66 |
atomic_inc(&acl->cond->users); |
atomic_inc(&acl->cond->users); |
67 |
list_add_tail_rcu(&acl->list, &domain->acl_info_list); |
list_add_tail_rcu(&acl->list, &domain->acl_info_list); |
68 |
} else { |
} else { |
69 |
acl->type &= ~ACL_DELETED; |
acl->type &= ~CCS_ACL_DELETED; |
70 |
} |
} |
71 |
return 0; |
return 0; |
72 |
} |
} |
81 |
int ccs_del_domain_acl(struct ccs_acl_info *acl) |
int ccs_del_domain_acl(struct ccs_acl_info *acl) |
82 |
{ |
{ |
83 |
if (acl) |
if (acl) |
84 |
acl->type |= ACL_DELETED; |
acl->type |= CCS_ACL_DELETED; |
85 |
return 0; |
return 0; |
86 |
} |
} |
87 |
|
|
100 |
const char *handler = ee->handler->name; |
const char *handler = ee->handler->name; |
101 |
r->mode = ccs_check_flags(r->domain, CCS_MAC_FOR_FILE); |
r->mode = ccs_check_flags(r->domain, CCS_MAC_FOR_FILE); |
102 |
return ccs_write_audit_log(true, r, "%s %s\n", |
return ccs_write_audit_log(true, r, "%s %s\n", |
103 |
is_default ? KEYWORD_EXECUTE_HANDLER : |
is_default ? CCS_KEYWORD_EXECUTE_HANDLER : |
104 |
KEYWORD_DENIED_EXECUTE_HANDLER, handler); |
CCS_KEYWORD_DENIED_EXECUTE_HANDLER, handler); |
105 |
} |
} |
106 |
|
|
107 |
/** |
/** |
221 |
domain = ptr->domainname->name; |
domain = ptr->domainname->name; |
222 |
} |
} |
223 |
done = ccs_io_printf(head, |
done = ccs_io_printf(head, |
224 |
"%s" KEYWORD_INITIALIZE_DOMAIN "%s%s%s\n", |
"%s" CCS_KEYWORD_INITIALIZE_DOMAIN "%s%s%s\n", |
225 |
no, ptr->program->name, from, domain); |
no, ptr->program->name, from, domain); |
226 |
if (!done) |
if (!done) |
227 |
break; |
break; |
412 |
from = " from "; |
from = " from "; |
413 |
program = ptr->program->name; |
program = ptr->program->name; |
414 |
} |
} |
415 |
done = ccs_io_printf(head, |
done = ccs_io_printf(head, "%s" CCS_KEYWORD_KEEP_DOMAIN |
416 |
"%s" KEYWORD_KEEP_DOMAIN "%s%s%s\n", no, |
"%s%s%s\n", no, program, from, |
417 |
program, from, ptr->domainname->name); |
ptr->domainname->name); |
418 |
if (!done) |
if (!done) |
419 |
break; |
break; |
420 |
} |
} |
538 |
ptr = list_entry(pos, struct ccs_aggregator_entry, list); |
ptr = list_entry(pos, struct ccs_aggregator_entry, list); |
539 |
if (ptr->is_deleted) |
if (ptr->is_deleted) |
540 |
continue; |
continue; |
541 |
done = ccs_io_printf(head, KEYWORD_AGGREGATOR "%s %s\n", |
done = ccs_io_printf(head, CCS_KEYWORD_AGGREGATOR "%s %s\n", |
542 |
ptr->original_name->name, |
ptr->original_name->name, |
543 |
ptr->aggregated_name->name); |
ptr->aggregated_name->name); |
544 |
if (!done) |
if (!done) |
1445 |
ee->obj.path1_vfsmnt = bprm->file->f_vfsmnt; |
ee->obj.path1_vfsmnt = bprm->file->f_vfsmnt; |
1446 |
/* Clear manager flag. */ |
/* Clear manager flag. */ |
1447 |
task->ccs_flags &= ~CCS_TASK_IS_POLICY_MANAGER; |
task->ccs_flags &= ~CCS_TASK_IS_POLICY_MANAGER; |
1448 |
if (ccs_find_execute_handler(ee, TYPE_EXECUTE_HANDLER)) { |
if (ccs_find_execute_handler(ee, CCS_TYPE_EXECUTE_HANDLER)) { |
1449 |
retval = ccs_try_alt_exec(ee); |
retval = ccs_try_alt_exec(ee); |
1450 |
if (!retval) |
if (!retval) |
1451 |
ccs_audit_execute_handler_log(ee, true); |
ccs_audit_execute_handler_log(ee, true); |
1454 |
retval = ccs_find_next_domain(ee); |
retval = ccs_find_next_domain(ee); |
1455 |
if (retval != -EPERM) |
if (retval != -EPERM) |
1456 |
goto ok; |
goto ok; |
1457 |
if (ccs_find_execute_handler(ee, TYPE_DENIED_EXECUTE_HANDLER)) { |
if (ccs_find_execute_handler(ee, CCS_TYPE_DENIED_EXECUTE_HANDLER)) { |
1458 |
retval = ccs_try_alt_exec(ee); |
retval = ccs_try_alt_exec(ee); |
1459 |
if (!retval) |
if (!retval) |
1460 |
ccs_audit_execute_handler_log(ee, false); |
ccs_audit_execute_handler_log(ee, false); |