diff options
Diffstat (limited to 'security/tomoyo/securityfs_if.c')
-rw-r--r-- | security/tomoyo/securityfs_if.c | 22 |
1 files changed, 10 insertions, 12 deletions
diff --git a/security/tomoyo/securityfs_if.c b/security/tomoyo/securityfs_if.c index e43d5554b506..a49c3bfd4dd5 100644 --- a/security/tomoyo/securityfs_if.c +++ b/security/tomoyo/securityfs_if.c | |||
@@ -1,9 +1,7 @@ | |||
1 | /* | 1 | /* |
2 | * security/tomoyo/common.c | 2 | * security/tomoyo/securityfs_if.c |
3 | * | 3 | * |
4 | * Securityfs interface for TOMOYO. | 4 | * Copyright (C) 2005-2011 NTT DATA CORPORATION |
5 | * | ||
6 | * Copyright (C) 2005-2010 NTT DATA CORPORATION | ||
7 | */ | 5 | */ |
8 | 6 | ||
9 | #include <linux/security.h> | 7 | #include <linux/security.h> |
@@ -34,11 +32,11 @@ static int tomoyo_open(struct inode *inode, struct file *file) | |||
34 | */ | 32 | */ |
35 | static int tomoyo_release(struct inode *inode, struct file *file) | 33 | static int tomoyo_release(struct inode *inode, struct file *file) |
36 | { | 34 | { |
37 | return tomoyo_close_control(file); | 35 | return tomoyo_close_control(file->private_data); |
38 | } | 36 | } |
39 | 37 | ||
40 | /** | 38 | /** |
41 | * tomoyo_poll - poll() for /proc/ccs/ interface. | 39 | * tomoyo_poll - poll() for /sys/kernel/security/tomoyo/ interface. |
42 | * | 40 | * |
43 | * @file: Pointer to "struct file". | 41 | * @file: Pointer to "struct file". |
44 | * @wait: Pointer to "poll_table". | 42 | * @wait: Pointer to "poll_table". |
@@ -63,7 +61,7 @@ static unsigned int tomoyo_poll(struct file *file, poll_table *wait) | |||
63 | static ssize_t tomoyo_read(struct file *file, char __user *buf, size_t count, | 61 | static ssize_t tomoyo_read(struct file *file, char __user *buf, size_t count, |
64 | loff_t *ppos) | 62 | loff_t *ppos) |
65 | { | 63 | { |
66 | return tomoyo_read_control(file, buf, count); | 64 | return tomoyo_read_control(file->private_data, buf, count); |
67 | } | 65 | } |
68 | 66 | ||
69 | /** | 67 | /** |
@@ -79,7 +77,7 @@ static ssize_t tomoyo_read(struct file *file, char __user *buf, size_t count, | |||
79 | static ssize_t tomoyo_write(struct file *file, const char __user *buf, | 77 | static ssize_t tomoyo_write(struct file *file, const char __user *buf, |
80 | size_t count, loff_t *ppos) | 78 | size_t count, loff_t *ppos) |
81 | { | 79 | { |
82 | return tomoyo_write_control(file, buf, count); | 80 | return tomoyo_write_control(file->private_data, buf, count); |
83 | } | 81 | } |
84 | 82 | ||
85 | /* | 83 | /* |
@@ -135,14 +133,14 @@ static int __init tomoyo_initerface_init(void) | |||
135 | TOMOYO_DOMAINPOLICY); | 133 | TOMOYO_DOMAINPOLICY); |
136 | tomoyo_create_entry("exception_policy", 0600, tomoyo_dir, | 134 | tomoyo_create_entry("exception_policy", 0600, tomoyo_dir, |
137 | TOMOYO_EXCEPTIONPOLICY); | 135 | TOMOYO_EXCEPTIONPOLICY); |
136 | tomoyo_create_entry("audit", 0400, tomoyo_dir, | ||
137 | TOMOYO_AUDIT); | ||
138 | tomoyo_create_entry("self_domain", 0400, tomoyo_dir, | 138 | tomoyo_create_entry("self_domain", 0400, tomoyo_dir, |
139 | TOMOYO_SELFDOMAIN); | 139 | TOMOYO_SELFDOMAIN); |
140 | tomoyo_create_entry(".domain_status", 0600, tomoyo_dir, | ||
141 | TOMOYO_DOMAIN_STATUS); | ||
142 | tomoyo_create_entry(".process_status", 0600, tomoyo_dir, | 140 | tomoyo_create_entry(".process_status", 0600, tomoyo_dir, |
143 | TOMOYO_PROCESS_STATUS); | 141 | TOMOYO_PROCESS_STATUS); |
144 | tomoyo_create_entry("meminfo", 0600, tomoyo_dir, | 142 | tomoyo_create_entry("stat", 0644, tomoyo_dir, |
145 | TOMOYO_MEMINFO); | 143 | TOMOYO_STAT); |
146 | tomoyo_create_entry("profile", 0600, tomoyo_dir, | 144 | tomoyo_create_entry("profile", 0600, tomoyo_dir, |
147 | TOMOYO_PROFILE); | 145 | TOMOYO_PROFILE); |
148 | tomoyo_create_entry("manager", 0600, tomoyo_dir, | 146 | tomoyo_create_entry("manager", 0600, tomoyo_dir, |