[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170405051209.GA15324@beast>
Date: Tue, 4 Apr 2017 22:12:09 -0700
From: Kees Cook <keescook@...omium.org>
To: linux-kernel@...r.kernel.org
Cc: "David S. Miller" <davem@...emloft.net>,
Miklos Szeredi <mszeredi@...hat.com>,
Al Viro <viro@...iv.linux.org.uk>,
WANG Cong <xiyou.wangcong@...il.com>,
Hannes Frederic Sowa <hannes@...essinduktion.org>,
Kees Cook <keescook@...omium.org>,
Vladimir Davydov <vdavydov.dev@...il.com>,
Andrey Vagin <avagin@...nvz.org>, netdev@...r.kernel.org
Subject: [PATCH] af_unix: Use designated initializers
Prepare to mark sensitive kernel structures for randomization by making
sure they're using designated initializers. These were identified during
allyesconfig builds of x86, arm, and arm64, and the initializer fixes
were extracted from grsecurity. In this case, NULL initialize with { }
instead of undesignated NULLs.
Signed-off-by: Kees Cook <keescook@...omium.org>
---
net/unix/af_unix.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c
index 928691c43408..6a7fe7660551 100644
--- a/net/unix/af_unix.c
+++ b/net/unix/af_unix.c
@@ -996,7 +996,7 @@ static int unix_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
unsigned int hash;
struct unix_address *addr;
struct hlist_head *list;
- struct path path = { NULL, NULL };
+ struct path path = { };
err = -EINVAL;
if (sunaddr->sun_family != AF_UNIX)
--
2.7.4
--
Kees Cook
Pixel Security
Powered by blists - more mailing lists