gcc-plugins: Add structleak for more stack initialization
authorKees Cook <keescook@chromium.org>
Fri, 13 Jan 2017 19:14:39 +0000 (11:14 -0800)
committerKees Cook <keescook@chromium.org>
Wed, 18 Jan 2017 20:02:35 +0000 (12:02 -0800)
commitc61f13eaa1ee17728c41370100d2d45c254ce76f
tree63ae636a8d3bfc405b8a0a108ab17c24c5790fd8
parent8d4973a1c01d4b38871fbc6631e1fdd20e6c9e90
gcc-plugins: Add structleak for more stack initialization

This plugin detects any structures that contain __user attributes and
makes sure it is being fully initialized so that a specific class of
information exposure is eliminated. (This plugin was originally designed
to block the exposure of siginfo in CVE-2013-2141.)

Ported from grsecurity/PaX. This version adds a verbose option to the
plugin and the Kconfig.

Signed-off-by: Kees Cook <keescook@chromium.org>
arch/Kconfig
include/linux/compiler.h
scripts/Makefile.gcc-plugins
scripts/gcc-plugins/structleak_plugin.c [new file with mode: 0644]