linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Kees Cook <keescook@chromium.org>
To: Linus Torvalds <torvalds@linux-foundation.org>
Cc: linux-kernel@vger.kernel.org, Kees Cook <keescook@chromium.org>
Subject: [GIT PULL] gcc-plugins updates for v4.11-rc1 (take 2)
Date: Tue, 21 Feb 2017 21:16:51 -0800	[thread overview]
Message-ID: <20170222051651.GA54127@beast> (raw)

Hi,

Please pull these gcc-plugins changes for v4.11-rc1. (This is take 2,
with the initify series removed.) This includes infrastructure updates
and the structleak plugin, which performs forced initialization of certain
structures to avoid possible information exposures to userspace.

Thanks!

-Kees

The following changes since commit a121103c922847ba5010819a3f250f1f7fc84ab8:

  Linux 4.10-rc3 (2017-01-08 14:18:17 -0800)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/gcc-plugins-v4.11-rc1

for you to fetch changes up to c054ee3bbf69ebcabb1f3218b7faf4b1b37a8eb6:

  Merge branch 'for-next/gcc-plugin/structleak' into for-linus/gcc-plugins (2017-02-21 21:12:57 -0800)

----------------------------------------------------------------
Updates to the gcc-plugins:
- infrastructure updates (gcc-common.h)
- introduce structleak plugin for forced initialization of some structures

----------------------------------------------------------------
Kees Cook (5):
      gcc-plugins: add PASS_INFO and build_const_char_string()
      gcc-plugins: consolidate on PASS_INFO macro
      gcc-plugins: Add structleak for more stack initialization
      Merge branch 'for-next/gcc-plugin-infrastructure' into for-linus/gcc-plugins
      Merge branch 'for-next/gcc-plugin/structleak' into for-linus/gcc-plugins

 arch/Kconfig                                |  22 +++
 include/linux/compiler.h                    |   6 +-
 scripts/Makefile.gcc-plugins                |   4 +
 scripts/gcc-plugins/cyc_complexity_plugin.c |   6 +-
 scripts/gcc-plugins/gcc-common.h            |  55 +++++--
 scripts/gcc-plugins/latent_entropy_plugin.c |   8 +-
 scripts/gcc-plugins/sancov_plugin.c         |   8 +-
 scripts/gcc-plugins/structleak_plugin.c     | 246 ++++++++++++++++++++++++++++
 8 files changed, 326 insertions(+), 29 deletions(-)
 create mode 100644 scripts/gcc-plugins/structleak_plugin.c

-- 
Kees Cook
Pixel Security

                 reply	other threads:[~2017-02-22  5:17 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170222051651.GA54127@beast \
    --to=keescook@chromium.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).