From: Kees Cook <keescook@chromium.org>
To: Linus Torvalds <torvalds@linux-foundation.org>
Cc: linux-kernel@vger.kernel.org,
Alex Deucher <alexander.deucher@amd.com>,
Ard Biesheuvel <ard.biesheuvel@linaro.org>,
"David S. Miller" <davem@davemloft.net>,
Kees Cook <keescook@chromium.org>
Subject: [GIT PULL] gcc-plugins updates for v4.14-rc1
Date: Tue, 5 Sep 2017 13:02:08 -0700 [thread overview]
Message-ID: <20170905200208.GA72394@beast> (raw)
Hi,
Please pull these gcc-plugins changes for v4.14-rc1. This finishes the
porting work on randstruct, and introduces a new option to structleak,
both noted below.
Thanks!
-Kees
The following changes since commit 520eccdfe187591a51ea9ab4c1a024ae4d0f68d9:
Linux 4.13-rc2 (2017-07-23 16:15:17 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/gcc-plugins-v4.14-rc1
for you to fetch changes up to ad05e6ca7b5fcf15ff178da662035ec7718f938c:
Merge branch 'for-next/gcc-plugin/structleak' into for-next/gcc-plugins (2017-08-07 13:29:04 -0700)
----------------------------------------------------------------
- For the randstruct plugin, enable automatic randomization of structures
that are entirely function pointers (along with a couple designated
initializer fixes).
- For the structleak plugin, provide an option to perform zeroing
initialization of all otherwise uninitialized stack variables that are
passed by reference (Ard Biesheuvel).
----------------------------------------------------------------
Ard Biesheuvel (1):
gcc-plugins: structleak: add option to init all vars used as byref args
Kees Cook (4):
drm/amd/powerplay: rv: Use designated initializers
drivers/net/wan/z85230.c: Use designated initializers
randstruct: Enable function pointer struct detection
Merge branch 'for-next/gcc-plugin/structleak' into for-next/gcc-plugins
arch/Kconfig | 19 +++++++++++-----
drivers/gpu/drm/amd/powerplay/hwmgr/rv_hwmgr.c | 8 +++----
drivers/net/wan/z85230.c | 30 ++++++++++++--------------
scripts/Makefile.gcc-plugins | 1 +
scripts/gcc-plugins/randomize_layout_plugin.c | 3 ---
scripts/gcc-plugins/structleak_plugin.c | 13 +++++++++--
6 files changed, 44 insertions(+), 30 deletions(-)
--
Kees Cook
Pixel Security
reply other threads:[~2017-09-05 20:02 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170905200208.GA72394@beast \
--to=keescook@chromium.org \
--cc=alexander.deucher@amd.com \
--cc=ard.biesheuvel@linaro.org \
--cc=davem@davemloft.net \
--cc=linux-kernel@vger.kernel.org \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).