original_kernel/security/tomoyo
Tetsuo Handa 484ca79c65 TOMOYO: Use pathname specified by policy rather than execve()
Commit c9e69318 "TOMOYO: Allow wildcard for execute permission." changed execute
permission and domainname to accept wildcards. But tomoyo_find_next_domain()
was using pathname passed to execve() rather than pathname specified by the
execute permission. As a result, processes were not able to transit to domains
which contain wildcards in their domainnames.

This patch passes pathname specified by the execute permission back to
tomoyo_find_next_domain() so that processes can transit to domains which
contain wildcards in their domainnames.

Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: James Morris <jmorris@namei.org>
2010-08-02 15:38:38 +10:00
..
Kconfig
Makefile
common.c TOMOYO: Update version to 2.3.0 2010-08-02 15:35:10 +10:00
common.h TOMOYO: Use pathname specified by policy rather than execve() 2010-08-02 15:38:38 +10:00
domain.c TOMOYO: Use pathname specified by policy rather than execve() 2010-08-02 15:38:38 +10:00
file.c TOMOYO: Use pathname specified by policy rather than execve() 2010-08-02 15:38:38 +10:00
gc.c
group.c TOMOYO: Use pathname specified by policy rather than execve() 2010-08-02 15:38:38 +10:00
load_policy.c
memory.c
mount.c TOMOYO: Use pathname specified by policy rather than execve() 2010-08-02 15:38:38 +10:00
realpath.c
securityfs_if.c TOMOYO: Explicitly set file_operations->llseek pointer. 2010-08-02 15:34:57 +10:00
tomoyo.c
util.c TOMOYO: Fix quota check. 2010-08-02 15:35:09 +10:00