[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5j+kUbEcAcCKZT09pHFxWTYkiNqnxGKCyrLhuYLeiSemZw@mail.gmail.com>
Date: Wed, 29 Mar 2017 13:45:28 -0700
From: Kees Cook <keescook@...omium.org>
To: Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>
Cc: LKML <linux-kernel@...r.kernel.org>,
Kentaro Takeda <takedakn@...data.co.jp>,
James Morris <james.l.morris@...cle.com>,
"Serge E. Hallyn" <serge@...lyn.com>,
linux-security-module <linux-security-module@...r.kernel.org>
Subject: Re: [PATCH] TOMOYO: use designated initializers
On Fri, Dec 16, 2016 at 6:55 PM, Tetsuo Handa
<penguin-kernel@...ove.sakura.ne.jp> wrote:
> Kees Cook wrote:
>> Prepare to mark sensitive kernel structures for randomization by making
>> sure they're using designated initializers. These were identified during
>> allyesconfig builds of x86, arm, and arm64, with most initializer fixes
>> extracted from grsecurity.
>>
>> Signed-off-by: Kees Cook <keescook@...omium.org>
>> ---
>> security/tomoyo/file.c | 12 ++++++------
>> security/tomoyo/tomoyo.c | 20 ++++++++++----------
>> 2 files changed, 16 insertions(+), 16 deletions(-)
>
> Acked-by: Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
>
> James, please apply to linux-security.git .
Friendly ping. :) James, I don't think this ever got into -next?
-Kees
--
Kees Cook
Pixel Security
Powered by blists - more mailing lists