Hi, Please pull these gcc-plugins changes for v4.14-rc1. This finishes the porting work on randstruct, and introduces a new option to structleak, both noted below.
Thanks! -Kees The following changes since commit 520eccdfe187591a51ea9ab4c1a024ae4d0f68d9: Linux 4.13-rc2 (2017-07-23 16:15:17 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/gcc-plugins-v4.14-rc1 for you to fetch changes up to ad05e6ca7b5fcf15ff178da662035ec7718f938c: Merge branch 'for-next/gcc-plugin/structleak' into for-next/gcc-plugins (2017-08-07 13:29:04 -0700) ---------------------------------------------------------------- - For the randstruct plugin, enable automatic randomization of structures that are entirely function pointers (along with a couple designated initializer fixes). - For the structleak plugin, provide an option to perform zeroing initialization of all otherwise uninitialized stack variables that are passed by reference (Ard Biesheuvel). ---------------------------------------------------------------- Ard Biesheuvel (1): gcc-plugins: structleak: add option to init all vars used as byref args Kees Cook (4): drm/amd/powerplay: rv: Use designated initializers drivers/net/wan/z85230.c: Use designated initializers randstruct: Enable function pointer struct detection Merge branch 'for-next/gcc-plugin/structleak' into for-next/gcc-plugins arch/Kconfig | 19 +++++++++++----- drivers/gpu/drm/amd/powerplay/hwmgr/rv_hwmgr.c | 8 +++---- drivers/net/wan/z85230.c | 30 ++++++++++++-------------- scripts/Makefile.gcc-plugins | 1 + scripts/gcc-plugins/randomize_layout_plugin.c | 3 --- scripts/gcc-plugins/structleak_plugin.c | 13 +++++++++-- 6 files changed, 44 insertions(+), 30 deletions(-) -- Kees Cook Pixel Security