1804 |
As remove_arg_zero() uses kmap_atomic(KM_USER0), I modified to use |
As remove_arg_zero() uses kmap_atomic(KM_USER0), I modified to use |
1805 |
kmap_atomic(KM_USER0) rather than kmap(). |
kmap_atomic(KM_USER0) rather than kmap(). |
1806 |
|
|
|
@ Relocate definitions and functions. |
|
|
|
|
|
To reduce exposed symbols, I relocated some definitions and functions. |
|
|
|
|
1807 |
Fix 2009/01/28 |
Fix 2009/01/28 |
1808 |
|
|
1809 |
@ Fix "allow_read" + "allow_write" != "allow_read/write" problem. |
@ Fix "allow_read" + "allow_write" != "allow_read/write" problem. |
1852 |
functionality. |
functionality. |
1853 |
|
|
1854 |
This functionality requires modification of ccs-patch-\*.diff . |
This functionality requires modification of ccs-patch-\*.diff . |
|
Therefore, this functionality will not work if you are using old |
|
|
ccs-patch-\*.diff . |
|
1855 |
|
|
1856 |
@ Use better name for socket's pathname. |
@ Use better name for socket's pathname. |
1857 |
|
|
1860 |
access control. Therefore, I modified to represent socket's pathname as |
access control. Therefore, I modified to represent socket's pathname as |
1861 |
"socket:[family=\$:type=\$:protocol=\$]" format. |
"socket:[family=\$:type=\$:protocol=\$]" format. |
1862 |
|
|
1863 |
This will help administrator control ioctl() against sockets more |
This will help administrator to control ioctl() against sockets more |
1864 |
precisely. |
precisely. |
1865 |
|
|
1866 |
Version 1.6.7 2009/??/?? Feature enhancement release. |
@ Fix misplaced ccs_capable() call. (only 2.6.8-\* and 2.6.9-\*) |
1867 |
|
|
1868 |
|
Location to insert ccs_capable(TOMOYO_SYS_IOCTL) in sys_ioctl() was |
1869 |
|
wrong since version 1.1 . |
1870 |
|
|
1871 |
|
@ Insert ccs_check_ioctl_permission() call. |
1872 |
|
|
1873 |
|
To make MAC_FOR_IOCTL functionality working, I inserted |
1874 |
|
ccs_check_ioctl_permission() call into ccs-patch-\*.diff . |
1875 |
|
|
1876 |
|
Fix 2009/03/23 |
1877 |
|
|
1878 |
|
@ Move sysctl()'s check from ccs-patch-\*.diff to fs/tomoyo_file.c . |
1879 |
|
|
1880 |
|
Since try_parse_table() in kernel/sysctl.c is almost identical between |
1881 |
|
all versions, I moved that function to fs/tomoyo_file.c . |
1882 |
|
|
1883 |
|
@ Relocate definitions and functions. |
1884 |
|
|
1885 |
|
To reduce exposed symbols, I relocated some definitions and functions. |
1886 |
|
|
1887 |
|
Fix 2009/03/24 |
1888 |
|
|
1889 |
|
@ Add CONFIG_TOMOYO_BUILTIN_INITIALIZERS option. |
1890 |
|
|
1891 |
|
Some systems don't have /sbin/modprobe and /sbin/hotplug . |
1892 |
|
Thus, I made these pathnames configurable. |
1893 |
|
|
1894 |
|
Version 1.6.7 2009/04/01 Feature enhancement release. |
1895 |
|
|
1896 |
|
Fix 2009/04/06 |
1897 |
|
|
1898 |
|
@ Drop "undelete domain" command. |
1899 |
|
|
1900 |
|
I added "undelete domain" command on 2007/01/19, but never used by policy |
1901 |
|
management tools. The garbage collector I added on 2007/01/29 will |
1902 |
|
automatically reuse memory and allow administrators switch domain policy |
1903 |
|
periodically, provided that the administrators kills processes in old |
1904 |
|
domains before recreating new domains with the same domainnames. |
1905 |
|
|
1906 |
|
Thus, I dropped "undelete domain" command. |
1907 |
|
|
1908 |
|
@ Escape invalid characters in ccs_check_mount_permission2(). |
1909 |
|
|
1910 |
|
ccs_check_mount_permission2() was passing unencoded strings to printk() |
1911 |
|
and ccs_update_mount_acl() and ccs_check_supervisor(). This may cause |
1912 |
|
/proc/ccs/system_policy and /proc/ccs/query to contain invalid |
1913 |
|
characters within a string. |