オープンソース・ソフトウェアの開発とダウンロード

Subversion リポジトリの参照

Diff of /trunk/1.5.x/ccs-patch/include/linux/tomoyo.h

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 512 by kumaneko, Thu Sep 27 08:52:16 2007 UTC revision 581 by kumaneko, Tue Oct 16 08:00:21 2007 UTC
# Line 5  Line 5 
5   *   *
6   * Copyright (C) 2005-2007  NTT DATA CORPORATION   * Copyright (C) 2005-2007  NTT DATA CORPORATION
7   *   *
8   * Version: 1.5.0   2007/09/20   * Version: 1.5.1-pre   2007/10/16
9   *   *
10   * This file is applicable to both 2.4.30 and 2.6.11 and later.   * This file is applicable to both 2.4.30 and 2.6.11 and later.
11   * See README.ccs for ChangeLog.   * See README.ccs for ChangeLog.
# Line 56  int CheckReWritePermission(struct file * Line 56  int CheckReWritePermission(struct file *
56  /* Check whether the basename of program and argv0 is allowed to differ. */  /* Check whether the basename of program and argv0 is allowed to differ. */
57  int CheckArgv0Perm(const struct path_info *filename, const char *argv0);  int CheckArgv0Perm(const struct path_info *filename, const char *argv0);
58    
59    /* Check whether the given environment is allowed to be received. */
60    int CheckEnvPerm(const char *env);
61    
62  /* Check whether the given IP address and port number are allowed to use. */  /* Check whether the given IP address and port number are allowed to use. */
63  int CheckNetworkListenACL(const u8 is_ipv6, const u8 *address, const u16 port);  int CheckNetworkListenACL(const u8 is_ipv6, const u8 *address, const u16 port);
64  int CheckNetworkConnectACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port);  int CheckNetworkConnectACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port);
# Line 79  static inline int CheckSingleWritePermis Line 82  static inline int CheckSingleWritePermis
82  static inline int CheckDoubleWritePermission(const unsigned int operation, struct dentry *dentry1, struct vfsmount *mnt1, struct dentry *dentry2, struct vfsmount *mnt2) { return 0; }  static inline int CheckDoubleWritePermission(const unsigned int operation, struct dentry *dentry1, struct vfsmount *mnt1, struct dentry *dentry2, struct vfsmount *mnt2) { return 0; }
83  static inline int CheckReWritePermission(struct file *filp) { return 0; }  static inline int CheckReWritePermission(struct file *filp) { return 0; }
84  static inline int CheckArgv0Perm(const struct path_info *filename, const char *argv0) { return 0; }  static inline int CheckArgv0Perm(const struct path_info *filename, const char *argv0) { return 0; }
85    static inline int CheckEnvPerm(const char *env) { return 0; }
86  static inline int CheckNetworkListenACL(const u8 is_ipv6, const u8 *address, const u16 port) { return 0; }  static inline int CheckNetworkListenACL(const u8 is_ipv6, const u8 *address, const u16 port) { return 0; }
87  static inline int CheckNetworkConnectACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port) { return 0; }  static inline int CheckNetworkConnectACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port) { return 0; }
88  static inline int CheckNetworkBindACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port) { return 0; }  static inline int CheckNetworkBindACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port) { return 0; }
# Line 118  int search_binary_handler_with_transitio Line 122  int search_binary_handler_with_transitio
122    
123  #define TYPE_FILE_ACL         100  #define TYPE_FILE_ACL         100
124  #define TYPE_ARGV0_ACL        101  #define TYPE_ARGV0_ACL        101
125  #define TYPE_CAPABILITY_ACL   102  #define TYPE_ENV_ACL          102
126  #define TYPE_IP_NETWORK_ACL   103  #define TYPE_CAPABILITY_ACL   103
127  #define TYPE_SIGNAL_ACL       104  #define TYPE_IP_NETWORK_ACL   104
128    #define TYPE_SIGNAL_ACL       105
129    
130  /*************************  Index numbers for Capability Controls.  *************************/  /*************************  Index numbers for Capability Controls.  *************************/
131    

Legend:
Removed from v.512  
changed lines
  Added in v.581

Back to OSDN">Back to OSDN
ViewVC Help
Powered by ViewVC 1.1.26