769 |
|
|
770 |
@ Allow reuse of memory allocated for domain policy. |
@ Allow reuse of memory allocated for domain policy. |
771 |
|
|
772 |
As with domain policy, unlike other policies, didn't have |
Regarding domain policy, unlike other policies, didn't have |
773 |
"is_deleted" flag and new memory were allocated |
"is_deleted" flag and new memory were allocated |
774 |
if the deleted entries are given again. |
if the deleted entries are given again. |
775 |
But to allow administrators switch domain policy periodically, |
But to allow administrators switch domain policy periodically, |
1029 |
next message from wanted source with MSG_PEEK flags. |
next message from wanted source with MSG_PEEK flags. |
1030 |
|
|
1031 |
Version 1.5.0 2007/09/20 Usability enhancement release. |
Version 1.5.0 2007/09/20 Usability enhancement release. |
1032 |
|
|
1033 |
|
Fix 2007/09/27 |
1034 |
|
|
1035 |
|
@ Avoid eating memory after quota exceeded. |
1036 |
|
|
1037 |
|
Although ACL entries in a domain won't be added if the domain's quota |
1038 |
|
has exceeded, SaveName() in AddFileACL() is called anyway. |
1039 |
|
This caused unneeded memory consumption. |
1040 |
|
|
1041 |
|
Now, quota checking is done before getting domain_acl_lock lock. |
1042 |
|
This may exceed quota by one or two entries, but that won't matter. |
1043 |
|
|
1044 |
|
Fix 2007/10/16 |
1045 |
|
|
1046 |
|
@ Add environment variable check. |
1047 |
|
|
1048 |
|
There are environment variables that may cause dangerous behavior |
1049 |
|
like LD_\* . |
1050 |
|
So I introduced 'allow_env' directive that allows specified |
1051 |
|
environment variable inherited to next domain. |
1052 |
|
Unlike other permissions, this check is done at execve() time |
1053 |
|
using next domain's ACL information. |
1054 |
|
|
1055 |
|
To manage commonly inherited environments like PATH , |
1056 |
|
you can use 'allow_env' directive in exception policy |
1057 |
|
to globally grant specified environment variable. |
1058 |
|
|
1059 |
|
Fix 2007/11/05 |
1060 |
|
|
1061 |
|
@ Replace semaphore with mutex. |
1062 |
|
|
1063 |
|
I replaced semaphore with mutex. |
1064 |
|
|
1065 |
|
@ Add missing down() in AddReservedEntry(). |
1066 |
|
|
1067 |
|
Mutex debugging capability told me that I had forgotten to call down() |
1068 |
|
since TOMOYO version 1.3.2 . |
1069 |
|
This function is not called by learning mode, |
1070 |
|
so the semaphore's counter will not overflow for normal usage. |
1071 |
|
|
1072 |
|
Fix 2005/11/27 |
1073 |
|
|
1074 |
|
@ Fix ReadTable() truncation bug. |
1075 |
|
|
1076 |
|
"snprintf(str, size, format, ...) >= size" means truncated. |
1077 |
|
But I was checking for "snprintf(str, size, format, ...) > size". |
1078 |
|
As a result, some entries might be dumped without '\n'. |
1079 |
|
|
1080 |
|
@ Purge direct "->prev"/"->next" manipulation. |
1081 |
|
|
1082 |
|
All list manipulations use "struct list_head" or "struct list1_head". |
1083 |
|
"struct list1_head" doesn't have "->prev" member to save memory usage. |
1084 |
|
|
1085 |
|
Fix 2007/11/29 |
1086 |
|
|
1087 |
|
@ Add missing semaphore in GetEXE(). |
1088 |
|
|
1089 |
|
mm->mmap_sem was missing. |
1090 |
|
|
1091 |
|
Fix 2007/12/17 |
1092 |
|
|
1093 |
|
@ Remove unused EXPORT_SYMBOL(). |
1094 |
|
|
1095 |
|
Mark some functions static. |
1096 |
|
|
1097 |
|
Fix 2007/12/18 |
1098 |
|
|
1099 |
|
@ Fix AddMountACL() rejection bug. |
1100 |
|
|
1101 |
|
To my surprise, "mount --bind source dest" accepts |
1102 |
|
not only "both source and dest are directory" |
1103 |
|
but also "both source and dest are non-directory". |
1104 |
|
I was rejecting if dest is not a directory in AddMountACL(). |
1105 |
|
|
1106 |
|
@ Change log format. |
1107 |
|
|
1108 |
|
Profile number and mode is added in audit logs. |
1109 |
|
|
1110 |
|
Fix 2008/01/03 |
1111 |
|
|
1112 |
|
@ Change directive for file's read/write/execute permission. |
1113 |
|
|
1114 |
|
Directives for file's read/write/execute permissions were |
1115 |
|
4/2/1 respectively. But for easier understanding, they are now |
1116 |
|
replaced by read/write/execute (e.g. "allow_read" instead of "4"). |
1117 |
|
But for easier inputting, 4/2/1 are still accepted instead of |
1118 |
|
allow_read/allow_write/allow_execute respectively. |
1119 |
|
|
1120 |
|
@ Change internal data structure. |
1121 |
|
|
1122 |
|
Since I don't have more than 16 types of file permissions, |
1123 |
|
I combined them using bit-fields. |
1124 |
|
|
1125 |
|
Each entry had a field for conditional permission support. |
1126 |
|
But since this field is unlikely used, I separated the field from |
1127 |
|
common part. |
1128 |
|
|
1129 |
|
These changes will reduce memory used by policy. |
1130 |
|
|
1131 |
|
Fix 2008/01/15 |
1132 |
|
|
1133 |
|
@ Add ptrace() hook. |
1134 |
|
|
1135 |
|
To prevent attackers from controlling important processes using |
1136 |
|
ptrace(), I added a hook for ptrace(). |
1137 |
|
Most programs (except strace(1) and gdb(1)) won't use ptrace(2). |
1138 |
|
|
1139 |
|
@ Fix sleep condition check in CheckSocketRecvDatagramPermission(). |
1140 |
|
|
1141 |
|
It seems that correct method to use is in_atomic() |
1142 |
|
rather than in_interrupt() because in_atomic() returns nonzero |
1143 |
|
whenever scheduling is not allowed. |