From mboxrd@z Thu Jan 1 00:00:00 1970 From: Kees Cook Subject: [PATCH 0/3] Kconfig: Refactor memory initialization hardening Date: Wed, 10 Apr 2019 09:16:09 -0700 Message-Id: <20190410161612.18545-1-keescook@chromium.org> To: Masahiro Yamada Cc: Kees Cook , Alexander Potapenko , Nick Desaulniers , Kostya Serebryany , Dmitry Vyukov , Sandeep Patil , Laura Abbott , Randy Dunlap , Alexander Popov , Michal Marek , Emese Revfy , James Morris , "Serge E. Hallyn" , linux-kbuild@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, kernel-hardening@lists.openwall.com List-ID: This is a proposed alternative for the memory initialization series, which refactoring the existing gcc plugins into a separate Kconfig file and collects all the related options together with some more language to describe their differences. The last patch adds the Clang auto init option, as done by Alexander Potapenko. Since there isn't really a good way to "select" with dependencies, I've left out CONFIG_INIT_ALL_MEMORY for the moment... -Kees Kees Cook (3): Kconfig: Create "kernel hardening" config area kbuild: Move stackleak config to Kconfig.hardening kbuild: Implement Clang's stack initialization Makefile | 5 ++ scripts/gcc-plugins/Kconfig | 121 +------------------------- security/Kconfig | 2 + security/Kconfig.hardening | 165 ++++++++++++++++++++++++++++++++++++ 4 files changed, 175 insertions(+), 118 deletions(-) create mode 100644 security/Kconfig.hardening -- 2.17.1