summaryrefslogtreecommitdiffstats
path: root/scripts/gcc-plugins
Commit message (Expand)AuthorAgeFilesLines
* gcc-plugins: arm_ssp_per_task_plugin: fix for GCC 9+Ard Biesheuvel2019-01-201-0/+18
* gcc-plugins: arm_ssp_per_task_plugin: sign extend the SP maskArd Biesheuvel2019-01-201-2/+3
* Merge tag 'gcc-plugins-v4.21-rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2018-12-272-0/+107
|\
| * ARM: smp: add support for per-task stack canariesArd Biesheuvel2018-12-122-0/+107
* | stackleak: Register the 'stackleak_cleanup' pass before the '*free_cfg' passAlexander Popov2018-12-061-3/+5
|/
* stackleak: Allow runtime disabling of kernel stack erasingAlexander Popov2018-09-041-0/+8
* fs/proc: Show STACKLEAK metrics in the /proc file systemAlexander Popov2018-09-041-0/+12
* gcc-plugins: Add STACKLEAK plugin for tracking the kernel stackAlexander Popov2018-09-042-0/+439
* x86/entry: Add STACKLEAK erasing the kernel stack at the end of syscallsAlexander Popov2018-09-041-0/+19
* Merge tag 'gcc-plugins-v4.19-rc1-fix' of git://git.kernel.org/pub/scm/linux/k...Linus Torvalds2018-08-261-1/+1
|\
| * gcc-plugins: Disable when building under ClangKees Cook2018-08-231-1/+1
* | gcc-plugins: Clean up the cgraph_create_edge* macrosAlexander Popov2018-07-251-10/+16
|/
* gcc-plugins: split out Kconfig entries to scripts/gcc-plugins/KconfigMasahiro Yamada2018-07-251-0/+142
* gcc-plugins: remove unused GCC_PLUGIN_SUBDIRMasahiro Yamada2018-07-031-5/+0Star
* gcc-plugins: test plugin support in Kconfig and clean up MakefileMasahiro Yamada2018-06-111-0/+1
* kcov: test compiler capability in Kconfig and correct dependencyMasahiro Yamada2018-06-111-4/+0Star
* security: convert security hooks to use hlistSargun Dhillon2018-03-311-2/+2
* gcc-plugins: Use dynamic initializersKees Cook2018-02-063-78/+33Star
* gcc-plugins: Add include required by GCC release 8valdis.kletnieks@vt.edu2018-02-061-0/+4
* License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2017-11-027-0/+7
* Merge branch 'for-next/gcc-plugin/structleak' into for-next/gcc-pluginsKees Cook2017-08-071-2/+11
|\
| * gcc-plugins: structleak: add option to init all vars used as byref argsArd Biesheuvel2017-08-071-2/+11
* | randstruct: Enable function pointer struct detectionKees Cook2017-08-021-3/+0Star
|/
* randstruct: Whitelist NIU struct page overloadingKees Cook2017-06-231-0/+2
* randstruct: Whitelist big_key path struct overloadingKees Cook2017-06-231-0/+2
* randstruct: Whitelist UNIXCB castKees Cook2017-06-231-0/+2
* randstruct: Whitelist struct security_hook_heads castKees Cook2017-06-231-0/+2
* gcc-plugins: Add the randstruct pluginKees Cook2017-06-235-0/+1042
* gcc-plugins: Detail c-common.h location for GCC 4.6Kees Cook2017-05-281-0/+7
* Merge tag 'gcc-plugins-v4.11-rc2' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2017-03-101-1/+1
|\
| * gcc-plugins: fix sancov_plugin for gcc-5Arnd Bergmann2017-02-271-1/+1
* | Merge branch 'for-next/gcc-plugin/structleak' into for-linus/gcc-pluginsKees Cook2017-02-221-0/+246
|\ \ | |/ |/|
| * gcc-plugins: Add structleak for more stack initializationKees Cook2017-01-181-0/+246
* | gcc-plugins: consolidate on PASS_INFO macroKees Cook2017-01-133-17/+5Star
|/
* gcc-plugins: add PASS_INFO and build_const_char_string()Kees Cook2017-01-111-11/+44
* gcc-plugins: update gcc-common.h for gcc-7Kees Cook2017-01-031-0/+85
* latent_entropy: fix ARM build error on earlier gccKees Cook2017-01-031-2/+2
* treewide: Fix printk() message errorsMasanari Iida2016-12-142-2/+2
* latent_entropy: Fix wrong gcc code generation with 64 bit variablesKees Cook2016-10-311-10/+9Star
* gcc-plugins: Export symbols needed by gccKees Cook2016-10-314-7/+8
* gcc-plugins: Add latent_entropy pluginEmese Revfy2016-10-101-0/+640
* gcc-plugins: Add support for plugin subdirectoriesEmese Revfy2016-08-091-3/+6
* gcc-plugins: Automate make rule generationEmese Revfy2016-08-091-2/+1Star
* Add sancov pluginEmese Revfy2016-06-072-0/+150
* Add Cyclomatic complexity GCC pluginEmese Revfy2016-06-072-0/+74
* GCC plugin infrastructureEmese Revfy2016-06-076-0/+1664