Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754264AbdC2UqT (ORCPT ); Wed, 29 Mar 2017 16:46:19 -0400 Received: from mail-it0-f52.google.com ([209.85.214.52]:36875 "EHLO mail-it0-f52.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753621AbdC2Upa (ORCPT ); Wed, 29 Mar 2017 16:45:30 -0400 MIME-Version: 1.0 In-Reply-To: <201612171155.EDG30258.QOtFMSOJFFLOVH@I-love.SAKURA.ne.jp> References: <20161217010522.GA140690@beast> <201612171155.EDG30258.QOtFMSOJFFLOVH@I-love.SAKURA.ne.jp> From: Kees Cook Date: Wed, 29 Mar 2017 13:45:28 -0700 X-Google-Sender-Auth: C72Vpb_3T75tVfqCrLZ-0ttV1iU Message-ID: Subject: Re: [PATCH] TOMOYO: use designated initializers To: Tetsuo Handa Cc: LKML , Kentaro Takeda , James Morris , "Serge E. Hallyn" , linux-security-module Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 799 Lines: 25 On Fri, Dec 16, 2016 at 6:55 PM, Tetsuo Handa wrote: > Kees Cook wrote: >> Prepare to mark sensitive kernel structures for randomization by making >> sure they're using designated initializers. These were identified during >> allyesconfig builds of x86, arm, and arm64, with most initializer fixes >> extracted from grsecurity. >> >> Signed-off-by: Kees Cook >> --- >> security/tomoyo/file.c | 12 ++++++------ >> security/tomoyo/tomoyo.c | 20 ++++++++++---------- >> 2 files changed, 16 insertions(+), 16 deletions(-) > > Acked-by: Tetsuo Handa > > James, please apply to linux-security.git . Friendly ping. :) James, I don't think this ever got into -next? -Kees -- Kees Cook Pixel Security