lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Z95-jK9QGbkWivvI@gmail.com>
Date: Sat, 22 Mar 2025 10:10:36 +0100
From: Ingo Molnar <mingo@...nel.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-kernel@...r.kernel.org, Peter Zijlstra <a.p.zijlstra@...llo.nl>,
	Josh Poimboeuf <jpoimboe@...hat.com>,
	Thomas Gleixner <tglx@...utronix.de>,
	Borislav Petkov <bp@...en8.de>,
	Andrew Morton <akpm@...ux-foundation.org>
Subject: [GIT PULL] objtool changes for v6.15

Linus,

Please pull the latest objtool/core Git tree from:

   git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git objtool-core-2025-03-22

   # HEAD: 2cbb20b008dba39893f0e296dc8ca312f40a9a0e tracing: Disable branch profiling in noinstr code

Objtool changes for v6.15:

 - The biggest change is the new option to automatically fail
   the build on objtool warnings: CONFIG_OBJTOOL_WERROR.

   While there are no currently known unfixed false positives
   left, such an expansion in the severity of objtool warnings
   inevitably creates a risk of build failures, so it's disabled by
   default and depends on !COMPILE_TEST, so it shouldn't be enabled
   on allyesconfig/allmodconfig builds and won't be forced on people
   who just accept build-time defaults in 'make oldconfig'.

   While the option is strongly recommended, only people who enable
   it explicitly should see it.

   (Josh Poimboeuf)

 - Disable branch profiling in noinstr code with a broad
   brush that includes all of arch/x86/ and kernel/sched/. (Josh Poimboeuf)

 - Create backup object files on objtool errors and print exact
   objtool arguments to make failure analysis easier (Josh Poimboeuf)

 - Improve noreturn handling (Josh Poimboeuf)

 - Improve rodata handling (Tiezhu Yang)

 - Support jump tables, switch tables and goto tables on LoongArch (Tiezhu Yang)

 - Misc cleanups and fixes (Josh Poimboeuf, David Engraf, Ingo Molnar)

 Thanks,

	Ingo

------------------>
David Engraf (1):
      objtool: Hide unnecessary compiler error message

Ingo Molnar (1):
      objtool: Use O_CREAT with explicit mode mask

Josh Poimboeuf (14):
      x86/traps: Make exc_double_fault() consistently noreturn
      objtool: Fix error handling inconsistencies in check()
      objtool: Improve __noreturn annotation warning
      objtool: Update documentation
      objtool: Increase per-function WARN_FUNC() rate limit
      objtool: Remove --unret dependency on --rethunk
      objtool: Consolidate option validation
      objtool: Upgrade "Linked object detected" warning to error
      objtool: Add --output option
      objtool: Add --Werror option
      objtool: Change "warning:" to "error:" for --Werror
      objtool: Create backup on error and print args
      objtool: Add CONFIG_OBJTOOL_WERROR
      tracing: Disable branch profiling in noinstr code

Tiezhu Yang (6):
      objtool: Handle various symbol types of rodata
      objtool: Handle different entry size of rodata
      objtool: Handle PC relative relocation type
      objtool/LoongArch: Add support for switch table
      objtool/LoongArch: Add support for goto table
      LoongArch: Enable jump table for objtool


 arch/loongarch/Kconfig                          |   3 +
 arch/loongarch/Makefile                         |   6 +-
 arch/x86/Kbuild                                 |   4 +
 arch/x86/coco/sev/core.c                        |   2 -
 arch/x86/kernel/head64.c                        |   2 -
 arch/x86/kernel/traps.c                         |  18 +-
 arch/x86/mm/kasan_init_64.c                     |   1 -
 arch/x86/mm/mem_encrypt_amd.c                   |   2 -
 arch/x86/mm/mem_encrypt_identity.c              |   2 -
 drivers/acpi/Makefile                           |   4 +
 drivers/cpuidle/Makefile                        |   3 +
 drivers/idle/Makefile                           |   5 +-
 kernel/Makefile                                 |   5 +
 kernel/entry/Makefile                           |   3 +
 kernel/sched/Makefile                           |   5 +
 kernel/time/Makefile                            |   6 +
 lib/Kconfig.debug                               |  11 ++
 lib/Makefile                                    |   5 +
 scripts/Makefile.lib                            |   1 +
 tools/objtool/Documentation/objtool.txt         | 105 ++++++------
 tools/objtool/Makefile                          |   2 +-
 tools/objtool/arch/loongarch/decode.c           |  28 +++-
 tools/objtool/arch/loongarch/include/arch/elf.h |   7 +
 tools/objtool/arch/loongarch/special.c          | 159 +++++++++++++++++-
 tools/objtool/arch/powerpc/decode.c             |  14 ++
 tools/objtool/arch/x86/decode.c                 |  13 ++
 tools/objtool/builtin-check.c                   | 208 ++++++++++++++++++------
 tools/objtool/check.c                           |  83 +++++-----
 tools/objtool/elf.c                             |   3 -
 tools/objtool/include/objtool/arch.h            |   3 +
 tools/objtool/include/objtool/builtin.h         |   3 +-
 tools/objtool/include/objtool/elf.h             |   2 +-
 tools/objtool/include/objtool/warn.h            |  20 ++-
 tools/objtool/objtool.c                         |  78 +--------
 tools/objtool/orc_dump.c                        |   7 +-
 35 files changed, 571 insertions(+), 252 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ