ANDROID: fix allmodconfig build
commite0c6791d04("BACKPORT: security: Create "kernel hardening" config area") introduced an x86 build breakage in allmodconfig mode. Copying the definition of GCC_PLUGIN_STRUCTLEAK_BYREF_ALL from upstream version of security/Kconfig.hardening fixes the build. Change-Id: I2def59283b829b8af8fa343eb1d4ebaa3f2e145d Reported-by: Todd Kjos <tkjos@google.com> Signed-off-by: Alexander Potapenko <glider@google.com> Bug: 143965122 Fixes:e0c6791d04("BACKPORT: security: Create "kernel hardening" config area) Test: manual - run `make allmodconfig && make -j64` Signed-off-by: Todd Kjos <tkjos@google.com>
This commit is contained in:
committed by
Todd Kjos
parent
3acdbda6a7
commit
8e89bf80ce
@@ -43,12 +43,15 @@ choice
|
|||||||
and information exposures.
|
and information exposures.
|
||||||
|
|
||||||
config GCC_PLUGIN_STRUCTLEAK_BYREF_ALL
|
config GCC_PLUGIN_STRUCTLEAK_BYREF_ALL
|
||||||
bool "Force initialize all struct type variables passed by reference"
|
bool "zero-init anything passed by reference (very strong)"
|
||||||
depends on GCC_PLUGIN_STRUCTLEAK
|
depends on GCC_PLUGINS
|
||||||
depends on !COMPILE_TEST
|
select GCC_PLUGIN_STRUCTLEAK
|
||||||
help
|
help
|
||||||
Zero initialize any struct type local variable that may
|
Zero-initialize any stack variables that may be passed
|
||||||
be passed by reference without having been initialized.
|
by reference and had not already been explicitly
|
||||||
|
initialized. This is intended to eliminate all classes
|
||||||
|
of uninitialized stack variable exploits and information
|
||||||
|
exposures.
|
||||||
|
|
||||||
config INIT_STACK_ALL
|
config INIT_STACK_ALL
|
||||||
bool "0xAA-init everything on the stack (strongest)"
|
bool "0xAA-init everything on the stack (strongest)"
|
||||||
|
|||||||
Reference in New Issue
Block a user