Re: [PATCH] Security: constify function pointer tables and fields

2008-01-23 Thread James Morris
On Wed, 23 Jan 2008, Jan Engelhardt wrote:

> Signed-off-by: Jan Engelhardt <[EMAIL PROTECTED]>
> ---
>  include/linux/security.h |2 +-
>  security/keys/proc.c |4 ++--
>  security/selinux/selinuxfs.c |2 +-
>  3 files changed, 4 insertions(+), 4 deletions(-)

Applied to 
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-akpm


-- 
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[PATCH] Security: constify function pointer tables and fields

2008-01-22 Thread Jan Engelhardt
Signed-off-by: Jan Engelhardt <[EMAIL PROTECTED]>
---
 include/linux/security.h |2 +-
 security/keys/proc.c |4 ++--
 security/selinux/selinuxfs.c |2 +-
 3 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/include/linux/security.h b/include/linux/security.h
index ac05083..c41e132 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -2266,7 +2266,7 @@ static inline struct dentry *securityfs_create_file(const 
char *name,
mode_t mode,
struct dentry *parent,
void *data,
-   struct file_operations *fops)
+   const struct file_operations 
*fops)
 {
return ERR_PTR(-ENODEV);
 }
diff --git a/security/keys/proc.c b/security/keys/proc.c
index 3e0d0a6..6941260 100644
--- a/security/keys/proc.c
+++ b/security/keys/proc.c
@@ -26,7 +26,7 @@ static void *proc_keys_next(struct seq_file *p, void *v, 
loff_t *_pos);
 static void proc_keys_stop(struct seq_file *p, void *v);
 static int proc_keys_show(struct seq_file *m, void *v);
 
-static struct seq_operations proc_keys_ops = {
+static const struct seq_operations proc_keys_ops = {
.start  = proc_keys_start,
.next   = proc_keys_next,
.stop   = proc_keys_stop,
@@ -47,7 +47,7 @@ static void *proc_key_users_next(struct seq_file *p, void *v, 
loff_t *_pos);
 static void proc_key_users_stop(struct seq_file *p, void *v);
 static int proc_key_users_show(struct seq_file *m, void *v);
 
-static struct seq_operations proc_key_users_ops = {
+static const struct seq_operations proc_key_users_ops = {
.start  = proc_key_users_start,
.next   = proc_key_users_next,
.stop   = proc_key_users_stop,
diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c
index 2fa483f..397fd49 100644
--- a/security/selinux/selinuxfs.c
+++ b/security/selinux/selinuxfs.c
@@ -1222,7 +1222,7 @@ static int sel_avc_stats_seq_show(struct seq_file *seq, 
void *v)
 static void sel_avc_stats_seq_stop(struct seq_file *seq, void *v)
 { }
 
-static struct seq_operations sel_avc_cache_stats_seq_ops = {
+static const struct seq_operations sel_avc_cache_stats_seq_ops = {
.start  = sel_avc_stats_seq_start,
.next   = sel_avc_stats_seq_next,
.show   = sel_avc_stats_seq_show,
-- 
1.5.3.4

-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html