]> git.baikalelectronics.ru Git - kernel.git/commit
gcc-plugins: Add structleak for more stack initialization
authorKees Cook <keescook@chromium.org>
Fri, 13 Jan 2017 19:14:39 +0000 (11:14 -0800)
committerKees Cook <keescook@chromium.org>
Wed, 18 Jan 2017 20:02:35 +0000 (12:02 -0800)
commitcd312d28dce1083a4d1c12c869e4688bbd53e544
tree63ae636a8d3bfc405b8a0a108ab17c24c5790fd8
parent2b5f521d04608ba55b38772dc6c2a4b1adf81254
gcc-plugins: Add structleak for more stack initialization

This plugin detects any structures that contain __user attributes and
makes sure it is being fully initialized so that a specific class of
information exposure is eliminated. (This plugin was originally designed
to block the exposure of siginfo in CVE-2013-2141.)

Ported from grsecurity/PaX. This version adds a verbose option to the
plugin and the Kconfig.

Signed-off-by: Kees Cook <keescook@chromium.org>
arch/Kconfig
include/linux/compiler.h
scripts/Makefile.gcc-plugins
scripts/gcc-plugins/structleak_plugin.c [new file with mode: 0644]