diff options
author | Kees Cook <keescook@chromium.org> | 2015-06-15 15:29:16 -0700 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2015-07-15 11:52:54 -0700 |
commit | 221272f97ca528048a577a3ff23d7774286ca5fd (patch) | |
tree | 78c221163aa09492b6cc2c90943734e5fcc1b9ba /kernel | |
parent | 13c4a90119d28cfcb6b5bdd820c233b86c2b0237 (diff) | |
download | linux-221272f97ca528048a577a3ff23d7774286ca5fd.tar.gz linux-221272f97ca528048a577a3ff23d7774286ca5fd.tar.bz2 linux-221272f97ca528048a577a3ff23d7774286ca5fd.zip |
seccomp: swap hard-coded zeros to defined name
For clarity, if CONFIG_SECCOMP isn't defined, seccomp_mode() is returning
"disabled". This makes that more clear, along with another 0-use, and
results in no operational change.
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'kernel')
-rw-r--r-- | kernel/seccomp.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/kernel/seccomp.c b/kernel/seccomp.c index 645e42d6fa4d..383bd6caca81 100644 --- a/kernel/seccomp.c +++ b/kernel/seccomp.c @@ -594,7 +594,7 @@ void secure_computing_strict(int this_syscall) unlikely(current->ptrace & PT_SUSPEND_SECCOMP)) return; - if (mode == 0) + if (mode == SECCOMP_MODE_DISABLED) return; else if (mode == SECCOMP_MODE_STRICT) __secure_computing_strict(this_syscall); |