpb   $0xf8,0x1(%rbx)
0146  106064f:	75 78                	jne    10606c9 <lkdtm_UNSET_SMEP+0x1c0>
0148  1060651:	48 8d 7b 02          	lea    0x2(%rbx),%rdi
014c  1060655:	48 89 f8             	mov    %rdi,%rax
014f  1060658:	48 89 fa             	mov    %rdi,%rdx
0152  106065b:	48 c1 e8 03          	shr    $0x3,%rax
0156  106065f:	83 e2 07             	and    $0x7,%edx
0159  1060662:	42 8a 04 20          	mov    (%rax,%r12,1),%al
015d  1060666:	38 d0                	cmp    %dl,%al
015f  1060668:	7f 09                	jg     1060673 <lkdtm_UNSET_SMEP+0x16a>
0161  106066a:	84 c0                	test   %al,%al
0163  106066c:	74 05                	je     1060673 <lkdtm_UNSET_SMEP+0x16a>
0165  106066e:	e8 00 00 00 00       	call   1060673 <lkdtm_UNSET_SMEP+0x16a>	106066f: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
016a  1060673:	80 7b 02 0f          	cmpb   $0xf,0x2(%rbx)
016e  1060677:	75 50                	jne    10606c9 <lkdtm_UNSET_SMEP+0x1c0>
0170  1060679:	48 8d 7b 03          	lea    0x3(%rbx),%rdi
0174  106067d:	48 89 f8             	mov    %rdi,%rax
0177  1060680:	48 89 fa             	mov    %rdi,%rdx
017a  1060683:	48 c1 e8 03          	shr    $0x3,%rax
017e  1060687:	83 e2 07             	and    $0x7,%edx
0181  106068a:	42 8a 04 20          	mov    (%rax,%r12,1),%al
0185  106068e:	38 d0                	cmp    %dl,%al
0187  1060690:	7f 09                	jg     106069b <lkdtm_UNSET_SMEP+0x192>
0189  1060692:	84 c0                	test   %al,%al
018b  1060694:	74 05                	je     106069b <lkdtm_UNSET_SMEP+0x192>
018d  1060696:	e8 00 00 00 00       	call   106069b <lkdtm_UNSET_SMEP+0x192>	1060697: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
0192  106069b:	80 7b 03 22          	cmpb   $0x22,0x3(%rbx)
0196  106069f:	75 28                	jne    10606c9 <lkdtm_UNSET_SMEP+0x1c0>
0198  10606a1:	48 8d 7b 04          	lea    0x4(%rbx),%rdi
019c  10606a5:	48 89 f8             	mov    %rdi,%rax
019f  10606a8:	48 89 fa             	mov    %rdi,%rdx
01a2  10606ab:	48 c1 e8 03          	shr    $0x3,%rax
01a6  10606af:	83 e2 07             	and    $0x7,%edx
01a9  10606b2:	42 8a 04 20          	mov    (%rax,%r12,1),%al
01ad  10606b6:	38 d0                	cmp    %dl,%al
01af  10606b8:	7f 09                	jg     10606c3 <lkdtm_UNSET_SMEP+0x1ba>
01b1  10606ba:	84 c0                	test   %al,%al
01b3  10606bc:	74 05                	je     10606c3 <lkdtm_UNSET_SMEP+0x1ba>
01b5  10606be:	e8 00 00 00 00       	call   10606c3 <lkdtm_UNSET_SMEP+0x1ba>	10606bf: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
01ba  10606c3:	80 7b 04 e0          	cmpb   $0xe0,0x4(%rbx)
01be  10606c7:	74 48                	je     1060711 <lkdtm_UNSET_SMEP+0x208>
01c0  10606c9:	4c 89 eb             	mov    %r13,%rbx
01c3  10606cc:	49 81 fd 00 00 00 00 	cmp    $0x0,%r13	10606cf: R_X86_64_32S	native_write_cr4+0x41
01ca  10606d3:	0f 85 9b fe ff ff    	jne    1060574 <lkdtm_UNSET_SMEP+0x6b>
01d0  10606d9:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	10606dc: R_X86_64_32S	.rodata+0x7adce0
01d7  10606e0:	eb 54                	jmp    1060736 <lkdtm_UNSET_SMEP+0x22d>
01d9  10606e2:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	10606e5: R_X86_64_32S	.rodata+0x7adc80
01e0  10606e9:	e8 00 00 00 00       	call   10606ee <lkdtm_UNSET_SMEP+0x1e5>	10606ea: R_X86_64_PLT32	_printk-0x4
01e5  10606ee:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	10606f1: R_X86_64_32S	.rodata+0x7adb80
01ec  10606f5:	e8 00 00 00 00       	call   10606fa <lkdtm_UNSET_SMEP+0x1f1>	10606f6: R_X86_64_PLT32	_printk-0x4
01f1  10606fa:	48 89 ef             	mov    %rbp,%rdi
01f4  10606fd:	5b                   	pop    %rbx
01f5  10606fe:	5d                   	pop    %rbp
01f6  10606ff:	48 81 cf 00 00 10 00 	or     $0x100000,%rdi
01fd  1060706:	41 5c                	pop    %r12
01ff  1060708:	41 5d                	pop    %r13
0201  106070a:	41 5e                	pop    %r14
0203  106070c:	e9 00 00 00 00       	jmp    1060711 <lkdtm_UNSET_SMEP+0x208>	106070d: R_X86_64_PLT32	native_write_cr4-0x4
0208  1060711:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1060714: R_X86_64_32S	.rodata+0x7add40
020f  1060718:	e8 00 00 00 00       	call   106071d <lkdtm_UNSET_SMEP+0x214>	1060719: R_X86_64_PLT32	_printk-0x4
0214  106071d:	48 89 ef             	mov    %rbp,%rdi
0217  1060720:	2e e8 00 00 00 00    	cs call 1060726 <lkdtm_UNSET_SMEP+0x21d>	1060722: R_X86_64_PLT32	__x86_indirect_thunk_r14-0x4
021d  1060726:	0f 20 e0             	mov    %cr4,%rax
0220  1060729:	0f ba e0 14          	bt     $0x14,%eax
0224  106072d:	73 b3                	jae    10606e2 <lkdtm_UNSET_SMEP+0x1d9>
0226  106072f:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1060732: R_X86_64_32S	.rodata+0x7adc20
022d  1060736:	5b                   	pop    %rbx
022e  1060737:	5d                   	pop    %rbp
022f  1060738:	41 5c                	pop    %r12
0231  106073a:	41 5d                	pop    %r13
0233  106073c:	41 5e                	pop    %r14
0235  106073e:	e9 00 00 00 00       	jmp    1060743 <ctor_double_free>	106073f: R_X86_64_PLT32	_printk-0x4

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

View attachment "config" of type "text/plain" (125359 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ