Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
[deliverable/linux.git] / kernel / seccomp.c
index 737436ebb4fe512163890606eaa0cc2fcbb773cd..7002796f14a493988f6da70f77e266e36bf7788d 100644 (file)
@@ -513,14 +513,14 @@ static void seccomp_send_sigsys(int syscall, int reason)
  * To be fully secure this must be combined with rlimit
  * to limit the stack allocations too.
  */
-static int mode1_syscalls[] = {
+static const int mode1_syscalls[] = {
        __NR_seccomp_read, __NR_seccomp_write, __NR_seccomp_exit, __NR_seccomp_sigreturn,
        0, /* null terminated */
 };
 
 static void __secure_computing_strict(int this_syscall)
 {
-       int *syscall_whitelist = mode1_syscalls;
+       const int *syscall_whitelist = mode1_syscalls;
 #ifdef CONFIG_COMPAT
        if (in_compat_syscall())
                syscall_whitelist = get_compat_mode1_syscalls();
@@ -908,7 +908,7 @@ long seccomp_get_filter(struct task_struct *task, unsigned long filter_off,
 
        fprog = filter->prog->orig_prog;
        if (!fprog) {
-               /* This must be a new non-cBPF filter, since we save every
+               /* This must be a new non-cBPF filter, since we save
                 * every cBPF filter's orig_prog above when
                 * CONFIG_CHECKPOINT_RESTORE is enabled.
                 */
This page took 0.026143 seconds and 5 git commands to generate.