objdump internal error with retpoline-equipped binary

Bug #1743350 reported by Dave Odell on 2018-01-15
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
binutils (Ubuntu)
Undecided
Unassigned

Bug Description

$ objdump -d

a.out: file format elf64-x86-64

objdump: BFD (GNU Binutils for Ubuntu) 2.26.1 internal error, aborting at ../../bfd/elf64-x86-64.c:6089 in elf_x86_64_get_plt_sym_val

objdump: Please report this bug.

Difficulty: a.out is using the retpoline mitigation <https://support.google.com/faqs/answer/7625886> for the Spectre vulnerability, variant 2: branch target injection (CVE-2017-5715). I have attached the binary in question; it should be small enough to disassemble in its entirety.

For the record, the executable was built with Clang and lld, from LLVM SVN r321862, plus the retpoline patch at <https://reviews.llvm.org/D41723>, using the following commands:

$ clang -mretpoline -c -O temp.c
$ ld.lld -z retpolineplt -dynamic-linker /lib64/ld-linux-x86-64.so.2 temp.o /lib/x86_64-linux-gnu/libc.so.6

ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: binutils 2.26.1-1ubuntu1~16.04.5
ProcVersionSignature: Ubuntu 4.4.0-109.132-generic 4.4.98
Uname: Linux 4.4.0-109-generic x86_64
NonfreeKernelModules: nvidia_uvm nvidia_drm nvidia_modeset nvidia
ApportVersion: 2.20.1-0ubuntu2.15
Architecture: amd64
CurrentDesktop: XFCE
Date: Mon Jan 15 05:03:48 2018
Dependencies:
 gcc-6-base 6.0.1-0ubuntu1
 libc6 2.23-0ubuntu9
 libgcc1 1:6.0.1-0ubuntu1
 zlib1g 1:1.2.8.dfsg-2ubuntu4.1
SourcePackage: binutils
UpgradeStatus: Upgraded to xenial on 2016-08-01 (532 days ago)

Dave Odell (dmo2118) wrote :
Dave Odell (dmo2118) wrote :
Dave Odell (dmo2118) wrote :
  • a.out Edit (13.9 KiB, application/octet-stream)

Accidentally uploaded the wrong a.out; my bad. Here's the right one.

To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers