797 |
I was using PAGE_SIZE (4096 in many environments) |
I was using PAGE_SIZE (4096 in many environments) |
798 |
as the max length of any string data. |
as the max length of any string data. |
799 |
But for environments that have larger PAGE_SIZE, |
But for environments that have larger PAGE_SIZE, |
800 |
doing memset(ptr, 0, PAGE_SIZE) everytime is too wasteful. |
doing memset(ptr, 0, PAGE_SIZE) every time is too wasteful. |
801 |
|
|
802 |
Fix 2007/01/29 |
Fix 2007/01/29 |
803 |
|
|
2773 |
check) and loading the variant part of policy. Since you can start using |
check) and loading the variant part of policy. Since you can start using |
2774 |
enforcing mode from the beginning, you can reduce the possibility of |
enforcing mode from the beginning, you can reduce the possibility of |
2775 |
hijacking the boot sequence. |
hijacking the boot sequence. |
2776 |
|
|
2777 |
|
Fix 2011/03/10 |
2778 |
|
|
2779 |
|
@ Remove /proc/ccs/meminfo interface. |
2780 |
|
|
2781 |
|
Please use /proc/ccs/stat interface instead. |
2782 |
|
|
2783 |
|
Fix 2011/03/15 |
2784 |
|
|
2785 |
|
@ Pack policy when printing via /proc/ccs/ interface. |
2786 |
|
|
2787 |
|
The kernel side is ready for accepting packed input like |
2788 |
|
|
2789 |
|
file read/write/execute /path/to/file |
2790 |
|
|
2791 |
|
but was using unpacked output like |
2792 |
|
|
2793 |
|
file read /path/to/file |
2794 |
|
file write /path/to/file |
2795 |
|
file execute /path/to/file |
2796 |
|
|
2797 |
|
because most of userland tools were not ready for accepting packed input. |
2798 |
|
|
2799 |
|
The advantages of using packed policy are that it makes policy files |
2800 |
|
smaller and it speeds up loading/saving policy files. |
2801 |
|
|
2802 |
|
Since most of userland tools are ready for accepting packed input by now, |
2803 |
|
I changed to use packed policy for both input and output. |
2804 |
|
|
2805 |
|
Fix 2011/03/31 |
2806 |
|
|
2807 |
|
@ Fix conditional policy parsing. |
2808 |
|
|
2809 |
|
Since exec.realpath= and symlink.target= accept path_group, |
2810 |
|
symlink.target="@foo" was by error parsed as symlink.target=@foo . |
2811 |
|
|
2812 |
|
@ Serialize updating profile's comment line. |
2813 |
|
|
2814 |
|
We need to serialize when updating COMMENT= line in /proc/ccs/profile . |
2815 |
|
|
2816 |
|
Version 1.8.1 2011/04/01 Usability enhancement with "Zettai, Daijoubudayo" release! |
2817 |
|
|
2818 |
|
Fix 2011/04/03 |
2819 |
|
|
2820 |
|
@ Fix fcntl(F_SETFL, O_APPEND) handling. |
2821 |
|
|
2822 |
|
Since 1.8.0, TOMOYO was by error checking "file write" permission rather |
2823 |
|
than "file append" permission when changing file's writing mode from |
2824 |
|
"overwriting" to "append". |
2825 |
|
|
2826 |
|
This error should impact little (except CentOS 6.0 kernels) because once |
2827 |
|
a file was opened for "overwriting" mode, changing that file to "append" |
2828 |
|
mode cannot undo overwriting the file. Regarding CentOS 6.0 kernels, |
2829 |
|
due to different ACC_MODE definition, TOMOYO was by error needlessly |
2830 |
|
checking "file read" permission when fcntl() was requested. |
2831 |
|
|
2832 |
|
Fix 2011/04/20 |
2833 |
|
|
2834 |
|
@ Remove unused "struct inode *" parameter from hooks. |
2835 |
|
|
2836 |
|
Since pre-vfs functions were removed on 2010/09/18, "struct inode *" |
2837 |
|
parameter which was used for checking parent directory's DAC permission |
2838 |
|
is no longer used. |
2839 |
|
|
2840 |
|
Note that "struct ccsecurity_operations ccsecurity_ops" has changed. |
2841 |
|
Loadable kernel modules that depends on it need to be rebuilt. |
2842 |
|
|
2843 |
|
Fix 2011/05/05 |
2844 |
|
|
2845 |
|
@ Fix wrong profile number in audit logs for "misc env" permission. |
2846 |
|
|
2847 |
|
Profile number used for "file execute" permission was by error reused |
2848 |
|
when generating audit logs for "misc env" permission. |
2849 |
|
|
2850 |
|
Fix 2011/05/11 |
2851 |
|
|
2852 |
|
@ Fix wrong domainname validation. |
2853 |
|
|
2854 |
|
"<kernel>" + "/foo/\" + "/bar" was by error checked when |
2855 |
|
"<kernel> /foo/\* /bar" was given. As a result, legal domainnames like |
2856 |
|
"<kernel> /foo/\* /bar" are rejected. |
2857 |
|
|
2858 |
|
Fix 2011/06/06 |
2859 |
|
|
2860 |
|
@ Add policy namespace support. |
2861 |
|
|
2862 |
|
To be able to use TOMOYO in LXC environments, I introduced policy |
2863 |
|
namespace. Each policy namespace has its own set of domain policy, |
2864 |
|
exception policy and profiles, which are all independent of other |
2865 |
|
namespaces. |
2866 |
|
|
2867 |
|
@ Remove CONFIG_CCSECURITY_BUILTIN_INITIALIZERS option. |
2868 |
|
|
2869 |
|
From now on, exception policy and manager need to be able to handle |
2870 |
|
policy namespace (which is a <$namespace> prefix added to each line). |
2871 |
|
Thus, space-separated list for CONFIG_CCSECURITY_BUILTIN_INITIALIZERS is |
2872 |
|
no longer suitable for handling policy namespace. |
2873 |
|
|
2874 |
|
Fix 2011/06/10 |
2875 |
|
|
2876 |
|
@ Allow specifying trigger for activation. |
2877 |
|
|
2878 |
|
To be able to use TOMOYO under systemd environments where init= parameter |
2879 |
|
is used, I changed to allow overriding the trigger for calling external |
2880 |
|
policy loader and activating MAC via kernel command line options. |
2881 |
|
|
2882 |
|
Fix 2011/06/14 |
2883 |
|
|
2884 |
|
@ Remove unused "struct inode *" parameter from ccs-patch-\*.diff . |
2885 |
|
|
2886 |
|
To follow changes I made on 2011/04/20, I removed "struct inode *" from |
2887 |
|
ccs_mknod_permission(), ccs_mkdir_permission(), ccs_rmdir_permission(), |
2888 |
|
ccs_unlink_permission(), ccs_symlink_permission(), ccs_link_permission(), |
2889 |
|
ccs_rename_permission() that are called from fs/namei.c |
2890 |
|
net/unix/af_unix.c include/linux/security.c security/security.c . |
2891 |
|
If you have your own ccs-patch-*.diff , please update accordingly. |
2892 |
|
|
2893 |
|
Version 1.8.2 2011/06/20 Usability enhancement release. |
2894 |
|
|
2895 |
|
Fix 2011/07/07 |
2896 |
|
|
2897 |
|
@ Remove /proc/ccs/.domain_status interface. |
2898 |
|
|
2899 |
|
Writing to /proc/ccs/.domain_status can be emulated by |
2900 |
|
|
2901 |
|
( echo "select " $domainname; echo "use_profile " $profile ) | |
2902 |
|
/usr/sbin/ccs-loadpolicy -d |
2903 |
|
|
2904 |
|
and reading from /proc/ccs/.domain_status can be emulated by |
2905 |
|
|
2906 |
|
grep -A 1 '^<' /proc/ccs/domain_policy | |
2907 |
|
awk ' { if ( domainname == "" ) { if ( substr($1, 1, 1) == "<" ) |
2908 |
|
domainname = $0; } else if ( $1 == "use_profile" ) { |
2909 |
|
print $2 " " domainname; domainname = ""; } } ; ' |
2910 |
|
|
2911 |
|
. Since this interface is used by only /usr/sbin/ccs-setprofile , |
2912 |
|
remove this interface by updating /usr/sbin/ccs-setprofile . |