diff options
author | Kees Cook <keescook@chromium.org> | 2017-04-04 22:12:09 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-04-06 12:43:04 -0700 |
commit | 82fe0d2b44e00820c4ecb40a30e6014df6a1dd1f (patch) | |
tree | 1c95b38318e3a3e2e7e1ca3f1bdd07963db9b171 | |
parent | 540c86f3ed3dd173c1dfcd95214e4401ef565ba7 (diff) |
af_unix: Use designated initializers
Prepare to mark sensitive kernel structures for randomization by making
sure they're using designated initializers. These were identified during
allyesconfig builds of x86, arm, and arm64, and the initializer fixes
were extracted from grsecurity. In this case, NULL initialize with { }
instead of undesignated NULLs.
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/unix/af_unix.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c index 928691c43408..6a7fe7660551 100644 --- a/net/unix/af_unix.c +++ b/net/unix/af_unix.c @@ -996,7 +996,7 @@ static int unix_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) unsigned int hash; struct unix_address *addr; struct hlist_head *list; - struct path path = { NULL, NULL }; + struct path path = { }; err = -EINVAL; if (sunaddr->sun_family != AF_UNIX) |