diff options
author | Kees Cook <keescook@chromium.org> | 2016-12-17 04:03:39 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2016-12-17 19:56:57 +0300 |
commit | e999cb43d51f3635afd6253c5c066798ad998255 (patch) | |
tree | 2e166c70749f5e0a61ef545b19077d409e4d8dc8 | |
parent | ebf12f1320c70c3eaeb5b7d108444fafd54d352c (diff) | |
download | linux-e999cb43d51f3635afd6253c5c066798ad998255.tar.xz |
net/x25: use designated initializers
Prepare to mark sensitive kernel structures for randomization by making
sure they're using designated initializers. These were identified during
allyesconfig builds of x86, arm, and arm64, with most initializer fixes
extracted from grsecurity.
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/x25/sysctl_net_x25.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/x25/sysctl_net_x25.c b/net/x25/sysctl_net_x25.c index 43239527a205..a06dfe143c67 100644 --- a/net/x25/sysctl_net_x25.c +++ b/net/x25/sysctl_net_x25.c @@ -70,7 +70,7 @@ static struct ctl_table x25_table[] = { .mode = 0644, .proc_handler = proc_dointvec, }, - { 0, }, + { }, }; void __init x25_register_sysctl(void) |