Open-Source-Software-Entwicklung und Downloads

Browse Subversion Repository

Diff of /trunk/1.8.x/ccs-patch/README.ccs

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 3934 by kumaneko, Wed Sep 1 14:04:16 2010 UTC revision 3961 by kumaneko, Tue Sep 7 05:07:31 2010 UTC
# Line 2570  Fix 2010/09/01 Line 2570  Fix 2010/09/01
2570        "ignore_global_allow_read" and "ignore_global_allow_env" directives were        "ignore_global_allow_read" and "ignore_global_allow_env" directives were
2571        removed from domain policy and "use_group" keyword was added.        removed from domain policy and "use_group" keyword was added.
2572    
2573        @ Remove "if" and "; set" keyword.
2574    
2575          I removed need for specifying these keyword.
2576          You can simply specify like below.
2577    
2578            file read /etc/shadow task.uid=0
2579    
2580        @ Remove per-profile preference.
2581    
2582          I removed per profile preference in order to make code simpler.
2583    
2584      @ Allow controlling generation of access granted logs for per an entry      @ Allow controlling generation of access granted logs for per an entry
2585        basis.        basis.
2586    
2587        I added per-entry flag which controls generation of grant logs because        I added per-entry flag which controls generation of grant logs because
2588        Xen and KVM issues ioctl requests so frequently. For example,        Xen and KVM issues ioctl requests so frequently. For example,
2589    
2590          file ioctl /dev/null 0x5401 if audit=no          file ioctl /dev/null 0x5401 audit=no
2591    
2592        will suppress /proc/ccs/grant_log even if profile says grant_log=yes .        will suppress /proc/ccs/grant_log even if preference says grant_log=yes .
2593    
2594          file ioctl /dev/null 0x5401 if audit=yes          file ioctl /dev/null 0x5401 audit=yes
2595    
2596        will generate /proc/ccs/grant_log even if profile says grant_log=no .        will generate /proc/ccs/grant_log even if preference says grant_log=no .
2597    
2598          file ioctl /dev/null 0x5401          file ioctl /dev/null 0x5401
2599    
2600        will generate /proc/ccs/grant_log only if profile says grant_log=yes .        will generate /proc/ccs/grant_log only if preference says grant_log=yes .
2601    
2602        This flag is intended for frequently accessed resources like        This flag is intended for frequently accessed resources like
2603    
2604          file read /var/www/html/\{\*\}/\*.html if audit=no          file read /var/www/html/\{\*\}/\*.html audit=no
2605    
2606        .        .
2607    
     @ Change profile structure.  
   
       To make it clear that preferences can be specified by per-profile basis,  
       I removed global preference ("PREFERENCE::"). Now, you need to explicitly  
       specify per-profile preference ("$profilenumber-PREFERENCE::").  
         
       I changed default mode for access grant logs from "yes" to "no".  
       You may change mode to "yes" if you want all grant logs to be generated.  
       You may override mode using "if audit=yes" if you want specific grant  
       logs to be generated.  
   
       Since printing all warning/error messages to console is noisy,  
       I changed verbose mode control from per-preference basis to  
       per-functionality basis. Now, you can selectively print warning/error  
       messages.  
   
2608      @ Automatically create domain by execve() even if enforcing mode.      @ Automatically create domain by execve() even if enforcing mode.
2609    
2610        Until now, new domains are not created if the domain was not defined and        Until now, new domains are not created if the domain was not defined and
# Line 2643  Fix 2010/09/01 Line 2638  Fix 2010/09/01
2638      @ Add "task auto_domain_transition".      @ Add "task auto_domain_transition".
2639    
2640        This is similar to "task manual_domain_transition", but is automatically        This is similar to "task manual_domain_transition", but is automatically
2641        applied if conditions are met. For example,        applied whenever conditions are met. For example,
2642    
2643          task auto_domain_transition <kernel> //./non-root if task.uid!=0          task auto_domain_transition <kernel> //./non-root task.uid!=0
2644    
2645        will automatically jump to "<kernel> //./non-root" domain if current        will automatically jump to "<kernel> //./non-root" domain if current
2646        process's UID is not 0 whereas        process's UID is not 0 whereas
2647    
2648          task manual_domain_transition <kernel> //./non-root if task.uid!=0          task manual_domain_transition <kernel> //./non-root task.uid!=0
2649    
2650        will jump to "<kernel> //./non-root" domain if current process's UID is        will jump to "<kernel> //./non-root" domain if current process's UID is
2651        not 0 and current process wrote "<kernel> //./non-root" + '\n' to        not 0 and current process wrote "<kernel> //./non-root" + '\n' to

Legend:
Removed from v.3934  
changed lines
  Added in v.3961

Back to OSDN">Back to OSDN
ViewVC Help
Powered by ViewVC 1.1.26