[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202305171513.CuTbyFPg-lkp@intel.com>
Date: Wed, 17 May 2023 16:01:32 +0800
From: kernel test robot <lkp@...el.com>
To: "Borislav Petkov (AMD)" <bp@...en8.de>
Cc: oe-kbuild-all@...ts.linux.dev, linux-kernel@...r.kernel.org,
Thomas Gleixner <tglx@...utronix.de>
Subject: vmlinux.o: warning: objtool: emit_return+0x3a: relocation to !ENDBR:
.text.__x86.return_thunk+0x3b
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: f1fcbaa18b28dec10281551dfe6ed3a3ed80e3d6
commit: 9a48d604672220545d209e9996c2a1edbb5637f6 x86/retbleed: Fix return thunk alignment
date: 4 days ago
config: x86_64-randconfig-x065
compiler: gcc-11 (Debian 11.3.0-12) 11.3.0
reproduce (this is a W=1 build):
# https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a48d604672220545d209e9996c2a1edbb5637f6
git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
git fetch --no-tags linus master
git checkout 9a48d604672220545d209e9996c2a1edbb5637f6
# save the config file
mkdir build_dir && cp config build_dir/.config
make W=1 O=build_dir ARCH=x86_64 olddefconfig
make W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash
If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202305171513.CuTbyFPg-lkp@intel.com/
All warnings (new ones prefixed by >>):
vmlinux.o: warning: objtool: ibt_selftest+0xf: sibling call from callable instruction with modified stack frame
vmlinux.o: warning: objtool: .altinstr_replacement+0x1a92: redundant UACCESS disable
vmlinux.o: warning: objtool: iovec_from_user.part.0+0xd8: call to copy_iovec_from_user.part.0() with UACCESS enabled
vmlinux.o: warning: objtool: ibt_selftest+0x19: return with modified stack frame
>> vmlinux.o: warning: objtool: emit_return+0x3a: relocation to !ENDBR: .text.__x86.return_thunk+0x3b
objdump-func vmlinux.o emit_return:
0000 00000000001c2ee0 <emit_return>:
0000 1c2ee0: 55 push %rbp
0001 1c2ee1: 48 89 e5 mov %rsp,%rbp
0004 1c2ee4: 41 56 push %r14
0006 1c2ee6: 41 55 push %r13
0008 1c2ee8: 49 89 f5 mov %rsi,%r13
000b 1c2eeb: 41 54 push %r12
000d 1c2eed: 49 89 fc mov %rdi,%r12
0010 1c2ef0: 53 push %rbx
0011 1c2ef1: e8 00 00 00 00 call 1c2ef6 <emit_return+0x16> 1c2ef2: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0016 1c2ef6: 4c 89 e2 mov %r12,%rdx
0019 1c2ef9: 48 b8 00 00 00 00 00 fc ff df movabs $0xdffffc0000000000,%rax
0023 1c2f03: 48 c1 ea 03 shr $0x3,%rdx
0027 1c2f07: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1)
002b 1c2f0b: 0f 85 0e 01 00 00 jne 1c301f <emit_return+0x13f>
0031 1c2f11: 49 8b 1c 24 mov (%r12),%rbx
0035 1c2f15: e9 00 00 00 00 jmp 1c2f1a <emit_return+0x3a> 1c2f16: R_X86_64_PC32 .altinstr_aux+0x1754
003a 1c2f1a: 49 be 00 00 00 00 00 00 00 00 movabs $0x0,%r14 1c2f1c: R_X86_64_64 __x86_return_thunk-0x5
0044 1c2f24: e8 00 00 00 00 call 1c2f29 <emit_return+0x49> 1c2f25: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0049 1c2f29: 4d 29 ee sub %r13,%r14
004c 1c2f2c: 49 63 c6 movslq %r14d,%rax
004f 1c2f2f: 49 39 c6 cmp %rax,%r14
0052 1c2f32: 0f 85 c3 00 00 00 jne 1c2ffb <emit_return+0x11b>
0058 1c2f38: e8 00 00 00 00 call 1c2f3d <emit_return+0x5d> 1c2f39: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
005d 1c2f3d: 48 89 da mov %rbx,%rdx
0060 1c2f40: 48 b8 00 00 00 00 00 fc ff df movabs $0xdffffc0000000000,%rax
006a 1c2f4a: 48 c1 ea 03 shr $0x3,%rdx
006e 1c2f4e: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax
0072 1c2f52: 48 89 da mov %rbx,%rdx
0075 1c2f55: 83 e2 07 and $0x7,%edx
0078 1c2f58: 38 d0 cmp %dl,%al
007a 1c2f5a: 7f 08 jg 1c2f64 <emit_return+0x84>
007c 1c2f5c: 84 c0 test %al,%al
007e 1c2f5e: 0f 85 d2 00 00 00 jne 1c3036 <emit_return+0x156>
0084 1c2f64: 48 8d 7b 01 lea 0x1(%rbx),%rdi
0088 1c2f68: c6 03 e9 movb $0xe9,(%rbx)
008b 1c2f6b: 48 b8 00 00 00 00 00 fc ff df movabs $0xdffffc0000000000,%rax
0095 1c2f75: 48 89 fa mov %rdi,%rdx
0098 1c2f78: 48 c1 ea 03 shr $0x3,%rdx
009c 1c2f7c: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx
00a0 1c2f80: 48 89 f8 mov %rdi,%rax
00a3 1c2f83: 83 e0 07 and $0x7,%eax
00a6 1c2f86: 83 c0 03 add $0x3,%eax
00a9 1c2f89: 38 d0 cmp %dl,%al
00ab 1c2f8b: 7c 08 jl 1c2f95 <emit_return+0xb5>
00ad 1c2f8d: 84 d2 test %dl,%dl
00af 1c2f8f: 0f 85 ae 00 00 00 jne 1c3043 <emit_return+0x163>
00b5 1c2f95: 44 89 73 01 mov %r14d,0x1(%rbx)
00b9 1c2f99: 48 83 c3 05 add $0x5,%rbx
00bd 1c2f9d: eb 2f jmp 1c2fce <emit_return+0xee>
00bf 1c2f9f: e8 00 00 00 00 call 1c2fa4 <emit_return+0xc4> 1c2fa0: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
00c4 1c2fa4: 48 89 da mov %rbx,%rdx
00c7 1c2fa7: 48 b8 00 00 00 00 00 fc ff df movabs $0xdffffc0000000000,%rax
00d1 1c2fb1: 48 c1 ea 03 shr $0x3,%rdx
00d5 1c2fb5: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax
00d9 1c2fb9: 48 89 da mov %rbx,%rdx
00dc 1c2fbc: 83 e2 07 and $0x7,%edx
00df 1c2fbf: 38 d0 cmp %dl,%al
00e1 1c2fc1: 7f 04 jg 1c2fc7 <emit_return+0xe7>
00e3 1c2fc3: 84 c0 test %al,%al
00e5 1c2fc5: 75 4e jne 1c3015 <emit_return+0x135>
00e7 1c2fc7: c6 03 c3 movb $0xc3,(%rbx)
00ea 1c2fca: 48 83 c3 01 add $0x1,%rbx
00ee 1c2fce: e8 00 00 00 00 call 1c2fd3 <emit_return+0xf3> 1c2fcf: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
00f3 1c2fd3: 4c 89 e2 mov %r12,%rdx
00f6 1c2fd6: 48 b8 00 00 00 00 00 fc ff df movabs $0xdffffc0000000000,%rax
0100 1c2fe0: 48 c1 ea 03 shr $0x3,%rdx
0104 1c2fe4: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1)
0108 1c2fe8: 75 42 jne 1c302c <emit_return+0x14c>
010a 1c2fea: 49 89 1c 24 mov %rbx,(%r12)
010e 1c2fee: 5b pop %rbx
010f 1c2fef: 41 5c pop %r12
0111 1c2ff1: 41 5d pop %r13
0113 1c2ff3: 41 5e pop %r14
0115 1c2ff5: 5d pop %rbp
0116 1c2ff6: e9 00 00 00 00 jmp 1c2ffb <emit_return+0x11b> 1c2ff7: R_X86_64_PLT32 __x86_return_thunk-0x4
011b 1c2ffb: e8 00 00 00 00 call 1c3000 <emit_return+0x120> 1c2ffc: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4
0120 1c3000: 48 c7 c6 00 00 00 00 mov $0x0,%rsi 1c3003: R_X86_64_32S __x86_return_thunk
0127 1c3007: 48 c7 c7 00 00 00 00 mov $0x0,%rdi 1c300a: R_X86_64_32S .rodata+0x8a980
012e 1c300e: e8 00 00 00 00 call 1c3013 <emit_return+0x133> 1c300f: R_X86_64_PLT32 _printk-0x4
0133 1c3013: eb b9 jmp 1c2fce <emit_return+0xee>
0135 1c3015: 48 89 df mov %rbx,%rdi
0138 1c3018: e8 00 00 00 00 call 1c301d <emit_return+0x13d> 1c3019: R_X86_64_PLT32 __asan_report_store1_noabort-0x4
013d 1c301d: eb a8 jmp 1c2fc7 <emit_return+0xe7>
013f 1c301f: 4c 89 e7 mov %r12,%rdi
0142 1c3022: e8 00 00 00 00 call 1c3027 <emit_return+0x147> 1c3023: R_X86_64_PLT32 __asan_report_load8_noabort-0x4
0147 1c3027: e9 e5 fe ff ff jmp 1c2f11 <emit_return+0x31>
014c 1c302c: 4c 89 e7 mov %r12,%rdi
014f 1c302f: e8 00 00 00 00 call 1c3034 <emit_return+0x154> 1c3030: R_X86_64_PLT32 __asan_report_store8_noabort-0x4
0154 1c3034: eb b4 jmp 1c2fea <emit_return+0x10a>
0156 1c3036: 48 89 df mov %rbx,%rdi
0159 1c3039: e8 00 00 00 00 call 1c303e <emit_return+0x15e> 1c303a: R_X86_64_PLT32 __asan_report_store1_noabort-0x4
015e 1c303e: e9 21 ff ff ff jmp 1c2f64 <emit_return+0x84>
0163 1c3043: e8 00 00 00 00 call 1c3048 <emit_return+0x168> 1c3044: R_X86_64_PLT32 __asan_report_store4_noabort-0x4
0168 1c3048: e9 48 ff ff ff jmp 1c2f95 <emit_return+0xb5>
016d 1c304d: 0f 1f 00 nopl (%rax)
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
View attachment "config" of type "text/plain" (140852 bytes)
Powered by blists - more mailing lists