Signed-off-by: Andrew Cooper
---
CC: Daniel De Graaf
---
xen/xsm/flask/flask_op.c| 4 ++--
xen/xsm/flask/include/avc.h | 2 +-
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/xen/xsm/flask/flask_op.c b/xen/xsm/flask/flask_op.c
index 719c2d7..15aa96b 100644
--- a/xen/xsm/flask/flask_op.c
+++ b/xen/xsm/flask/flask_op.c
@@ -29,7 +29,7 @@ enum flask_bootparam_t __read_mostly flask_bootparam =
FLASK_BOOTPARAM_ENFORCING
static void parse_flask_param(char *s);
custom_param("flask", parse_flask_param);
-bool_t __read_mostly flask_enforcing = 1;
+bool __read_mostly flask_enforcing = true;
#define MAX_POLICY_SIZE 0x400
@@ -453,7 +453,7 @@ static int flask_security_load(struct xen_flask_load *load)
{
int ret;
void *buf = NULL;
-bool_t is_reload = ss_initialized;
+bool is_reload = ss_initialized;
ret = domain_has_security(current->domain, SECURITY__LOAD_POLICY);
if ( ret )
diff --git a/xen/xsm/flask/include/avc.h b/xen/xsm/flask/include/avc.h
index c153c8e..bfc69f4 100644
--- a/xen/xsm/flask/include/avc.h
+++ b/xen/xsm/flask/include/avc.h
@@ -17,7 +17,7 @@
#include "av_permissions.h"
#include "security.h"
-extern bool_t flask_enforcing;
+extern bool flask_enforcing;
/*
* An entry in the AVC.
--
2.1.4
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel