stackleak: Allow runtime disabling of kernel stack erasing
authorAlexander Popov <alex.popov@linux.com>
Thu, 16 Aug 2018 22:17:03 +0000 (01:17 +0300)
committerKees Cook <keescook@chromium.org>
Tue, 4 Sep 2018 17:35:48 +0000 (10:35 -0700)
commit964c9dff0091893a9a74a88edf984c6da0b779f7
tree162d45af3ac44401db524294e67e396ddee476f4
parented535a2dae1836d15c71e250475952881265d244
stackleak: Allow runtime disabling of kernel stack erasing

Introduce CONFIG_STACKLEAK_RUNTIME_DISABLE option, which provides
'stack_erasing' sysctl. It can be used in runtime to control kernel
stack erasing for kernels built with CONFIG_GCC_PLUGIN_STACKLEAK.

Suggested-by: Ingo Molnar <mingo@kernel.org>
Signed-off-by: Alexander Popov <alex.popov@linux.com>
Tested-by: Laura Abbott <labbott@redhat.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Documentation/sysctl/kernel.txt
include/linux/stackleak.h
kernel/stackleak.c
kernel/sysctl.c
scripts/gcc-plugins/Kconfig