diff options
author | Rusty Russell <rusty@rustcorp.com.au> | 2012-01-12 18:02:20 -0500 |
---|---|---|
committer | Rusty Russell <rusty@rustcorp.com.au> | 2012-01-12 18:02:20 -0500 |
commit | 90ab5ee94171b3e28de6bb42ee30b527014e0be7 (patch) | |
tree | fcf89889f6e881f2b231d3d20287c08174ce4b54 /security | |
parent | 476bc0015bf09dad39d36a8b19f76f0c181d1ec9 (diff) |
module_param: make bool parameters really bool (drivers & misc)
module_param(bool) used to counter-intuitively take an int. In
fddd5201 (mid-2009) we allowed bool or int/unsigned int using a messy
trick.
It's time to remove the int/unsigned int option. For this version
it'll simply give a warning, but it'll break next kernel version.
Acked-by: Mauro Carvalho Chehab <mchehab@redhat.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Diffstat (limited to 'security')
-rw-r--r-- | security/apparmor/include/apparmor.h | 10 | ||||
-rw-r--r-- | security/apparmor/lsm.c | 12 |
2 files changed, 11 insertions, 11 deletions
diff --git a/security/apparmor/include/apparmor.h b/security/apparmor/include/apparmor.h index 38ccaea08204..df3649560818 100644 --- a/security/apparmor/include/apparmor.h +++ b/security/apparmor/include/apparmor.h | |||
@@ -21,11 +21,11 @@ | |||
21 | 21 | ||
22 | /* Control parameters settable through module/boot flags */ | 22 | /* Control parameters settable through module/boot flags */ |
23 | extern enum audit_mode aa_g_audit; | 23 | extern enum audit_mode aa_g_audit; |
24 | extern int aa_g_audit_header; | 24 | extern bool aa_g_audit_header; |
25 | extern int aa_g_debug; | 25 | extern bool aa_g_debug; |
26 | extern int aa_g_lock_policy; | 26 | extern bool aa_g_lock_policy; |
27 | extern int aa_g_logsyscall; | 27 | extern bool aa_g_logsyscall; |
28 | extern int aa_g_paranoid_load; | 28 | extern bool aa_g_paranoid_load; |
29 | extern unsigned int aa_g_path_max; | 29 | extern unsigned int aa_g_path_max; |
30 | 30 | ||
31 | /* | 31 | /* |
diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c index d7f06f8b2837..68d50c54e431 100644 --- a/security/apparmor/lsm.c +++ b/security/apparmor/lsm.c | |||
@@ -708,7 +708,7 @@ module_param_call(mode, param_set_mode, param_get_mode, | |||
708 | &aa_g_profile_mode, S_IRUSR | S_IWUSR); | 708 | &aa_g_profile_mode, S_IRUSR | S_IWUSR); |
709 | 709 | ||
710 | /* Debug mode */ | 710 | /* Debug mode */ |
711 | int aa_g_debug; | 711 | bool aa_g_debug; |
712 | module_param_named(debug, aa_g_debug, aabool, S_IRUSR | S_IWUSR); | 712 | module_param_named(debug, aa_g_debug, aabool, S_IRUSR | S_IWUSR); |
713 | 713 | ||
714 | /* Audit mode */ | 714 | /* Audit mode */ |
@@ -719,7 +719,7 @@ module_param_call(audit, param_set_audit, param_get_audit, | |||
719 | /* Determines if audit header is included in audited messages. This | 719 | /* Determines if audit header is included in audited messages. This |
720 | * provides more context if the audit daemon is not running | 720 | * provides more context if the audit daemon is not running |
721 | */ | 721 | */ |
722 | int aa_g_audit_header = 1; | 722 | bool aa_g_audit_header = 1; |
723 | module_param_named(audit_header, aa_g_audit_header, aabool, | 723 | module_param_named(audit_header, aa_g_audit_header, aabool, |
724 | S_IRUSR | S_IWUSR); | 724 | S_IRUSR | S_IWUSR); |
725 | 725 | ||
@@ -727,12 +727,12 @@ module_param_named(audit_header, aa_g_audit_header, aabool, | |||
727 | * TODO: add in at boot loading of policy, which is the only way to | 727 | * TODO: add in at boot loading of policy, which is the only way to |
728 | * load policy, if lock_policy is set | 728 | * load policy, if lock_policy is set |
729 | */ | 729 | */ |
730 | int aa_g_lock_policy; | 730 | bool aa_g_lock_policy; |
731 | module_param_named(lock_policy, aa_g_lock_policy, aalockpolicy, | 731 | module_param_named(lock_policy, aa_g_lock_policy, aalockpolicy, |
732 | S_IRUSR | S_IWUSR); | 732 | S_IRUSR | S_IWUSR); |
733 | 733 | ||
734 | /* Syscall logging mode */ | 734 | /* Syscall logging mode */ |
735 | int aa_g_logsyscall; | 735 | bool aa_g_logsyscall; |
736 | module_param_named(logsyscall, aa_g_logsyscall, aabool, S_IRUSR | S_IWUSR); | 736 | module_param_named(logsyscall, aa_g_logsyscall, aabool, S_IRUSR | S_IWUSR); |
737 | 737 | ||
738 | /* Maximum pathname length before accesses will start getting rejected */ | 738 | /* Maximum pathname length before accesses will start getting rejected */ |
@@ -742,12 +742,12 @@ module_param_named(path_max, aa_g_path_max, aauint, S_IRUSR | S_IWUSR); | |||
742 | /* Determines how paranoid loading of policy is and how much verification | 742 | /* Determines how paranoid loading of policy is and how much verification |
743 | * on the loaded policy is done. | 743 | * on the loaded policy is done. |
744 | */ | 744 | */ |
745 | int aa_g_paranoid_load = 1; | 745 | bool aa_g_paranoid_load = 1; |
746 | module_param_named(paranoid_load, aa_g_paranoid_load, aabool, | 746 | module_param_named(paranoid_load, aa_g_paranoid_load, aabool, |
747 | S_IRUSR | S_IWUSR); | 747 | S_IRUSR | S_IWUSR); |
748 | 748 | ||
749 | /* Boot time disable flag */ | 749 | /* Boot time disable flag */ |
750 | static unsigned int apparmor_enabled = CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE; | 750 | static bool apparmor_enabled = CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE; |
751 | module_param_named(enabled, apparmor_enabled, aabool, S_IRUSR); | 751 | module_param_named(enabled, apparmor_enabled, aabool, S_IRUSR); |
752 | 752 | ||
753 | static int __init apparmor_enabled_setup(char *str) | 753 | static int __init apparmor_enabled_setup(char *str) |