lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Wed, 17 May 2023 16:01:32 +0800
From:   kernel test robot <lkp@...el.com>
To:     "Borislav Petkov (AMD)" <bp@...en8.de>
Cc:     oe-kbuild-all@...ts.linux.dev, linux-kernel@...r.kernel.org,
        Thomas Gleixner <tglx@...utronix.de>
Subject: vmlinux.o: warning: objtool: emit_return+0x3a: relocation to !ENDBR:
 .text.__x86.return_thunk+0x3b

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   f1fcbaa18b28dec10281551dfe6ed3a3ed80e3d6
commit: 9a48d604672220545d209e9996c2a1edbb5637f6 x86/retbleed: Fix return thunk alignment
date:   4 days ago
config: x86_64-randconfig-x065
compiler: gcc-11 (Debian 11.3.0-12) 11.3.0
reproduce (this is a W=1 build):
        # https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a48d604672220545d209e9996c2a1edbb5637f6
        git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
        git fetch --no-tags linus master
        git checkout 9a48d604672220545d209e9996c2a1edbb5637f6
        # save the config file
        mkdir build_dir && cp config build_dir/.config
        make W=1 O=build_dir ARCH=x86_64 olddefconfig
        make W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash

If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202305171513.CuTbyFPg-lkp@intel.com/

All warnings (new ones prefixed by >>):

   vmlinux.o: warning: objtool: ibt_selftest+0xf: sibling call from callable instruction with modified stack frame
   vmlinux.o: warning: objtool: .altinstr_replacement+0x1a92: redundant UACCESS disable
   vmlinux.o: warning: objtool: iovec_from_user.part.0+0xd8: call to copy_iovec_from_user.part.0() with UACCESS enabled
   vmlinux.o: warning: objtool: ibt_selftest+0x19: return with modified stack frame
>> vmlinux.o: warning: objtool: emit_return+0x3a: relocation to !ENDBR: .text.__x86.return_thunk+0x3b


objdump-func vmlinux.o emit_return:
0000 00000000001c2ee0 <emit_return>:
0000   1c2ee0:	55                   	push   %rbp
0001   1c2ee1:	48 89 e5             	mov    %rsp,%rbp
0004   1c2ee4:	41 56                	push   %r14
0006   1c2ee6:	41 55                	push   %r13
0008   1c2ee8:	49 89 f5             	mov    %rsi,%r13
000b   1c2eeb:	41 54                	push   %r12
000d   1c2eed:	49 89 fc             	mov    %rdi,%r12
0010   1c2ef0:	53                   	push   %rbx
0011   1c2ef1:	e8 00 00 00 00       	call   1c2ef6 <emit_return+0x16>	1c2ef2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0016   1c2ef6:	4c 89 e2             	mov    %r12,%rdx
0019   1c2ef9:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0023   1c2f03:	48 c1 ea 03          	shr    $0x3,%rdx
0027   1c2f07:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
002b   1c2f0b:	0f 85 0e 01 00 00    	jne    1c301f <emit_return+0x13f>
0031   1c2f11:	49 8b 1c 24          	mov    (%r12),%rbx
0035   1c2f15:	e9 00 00 00 00       	jmp    1c2f1a <emit_return+0x3a>	1c2f16: R_X86_64_PC32	.altinstr_aux+0x1754
003a   1c2f1a:	49 be 00 00 00 00 00 00 00 00 	movabs $0x0,%r14	1c2f1c: R_X86_64_64	__x86_return_thunk-0x5
0044   1c2f24:	e8 00 00 00 00       	call   1c2f29 <emit_return+0x49>	1c2f25: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0049   1c2f29:	4d 29 ee             	sub    %r13,%r14
004c   1c2f2c:	49 63 c6             	movslq %r14d,%rax
004f   1c2f2f:	49 39 c6             	cmp    %rax,%r14
0052   1c2f32:	0f 85 c3 00 00 00    	jne    1c2ffb <emit_return+0x11b>
0058   1c2f38:	e8 00 00 00 00       	call   1c2f3d <emit_return+0x5d>	1c2f39: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
005d   1c2f3d:	48 89 da             	mov    %rbx,%rdx
0060   1c2f40:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
006a   1c2f4a:	48 c1 ea 03          	shr    $0x3,%rdx
006e   1c2f4e:	0f b6 04 02          	movzbl (%rdx,%rax,1),%eax
0072   1c2f52:	48 89 da             	mov    %rbx,%rdx
0075   1c2f55:	83 e2 07             	and    $0x7,%edx
0078   1c2f58:	38 d0                	cmp    %dl,%al
007a   1c2f5a:	7f 08                	jg     1c2f64 <emit_return+0x84>
007c   1c2f5c:	84 c0                	test   %al,%al
007e   1c2f5e:	0f 85 d2 00 00 00    	jne    1c3036 <emit_return+0x156>
0084   1c2f64:	48 8d 7b 01          	lea    0x1(%rbx),%rdi
0088   1c2f68:	c6 03 e9             	movb   $0xe9,(%rbx)
008b   1c2f6b:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0095   1c2f75:	48 89 fa             	mov    %rdi,%rdx
0098   1c2f78:	48 c1 ea 03          	shr    $0x3,%rdx
009c   1c2f7c:	0f b6 14 02          	movzbl (%rdx,%rax,1),%edx
00a0   1c2f80:	48 89 f8             	mov    %rdi,%rax
00a3   1c2f83:	83 e0 07             	and    $0x7,%eax
00a6   1c2f86:	83 c0 03             	add    $0x3,%eax
00a9   1c2f89:	38 d0                	cmp    %dl,%al
00ab   1c2f8b:	7c 08                	jl     1c2f95 <emit_return+0xb5>
00ad   1c2f8d:	84 d2                	test   %dl,%dl
00af   1c2f8f:	0f 85 ae 00 00 00    	jne    1c3043 <emit_return+0x163>
00b5   1c2f95:	44 89 73 01          	mov    %r14d,0x1(%rbx)
00b9   1c2f99:	48 83 c3 05          	add    $0x5,%rbx
00bd   1c2f9d:	eb 2f                	jmp    1c2fce <emit_return+0xee>
00bf   1c2f9f:	e8 00 00 00 00       	call   1c2fa4 <emit_return+0xc4>	1c2fa0: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
00c4   1c2fa4:	48 89 da             	mov    %rbx,%rdx
00c7   1c2fa7:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
00d1   1c2fb1:	48 c1 ea 03          	shr    $0x3,%rdx
00d5   1c2fb5:	0f b6 04 02          	movzbl (%rdx,%rax,1),%eax
00d9   1c2fb9:	48 89 da             	mov    %rbx,%rdx
00dc   1c2fbc:	83 e2 07             	and    $0x7,%edx
00df   1c2fbf:	38 d0                	cmp    %dl,%al
00e1   1c2fc1:	7f 04                	jg     1c2fc7 <emit_return+0xe7>
00e3   1c2fc3:	84 c0                	test   %al,%al
00e5   1c2fc5:	75 4e                	jne    1c3015 <emit_return+0x135>
00e7   1c2fc7:	c6 03 c3             	movb   $0xc3,(%rbx)
00ea   1c2fca:	48 83 c3 01          	add    $0x1,%rbx
00ee   1c2fce:	e8 00 00 00 00       	call   1c2fd3 <emit_return+0xf3>	1c2fcf: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
00f3   1c2fd3:	4c 89 e2             	mov    %r12,%rdx
00f6   1c2fd6:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0100   1c2fe0:	48 c1 ea 03          	shr    $0x3,%rdx
0104   1c2fe4:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
0108   1c2fe8:	75 42                	jne    1c302c <emit_return+0x14c>
010a   1c2fea:	49 89 1c 24          	mov    %rbx,(%r12)
010e   1c2fee:	5b                   	pop    %rbx
010f   1c2fef:	41 5c                	pop    %r12
0111   1c2ff1:	41 5d                	pop    %r13
0113   1c2ff3:	41 5e                	pop    %r14
0115   1c2ff5:	5d                   	pop    %rbp
0116   1c2ff6:	e9 00 00 00 00       	jmp    1c2ffb <emit_return+0x11b>	1c2ff7: R_X86_64_PLT32	__x86_return_thunk-0x4
011b   1c2ffb:	e8 00 00 00 00       	call   1c3000 <emit_return+0x120>	1c2ffc: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0120   1c3000:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi	1c3003: R_X86_64_32S	__x86_return_thunk
0127   1c3007:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1c300a: R_X86_64_32S	.rodata+0x8a980
012e   1c300e:	e8 00 00 00 00       	call   1c3013 <emit_return+0x133>	1c300f: R_X86_64_PLT32	_printk-0x4
0133   1c3013:	eb b9                	jmp    1c2fce <emit_return+0xee>
0135   1c3015:	48 89 df             	mov    %rbx,%rdi
0138   1c3018:	e8 00 00 00 00       	call   1c301d <emit_return+0x13d>	1c3019: R_X86_64_PLT32	__asan_report_store1_noabort-0x4
013d   1c301d:	eb a8                	jmp    1c2fc7 <emit_return+0xe7>
013f   1c301f:	4c 89 e7             	mov    %r12,%rdi
0142   1c3022:	e8 00 00 00 00       	call   1c3027 <emit_return+0x147>	1c3023: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0147   1c3027:	e9 e5 fe ff ff       	jmp    1c2f11 <emit_return+0x31>
014c   1c302c:	4c 89 e7             	mov    %r12,%rdi
014f   1c302f:	e8 00 00 00 00       	call   1c3034 <emit_return+0x154>	1c3030: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
0154   1c3034:	eb b4                	jmp    1c2fea <emit_return+0x10a>
0156   1c3036:	48 89 df             	mov    %rbx,%rdi
0159   1c3039:	e8 00 00 00 00       	call   1c303e <emit_return+0x15e>	1c303a: R_X86_64_PLT32	__asan_report_store1_noabort-0x4
015e   1c303e:	e9 21 ff ff ff       	jmp    1c2f64 <emit_return+0x84>
0163   1c3043:	e8 00 00 00 00       	call   1c3048 <emit_return+0x168>	1c3044: R_X86_64_PLT32	__asan_report_store4_noabort-0x4
0168   1c3048:	e9 48 ff ff ff       	jmp    1c2f95 <emit_return+0xb5>
016d   1c304d:	0f 1f 00             	nopl   (%rax)

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

View attachment "config" of type "text/plain" (140852 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ