Navigation: Linux Kernel Driver DataBase - web LKDDB: Main index - G index

CONFIG_GCC_PLUGIN_STRUCTLEAK:

General informations

The Linux kernel configuration item CONFIG_GCC_PLUGIN_STRUCTLEAK has multiple definitions:

found in security/Kconfig.hardening

The configuration item CONFIG_GCC_PLUGIN_STRUCTLEAK:

Help text

While the kernel is built with warnings enabled for any missed stack variable initializations, this warning is silenced for anything passed by reference to another function, under the occasionally misguided assumption that the function will do the initialization. As this regularly leads to exploitable flaws, this plugin is available to identify and zero-initialize such variables, depending on the chosen level of coverage.

This plugin was originally ported from grsecurity/PaX. More information at: * https://grsecurity.net/ * https://pax.grsecurity.net/

Force initialization of variables containing userspace addresses found in arch/Kconfig

The configuration item CONFIG_GCC_PLUGIN_STRUCTLEAK:

Help text

This plugin zero-initializes any structures containing a __user attribute. This can prevent some classes of information exposures.

This plugin was ported from grsecurity/PaX. More information at: * https://grsecurity.net/ * https://pax.grsecurity.net/

Hardware

LKDDb

Raw data from LKDDb:

Sources

This page is automaticly generated with free (libre, open) software lkddb(see lkddb-sources).

The data is retrived from:

Automatic links from Google (and ads)

Custom Search

Popular queries:

Navigation: Linux Kernel Driver DataBase - web LKDDB: main index - G index

Automatically generated (in year 2019). See also LKDDb sources on GitLab