diff options
author | Kees Cook <keescook@chromium.org> | 2017-04-04 22:12:09 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-04-06 12:43:04 -0700 |
commit | 82fe0d2b44e00820c4ecb40a30e6014df6a1dd1f (patch) | |
tree | 1c95b38318e3a3e2e7e1ca3f1bdd07963db9b171 /net | |
parent | 540c86f3ed3dd173c1dfcd95214e4401ef565ba7 (diff) | |
download | linux-stable-82fe0d2b44e00820c4ecb40a30e6014df6a1dd1f.tar.gz linux-stable-82fe0d2b44e00820c4ecb40a30e6014df6a1dd1f.tar.bz2 linux-stable-82fe0d2b44e00820c4ecb40a30e6014df6a1dd1f.zip |
af_unix: Use designated initializers
Prepare to mark sensitive kernel structures for randomization by making
sure they're using designated initializers. These were identified during
allyesconfig builds of x86, arm, and arm64, and the initializer fixes
were extracted from grsecurity. In this case, NULL initialize with { }
instead of undesignated NULLs.
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net')
-rw-r--r-- | net/unix/af_unix.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c index 928691c43408..6a7fe7660551 100644 --- a/net/unix/af_unix.c +++ b/net/unix/af_unix.c @@ -996,7 +996,7 @@ static int unix_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) unsigned int hash; struct unix_address *addr; struct hlist_head *list; - struct path path = { NULL, NULL }; + struct path path = { }; err = -EINVAL; if (sunaddr->sun_family != AF_UNIX) |