Linux Kernel
3.7.1
|
#include <linux/uaccess.h>
#include <linux/slab.h>
#include <linux/security.h>
#include "common.h"
#include "builtin-policy.h"
Go to the source code of this file.
Data Structures | |
struct | tomoyo_query |
Functions | |
const char * | tomoyo_yesno (const unsigned int value) |
LIST_HEAD (tomoyo_namespace_list) | |
void | tomoyo_init_policy_namespace (struct tomoyo_policy_namespace *ns) |
struct tomoyo_profile * | tomoyo_profile (const struct tomoyo_policy_namespace *ns, const u8 profile) |
. | |
: Pointer to "struct tomoyo_profile". Returns 0 on success, negative value otherwise. | |
const char *const | tomoyo_dif [TOMOYO_MAX_DOMAIN_INFO_FLAGS] |
int | tomoyo_supervisor (struct tomoyo_request_info *r, const char *fmt,...) |
void | tomoyo_update_stat (const u8 index) |
int | tomoyo_open_control (const u8 type, struct file *file) |
unsigned int | tomoyo_poll_control (struct file *file, poll_table *wait) |
ssize_t | tomoyo_read_control (struct tomoyo_io_buffer *head, char __user *buffer, const int buffer_len) |
ssize_t | tomoyo_write_control (struct tomoyo_io_buffer *head, const char __user *buffer, const int buffer_len) |
int | tomoyo_close_control (struct tomoyo_io_buffer *head) |
void | tomoyo_check_profile (void) |
void __init | tomoyo_load_builtin_policy (void) |
LIST_HEAD | ( | tomoyo_namespace_list | ) |
int tomoyo_close_control | ( | struct tomoyo_io_buffer * | head | ) |
void tomoyo_init_policy_namespace | ( | struct tomoyo_policy_namespace * | ns | ) |
unsigned int tomoyo_poll_control | ( | struct file * | file, |
poll_table * | wait | ||
) |
|
read |
tomoyo_profile - Find a profile.
: Pointer to "struct tomoyo_policy_namespace". : Profile number to find.
Returns pointer to "struct tomoyo_profile".
int tomoyo_supervisor | ( | struct tomoyo_request_info * | r, |
const char * | fmt, | ||
... | |||
) |
tomoyo_supervisor - Ask for the supervisor's decision.
: Pointer to "struct tomoyo_request_info". : The printf()'s format string, followed by parameters.
Returns 0 if the supervisor decided to permit the access request which violated the policy in enforcing mode, TOMOYO_RETRY_REQUEST if the supervisor decided to retry the access request which violated the policy in enforcing mode, 0 if it is not in enforcing mode, -EPERM otherwise.
const char* const tomoyo_condition_keyword[TOMOYO_MAX_CONDITION_KEYWORD] |
const char* const tomoyo_dif[TOMOYO_MAX_DOMAIN_INFO_FLAGS] |
const char* const tomoyo_mac_keywords[TOMOYO_MAX_MAC_INDEX+TOMOYO_MAX_MAC_CATEGORY_INDEX] |
const char* const tomoyo_mode[TOMOYO_CONFIG_MAX_MODE] |
const char* const tomoyo_path_keyword[TOMOYO_MAX_PATH_OPERATION] |
const char* const tomoyo_socket_keyword[TOMOYO_MAX_NETWORK_OPERATION] |