Public bug reported:

$ objdump -d

a.out:     file format elf64-x86-64

objdump: BFD (GNU Binutils for Ubuntu) 2.26.1 internal error, aborting
at ../../bfd/elf64-x86-64.c:6089 in elf_x86_64_get_plt_sym_val

objdump: Please report this bug.

Difficulty: a.out is using the retpoline mitigation
<https://support.google.com/faqs/answer/7625886> for the Spectre
vulnerability, variant 2: branch target injection (CVE-2017-5715). I
have attached the binary in question; it should be small enough to
disassemble in its entirety.

For the record, the executable was built with Clang and lld, from LLVM
SVN r321862, plus the retpoline patch at
<https://reviews.llvm.org/D41723>, using the following commands:

$ clang -mretpoline -c -O temp.c
$ ld.lld -z retpolineplt -dynamic-linker /lib64/ld-linux-x86-64.so.2 temp.o 
/lib/x86_64-linux-gnu/libc.so.6

ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: binutils 2.26.1-1ubuntu1~16.04.5
ProcVersionSignature: Ubuntu 4.4.0-109.132-generic 4.4.98
Uname: Linux 4.4.0-109-generic x86_64
NonfreeKernelModules: nvidia_uvm nvidia_drm nvidia_modeset nvidia
ApportVersion: 2.20.1-0ubuntu2.15
Architecture: amd64
CurrentDesktop: XFCE
Date: Mon Jan 15 05:03:48 2018
Dependencies:
 gcc-6-base 6.0.1-0ubuntu1
 libc6 2.23-0ubuntu9
 libgcc1 1:6.0.1-0ubuntu1
 zlib1g 1:1.2.8.dfsg-2ubuntu4.1
SourcePackage: binutils
UpgradeStatus: Upgraded to xenial on 2016-08-01 (532 days ago)

** Affects: binutils (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug xenial

** Attachment added: "a.out"
   https://bugs.launchpad.net/bugs/1743350/+attachment/5037262/+files/a.out

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1743350

Title:
  objdump internal error with retpoline-equipped binary

Status in binutils package in Ubuntu:
  New

Bug description:
  $ objdump -d

  a.out:     file format elf64-x86-64

  objdump: BFD (GNU Binutils for Ubuntu) 2.26.1 internal error, aborting
  at ../../bfd/elf64-x86-64.c:6089 in elf_x86_64_get_plt_sym_val

  objdump: Please report this bug.

  Difficulty: a.out is using the retpoline mitigation
  <https://support.google.com/faqs/answer/7625886> for the Spectre
  vulnerability, variant 2: branch target injection (CVE-2017-5715). I
  have attached the binary in question; it should be small enough to
  disassemble in its entirety.

  For the record, the executable was built with Clang and lld, from LLVM
  SVN r321862, plus the retpoline patch at
  <https://reviews.llvm.org/D41723>, using the following commands:

  $ clang -mretpoline -c -O temp.c
  $ ld.lld -z retpolineplt -dynamic-linker /lib64/ld-linux-x86-64.so.2 temp.o 
/lib/x86_64-linux-gnu/libc.so.6

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: binutils 2.26.1-1ubuntu1~16.04.5
  ProcVersionSignature: Ubuntu 4.4.0-109.132-generic 4.4.98
  Uname: Linux 4.4.0-109-generic x86_64
  NonfreeKernelModules: nvidia_uvm nvidia_drm nvidia_modeset nvidia
  ApportVersion: 2.20.1-0ubuntu2.15
  Architecture: amd64
  CurrentDesktop: XFCE
  Date: Mon Jan 15 05:03:48 2018
  Dependencies:
   gcc-6-base 6.0.1-0ubuntu1
   libc6 2.23-0ubuntu9
   libgcc1 1:6.0.1-0ubuntu1
   zlib1g 1:1.2.8.dfsg-2ubuntu4.1
  SourcePackage: binutils
  UpgradeStatus: Upgraded to xenial on 2016-08-01 (532 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1743350/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to