aboutsummaryrefslogtreecommitdiffstats
path: root/security/apparmor/lsm.c
diff options
context:
space:
mode:
Diffstat (limited to 'security/apparmor/lsm.c')
-rw-r--r--security/apparmor/lsm.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c
index d7f06f8b2837..68d50c54e431 100644
--- a/security/apparmor/lsm.c
+++ b/security/apparmor/lsm.c
@@ -708,7 +708,7 @@ module_param_call(mode, param_set_mode, param_get_mode,
708 &aa_g_profile_mode, S_IRUSR | S_IWUSR); 708 &aa_g_profile_mode, S_IRUSR | S_IWUSR);
709 709
710/* Debug mode */ 710/* Debug mode */
711int aa_g_debug; 711bool aa_g_debug;
712module_param_named(debug, aa_g_debug, aabool, S_IRUSR | S_IWUSR); 712module_param_named(debug, aa_g_debug, aabool, S_IRUSR | S_IWUSR);
713 713
714/* Audit mode */ 714/* Audit mode */
@@ -719,7 +719,7 @@ module_param_call(audit, param_set_audit, param_get_audit,
719/* Determines if audit header is included in audited messages. This 719/* Determines if audit header is included in audited messages. This
720 * provides more context if the audit daemon is not running 720 * provides more context if the audit daemon is not running
721 */ 721 */
722int aa_g_audit_header = 1; 722bool aa_g_audit_header = 1;
723module_param_named(audit_header, aa_g_audit_header, aabool, 723module_param_named(audit_header, aa_g_audit_header, aabool,
724 S_IRUSR | S_IWUSR); 724 S_IRUSR | S_IWUSR);
725 725
@@ -727,12 +727,12 @@ module_param_named(audit_header, aa_g_audit_header, aabool,
727 * TODO: add in at boot loading of policy, which is the only way to 727 * TODO: add in at boot loading of policy, which is the only way to
728 * load policy, if lock_policy is set 728 * load policy, if lock_policy is set
729 */ 729 */
730int aa_g_lock_policy; 730bool aa_g_lock_policy;
731module_param_named(lock_policy, aa_g_lock_policy, aalockpolicy, 731module_param_named(lock_policy, aa_g_lock_policy, aalockpolicy,
732 S_IRUSR | S_IWUSR); 732 S_IRUSR | S_IWUSR);
733 733
734/* Syscall logging mode */ 734/* Syscall logging mode */
735int aa_g_logsyscall; 735bool aa_g_logsyscall;
736module_param_named(logsyscall, aa_g_logsyscall, aabool, S_IRUSR | S_IWUSR); 736module_param_named(logsyscall, aa_g_logsyscall, aabool, S_IRUSR | S_IWUSR);
737 737
738/* Maximum pathname length before accesses will start getting rejected */ 738/* Maximum pathname length before accesses will start getting rejected */
@@ -742,12 +742,12 @@ module_param_named(path_max, aa_g_path_max, aauint, S_IRUSR | S_IWUSR);
742/* Determines how paranoid loading of policy is and how much verification 742/* Determines how paranoid loading of policy is and how much verification
743 * on the loaded policy is done. 743 * on the loaded policy is done.
744 */ 744 */
745int aa_g_paranoid_load = 1; 745bool aa_g_paranoid_load = 1;
746module_param_named(paranoid_load, aa_g_paranoid_load, aabool, 746module_param_named(paranoid_load, aa_g_paranoid_load, aabool,
747 S_IRUSR | S_IWUSR); 747 S_IRUSR | S_IWUSR);
748 748
749/* Boot time disable flag */ 749/* Boot time disable flag */
750static unsigned int apparmor_enabled = CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE; 750static bool apparmor_enabled = CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE;
751module_param_named(enabled, apparmor_enabled, aabool, S_IRUSR); 751module_param_named(enabled, apparmor_enabled, aabool, S_IRUSR);
752 752
753static int __init apparmor_enabled_setup(char *str) 753static int __init apparmor_enabled_setup(char *str)