Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756309AbcC2If7 (ORCPT ); Tue, 29 Mar 2016 04:35:59 -0400 Received: from mailapp01.imgtec.com ([195.59.15.196]:6190 "EHLO mailapp01.imgtec.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756291AbcC2If5 (ORCPT ); Tue, 29 Mar 2016 04:35:57 -0400 From: Matt Redfearn To: CC: Matt Redfearn , Will Drewry , , Andy Lutomirski , "Kees Cook" Subject: [PATCH v2 6/6] secomp: Constify mode1 syscall whitelist Date: Tue, 29 Mar 2016 09:35:34 +0100 Message-ID: <1459240534-8658-7-git-send-email-matt.redfearn@imgtec.com> X-Mailer: git-send-email 2.5.0 In-Reply-To: <1459240534-8658-1-git-send-email-matt.redfearn@imgtec.com> References: <1459240534-8658-1-git-send-email-matt.redfearn@imgtec.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [192.168.154.116] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 981 Lines: 33 These values are constant and should be marked as such. Signed-off-by: Matt Redfearn --- Changes in v2: None kernel/seccomp.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/kernel/seccomp.c b/kernel/seccomp.c index b0082c14764f..9243d686d11a 100644 --- a/kernel/seccomp.c +++ b/kernel/seccomp.c @@ -513,14 +513,14 @@ static void seccomp_send_sigsys(int syscall, int reason) * To be fully secure this must be combined with rlimit * to limit the stack allocations too. */ -static int mode1_syscalls[] = { +static const int mode1_syscalls[] = { __NR_seccomp_read, __NR_seccomp_write, __NR_seccomp_exit, __NR_seccomp_sigreturn, 0, /* null terminated */ }; static void __secure_computing_strict(int this_syscall) { - int *syscall_whitelist = mode1_syscalls; + const int *syscall_whitelist = mode1_syscalls; #ifdef CONFIG_COMPAT if (is_compat_task()) syscall_whitelist = get_compat_mode1_syscalls(); -- 2.5.0