[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202008031155.E07E37D@keescook>
Date: Mon, 3 Aug 2020 11:57:08 -0700
From: Kees Cook <keescook@...omium.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-kernel@...r.kernel.org,
Alexander Potapenko <glider@...gle.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Kees Cook <keescook@...omium.org>,
Maciej Żenczykowski <maze@...gle.com>,
Nick Desaulniers <ndesaulniers@...gle.com>
Subject: [GIT PULL] var-init update for v5.9-rc1
Hi Linus,
Please pull this var-init update for v5.9-rc1. (This is the tree formerly
known as "mem-init", which you correctly pointed out was not a good
name.) This adds the "zero" init option from Clang, which is being used
widely in production builds of Android and Chrome OS (though it keeps the
"pattern" init, which is better for debug builds).
Thanks!
-Kees
The following changes since commit b3a9e3b9622ae10064826dccb4f7a52bd88c7407:
Linux 5.8-rc1 (2020-06-14 12:45:04 -0700)
are available in the Git repository at:
https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/var-init-v5.9-rc1
for you to fetch changes up to f0fe00d4972a8cd4b98cc2c29758615e4d51cdfe:
security: allow using Clang's zero initialization for stack variables (2020-06-16 02:06:23 -0700)
----------------------------------------------------------------
Automatic variable initialization updates for v5.9-rc1
- Introduce CONFIG_INIT_STACK_ALL_ZERO (Alexander Potapenko)
----------------------------------------------------------------
glider@...gle.com (1):
security: allow using Clang's zero initialization for stack variables
Makefile | 13 +++++++++++--
init/main.c | 12 +++++++-----
security/Kconfig.hardening | 29 +++++++++++++++++++++++++----
3 files changed, 43 insertions(+), 11 deletions(-)
--
Kees Cook
Powered by blists - more mailing lists