From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933328AbdC3ITB (ORCPT ); Thu, 30 Mar 2017 04:19:01 -0400 Received: from verein.lst.de ([213.95.11.211]:56441 "EHLO newverein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933262AbdC3IS6 (ORCPT ); Thu, 30 Mar 2017 04:18:58 -0400 Date: Thu, 30 Mar 2017 10:18:55 +0200 From: Christoph Hellwig To: Kees Cook Cc: linux-kernel@vger.kernel.org, Christoph Hellwig , Anil Gurumurthy , Sudarsana Kalluru , "James E.J. Bottomley" , "Martin K. Petersen" , linux-scsi@vger.kernel.org Subject: Re: [PATCH v2] scsi/bfa: use designated initializers Message-ID: <20170330081855.GA11344@lst.de> References: <20170329205509.GA39525@beast> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170329205509.GA39525@beast> User-Agent: Mutt/1.5.17 (2007-11-01) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 29, 2017 at 01:55:09PM -0700, Kees Cook wrote: > Prepare to mark sensitive kernel structures for randomization by making > sure they're using designated initializers. These were identified during > allyesconfig builds of x86, arm, and arm64, with most initializer fixes > extracted from grsecurity. > > Signed-off-by: Kees Cook > --- > This has been updated now that struct bfa_fcs_mod_s was dropped. Can you also add designated array initializers for __port_action while you're at it?