Re: [PATCH] hpsa: use designated initializers

2016-12-20 Thread Martin K. Petersen
> "Kees" == Kees Cook  writes:

Kees> Prepare to mark sensitive kernel structures for randomization by
Kees> making sure they're using designated initializers. These were
Kees> identified during allyesconfig builds of x86, arm, and arm64, with
Kees> most initializer fixes extracted from grsecurity.

Applied to 4.11/scsi-queue.

-- 
Martin K. Petersen  Oracle Linux Engineering


[PATCH] hpsa: use designated initializers

2016-12-16 Thread Kees Cook
Prepare to mark sensitive kernel structures for randomization by making
sure they're using designated initializers. These were identified during
allyesconfig builds of x86, arm, and arm64, with most initializer fixes
extracted from grsecurity.

Signed-off-by: Kees Cook 
---
 drivers/scsi/hpsa.h | 40 
 1 file changed, 20 insertions(+), 20 deletions(-)

diff --git a/drivers/scsi/hpsa.h b/drivers/scsi/hpsa.h
index 64e98295b707..bf6cdc106654 100644
--- a/drivers/scsi/hpsa.h
+++ b/drivers/scsi/hpsa.h
@@ -578,38 +578,38 @@ static unsigned long SA5_ioaccel_mode1_completed(struct 
ctlr_info *h, u8 q)
 }
 
 static struct access_method SA5_access = {
-   SA5_submit_command,
-   SA5_intr_mask,
-   SA5_intr_pending,
-   SA5_completed,
+   .submit_command = SA5_submit_command,
+   .set_intr_mask = SA5_intr_mask,
+   .intr_pending = SA5_intr_pending,
+   .command_completed = SA5_completed,
 };
 
 static struct access_method SA5_ioaccel_mode1_access = {
-   SA5_submit_command,
-   SA5_performant_intr_mask,
-   SA5_ioaccel_mode1_intr_pending,
-   SA5_ioaccel_mode1_completed,
+   .submit_command = SA5_submit_command,
+   .set_intr_mask = SA5_performant_intr_mask,
+   .intr_pending = SA5_ioaccel_mode1_intr_pending,
+   .command_completed = SA5_ioaccel_mode1_completed,
 };
 
 static struct access_method SA5_ioaccel_mode2_access = {
-   SA5_submit_command_ioaccel2,
-   SA5_performant_intr_mask,
-   SA5_performant_intr_pending,
-   SA5_performant_completed,
+   .submit_command = SA5_submit_command_ioaccel2,
+   .set_intr_mask = SA5_performant_intr_mask,
+   .intr_pending = SA5_performant_intr_pending,
+   .command_completed = SA5_performant_completed,
 };
 
 static struct access_method SA5_performant_access = {
-   SA5_submit_command,
-   SA5_performant_intr_mask,
-   SA5_performant_intr_pending,
-   SA5_performant_completed,
+   .submit_command = SA5_submit_command,
+   .set_intr_mask = SA5_performant_intr_mask,
+   .intr_pending = SA5_performant_intr_pending,
+   .command_completed = SA5_performant_completed,
 };
 
 static struct access_method SA5_performant_access_no_read = {
-   SA5_submit_command_no_read,
-   SA5_performant_intr_mask,
-   SA5_performant_intr_pending,
-   SA5_performant_completed,
+   .submit_command = SA5_submit_command_no_read,
+   .set_intr_mask = SA5_performant_intr_mask,
+   .intr_pending = SA5_performant_intr_pending,
+   .command_completed = SA5_performant_completed,
 };
 
 struct board_type {
-- 
2.7.4


-- 
Kees Cook
Nexus Security