diff options
-rw-r--r-- | MAINTAINERS | 2 | ||||
-rw-r--r-- | security/tomoyo/Makefile | 2 | ||||
-rw-r--r-- | security/tomoyo/common.c | 12 | ||||
-rw-r--r-- | security/tomoyo/common.h | 4 |
4 files changed, 10 insertions, 10 deletions
diff --git a/MAINTAINERS b/MAINTAINERS index 02a60b8e503b..a790022055ca 100644 --- a/MAINTAINERS +++ b/MAINTAINERS | |||
@@ -6443,7 +6443,7 @@ L: tomoyo-users-en@lists.sourceforge.jp (subscribers-only, for users in English) | |||
6443 | L: tomoyo-dev@lists.sourceforge.jp (subscribers-only, for developers in Japanese) | 6443 | L: tomoyo-dev@lists.sourceforge.jp (subscribers-only, for developers in Japanese) |
6444 | L: tomoyo-users@lists.sourceforge.jp (subscribers-only, for users in Japanese) | 6444 | L: tomoyo-users@lists.sourceforge.jp (subscribers-only, for users in Japanese) |
6445 | W: http://tomoyo.sourceforge.jp/ | 6445 | W: http://tomoyo.sourceforge.jp/ |
6446 | T: quilt http://svn.sourceforge.jp/svnroot/tomoyo/trunk/2.4.x/tomoyo-lsm/patches/ | 6446 | T: quilt http://svn.sourceforge.jp/svnroot/tomoyo/trunk/2.5.x/tomoyo-lsm/patches/ |
6447 | S: Maintained | 6447 | S: Maintained |
6448 | F: security/tomoyo/ | 6448 | F: security/tomoyo/ |
6449 | 6449 | ||
diff --git a/security/tomoyo/Makefile b/security/tomoyo/Makefile index fc2a8ce40301..56a0c7be409e 100644 --- a/security/tomoyo/Makefile +++ b/security/tomoyo/Makefile | |||
@@ -27,7 +27,7 @@ $(obj)/policy/stat.conf: | |||
27 | @touch $@ | 27 | @touch $@ |
28 | 28 | ||
29 | $(obj)/builtin-policy.h: $(obj)/policy/profile.conf $(obj)/policy/exception_policy.conf $(obj)/policy/domain_policy.conf $(obj)/policy/manager.conf $(obj)/policy/stat.conf | 29 | $(obj)/builtin-policy.h: $(obj)/policy/profile.conf $(obj)/policy/exception_policy.conf $(obj)/policy/domain_policy.conf $(obj)/policy/manager.conf $(obj)/policy/stat.conf |
30 | @echo Generating built-in policy for TOMOYO 2.4.x. | 30 | @echo Generating built-in policy for TOMOYO 2.5.x. |
31 | @echo "static char tomoyo_builtin_profile[] __initdata =" > $@.tmp | 31 | @echo "static char tomoyo_builtin_profile[] __initdata =" > $@.tmp |
32 | @sed -e 's/\\/\\\\/g' -e 's/\"/\\"/g' -e 's/\(.*\)/"\1\\n"/' < $(obj)/policy/profile.conf >> $@.tmp | 32 | @sed -e 's/\\/\\\\/g' -e 's/\"/\\"/g' -e 's/\(.*\)/"\1\\n"/' < $(obj)/policy/profile.conf >> $@.tmp |
33 | @echo "\"\";" >> $@.tmp | 33 | @echo "\"\";" >> $@.tmp |
diff --git a/security/tomoyo/common.c b/security/tomoyo/common.c index 1fd0fc1059ba..084018351b4f 100644 --- a/security/tomoyo/common.c +++ b/security/tomoyo/common.c | |||
@@ -345,7 +345,7 @@ void tomoyo_init_policy_namespace(struct tomoyo_policy_namespace *ns) | |||
345 | INIT_LIST_HEAD(&ns->group_list[idx]); | 345 | INIT_LIST_HEAD(&ns->group_list[idx]); |
346 | for (idx = 0; idx < TOMOYO_MAX_POLICY; idx++) | 346 | for (idx = 0; idx < TOMOYO_MAX_POLICY; idx++) |
347 | INIT_LIST_HEAD(&ns->policy_list[idx]); | 347 | INIT_LIST_HEAD(&ns->policy_list[idx]); |
348 | ns->profile_version = 20100903; | 348 | ns->profile_version = 20110903; |
349 | tomoyo_namespace_enabled = !list_empty(&tomoyo_namespace_list); | 349 | tomoyo_namespace_enabled = !list_empty(&tomoyo_namespace_list); |
350 | list_add_tail_rcu(&ns->namespace_list, &tomoyo_namespace_list); | 350 | list_add_tail_rcu(&ns->namespace_list, &tomoyo_namespace_list); |
351 | } | 351 | } |
@@ -2222,7 +2222,7 @@ static int tomoyo_write_answer(struct tomoyo_io_buffer *head) | |||
2222 | static void tomoyo_read_version(struct tomoyo_io_buffer *head) | 2222 | static void tomoyo_read_version(struct tomoyo_io_buffer *head) |
2223 | { | 2223 | { |
2224 | if (!head->r.eof) { | 2224 | if (!head->r.eof) { |
2225 | tomoyo_io_printf(head, "2.4.0"); | 2225 | tomoyo_io_printf(head, "2.5.0"); |
2226 | head->r.eof = true; | 2226 | head->r.eof = true; |
2227 | } | 2227 | } |
2228 | } | 2228 | } |
@@ -2694,11 +2694,11 @@ void tomoyo_check_profile(void) | |||
2694 | struct tomoyo_domain_info *domain; | 2694 | struct tomoyo_domain_info *domain; |
2695 | const int idx = tomoyo_read_lock(); | 2695 | const int idx = tomoyo_read_lock(); |
2696 | tomoyo_policy_loaded = true; | 2696 | tomoyo_policy_loaded = true; |
2697 | printk(KERN_INFO "TOMOYO: 2.4.0\n"); | 2697 | printk(KERN_INFO "TOMOYO: 2.5.0\n"); |
2698 | list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) { | 2698 | list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) { |
2699 | const u8 profile = domain->profile; | 2699 | const u8 profile = domain->profile; |
2700 | const struct tomoyo_policy_namespace *ns = domain->ns; | 2700 | const struct tomoyo_policy_namespace *ns = domain->ns; |
2701 | if (ns->profile_version != 20100903) | 2701 | if (ns->profile_version != 20110903) |
2702 | printk(KERN_ERR | 2702 | printk(KERN_ERR |
2703 | "Profile version %u is not supported.\n", | 2703 | "Profile version %u is not supported.\n", |
2704 | ns->profile_version); | 2704 | ns->profile_version); |
@@ -2709,9 +2709,9 @@ void tomoyo_check_profile(void) | |||
2709 | else | 2709 | else |
2710 | continue; | 2710 | continue; |
2711 | printk(KERN_ERR | 2711 | printk(KERN_ERR |
2712 | "Userland tools for TOMOYO 2.4 must be installed and " | 2712 | "Userland tools for TOMOYO 2.5 must be installed and " |
2713 | "policy must be initialized.\n"); | 2713 | "policy must be initialized.\n"); |
2714 | printk(KERN_ERR "Please see http://tomoyo.sourceforge.jp/2.4/ " | 2714 | printk(KERN_ERR "Please see http://tomoyo.sourceforge.jp/2.5/ " |
2715 | "for more information.\n"); | 2715 | "for more information.\n"); |
2716 | panic("STOP!"); | 2716 | panic("STOP!"); |
2717 | } | 2717 | } |
diff --git a/security/tomoyo/common.h b/security/tomoyo/common.h index af82683df7ff..471c9f9afc18 100644 --- a/security/tomoyo/common.h +++ b/security/tomoyo/common.h | |||
@@ -3,7 +3,7 @@ | |||
3 | * | 3 | * |
4 | * Header file for TOMOYO. | 4 | * Header file for TOMOYO. |
5 | * | 5 | * |
6 | * Copyright (C) 2005-2010 NTT DATA CORPORATION | 6 | * Copyright (C) 2005-2011 NTT DATA CORPORATION |
7 | */ | 7 | */ |
8 | 8 | ||
9 | #ifndef _SECURITY_TOMOYO_COMMON_H | 9 | #ifndef _SECURITY_TOMOYO_COMMON_H |
@@ -901,7 +901,7 @@ struct tomoyo_policy_namespace { | |||
901 | struct list_head acl_group[TOMOYO_MAX_ACL_GROUPS]; | 901 | struct list_head acl_group[TOMOYO_MAX_ACL_GROUPS]; |
902 | /* List for connecting to tomoyo_namespace_list list. */ | 902 | /* List for connecting to tomoyo_namespace_list list. */ |
903 | struct list_head namespace_list; | 903 | struct list_head namespace_list; |
904 | /* Profile version. Currently only 20100903 is defined. */ | 904 | /* Profile version. Currently only 20110903 is defined. */ |
905 | unsigned int profile_version; | 905 | unsigned int profile_version; |
906 | /* Name of this namespace (e.g. "<kernel>", "</usr/sbin/httpd>" ). */ | 906 | /* Name of this namespace (e.g. "<kernel>", "</usr/sbin/httpd>" ). */ |
907 | const char *name; | 907 | const char *name; |