2570 |
"ignore_global_allow_read" and "ignore_global_allow_env" directives were |
"ignore_global_allow_read" and "ignore_global_allow_env" directives were |
2571 |
removed from domain policy and "use_group" keyword was added. |
removed from domain policy and "use_group" keyword was added. |
2572 |
|
|
2573 |
|
@ Remove "if" and "; set" keyword. |
2574 |
|
|
2575 |
|
I removed need for specifying these keyword. |
2576 |
|
You can simply specify like below. |
2577 |
|
|
2578 |
|
file read /etc/shadow task.uid=0 |
2579 |
|
|
2580 |
|
@ Remove per-profile preference. |
2581 |
|
|
2582 |
|
I removed per profile preference in order to make code simpler. |
2583 |
|
|
2584 |
@ Allow controlling generation of access granted logs for per an entry |
@ Allow controlling generation of access granted logs for per an entry |
2585 |
basis. |
basis. |
2586 |
|
|
2587 |
I added per-entry flag which controls generation of grant logs because |
I added per-entry flag which controls generation of grant logs because |
2588 |
Xen and KVM issues ioctl requests so frequently. For example, |
Xen and KVM issues ioctl requests so frequently. For example, |
2589 |
|
|
2590 |
file ioctl /dev/null 0x5401 if audit=no |
file ioctl /dev/null 0x5401 audit=no |
2591 |
|
|
2592 |
will suppress /proc/ccs/grant_log even if profile says grant_log=yes . |
will suppress /proc/ccs/grant_log even if preference says grant_log=yes . |
2593 |
|
|
2594 |
file ioctl /dev/null 0x5401 if audit=yes |
file ioctl /dev/null 0x5401 audit=yes |
2595 |
|
|
2596 |
will generate /proc/ccs/grant_log even if profile says grant_log=no . |
will generate /proc/ccs/grant_log even if preference says grant_log=no . |
2597 |
|
|
2598 |
file ioctl /dev/null 0x5401 |
file ioctl /dev/null 0x5401 |
2599 |
|
|
2600 |
will generate /proc/ccs/grant_log only if profile says grant_log=yes . |
will generate /proc/ccs/grant_log only if preference says grant_log=yes . |
2601 |
|
|
2602 |
This flag is intended for frequently accessed resources like |
This flag is intended for frequently accessed resources like |
2603 |
|
|
2604 |
file read /var/www/html/\{\*\}/\*.html if audit=no |
file read /var/www/html/\{\*\}/\*.html audit=no |
2605 |
|
|
2606 |
. |
. |
2607 |
|
|
|
@ Change profile structure. |
|
|
|
|
|
To make it clear that preferences can be specified by per-profile basis, |
|
|
I removed global preference ("PREFERENCE::"). Now, you need to explicitly |
|
|
specify per-profile preference ("$profilenumber-PREFERENCE::"). |
|
|
|
|
|
I changed default mode for access grant logs from "yes" to "no". |
|
|
You may change mode to "yes" if you want all grant logs to be generated. |
|
|
You may override mode using "if audit=yes" if you want specific grant |
|
|
logs to be generated. |
|
|
|
|
|
Since printing all warning/error messages to console is noisy, |
|
|
I changed verbose mode control from per-preference basis to |
|
|
per-functionality basis. Now, you can selectively print warning/error |
|
|
messages. |
|
|
|
|
2608 |
@ Automatically create domain by execve() even if enforcing mode. |
@ Automatically create domain by execve() even if enforcing mode. |
2609 |
|
|
2610 |
Until now, new domains are not created if the domain was not defined and |
Until now, new domains are not created if the domain was not defined and |
2638 |
@ Add "task auto_domain_transition". |
@ Add "task auto_domain_transition". |
2639 |
|
|
2640 |
This is similar to "task manual_domain_transition", but is automatically |
This is similar to "task manual_domain_transition", but is automatically |
2641 |
applied if conditions are met. For example, |
applied whenever conditions are met. For example, |
2642 |
|
|
2643 |
task auto_domain_transition <kernel> //./non-root if task.uid!=0 |
task auto_domain_transition <kernel> //./non-root task.uid!=0 |
2644 |
|
|
2645 |
will automatically jump to "<kernel> //./non-root" domain if current |
will automatically jump to "<kernel> //./non-root" domain if current |
2646 |
process's UID is not 0 whereas |
process's UID is not 0 whereas |
2647 |
|
|
2648 |
task manual_domain_transition <kernel> //./non-root if task.uid!=0 |
task manual_domain_transition <kernel> //./non-root task.uid!=0 |
2649 |
|
|
2650 |
will jump to "<kernel> //./non-root" domain if current process's UID is |
will jump to "<kernel> //./non-root" domain if current process's UID is |
2651 |
not 0 and current process wrote "<kernel> //./non-root" + '\n' to |
not 0 and current process wrote "<kernel> //./non-root" + '\n' to |