* [PATCH] selinux: make "selinux_policycap_names[]" const char *
@ 2018-11-24 9:11 Alexey Dobriyan
2018-11-26 23:28 ` Paul Moore
0 siblings, 1 reply; 2+ messages in thread
From: Alexey Dobriyan @ 2018-11-24 9:11 UTC (permalink / raw)
To: paul, sds, eparis; +Cc: selinux
Those strings aren't written.
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
---
security/selinux/include/security.h | 2 +-
security/selinux/ss/services.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
--- a/security/selinux/include/security.h
+++ b/security/selinux/include/security.h
@@ -81,7 +81,7 @@ enum {
};
#define POLICYDB_CAPABILITY_MAX (__POLICYDB_CAPABILITY_MAX - 1)
-extern char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX];
+extern const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX];
/*
* type_datum properties
--- a/security/selinux/ss/services.c
+++ b/security/selinux/ss/services.c
@@ -71,7 +71,7 @@
#include "audit.h"
/* Policy capability names */
-char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX] = {
+const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX] = {
"network_peer_controls",
"open_perms",
"extended_socket_class",
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [PATCH] selinux: make "selinux_policycap_names[]" const char *
2018-11-24 9:11 [PATCH] selinux: make "selinux_policycap_names[]" const char * Alexey Dobriyan
@ 2018-11-26 23:28 ` Paul Moore
0 siblings, 0 replies; 2+ messages in thread
From: Paul Moore @ 2018-11-26 23:28 UTC (permalink / raw)
To: adobriyan; +Cc: Stephen Smalley, Eric Paris, selinux
On Sat, Nov 24, 2018 at 4:11 AM Alexey Dobriyan <adobriyan@gmail.com> wrote:
>
> Those strings aren't written.
>
> Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
> ---
>
> security/selinux/include/security.h | 2 +-
> security/selinux/ss/services.c | 2 +-
> 2 files changed, 2 insertions(+), 2 deletions(-)
Merged into selinux/next, thanks.
> --- a/security/selinux/include/security.h
> +++ b/security/selinux/include/security.h
> @@ -81,7 +81,7 @@ enum {
> };
> #define POLICYDB_CAPABILITY_MAX (__POLICYDB_CAPABILITY_MAX - 1)
>
> -extern char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX];
> +extern const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX];
>
> /*
> * type_datum properties
> --- a/security/selinux/ss/services.c
> +++ b/security/selinux/ss/services.c
> @@ -71,7 +71,7 @@
> #include "audit.h"
>
> /* Policy capability names */
> -char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX] = {
> +const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX] = {
> "network_peer_controls",
> "open_perms",
> "extended_socket_class",
--
paul moore
www.paul-moore.com
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2018-11-26 23:28 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-11-24 9:11 [PATCH] selinux: make "selinux_policycap_names[]" const char * Alexey Dobriyan
2018-11-26 23:28 ` Paul Moore
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).