diff options
author | Linus Torvalds | 2019-03-09 09:06:15 -0800 |
---|---|---|
committer | Linus Torvalds | 2019-03-09 09:06:15 -0800 |
commit | 2bb995405fe52dd893db57456556e8dc4fce35a7 (patch) | |
tree | 205f798be891b8ede69ea83deb1156ad5d4f2cf5 /lib/Kconfig.debug | |
parent | a39f009acefd85d3e36bcae828a4e67c9dce9684 (diff) | |
parent | 50ceaa95ea09703722b30b4afa617c972071cd7f (diff) |
Merge tag 'gcc-plugins-v5.1-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux
Pull gcc-plugins updates from Kees Cook:
"This adds additional type coverage to the existing structleak plugin
and adds a large set of selftests to help evaluate stack variable
zero-initialization coverage.
That can be used to test whatever instrumentation might be performing
zero-initialization: either with the structleak plugin or with Clang's
coming "-ftrivial-auto-var-init=zero" option.
Summary:
- Add scalar and array initialization coverage
- Refactor Kconfig to make options more clear
- Add self-test module for testing automatic initialization"
* tag 'gcc-plugins-v5.1-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux:
lib: Introduce test_stackinit module
gcc-plugins: structleak: Generalize to all variable types
Diffstat (limited to 'lib/Kconfig.debug')
-rw-r--r-- | lib/Kconfig.debug | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index d765d36f8737..e718487c97c3 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -2016,6 +2016,16 @@ config TEST_OBJAGG (or module load). +config TEST_STACKINIT + tristate "Test level of stack variable initialization" + help + Test if the kernel is zero-initializing stack variables and + padding. Coverage is controlled by compiler flags, + CONFIG_GCC_PLUGIN_STRUCTLEAK, CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF, + or CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF_ALL. + + If unsure, say N. + endif # RUNTIME_TESTING_MENU config MEMTEST |