diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2018-05-11 18:04:12 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2018-05-11 18:04:12 -0700 |
commit | f0ab773f5c96c29a5227234c4b5a820f5591b74d (patch) | |
tree | a98d6190989c2190e522b8d1966727125bcbcbb3 /arch | |
parent | 4bc871984f7cb5b2dec3ae64b570cb02f9ce2227 (diff) | |
parent | 2075b16e32c26e4031b9fd3cbe26c54676a8fcb5 (diff) | |
download | linux-f0ab773f5c96c29a5227234c4b5a820f5591b74d.tar.gz linux-f0ab773f5c96c29a5227234c4b5a820f5591b74d.tar.bz2 linux-f0ab773f5c96c29a5227234c4b5a820f5591b74d.zip |
Merge branch 'akpm' (patches from Andrew)
Merge misc fixes from Andrew Morton:
"13 fixes"
* emailed patches from Andrew Morton <akpm@linux-foundation.org>:
rbtree: include rcu.h
scripts/faddr2line: fix error when addr2line output contains discriminator
ocfs2: take inode cluster lock before moving reflinked inode from orphan dir
mm, oom: fix concurrent munlock and oom reaper unmap, v3
mm: migrate: fix double call of radix_tree_replace_slot()
proc/kcore: don't bounds check against address 0
mm: don't show nr_indirectly_reclaimable in /proc/vmstat
mm: sections are not offlined during memory hotremove
z3fold: fix reclaim lock-ups
init: fix false positives in W+X checking
lib/find_bit_benchmark.c: avoid soft lockup in test_find_first_bit()
KASAN: prohibit KASAN+STRUCTLEAK combination
MAINTAINERS: update Shuah's email address
Diffstat (limited to 'arch')
-rw-r--r-- | arch/Kconfig | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/arch/Kconfig b/arch/Kconfig index 8e0d665c8d53..75dd23acf133 100644 --- a/arch/Kconfig +++ b/arch/Kconfig @@ -464,6 +464,10 @@ config GCC_PLUGIN_LATENT_ENTROPY config GCC_PLUGIN_STRUCTLEAK bool "Force initialization of variables containing userspace addresses" depends on GCC_PLUGINS + # Currently STRUCTLEAK inserts initialization out of live scope of + # variables from KASAN point of view. This leads to KASAN false + # positive reports. Prohibit this combination for now. + depends on !KASAN_EXTRA help This plugin zero-initializes any structures containing a __user attribute. This can prevent some classes of information |