2812 |
@ Serialize updating profile's comment line. |
@ Serialize updating profile's comment line. |
2813 |
|
|
2814 |
We need to serialize when updating COMMENT= line in /proc/ccs/profile . |
We need to serialize when updating COMMENT= line in /proc/ccs/profile . |
2815 |
|
|
2816 |
|
Version 1.8.1 2011/04/01 Usability enhancement with "Zettai, Daijoubudayo" release! |
2817 |
|
|
2818 |
|
Fix 2011/04/03 |
2819 |
|
|
2820 |
|
@ Fix fcntl(F_SETFL, O_APPEND) handling. |
2821 |
|
|
2822 |
|
Since 1.8.0, TOMOYO was by error checking "file write" permission rather |
2823 |
|
than "file append" permission when changing file's writing mode from |
2824 |
|
"overwriting" to "append". |
2825 |
|
|
2826 |
|
This error should impact little (except CentOS 6.0 kernels) because once |
2827 |
|
a file was opened for "overwriting" mode, changing that file to "append" |
2828 |
|
mode cannot undo overwriting the file. Regarding CentOS 6.0 kernels, |
2829 |
|
due to different ACC_MODE definition, TOMOYO was by error needlessly |
2830 |
|
checking "file read" permission when fcntl() was requested. |
2831 |
|
|
2832 |
|
Fix 2011/04/20 |
2833 |
|
|
2834 |
|
@ Remove unused "struct inode *" parameter from hooks. |
2835 |
|
|
2836 |
|
Since pre-vfs functions were removed on 2010/09/18, "struct inode *" |
2837 |
|
parameter which was used for checking parent directory's DAC permission |
2838 |
|
is no longer used. |
2839 |
|
|
2840 |
|
Note that "struct ccsecurity_operations ccsecurity_ops" has changed. |
2841 |
|
Loadable kernel modules that depends on it need to be rebuilt. |
2842 |
|
|
2843 |
|
Fix 2011/05/05 |
2844 |
|
|
2845 |
|
@ Fix wrong profile number in audit logs for "misc env" permission. |
2846 |
|
|
2847 |
|
Profile number used for "file execute" permission was by error reused |
2848 |
|
when generating audit logs for "misc env" permission. |
2849 |
|
|
2850 |
|
Fix 2011/05/11 |
2851 |
|
|
2852 |
|
@ Fix wrong domainname validation. |
2853 |
|
|
2854 |
|
"<kernel>" + "/foo/\" + "/bar" was by error checked when |
2855 |
|
"<kernel> /foo/\* /bar" was given. As a result, legal domainnames like |
2856 |
|
"<kernel> /foo/\* /bar" are rejected. |