[PATCH] TOMOYO: use designated initializers

Kees Cook keescook at chromium.org
Wed Mar 29 20:45:28 UTC 2017


On Fri, Dec 16, 2016 at 6:55 PM, Tetsuo Handa
<penguin-kernel at i-love.sakura.ne.jp> wrote:
> Kees Cook wrote:
>> Prepare to mark sensitive kernel structures for randomization by making
>> sure they're using designated initializers. These were identified during
>> allyesconfig builds of x86, arm, and arm64, with most initializer fixes
>> extracted from grsecurity.
>>
>> Signed-off-by: Kees Cook <keescook at chromium.org>
>> ---
>>  security/tomoyo/file.c   | 12 ++++++------
>>  security/tomoyo/tomoyo.c | 20 ++++++++++----------
>>  2 files changed, 16 insertions(+), 16 deletions(-)
>
> Acked-by: Tetsuo Handa <penguin-kernel at I-love.SAKURA.ne.jp>
>
> James, please apply to linux-security.git .

Friendly ping. :) James, I don't think this ever got into -next?

-Kees

-- 
Kees Cook
Pixel Security
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html



More information about the Linux-security-module-archive mailing list