|
enum | tomoyo_conditions_index {
TOMOYO_TASK_UID,
TOMOYO_TASK_EUID,
TOMOYO_TASK_SUID,
TOMOYO_TASK_FSUID,
TOMOYO_TASK_GID,
TOMOYO_TASK_EGID,
TOMOYO_TASK_SGID,
TOMOYO_TASK_FSGID,
TOMOYO_TASK_PID,
TOMOYO_TASK_PPID,
TOMOYO_EXEC_ARGC,
TOMOYO_EXEC_ENVC,
TOMOYO_TYPE_IS_SOCKET,
TOMOYO_TYPE_IS_SYMLINK,
TOMOYO_TYPE_IS_FILE,
TOMOYO_TYPE_IS_BLOCK_DEV,
TOMOYO_TYPE_IS_DIRECTORY,
TOMOYO_TYPE_IS_CHAR_DEV,
TOMOYO_TYPE_IS_FIFO,
TOMOYO_MODE_SETUID,
TOMOYO_MODE_SETGID,
TOMOYO_MODE_STICKY,
TOMOYO_MODE_OWNER_READ,
TOMOYO_MODE_OWNER_WRITE,
TOMOYO_MODE_OWNER_EXECUTE,
TOMOYO_MODE_GROUP_READ,
TOMOYO_MODE_GROUP_WRITE,
TOMOYO_MODE_GROUP_EXECUTE,
TOMOYO_MODE_OTHERS_READ,
TOMOYO_MODE_OTHERS_WRITE,
TOMOYO_MODE_OTHERS_EXECUTE,
TOMOYO_EXEC_REALPATH,
TOMOYO_SYMLINK_TARGET,
TOMOYO_PATH1_UID,
TOMOYO_PATH1_GID,
TOMOYO_PATH1_INO,
TOMOYO_PATH1_MAJOR,
TOMOYO_PATH1_MINOR,
TOMOYO_PATH1_PERM,
TOMOYO_PATH1_TYPE,
TOMOYO_PATH1_DEV_MAJOR,
TOMOYO_PATH1_DEV_MINOR,
TOMOYO_PATH2_UID,
TOMOYO_PATH2_GID,
TOMOYO_PATH2_INO,
TOMOYO_PATH2_MAJOR,
TOMOYO_PATH2_MINOR,
TOMOYO_PATH2_PERM,
TOMOYO_PATH2_TYPE,
TOMOYO_PATH2_DEV_MAJOR,
TOMOYO_PATH2_DEV_MINOR,
TOMOYO_PATH1_PARENT_UID,
TOMOYO_PATH1_PARENT_GID,
TOMOYO_PATH1_PARENT_INO,
TOMOYO_PATH1_PARENT_PERM,
TOMOYO_PATH2_PARENT_UID,
TOMOYO_PATH2_PARENT_GID,
TOMOYO_PATH2_PARENT_INO,
TOMOYO_PATH2_PARENT_PERM,
TOMOYO_MAX_CONDITION_KEYWORD,
TOMOYO_NUMBER_UNION,
TOMOYO_NAME_UNION,
TOMOYO_ARGV_ENTRY,
TOMOYO_ENVP_ENTRY
} |
|
enum | tomoyo_path_stat_index {
TOMOYO_PATH1,
TOMOYO_PATH1_PARENT,
TOMOYO_PATH2,
TOMOYO_PATH2_PARENT,
TOMOYO_MAX_PATH_STAT
} |
|
enum | tomoyo_mode_index {
TOMOYO_CONFIG_DISABLED,
TOMOYO_CONFIG_LEARNING,
TOMOYO_CONFIG_PERMISSIVE,
TOMOYO_CONFIG_ENFORCING,
TOMOYO_CONFIG_MAX_MODE,
TOMOYO_CONFIG_WANT_REJECT_LOG = 64,
TOMOYO_CONFIG_WANT_GRANT_LOG = 128,
TOMOYO_CONFIG_USE_DEFAULT = 255
} |
|
enum | tomoyo_policy_id {
TOMOYO_ID_GROUP,
TOMOYO_ID_ADDRESS_GROUP,
TOMOYO_ID_PATH_GROUP,
TOMOYO_ID_NUMBER_GROUP,
TOMOYO_ID_TRANSITION_CONTROL,
TOMOYO_ID_AGGREGATOR,
TOMOYO_ID_MANAGER,
TOMOYO_ID_CONDITION,
TOMOYO_ID_NAME,
TOMOYO_ID_ACL,
TOMOYO_ID_DOMAIN,
TOMOYO_MAX_POLICY
} |
|
enum | tomoyo_domain_info_flags_index { TOMOYO_DIF_QUOTA_WARNED,
TOMOYO_DIF_TRANSITION_FAILED,
TOMOYO_MAX_DOMAIN_INFO_FLAGS
} |
|
enum | tomoyo_grant_log { TOMOYO_GRANTLOG_AUTO,
TOMOYO_GRANTLOG_NO,
TOMOYO_GRANTLOG_YES
} |
|
enum | tomoyo_group_id { TOMOYO_PATH_GROUP,
TOMOYO_NUMBER_GROUP,
TOMOYO_ADDRESS_GROUP,
TOMOYO_MAX_GROUP
} |
|
enum | tomoyo_value_type { TOMOYO_VALUE_TYPE_INVALID,
TOMOYO_VALUE_TYPE_DECIMAL,
TOMOYO_VALUE_TYPE_OCTAL,
TOMOYO_VALUE_TYPE_HEXADECIMAL
} |
|
enum | tomoyo_transition_type {
TOMOYO_TRANSITION_CONTROL_NO_RESET,
TOMOYO_TRANSITION_CONTROL_RESET,
TOMOYO_TRANSITION_CONTROL_NO_INITIALIZE,
TOMOYO_TRANSITION_CONTROL_INITIALIZE,
TOMOYO_TRANSITION_CONTROL_NO_KEEP,
TOMOYO_TRANSITION_CONTROL_KEEP,
TOMOYO_MAX_TRANSITION_TYPE
} |
|
enum | tomoyo_acl_entry_type_index {
TOMOYO_TYPE_PATH_ACL,
TOMOYO_TYPE_PATH2_ACL,
TOMOYO_TYPE_PATH_NUMBER_ACL,
TOMOYO_TYPE_MKDEV_ACL,
TOMOYO_TYPE_MOUNT_ACL,
TOMOYO_TYPE_INET_ACL,
TOMOYO_TYPE_UNIX_ACL,
TOMOYO_TYPE_ENV_ACL,
TOMOYO_TYPE_MANUAL_TASK_ACL
} |
|
enum | tomoyo_path_acl_index {
TOMOYO_TYPE_EXECUTE,
TOMOYO_TYPE_READ,
TOMOYO_TYPE_WRITE,
TOMOYO_TYPE_APPEND,
TOMOYO_TYPE_UNLINK,
TOMOYO_TYPE_GETATTR,
TOMOYO_TYPE_RMDIR,
TOMOYO_TYPE_TRUNCATE,
TOMOYO_TYPE_SYMLINK,
TOMOYO_TYPE_CHROOT,
TOMOYO_TYPE_UMOUNT,
TOMOYO_MAX_PATH_OPERATION
} |
|
enum | tomoyo_memory_stat_type { TOMOYO_MEMORY_POLICY,
TOMOYO_MEMORY_AUDIT,
TOMOYO_MEMORY_QUERY,
TOMOYO_MAX_MEMORY_STAT
} |
|
enum | tomoyo_mkdev_acl_index { TOMOYO_TYPE_MKBLOCK,
TOMOYO_TYPE_MKCHAR,
TOMOYO_MAX_MKDEV_OPERATION
} |
|
enum | tomoyo_network_acl_index {
TOMOYO_NETWORK_BIND,
TOMOYO_NETWORK_LISTEN,
TOMOYO_NETWORK_CONNECT,
TOMOYO_NETWORK_SEND,
TOMOYO_MAX_NETWORK_OPERATION
} |
|
enum | tomoyo_path2_acl_index { TOMOYO_TYPE_LINK,
TOMOYO_TYPE_RENAME,
TOMOYO_TYPE_PIVOT_ROOT,
TOMOYO_MAX_PATH2_OPERATION
} |
|
enum | tomoyo_path_number_acl_index {
TOMOYO_TYPE_CREATE,
TOMOYO_TYPE_MKDIR,
TOMOYO_TYPE_MKFIFO,
TOMOYO_TYPE_MKSOCK,
TOMOYO_TYPE_IOCTL,
TOMOYO_TYPE_CHMOD,
TOMOYO_TYPE_CHOWN,
TOMOYO_TYPE_CHGRP,
TOMOYO_MAX_PATH_NUMBER_OPERATION
} |
|
enum | tomoyo_securityfs_interface_index {
TOMOYO_DOMAINPOLICY,
TOMOYO_EXCEPTIONPOLICY,
TOMOYO_PROCESS_STATUS,
TOMOYO_STAT,
TOMOYO_AUDIT,
TOMOYO_VERSION,
TOMOYO_PROFILE,
TOMOYO_QUERY,
TOMOYO_MANAGER
} |
|
enum | tomoyo_special_mount {
TOMOYO_MOUNT_BIND,
TOMOYO_MOUNT_MOVE,
TOMOYO_MOUNT_REMOUNT,
TOMOYO_MOUNT_MAKE_UNBINDABLE,
TOMOYO_MOUNT_MAKE_PRIVATE,
TOMOYO_MOUNT_MAKE_SLAVE,
TOMOYO_MOUNT_MAKE_SHARED,
TOMOYO_MAX_SPECIAL_MOUNT
} |
|
enum | tomoyo_mac_index {
TOMOYO_MAC_FILE_EXECUTE,
TOMOYO_MAC_FILE_OPEN,
TOMOYO_MAC_FILE_CREATE,
TOMOYO_MAC_FILE_UNLINK,
TOMOYO_MAC_FILE_GETATTR,
TOMOYO_MAC_FILE_MKDIR,
TOMOYO_MAC_FILE_RMDIR,
TOMOYO_MAC_FILE_MKFIFO,
TOMOYO_MAC_FILE_MKSOCK,
TOMOYO_MAC_FILE_TRUNCATE,
TOMOYO_MAC_FILE_SYMLINK,
TOMOYO_MAC_FILE_MKBLOCK,
TOMOYO_MAC_FILE_MKCHAR,
TOMOYO_MAC_FILE_LINK,
TOMOYO_MAC_FILE_RENAME,
TOMOYO_MAC_FILE_CHMOD,
TOMOYO_MAC_FILE_CHOWN,
TOMOYO_MAC_FILE_CHGRP,
TOMOYO_MAC_FILE_IOCTL,
TOMOYO_MAC_FILE_CHROOT,
TOMOYO_MAC_FILE_MOUNT,
TOMOYO_MAC_FILE_UMOUNT,
TOMOYO_MAC_FILE_PIVOT_ROOT,
TOMOYO_MAC_NETWORK_INET_STREAM_BIND,
TOMOYO_MAC_NETWORK_INET_STREAM_LISTEN,
TOMOYO_MAC_NETWORK_INET_STREAM_CONNECT,
TOMOYO_MAC_NETWORK_INET_DGRAM_BIND,
TOMOYO_MAC_NETWORK_INET_DGRAM_SEND,
TOMOYO_MAC_NETWORK_INET_RAW_BIND,
TOMOYO_MAC_NETWORK_INET_RAW_SEND,
TOMOYO_MAC_NETWORK_UNIX_STREAM_BIND,
TOMOYO_MAC_NETWORK_UNIX_STREAM_LISTEN,
TOMOYO_MAC_NETWORK_UNIX_STREAM_CONNECT,
TOMOYO_MAC_NETWORK_UNIX_DGRAM_BIND,
TOMOYO_MAC_NETWORK_UNIX_DGRAM_SEND,
TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_BIND,
TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_LISTEN,
TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_CONNECT,
TOMOYO_MAC_ENVIRON,
TOMOYO_MAX_MAC_INDEX
} |
|
enum | tomoyo_mac_category_index { TOMOYO_MAC_CATEGORY_FILE,
TOMOYO_MAC_CATEGORY_NETWORK,
TOMOYO_MAC_CATEGORY_MISC,
TOMOYO_MAX_MAC_CATEGORY_INDEX
} |
|
enum | tomoyo_policy_stat_type {
TOMOYO_STAT_POLICY_UPDATES,
TOMOYO_STAT_POLICY_LEARNING,
TOMOYO_STAT_POLICY_PERMISSIVE,
TOMOYO_STAT_POLICY_ENFORCING,
TOMOYO_MAX_POLICY_STAT
} |
|
enum | tomoyo_pref_index { TOMOYO_PREF_MAX_AUDIT_LOG,
TOMOYO_PREF_MAX_LEARNING_ENTRY,
TOMOYO_MAX_PREF
} |
|
|
bool | tomoyo_address_matches_group (const bool is_ipv6, const __be32 *address, const struct tomoyo_group *group) |
|
bool | tomoyo_compare_number_union (const unsigned long value, const struct tomoyo_number_union *ptr) |
|
bool | tomoyo_condition (struct tomoyo_request_info *r, const struct tomoyo_condition *cond) |
|
bool | tomoyo_correct_domain (const unsigned char *domainname) |
|
bool | tomoyo_correct_path (const char *filename) |
|
bool | tomoyo_correct_word (const char *string) |
|
bool | tomoyo_domain_def (const unsigned char *buffer) |
|
bool | tomoyo_domain_quota_is_ok (struct tomoyo_request_info *r) |
|
bool | tomoyo_dump_page (struct linux_binprm *bprm, unsigned long pos, struct tomoyo_page_dump *dump) |
|
bool | tomoyo_memory_ok (void *ptr) |
|
bool | tomoyo_number_matches_group (const unsigned long min, const unsigned long max, const struct tomoyo_group *group) |
|
bool | tomoyo_parse_ipaddr_union (struct tomoyo_acl_param *param, struct tomoyo_ipaddr_union *ptr) |
|
bool | tomoyo_parse_name_union (struct tomoyo_acl_param *param, struct tomoyo_name_union *ptr) |
|
bool | tomoyo_parse_number_union (struct tomoyo_acl_param *param, struct tomoyo_number_union *ptr) |
|
bool | tomoyo_path_matches_pattern (const struct tomoyo_path_info *filename, const struct tomoyo_path_info *pattern) |
|
bool | tomoyo_permstr (const char *string, const char *keyword) |
|
bool | tomoyo_str_starts (char **src, const char *find) |
|
char * | tomoyo_encode (const char *str) |
|
char * | tomoyo_encode2 (const char *str, int str_len) |
|
char * | tomoyo_init_log (struct tomoyo_request_info *r, int len, const char *fmt, va_list args) |
|
char * | tomoyo_read_token (struct tomoyo_acl_param *param) |
|
char * | tomoyo_realpath_from_path (struct path *path) |
|
char * | tomoyo_realpath_nofollow (const char *pathname) |
|
const char * | tomoyo_get_exe (void) |
|
const char * | tomoyo_yesno (const unsigned int value) |
|
struct tomoyo_path_info * | tomoyo_compare_name_union (const struct tomoyo_path_info *name, const struct tomoyo_name_union *ptr) |
|
struct tomoyo_path_info * | tomoyo_get_domainname (struct tomoyo_acl_param *param) |
|
struct tomoyo_path_info * | tomoyo_get_name (const char *name) |
|
struct tomoyo_path_info * | tomoyo_path_matches_group (const struct tomoyo_path_info *pathname, const struct tomoyo_group *group) |
|
int | tomoyo_check_open_permission (struct tomoyo_domain_info *domain, struct path *path, const int flag) |
|
int | tomoyo_close_control (struct tomoyo_io_buffer *head) |
|
int | tomoyo_env_perm (struct tomoyo_request_info *r, const char *env) |
|
int | tomoyo_execute_permission (struct tomoyo_request_info *r, const struct tomoyo_path_info *filename) |
|
int | tomoyo_find_next_domain (struct linux_binprm *bprm) |
|
int | tomoyo_get_mode (const struct tomoyo_policy_namespace *ns, const u8 profile, const u8 index) |
|
int | tomoyo_init_request_info (struct tomoyo_request_info *r, struct tomoyo_domain_info *domain, const u8 index) |
|
int | tomoyo_mkdev_perm (const u8 operation, struct path *path, const unsigned int mode, unsigned int dev) |
|
int | tomoyo_mount_permission (const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data_page) |
|
int | tomoyo_open_control (const u8 type, struct file *file) |
|
int | tomoyo_path2_perm (const u8 operation, struct path *path1, struct path *path2) |
|
int | tomoyo_path_number_perm (const u8 operation, struct path *path, unsigned long number) |
|
int | tomoyo_path_perm (const u8 operation, struct path *path, const char *target) |
|
unsigned int | tomoyo_poll_control (struct file *file, poll_table *wait) |
|
unsigned int | tomoyo_poll_log (struct file *file, poll_table *wait) |
|
int | tomoyo_socket_bind_permission (struct socket *sock, struct sockaddr *addr, int addr_len) |
|
int | tomoyo_socket_connect_permission (struct socket *sock, struct sockaddr *addr, int addr_len) |
|
int | tomoyo_socket_listen_permission (struct socket *sock) |
|
int | tomoyo_socket_sendmsg_permission (struct socket *sock, struct msghdr *msg, int size) |
|
int | tomoyo_supervisor (struct tomoyo_request_info *r, const char *fmt,...) __printf(2 |
|
int int | tomoyo_update_domain (struct tomoyo_acl_info *new_entry, const int size, struct tomoyo_acl_param *param, bool(*check_duplicate)(const struct tomoyo_acl_info *, const struct tomoyo_acl_info *), bool(*merge_duplicate)(struct tomoyo_acl_info *, struct tomoyo_acl_info *, const bool)) |
|
int | tomoyo_update_policy (struct tomoyo_acl_head *new_entry, const int size, struct tomoyo_acl_param *param, bool(*check_duplicate)(const struct tomoyo_acl_head *, const struct tomoyo_acl_head *)) |
|
int | tomoyo_write_aggregator (struct tomoyo_acl_param *param) |
|
int | tomoyo_write_file (struct tomoyo_acl_param *param) |
|
int | tomoyo_write_group (struct tomoyo_acl_param *param, const u8 type) |
|
int | tomoyo_write_misc (struct tomoyo_acl_param *param) |
|
int | tomoyo_write_inet_network (struct tomoyo_acl_param *param) |
|
int | tomoyo_write_transition_control (struct tomoyo_acl_param *param, const u8 type) |
|
int | tomoyo_write_unix_network (struct tomoyo_acl_param *param) |
|
ssize_t | tomoyo_read_control (struct tomoyo_io_buffer *head, char __user *buffer, const int buffer_len) |
|
ssize_t | tomoyo_write_control (struct tomoyo_io_buffer *head, const char __user *buffer, const int buffer_len) |
|
struct tomoyo_condition * | tomoyo_get_condition (struct tomoyo_acl_param *param) |
|
struct tomoyo_domain_info * | tomoyo_assign_domain (const char *domainname, const bool transit) |
|
struct tomoyo_domain_info * | tomoyo_find_domain (const char *domainname) |
|
struct tomoyo_group * | tomoyo_get_group (struct tomoyo_acl_param *param, const u8 idx) |
|
struct tomoyo_policy_namespace * | tomoyo_assign_namespace (const char *domainname) |
|
struct tomoyo_profile * | tomoyo_profile (const struct tomoyo_policy_namespace *ns, const u8 profile) |
|
unsigned int | tomoyo_check_flags (const struct tomoyo_domain_info *domain, const u8 index) |
|
u8 | tomoyo_parse_ulong (unsigned long *result, char **str) |
|
void * | tomoyo_commit_ok (void *data, const unsigned int size) |
|
void __init | tomoyo_load_builtin_policy (void) |
|
void __init | tomoyo_mm_init (void) |
|
void | tomoyo_check_acl (struct tomoyo_request_info *r, bool(*check_entry)(struct tomoyo_request_info *, const struct tomoyo_acl_info *)) |
|
void | tomoyo_check_profile (void) |
|
void | tomoyo_convert_time (time_t time, struct tomoyo_time *stamp) |
|
void | tomoyo_del_condition (struct list_head *element) |
|
void | tomoyo_fill_path_info (struct tomoyo_path_info *ptr) |
|
void | tomoyo_get_attributes (struct tomoyo_obj_info *obj) |
|
void | tomoyo_init_policy_namespace (struct tomoyo_policy_namespace *ns) |
|
void | tomoyo_load_policy (const char *filename) |
|
void | tomoyo_normalize_line (unsigned char *buffer) |
|
void | tomoyo_notify_gc (struct tomoyo_io_buffer *head, const bool is_register) |
|
void | tomoyo_print_ip (char *buf, const unsigned int size, const struct tomoyo_ipaddr_union *ptr) |
|
void | tomoyo_print_ulong (char *buffer, const int buffer_len, const unsigned long value, const u8 type) |
|
void | tomoyo_put_name_union (struct tomoyo_name_union *ptr) |
|
void | tomoyo_put_number_union (struct tomoyo_number_union *ptr) |
|
void | tomoyo_read_log (struct tomoyo_io_buffer *head) |
|
void | tomoyo_update_stat (const u8 index) |
|
void | tomoyo_warn_oom (const char *function) |
|
void | tomoyo_write_log (struct tomoyo_request_info *r, const char *fmt,...) __printf(2 |
|
void void | tomoyo_write_log2 (struct tomoyo_request_info *r, int len, const char *fmt, va_list args) |
|
tomoyo_address_matches_group - Check whether the given address matches members of the given address group.
: True if is an IPv6 address. : An IPv4 or IPv6 address. : Pointer to "struct tomoyo_address_group".
Returns true if matches addresses in group, false otherwise.
Caller holds tomoyo_read_lock().
Definition at line 179 of file group.c.
tomoyo_commit_ok - Check memory quota.
: Data to copy from. : Size in byte.
Returns pointer to allocated memory on success, NULL otherwise. is zero-cleared on success.
Caller holds tomoyo_policy_lock mutex.
Definition at line 72 of file memory.c.
tomoyo_domain_quota_is_ok - Check for domain's quota.
: Pointer to "struct tomoyo_request_info".
Returns true if the domain is not exceeded quota, false otherwise.
Caller holds tomoyo_read_lock().
Definition at line 1023 of file util.c.
tomoyo_encode - Encode binary string to ascii string.
: String in binary format.
Returns pointer to in ascii format on success, NULL otherwise.
This function uses kzalloc(), so caller must kfree() if this function didn't return NULL.
Definition at line 76 of file realpath.c.
tomoyo_encode2 - Encode binary string to ascii string.
: String in binary format. : Size of in byte.
Returns pointer to in ascii format on success, NULL otherwise.
This function uses kzalloc(), so caller must kfree() if this function didn't return NULL.
Definition at line 21 of file realpath.c.
tomoyo_env_perm - Check permission for environment variable's name.
: Pointer to "struct tomoyo_request_info". : The name of environment variable.
Returns 0 on success, negative value otherwise.
Caller holds tomoyo_read_lock().
Definition at line 49 of file environ.c.
tomoyo_find_next_domain - Find a domain.
: Pointer to "struct linux_binprm".
Returns 0 on success, negative value otherwise.
Caller holds tomoyo_read_lock().
Definition at line 676 of file domain.c.
tomoyo_get_exe - Get tomoyo_realpath() of current process.
Returns the tomoyo_realpath() of current process on success, NULL otherwise.
This function uses kzalloc(), so the caller must call kfree() if this function didn't return NULL.
Definition at line 949 of file util.c.
tomoyo_load_policy - Run external policy loader to load policy.
: The program about to start.
This function checks whether is /sbin/init , and if so invoke /sbin/tomoyo-init and wait for the termination of /sbin/tomoyo-init and then continues invocation of /sbin/init. /sbin/tomoyo-init reads policy files in /etc/tomoyo/ directory and writes to /sys/kernel/security/tomoyo/ interfaces.
Returns nothing.
Definition at line 83 of file load_policy.c.
tomoyo_memory_ok - Check memory quota.
: Pointer to allocated memory.
Returns true on success, false otherwise.
Returns true if is not NULL and quota not exceeded, false otherwise.
Caller holds tomoyo_policy_lock mutex.
Definition at line 46 of file memory.c.
tomoyo_number_matches_group - Check whether the given number matches members of the given number group.
: Min number. : Max number. : Pointer to "struct tomoyo_number_group".
Returns true if and partially overlaps , false otherwise.
Caller holds tomoyo_read_lock().
Definition at line 150 of file group.c.
tomoyo_path_number_perm - Check permission for "create", "mkdir", "mkfifo", "mksock", "ioctl", "chmod", "chown", "chgrp".
: Type of operation. : Pointer to "struct path". : Number.
Returns 0 on success, negative value otherwise.
Definition at line 690 of file file.c.
tomoyo_path_perm - Check permission for "unlink", "rmdir", "truncate", "symlink", "append", "chroot" and "unmount".
: Type of operation. : Pointer to "struct path". : Symlink's target if is TOMOYO_TYPE_SYMLINK, NULL otherwise.
Returns 0 on success, negative value otherwise.
Definition at line 785 of file file.c.
tomoyo_permstr - Find permission keywords.
: String representation for permissions in foo/bar/buz format. : Keyword to find from /
Returns ture if was found in , false otherwise.
This function assumes that strncmp(w1, w2, strlen(w1)) != 0 if w1 != w2.
Definition at line 131 of file util.c.
tomoyo_realpath_from_path - Returns realpath(3) of the given pathname but ignores chroot'ed root.
: Pointer to "struct path".
Returns the realpath of the given on success, NULL otherwise.
If dentry is a directory, trailing '/' is appended. Characters out of 0x20 < c < 0x7F range are converted to style octal string. Character \ is converted to \ string.
These functions use kzalloc(), so the caller must call kfree() if these functions didn't return NULL.
Definition at line 250 of file realpath.c.
tomoyo_str_starts - Check whether the given string starts with the given keyword.
: Pointer to pointer to the string. : Pointer to the keyword.
Returns true if starts with , false otherwise.
The is updated to point the first character after the if starts with .
Definition at line 392 of file util.c.