diff options
author | Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> | 2010-06-17 03:54:33 -0400 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2010-08-02 01:34:41 -0400 |
commit | 31845e8c6d3f4f26702e567c667277f9fd1f73a3 (patch) | |
tree | 5c457513fcdae4e7e39b19d36e1698ae298ce8d4 /security/tomoyo/common.h | |
parent | a230f9e7121cbcbfe23bd5a630abf6b53cece555 (diff) |
TOMOYO: Aggregate reader functions.
Now lists are accessible via array index. Aggregate reader functions using index.
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/tomoyo/common.h')
-rw-r--r-- | security/tomoyo/common.h | 22 |
1 files changed, 0 insertions, 22 deletions
diff --git a/security/tomoyo/common.h b/security/tomoyo/common.h index 451dc3c1036a..21eb1e7885b8 100644 --- a/security/tomoyo/common.h +++ b/security/tomoyo/common.h | |||
@@ -794,28 +794,6 @@ bool tomoyo_path_matches_pattern(const struct tomoyo_path_info *filename, | |||
794 | bool tomoyo_print_number_union(struct tomoyo_io_buffer *head, | 794 | bool tomoyo_print_number_union(struct tomoyo_io_buffer *head, |
795 | const struct tomoyo_number_union *ptr); | 795 | const struct tomoyo_number_union *ptr); |
796 | bool tomoyo_parse_number_union(char *data, struct tomoyo_number_union *num); | 796 | bool tomoyo_parse_number_union(char *data, struct tomoyo_number_union *num); |
797 | |||
798 | /* Read "aggregator" entry in exception policy. */ | ||
799 | bool tomoyo_read_aggregator_policy(struct tomoyo_io_buffer *head); | ||
800 | /* Read "alias" entry in exception policy. */ | ||
801 | bool tomoyo_read_alias_policy(struct tomoyo_io_buffer *head); | ||
802 | /* | ||
803 | * Read "initialize_domain" and "no_initialize_domain" entry | ||
804 | * in exception policy. | ||
805 | */ | ||
806 | bool tomoyo_read_domain_initializer_policy(struct tomoyo_io_buffer *head); | ||
807 | /* Read "keep_domain" and "no_keep_domain" entry in exception policy. */ | ||
808 | bool tomoyo_read_domain_keeper_policy(struct tomoyo_io_buffer *head); | ||
809 | /* Read "file_pattern" entry in exception policy. */ | ||
810 | bool tomoyo_read_file_pattern(struct tomoyo_io_buffer *head); | ||
811 | /* Read "path_group" entry in exception policy. */ | ||
812 | bool tomoyo_read_path_group_policy(struct tomoyo_io_buffer *head); | ||
813 | /* Read "number_group" entry in exception policy. */ | ||
814 | bool tomoyo_read_number_group_policy(struct tomoyo_io_buffer *head); | ||
815 | /* Read "allow_read" entry in exception policy. */ | ||
816 | bool tomoyo_read_globally_readable_policy(struct tomoyo_io_buffer *head); | ||
817 | /* Read "deny_rewrite" entry in exception policy. */ | ||
818 | bool tomoyo_read_no_rewrite_policy(struct tomoyo_io_buffer *head); | ||
819 | /* Tokenize a line. */ | 797 | /* Tokenize a line. */ |
820 | bool tomoyo_tokenize(char *buffer, char *w[], size_t size); | 798 | bool tomoyo_tokenize(char *buffer, char *w[], size_t size); |
821 | /* Write domain policy violation warning message to console? */ | 799 | /* Write domain policy violation warning message to console? */ |