• R/O
  • SSH
  • HTTPS

tomoyo: コミット


コミットメタ情報

リビジョン6316 (tree)
日時2014-03-16 13:52:03
作者kumaneko

ログメッセージ

(メッセージはありません)

変更サマリ

差分

--- trunk/1.8.x/ccs-patch/patches/ccs-patch-3.10.diff (revision 6315)
+++ trunk/1.8.x/ccs-patch/patches/ccs-patch-3.10.diff (revision 6316)
@@ -1,6 +1,6 @@
1-This is TOMOYO Linux patch for kernel 3.10.31.
1+This is TOMOYO Linux patch for kernel 3.10.33.
22
3-Source code for this patch is https://www.kernel.org/pub/linux/kernel/v3.x/linux-3.10.31.tar.xz
3+Source code for this patch is https://www.kernel.org/pub/linux/kernel/v3.x/linux-3.10.33.tar.xz
44 ---
55 fs/exec.c | 2
66 fs/open.c | 2
@@ -28,8 +28,8 @@
2828 security/security.c | 107 ++++++++++++++++++++++++++++++++++++++++------
2929 24 files changed, 235 insertions(+), 37 deletions(-)
3030
31---- linux-3.10.31.orig/fs/exec.c
32-+++ linux-3.10.31/fs/exec.c
31+--- linux-3.10.33.orig/fs/exec.c
32++++ linux-3.10.33/fs/exec.c
3333 @@ -1540,7 +1540,7 @@ static int do_execve_common(const char *
3434 if (retval < 0)
3535 goto out;
@@ -39,8 +39,8 @@
3939 if (retval < 0)
4040 goto out;
4141
42---- linux-3.10.31.orig/fs/open.c
43-+++ linux-3.10.31/fs/open.c
42+--- linux-3.10.33.orig/fs/open.c
43++++ linux-3.10.33/fs/open.c
4444 @@ -1035,6 +1035,8 @@ EXPORT_SYMBOL(sys_close);
4545 */
4646 SYSCALL_DEFINE0(vhangup)
@@ -50,8 +50,8 @@
5050 if (capable(CAP_SYS_TTY_CONFIG)) {
5151 tty_vhangup_self();
5252 return 0;
53---- linux-3.10.31.orig/fs/proc/version.c
54-+++ linux-3.10.31/fs/proc/version.c
53+--- linux-3.10.33.orig/fs/proc/version.c
54++++ linux-3.10.33/fs/proc/version.c
5555 @@ -32,3 +32,10 @@ static int __init proc_version_init(void
5656 return 0;
5757 }
@@ -59,12 +59,12 @@
5959 +
6060 +static int __init ccs_show_version(void)
6161 +{
62-+ printk(KERN_INFO "Hook version: 3.10.31 2014/02/22\n");
62++ printk(KERN_INFO "Hook version: 3.10.33 2014/03/10\n");
6363 + return 0;
6464 +}
6565 +module_init(ccs_show_version);
66---- linux-3.10.31.orig/include/linux/init_task.h
67-+++ linux-3.10.31/include/linux/init_task.h
66+--- linux-3.10.33.orig/include/linux/init_task.h
67++++ linux-3.10.33/include/linux/init_task.h
6868 @@ -154,6 +154,14 @@ extern struct task_group root_task_group
6969
7070 #define INIT_TASK_COMM "swapper"
@@ -88,8 +88,8 @@
8888 }
8989
9090
91---- linux-3.10.31.orig/include/linux/sched.h
92-+++ linux-3.10.31/include/linux/sched.h
91+--- linux-3.10.33.orig/include/linux/sched.h
92++++ linux-3.10.33/include/linux/sched.h
9393 @@ -4,6 +4,8 @@
9494 #include <uapi/linux/sched.h>
9595
@@ -110,8 +110,8 @@
110110 };
111111
112112 /* Future-safe accessor for struct task_struct's cpus_allowed. */
113---- linux-3.10.31.orig/include/linux/security.h
114-+++ linux-3.10.31/include/linux/security.h
113+--- linux-3.10.33.orig/include/linux/security.h
114++++ linux-3.10.33/include/linux/security.h
115115 @@ -52,6 +52,7 @@ struct msg_queue;
116116 struct xattr;
117117 struct xfrm_sec_ctx;
@@ -313,8 +313,8 @@
313313 }
314314 #endif /* CONFIG_SECURITY_PATH */
315315
316---- linux-3.10.31.orig/include/net/ip.h
317-+++ linux-3.10.31/include/net/ip.h
316+--- linux-3.10.33.orig/include/net/ip.h
317++++ linux-3.10.33/include/net/ip.h
318318 @@ -205,6 +205,8 @@ extern void inet_get_local_port_range(in
319319 extern unsigned long *sysctl_local_reserved_ports;
320320 static inline int inet_is_reserved_local_port(int port)
@@ -324,8 +324,8 @@
324324 return test_bit(port, sysctl_local_reserved_ports);
325325 }
326326
327---- linux-3.10.31.orig/kernel/fork.c
328-+++ linux-3.10.31/kernel/fork.c
327+--- linux-3.10.33.orig/kernel/fork.c
328++++ linux-3.10.33/kernel/fork.c
329329 @@ -242,6 +242,7 @@ void __put_task_struct(struct task_struc
330330 delayacct_tsk_free(tsk);
331331 put_signal_struct(tsk->signal);
@@ -352,8 +352,8 @@
352352 bad_fork_cleanup_policy:
353353 perf_event_free_task(p);
354354 #ifdef CONFIG_NUMA
355---- linux-3.10.31.orig/kernel/kexec.c
356-+++ linux-3.10.31/kernel/kexec.c
355+--- linux-3.10.33.orig/kernel/kexec.c
356++++ linux-3.10.33/kernel/kexec.c
357357 @@ -37,6 +37,7 @@
358358 #include <asm/uaccess.h>
359359 #include <asm/io.h>
@@ -371,8 +371,8 @@
371371
372372 /*
373373 * Verify we have a legal set of flags
374---- linux-3.10.31.orig/kernel/module.c
375-+++ linux-3.10.31/kernel/module.c
374+--- linux-3.10.33.orig/kernel/module.c
375++++ linux-3.10.33/kernel/module.c
376376 @@ -63,6 +63,7 @@
377377 #include <linux/fips.h>
378378 #include <uapi/linux/module.h>
@@ -399,8 +399,8 @@
399399
400400 return 0;
401401 }
402---- linux-3.10.31.orig/kernel/ptrace.c
403-+++ linux-3.10.31/kernel/ptrace.c
402+--- linux-3.10.33.orig/kernel/ptrace.c
403++++ linux-3.10.33/kernel/ptrace.c
404404 @@ -998,6 +998,11 @@ SYSCALL_DEFINE4(ptrace, long, request, l
405405 {
406406 struct task_struct *child;
@@ -425,8 +425,8 @@
425425
426426 if (request == PTRACE_TRACEME) {
427427 ret = ptrace_traceme();
428---- linux-3.10.31.orig/kernel/sched/core.c
429-+++ linux-3.10.31/kernel/sched/core.c
428+--- linux-3.10.33.orig/kernel/sched/core.c
429++++ linux-3.10.33/kernel/sched/core.c
430430 @@ -3732,6 +3732,8 @@ int can_nice(const struct task_struct *p
431431 SYSCALL_DEFINE1(nice, int, increment)
432432 {
@@ -436,8 +436,8 @@
436436
437437 /*
438438 * Setpriority might change our priority at the same moment.
439---- linux-3.10.31.orig/kernel/signal.c
440-+++ linux-3.10.31/kernel/signal.c
439+--- linux-3.10.33.orig/kernel/signal.c
440++++ linux-3.10.33/kernel/signal.c
441441 @@ -2909,6 +2909,8 @@ SYSCALL_DEFINE4(rt_sigtimedwait, const s
442442 SYSCALL_DEFINE2(kill, pid_t, pid, int, sig)
443443 {
@@ -483,8 +483,8 @@
483483
484484 return do_send_specific(tgid, pid, sig, info);
485485 }
486---- linux-3.10.31.orig/kernel/sys.c
487-+++ linux-3.10.31/kernel/sys.c
486+--- linux-3.10.33.orig/kernel/sys.c
487++++ linux-3.10.33/kernel/sys.c
488488 @@ -186,6 +186,10 @@ SYSCALL_DEFINE3(setpriority, int, which,
489489
490490 if (which > PRIO_USER || which < PRIO_PROCESS)
@@ -523,8 +523,8 @@
523523
524524 down_write(&uts_sem);
525525 errno = -EFAULT;
526---- linux-3.10.31.orig/kernel/time/ntp.c
527-+++ linux-3.10.31/kernel/time/ntp.c
526+--- linux-3.10.33.orig/kernel/time/ntp.c
527++++ linux-3.10.33/kernel/time/ntp.c
528528 @@ -16,6 +16,7 @@
529529 #include <linux/mm.h>
530530 #include <linux/module.h>
@@ -558,8 +558,8 @@
558558
559559 return 0;
560560 }
561---- linux-3.10.31.orig/net/ipv4/raw.c
562-+++ linux-3.10.31/net/ipv4/raw.c
561+--- linux-3.10.33.orig/net/ipv4/raw.c
562++++ linux-3.10.33/net/ipv4/raw.c
563563 @@ -700,6 +700,10 @@ static int raw_recvmsg(struct kiocb *ioc
564564 skb = skb_recv_datagram(sk, flags, noblock, &err);
565565 if (!skb)
@@ -571,8 +571,8 @@
571571
572572 copied = skb->len;
573573 if (len < copied) {
574---- linux-3.10.31.orig/net/ipv4/udp.c
575-+++ linux-3.10.31/net/ipv4/udp.c
574+--- linux-3.10.33.orig/net/ipv4/udp.c
575++++ linux-3.10.33/net/ipv4/udp.c
576576 @@ -1218,6 +1218,10 @@ try_again:
577577 &peeked, &off, &err);
578578 if (!skb)
@@ -584,8 +584,8 @@
584584
585585 ulen = skb->len - sizeof(struct udphdr);
586586 copied = len;
587---- linux-3.10.31.orig/net/ipv6/raw.c
588-+++ linux-3.10.31/net/ipv6/raw.c
587+--- linux-3.10.33.orig/net/ipv6/raw.c
588++++ linux-3.10.33/net/ipv6/raw.c
589589 @@ -468,6 +468,10 @@ static int rawv6_recvmsg(struct kiocb *i
590590 skb = skb_recv_datagram(sk, flags, noblock, &err);
591591 if (!skb)
@@ -597,8 +597,8 @@
597597
598598 copied = skb->len;
599599 if (copied > len) {
600---- linux-3.10.31.orig/net/ipv6/udp.c
601-+++ linux-3.10.31/net/ipv6/udp.c
600+--- linux-3.10.33.orig/net/ipv6/udp.c
601++++ linux-3.10.33/net/ipv6/udp.c
602602 @@ -384,6 +384,10 @@ try_again:
603603 &peeked, &off, &err);
604604 if (!skb)
@@ -610,8 +610,8 @@
610610
611611 ulen = skb->len - sizeof(struct udphdr);
612612 copied = len;
613---- linux-3.10.31.orig/net/socket.c
614-+++ linux-3.10.31/net/socket.c
613+--- linux-3.10.33.orig/net/socket.c
614++++ linux-3.10.33/net/socket.c
615615 @@ -1611,6 +1611,10 @@ SYSCALL_DEFINE4(accept4, int, fd, struct
616616 if (err < 0)
617617 goto out_fd;
@@ -623,8 +623,8 @@
623623 if (upeer_sockaddr) {
624624 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
625625 &len, 2) < 0) {
626---- linux-3.10.31.orig/net/unix/af_unix.c
627-+++ linux-3.10.31/net/unix/af_unix.c
626+--- linux-3.10.33.orig/net/unix/af_unix.c
627++++ linux-3.10.33/net/unix/af_unix.c
628628 @@ -1814,6 +1814,10 @@ static int unix_dgram_recvmsg(struct kio
629629 wake_up_interruptible_sync_poll(&u->peer_wait,
630630 POLLOUT | POLLWRNORM | POLLWRBAND);
@@ -636,8 +636,8 @@
636636 if (msg->msg_name)
637637 unix_copy_addr(msg, skb->sk);
638638
639---- linux-3.10.31.orig/security/Kconfig
640-+++ linux-3.10.31/security/Kconfig
639+--- linux-3.10.33.orig/security/Kconfig
640++++ linux-3.10.33/security/Kconfig
641641 @@ -167,5 +167,7 @@ config DEFAULT_SECURITY
642642 default "yama" if DEFAULT_SECURITY_YAMA
643643 default "" if DEFAULT_SECURITY_DAC
@@ -646,8 +646,8 @@
646646 +
647647 endmenu
648648
649---- linux-3.10.31.orig/security/Makefile
650-+++ linux-3.10.31/security/Makefile
649+--- linux-3.10.33.orig/security/Makefile
650++++ linux-3.10.33/security/Makefile
651651 @@ -28,3 +28,6 @@ obj-$(CONFIG_CGROUP_DEVICE) += device_c
652652 # Object integrity file lists
653653 subdir-$(CONFIG_INTEGRITY) += integrity
@@ -655,8 +655,8 @@
655655 +
656656 +subdir-$(CONFIG_CCSECURITY) += ccsecurity
657657 +obj-$(CONFIG_CCSECURITY) += ccsecurity/built-in.o
658---- linux-3.10.31.orig/security/security.c
659-+++ linux-3.10.31/security/security.c
658+--- linux-3.10.33.orig/security/security.c
659++++ linux-3.10.33/security/security.c
660660 @@ -202,7 +202,10 @@ int security_syslog(int type)
661661
662662 int security_settime(const struct timespec *ts, const struct timezone *tz)
--- trunk/1.8.x/ccs-patch/patches/ccs-patch-3.12.diff (revision 6315)
+++ trunk/1.8.x/ccs-patch/patches/ccs-patch-3.12.diff (revision 6316)
@@ -1,6 +1,6 @@
1-This is TOMOYO Linux patch for kernel 3.12.12.
1+This is TOMOYO Linux patch for kernel 3.12.13.
22
3-Source code for this patch is https://www.kernel.org/pub/linux/kernel/v3.x/linux-3.12.12.tar.xz
3+Source code for this patch is https://www.kernel.org/pub/linux/kernel/v3.x/linux-3.12.13.tar.xz
44 ---
55 fs/exec.c | 2
66 fs/open.c | 2
@@ -29,8 +29,8 @@
2929 security/security.c | 107 ++++++++++++++++++++++++++++++++++++++++------
3030 25 files changed, 236 insertions(+), 37 deletions(-)
3131
32---- linux-3.12.12.orig/fs/exec.c
33-+++ linux-3.12.12/fs/exec.c
32+--- linux-3.12.13.orig/fs/exec.c
33++++ linux-3.12.13/fs/exec.c
3434 @@ -1434,7 +1434,7 @@ static int exec_binprm(struct linux_binp
3535 old_vpid = task_pid_nr_ns(current, task_active_pid_ns(current->parent));
3636 rcu_read_unlock();
@@ -40,8 +40,8 @@
4040 if (ret >= 0) {
4141 trace_sched_process_exec(current, old_pid, bprm);
4242 ptrace_event(PTRACE_EVENT_EXEC, old_vpid);
43---- linux-3.12.12.orig/fs/open.c
44-+++ linux-3.12.12/fs/open.c
43+--- linux-3.12.13.orig/fs/open.c
44++++ linux-3.12.13/fs/open.c
4545 @@ -1062,6 +1062,8 @@ EXPORT_SYMBOL(sys_close);
4646 */
4747 SYSCALL_DEFINE0(vhangup)
@@ -51,8 +51,8 @@
5151 if (capable(CAP_SYS_TTY_CONFIG)) {
5252 tty_vhangup_self();
5353 return 0;
54---- linux-3.12.12.orig/fs/proc/version.c
55-+++ linux-3.12.12/fs/proc/version.c
54+--- linux-3.12.13.orig/fs/proc/version.c
55++++ linux-3.12.13/fs/proc/version.c
5656 @@ -32,3 +32,10 @@ static int __init proc_version_init(void
5757 return 0;
5858 }
@@ -60,12 +60,12 @@
6060 +
6161 +static int __init ccs_show_version(void)
6262 +{
63-+ printk(KERN_INFO "Hook version: 3.12.12 2014/02/22\n");
63++ printk(KERN_INFO "Hook version: 3.12.13 2014/03/10\n");
6464 + return 0;
6565 +}
6666 +module_init(ccs_show_version);
67---- linux-3.12.12.orig/include/linux/init_task.h
68-+++ linux-3.12.12/include/linux/init_task.h
67+--- linux-3.12.13.orig/include/linux/init_task.h
68++++ linux-3.12.13/include/linux/init_task.h
6969 @@ -154,6 +154,14 @@ extern struct task_group root_task_group
7070
7171 #define INIT_TASK_COMM "swapper"
@@ -89,8 +89,8 @@
8989 }
9090
9191
92---- linux-3.12.12.orig/include/linux/sched.h
93-+++ linux-3.12.12/include/linux/sched.h
92+--- linux-3.12.13.orig/include/linux/sched.h
93++++ linux-3.12.13/include/linux/sched.h
9494 @@ -4,6 +4,8 @@
9595 #include <uapi/linux/sched.h>
9696
@@ -111,8 +111,8 @@
111111 };
112112
113113 /* Future-safe accessor for struct task_struct's cpus_allowed. */
114---- linux-3.12.12.orig/include/linux/security.h
115-+++ linux-3.12.12/include/linux/security.h
114+--- linux-3.12.13.orig/include/linux/security.h
115++++ linux-3.12.13/include/linux/security.h
116116 @@ -53,6 +53,7 @@ struct msg_queue;
117117 struct xattr;
118118 struct xfrm_sec_ctx;
@@ -314,8 +314,8 @@
314314 }
315315 #endif /* CONFIG_SECURITY_PATH */
316316
317---- linux-3.12.12.orig/include/net/ip.h
318-+++ linux-3.12.12/include/net/ip.h
317+--- linux-3.12.13.orig/include/net/ip.h
318++++ linux-3.12.13/include/net/ip.h
319319 @@ -215,6 +215,8 @@ extern void inet_get_local_port_range(in
320320 extern unsigned long *sysctl_local_reserved_ports;
321321 static inline int inet_is_reserved_local_port(int port)
@@ -325,8 +325,8 @@
325325 return test_bit(port, sysctl_local_reserved_ports);
326326 }
327327
328---- linux-3.12.12.orig/kernel/fork.c
329-+++ linux-3.12.12/kernel/fork.c
328+--- linux-3.12.13.orig/kernel/fork.c
329++++ linux-3.12.13/kernel/fork.c
330330 @@ -242,6 +242,7 @@ void __put_task_struct(struct task_struc
331331 delayacct_tsk_free(tsk);
332332 put_signal_struct(tsk->signal);
@@ -353,8 +353,8 @@
353353 bad_fork_cleanup_policy:
354354 perf_event_free_task(p);
355355 #ifdef CONFIG_NUMA
356---- linux-3.12.12.orig/kernel/kexec.c
357-+++ linux-3.12.12/kernel/kexec.c
356+--- linux-3.12.13.orig/kernel/kexec.c
357++++ linux-3.12.13/kernel/kexec.c
358358 @@ -37,6 +37,7 @@
359359 #include <asm/uaccess.h>
360360 #include <asm/io.h>
@@ -372,8 +372,8 @@
372372
373373 /*
374374 * Verify we have a legal set of flags
375---- linux-3.12.12.orig/kernel/module.c
376-+++ linux-3.12.12/kernel/module.c
375+--- linux-3.12.13.orig/kernel/module.c
376++++ linux-3.12.13/kernel/module.c
377377 @@ -63,6 +63,7 @@
378378 #include <linux/fips.h>
379379 #include <uapi/linux/module.h>
@@ -400,8 +400,8 @@
400400
401401 return 0;
402402 }
403---- linux-3.12.12.orig/kernel/ptrace.c
404-+++ linux-3.12.12/kernel/ptrace.c
403+--- linux-3.12.13.orig/kernel/ptrace.c
404++++ linux-3.12.13/kernel/ptrace.c
405405 @@ -1038,6 +1038,11 @@ SYSCALL_DEFINE4(ptrace, long, request, l
406406 {
407407 struct task_struct *child;
@@ -426,8 +426,8 @@
426426
427427 if (request == PTRACE_TRACEME) {
428428 ret = ptrace_traceme();
429---- linux-3.12.12.orig/kernel/reboot.c
430-+++ linux-3.12.12/kernel/reboot.c
429+--- linux-3.12.13.orig/kernel/reboot.c
430++++ linux-3.12.13/kernel/reboot.c
431431 @@ -16,6 +16,7 @@
432432 #include <linux/syscalls.h>
433433 #include <linux/syscore_ops.h>
@@ -445,8 +445,8 @@
445445
446446 /*
447447 * If pid namespaces are enabled and the current task is in a child
448---- linux-3.12.12.orig/kernel/sched/core.c
449-+++ linux-3.12.12/kernel/sched/core.c
448+--- linux-3.12.13.orig/kernel/sched/core.c
449++++ linux-3.12.13/kernel/sched/core.c
450450 @@ -3148,6 +3148,8 @@ int can_nice(const struct task_struct *p
451451 SYSCALL_DEFINE1(nice, int, increment)
452452 {
@@ -456,8 +456,8 @@
456456
457457 /*
458458 * Setpriority might change our priority at the same moment.
459---- linux-3.12.12.orig/kernel/signal.c
460-+++ linux-3.12.12/kernel/signal.c
459+--- linux-3.12.13.orig/kernel/signal.c
460++++ linux-3.12.13/kernel/signal.c
461461 @@ -2909,6 +2909,8 @@ SYSCALL_DEFINE4(rt_sigtimedwait, const s
462462 SYSCALL_DEFINE2(kill, pid_t, pid, int, sig)
463463 {
@@ -503,8 +503,8 @@
503503
504504 return do_send_specific(tgid, pid, sig, info);
505505 }
506---- linux-3.12.12.orig/kernel/sys.c
507-+++ linux-3.12.12/kernel/sys.c
506+--- linux-3.12.13.orig/kernel/sys.c
507++++ linux-3.12.13/kernel/sys.c
508508 @@ -172,6 +172,10 @@ SYSCALL_DEFINE3(setpriority, int, which,
509509
510510 if (which > PRIO_USER || which < PRIO_PROCESS)
@@ -534,8 +534,8 @@
534534
535535 down_write(&uts_sem);
536536 errno = -EFAULT;
537---- linux-3.12.12.orig/kernel/time/ntp.c
538-+++ linux-3.12.12/kernel/time/ntp.c
537+--- linux-3.12.13.orig/kernel/time/ntp.c
538++++ linux-3.12.13/kernel/time/ntp.c
539539 @@ -16,6 +16,7 @@
540540 #include <linux/mm.h>
541541 #include <linux/module.h>
@@ -569,8 +569,8 @@
569569
570570 return 0;
571571 }
572---- linux-3.12.12.orig/net/ipv4/raw.c
573-+++ linux-3.12.12/net/ipv4/raw.c
572+--- linux-3.12.13.orig/net/ipv4/raw.c
573++++ linux-3.12.13/net/ipv4/raw.c
574574 @@ -702,6 +702,10 @@ static int raw_recvmsg(struct kiocb *ioc
575575 skb = skb_recv_datagram(sk, flags, noblock, &err);
576576 if (!skb)
@@ -582,8 +582,8 @@
582582
583583 copied = skb->len;
584584 if (len < copied) {
585---- linux-3.12.12.orig/net/ipv4/udp.c
586-+++ linux-3.12.12/net/ipv4/udp.c
585+--- linux-3.12.13.orig/net/ipv4/udp.c
586++++ linux-3.12.13/net/ipv4/udp.c
587587 @@ -1220,6 +1220,10 @@ try_again:
588588 &peeked, &off, &err);
589589 if (!skb)
@@ -595,8 +595,8 @@
595595
596596 ulen = skb->len - sizeof(struct udphdr);
597597 copied = len;
598---- linux-3.12.12.orig/net/ipv6/raw.c
599-+++ linux-3.12.12/net/ipv6/raw.c
598+--- linux-3.12.13.orig/net/ipv6/raw.c
599++++ linux-3.12.13/net/ipv6/raw.c
600600 @@ -475,6 +475,10 @@ static int rawv6_recvmsg(struct kiocb *i
601601 skb = skb_recv_datagram(sk, flags, noblock, &err);
602602 if (!skb)
@@ -608,8 +608,8 @@
608608
609609 copied = skb->len;
610610 if (copied > len) {
611---- linux-3.12.12.orig/net/ipv6/udp.c
612-+++ linux-3.12.12/net/ipv6/udp.c
611+--- linux-3.12.13.orig/net/ipv6/udp.c
612++++ linux-3.12.13/net/ipv6/udp.c
613613 @@ -385,6 +385,10 @@ try_again:
614614 &peeked, &off, &err);
615615 if (!skb)
@@ -621,8 +621,8 @@
621621
622622 ulen = skb->len - sizeof(struct udphdr);
623623 copied = len;
624---- linux-3.12.12.orig/net/socket.c
625-+++ linux-3.12.12/net/socket.c
624+--- linux-3.12.13.orig/net/socket.c
625++++ linux-3.12.13/net/socket.c
626626 @@ -1619,6 +1619,10 @@ SYSCALL_DEFINE4(accept4, int, fd, struct
627627 if (err < 0)
628628 goto out_fd;
@@ -634,8 +634,8 @@
634634 if (upeer_sockaddr) {
635635 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
636636 &len, 2) < 0) {
637---- linux-3.12.12.orig/net/unix/af_unix.c
638-+++ linux-3.12.12/net/unix/af_unix.c
637+--- linux-3.12.13.orig/net/unix/af_unix.c
638++++ linux-3.12.13/net/unix/af_unix.c
639639 @@ -1807,6 +1807,10 @@ static int unix_dgram_recvmsg(struct kio
640640 wake_up_interruptible_sync_poll(&u->peer_wait,
641641 POLLOUT | POLLWRNORM | POLLWRBAND);
@@ -647,8 +647,8 @@
647647 if (msg->msg_name)
648648 unix_copy_addr(msg, skb->sk);
649649
650---- linux-3.12.12.orig/security/Kconfig
651-+++ linux-3.12.12/security/Kconfig
650+--- linux-3.12.13.orig/security/Kconfig
651++++ linux-3.12.13/security/Kconfig
652652 @@ -167,5 +167,7 @@ config DEFAULT_SECURITY
653653 default "yama" if DEFAULT_SECURITY_YAMA
654654 default "" if DEFAULT_SECURITY_DAC
@@ -657,8 +657,8 @@
657657 +
658658 endmenu
659659
660---- linux-3.12.12.orig/security/Makefile
661-+++ linux-3.12.12/security/Makefile
660+--- linux-3.12.13.orig/security/Makefile
661++++ linux-3.12.13/security/Makefile
662662 @@ -28,3 +28,6 @@ obj-$(CONFIG_CGROUP_DEVICE) += device_c
663663 # Object integrity file lists
664664 subdir-$(CONFIG_INTEGRITY) += integrity
@@ -666,8 +666,8 @@
666666 +
667667 +subdir-$(CONFIG_CCSECURITY) += ccsecurity
668668 +obj-$(CONFIG_CCSECURITY) += ccsecurity/built-in.o
669---- linux-3.12.12.orig/security/security.c
670-+++ linux-3.12.12/security/security.c
669+--- linux-3.12.13.orig/security/security.c
670++++ linux-3.12.13/security/security.c
671671 @@ -203,7 +203,10 @@ int security_syslog(int type)
672672
673673 int security_settime(const struct timespec *ts, const struct timezone *tz)
--- trunk/1.8.x/ccs-patch/patches/ccs-patch-3.14.diff (revision 6315)
+++ trunk/1.8.x/ccs-patch/patches/ccs-patch-3.14.diff (revision 6316)
@@ -1,6 +1,6 @@
1-This is TOMOYO Linux patch for kernel 3.14-rc3.
1+This is TOMOYO Linux patch for kernel 3.14-rc6.
22
3-Source code for this patch is https://www.kernel.org/pub/linux/kernel/v3.x/testing/linux-3.14-rc3.tar.xz
3+Source code for this patch is https://www.kernel.org/pub/linux/kernel/v3.x/testing/linux-3.14-rc6.tar.xz
44 ---
55 fs/exec.c | 2
66 fs/open.c | 2
@@ -29,8 +29,8 @@
2929 security/security.c | 107 ++++++++++++++++++++++++++++++++++++++++------
3030 25 files changed, 236 insertions(+), 37 deletions(-)
3131
32---- linux-3.14-rc3.orig/fs/exec.c
33-+++ linux-3.14-rc3/fs/exec.c
32+--- linux-3.14-rc6.orig/fs/exec.c
33++++ linux-3.14-rc6/fs/exec.c
3434 @@ -1423,7 +1423,7 @@ static int exec_binprm(struct linux_binp
3535 old_vpid = task_pid_nr_ns(current, task_active_pid_ns(current->parent));
3636 rcu_read_unlock();
@@ -40,8 +40,8 @@
4040 if (ret >= 0) {
4141 audit_bprm(bprm);
4242 trace_sched_process_exec(current, old_pid, bprm);
43---- linux-3.14-rc3.orig/fs/open.c
44-+++ linux-3.14-rc3/fs/open.c
43+--- linux-3.14-rc6.orig/fs/open.c
44++++ linux-3.14-rc6/fs/open.c
4545 @@ -1078,6 +1078,8 @@ EXPORT_SYMBOL(sys_close);
4646 */
4747 SYSCALL_DEFINE0(vhangup)
@@ -51,8 +51,8 @@
5151 if (capable(CAP_SYS_TTY_CONFIG)) {
5252 tty_vhangup_self();
5353 return 0;
54---- linux-3.14-rc3.orig/fs/proc/version.c
55-+++ linux-3.14-rc3/fs/proc/version.c
54+--- linux-3.14-rc6.orig/fs/proc/version.c
55++++ linux-3.14-rc6/fs/proc/version.c
5656 @@ -32,3 +32,10 @@ static int __init proc_version_init(void
5757 return 0;
5858 }
@@ -60,12 +60,12 @@
6060 +
6161 +static int __init ccs_show_version(void)
6262 +{
63-+ printk(KERN_INFO "Hook version: 3.14-rc3 2014/02/22\n");
63++ printk(KERN_INFO "Hook version: 3.14-rc6 2014/03/10\n");
6464 + return 0;
6565 +}
6666 +fs_initcall(ccs_show_version);
67---- linux-3.14-rc3.orig/include/linux/init_task.h
68-+++ linux-3.14-rc3/include/linux/init_task.h
67+--- linux-3.14-rc6.orig/include/linux/init_task.h
68++++ linux-3.14-rc6/include/linux/init_task.h
6969 @@ -164,6 +164,14 @@ extern struct task_group root_task_group
7070 # define INIT_RT_MUTEXES(tsk)
7171 #endif
@@ -89,8 +89,8 @@
8989 }
9090
9191
92---- linux-3.14-rc3.orig/include/linux/sched.h
93-+++ linux-3.14-rc3/include/linux/sched.h
92+--- linux-3.14-rc6.orig/include/linux/sched.h
93++++ linux-3.14-rc6/include/linux/sched.h
9494 @@ -4,6 +4,8 @@
9595 #include <uapi/linux/sched.h>
9696
@@ -111,8 +111,8 @@
111111 };
112112
113113 /* Future-safe accessor for struct task_struct's cpus_allowed. */
114---- linux-3.14-rc3.orig/include/linux/security.h
115-+++ linux-3.14-rc3/include/linux/security.h
114+--- linux-3.14-rc6.orig/include/linux/security.h
115++++ linux-3.14-rc6/include/linux/security.h
116116 @@ -53,6 +53,7 @@ struct msg_queue;
117117 struct xattr;
118118 struct xfrm_sec_ctx;
@@ -314,8 +314,8 @@
314314 }
315315 #endif /* CONFIG_SECURITY_PATH */
316316
317---- linux-3.14-rc3.orig/include/net/ip.h
318-+++ linux-3.14-rc3/include/net/ip.h
317+--- linux-3.14-rc6.orig/include/net/ip.h
318++++ linux-3.14-rc6/include/net/ip.h
319319 @@ -217,6 +217,8 @@ void inet_get_local_port_range(struct ne
320320 extern unsigned long *sysctl_local_reserved_ports;
321321 static inline int inet_is_reserved_local_port(int port)
@@ -325,8 +325,8 @@
325325 return test_bit(port, sysctl_local_reserved_ports);
326326 }
327327
328---- linux-3.14-rc3.orig/kernel/fork.c
329-+++ linux-3.14-rc3/kernel/fork.c
328+--- linux-3.14-rc6.orig/kernel/fork.c
329++++ linux-3.14-rc6/kernel/fork.c
330330 @@ -242,6 +242,7 @@ void __put_task_struct(struct task_struc
331331 delayacct_tsk_free(tsk);
332332 put_signal_struct(tsk->signal);
@@ -353,8 +353,8 @@
353353 bad_fork_cleanup_policy:
354354 perf_event_free_task(p);
355355 #ifdef CONFIG_NUMA
356---- linux-3.14-rc3.orig/kernel/kexec.c
357-+++ linux-3.14-rc3/kernel/kexec.c
356+--- linux-3.14-rc6.orig/kernel/kexec.c
357++++ linux-3.14-rc6/kernel/kexec.c
358358 @@ -37,6 +37,7 @@
359359 #include <asm/uaccess.h>
360360 #include <asm/io.h>
@@ -372,8 +372,8 @@
372372
373373 /*
374374 * Verify we have a legal set of flags
375---- linux-3.14-rc3.orig/kernel/module.c
376-+++ linux-3.14-rc3/kernel/module.c
375+--- linux-3.14-rc6.orig/kernel/module.c
376++++ linux-3.14-rc6/kernel/module.c
377377 @@ -63,6 +63,7 @@
378378 #include <linux/fips.h>
379379 #include <uapi/linux/module.h>
@@ -400,8 +400,8 @@
400400
401401 return 0;
402402 }
403---- linux-3.14-rc3.orig/kernel/ptrace.c
404-+++ linux-3.14-rc3/kernel/ptrace.c
403+--- linux-3.14-rc6.orig/kernel/ptrace.c
404++++ linux-3.14-rc6/kernel/ptrace.c
405405 @@ -1038,6 +1038,11 @@ SYSCALL_DEFINE4(ptrace, long, request, l
406406 {
407407 struct task_struct *child;
@@ -426,8 +426,8 @@
426426
427427 if (request == PTRACE_TRACEME) {
428428 ret = ptrace_traceme();
429---- linux-3.14-rc3.orig/kernel/reboot.c
430-+++ linux-3.14-rc3/kernel/reboot.c
429+--- linux-3.14-rc6.orig/kernel/reboot.c
430++++ linux-3.14-rc6/kernel/reboot.c
431431 @@ -16,6 +16,7 @@
432432 #include <linux/syscalls.h>
433433 #include <linux/syscore_ops.h>
@@ -445,8 +445,8 @@
445445
446446 /*
447447 * If pid namespaces are enabled and the current task is in a child
448---- linux-3.14-rc3.orig/kernel/sched/core.c
449-+++ linux-3.14-rc3/kernel/sched/core.c
448+--- linux-3.14-rc6.orig/kernel/sched/core.c
449++++ linux-3.14-rc6/kernel/sched/core.c
450450 @@ -3065,6 +3065,8 @@ int can_nice(const struct task_struct *p
451451 SYSCALL_DEFINE1(nice, int, increment)
452452 {
@@ -456,8 +456,8 @@
456456
457457 /*
458458 * Setpriority might change our priority at the same moment.
459---- linux-3.14-rc3.orig/kernel/signal.c
460-+++ linux-3.14-rc3/kernel/signal.c
459+--- linux-3.14-rc6.orig/kernel/signal.c
460++++ linux-3.14-rc6/kernel/signal.c
461461 @@ -2909,6 +2909,8 @@ SYSCALL_DEFINE4(rt_sigtimedwait, const s
462462 SYSCALL_DEFINE2(kill, pid_t, pid, int, sig)
463463 {
@@ -503,8 +503,8 @@
503503
504504 return do_send_specific(tgid, pid, sig, info);
505505 }
506---- linux-3.14-rc3.orig/kernel/sys.c
507-+++ linux-3.14-rc3/kernel/sys.c
506+--- linux-3.14-rc6.orig/kernel/sys.c
507++++ linux-3.14-rc6/kernel/sys.c
508508 @@ -171,6 +171,10 @@ SYSCALL_DEFINE3(setpriority, int, which,
509509
510510 if (which > PRIO_USER || which < PRIO_PROCESS)
@@ -534,8 +534,8 @@
534534
535535 down_write(&uts_sem);
536536 errno = -EFAULT;
537---- linux-3.14-rc3.orig/kernel/time/ntp.c
538-+++ linux-3.14-rc3/kernel/time/ntp.c
537+--- linux-3.14-rc6.orig/kernel/time/ntp.c
538++++ linux-3.14-rc6/kernel/time/ntp.c
539539 @@ -16,6 +16,7 @@
540540 #include <linux/mm.h>
541541 #include <linux/module.h>
@@ -569,8 +569,8 @@
569569
570570 return 0;
571571 }
572---- linux-3.14-rc3.orig/net/ipv4/raw.c
573-+++ linux-3.14-rc3/net/ipv4/raw.c
572+--- linux-3.14-rc6.orig/net/ipv4/raw.c
573++++ linux-3.14-rc6/net/ipv4/raw.c
574574 @@ -704,6 +704,10 @@ static int raw_recvmsg(struct kiocb *ioc
575575 skb = skb_recv_datagram(sk, flags, noblock, &err);
576576 if (!skb)
@@ -582,8 +582,8 @@
582582
583583 copied = skb->len;
584584 if (len < copied) {
585---- linux-3.14-rc3.orig/net/ipv4/udp.c
586-+++ linux-3.14-rc3/net/ipv4/udp.c
585+--- linux-3.14-rc6.orig/net/ipv4/udp.c
586++++ linux-3.14-rc6/net/ipv4/udp.c
587587 @@ -1242,6 +1242,10 @@ try_again:
588588 &peeked, &off, &err);
589589 if (!skb)
@@ -595,8 +595,8 @@
595595
596596 ulen = skb->len - sizeof(struct udphdr);
597597 copied = len;
598---- linux-3.14-rc3.orig/net/ipv6/raw.c
599-+++ linux-3.14-rc3/net/ipv6/raw.c
598+--- linux-3.14-rc6.orig/net/ipv6/raw.c
599++++ linux-3.14-rc6/net/ipv6/raw.c
600600 @@ -478,6 +478,10 @@ static int rawv6_recvmsg(struct kiocb *i
601601 skb = skb_recv_datagram(sk, flags, noblock, &err);
602602 if (!skb)
@@ -608,8 +608,8 @@
608608
609609 copied = skb->len;
610610 if (copied > len) {
611---- linux-3.14-rc3.orig/net/ipv6/udp.c
612-+++ linux-3.14-rc3/net/ipv6/udp.c
611+--- linux-3.14-rc6.orig/net/ipv6/udp.c
612++++ linux-3.14-rc6/net/ipv6/udp.c
613613 @@ -403,6 +403,10 @@ try_again:
614614 &peeked, &off, &err);
615615 if (!skb)
@@ -621,8 +621,8 @@
621621
622622 ulen = skb->len - sizeof(struct udphdr);
623623 copied = len;
624---- linux-3.14-rc3.orig/net/socket.c
625-+++ linux-3.14-rc3/net/socket.c
624+--- linux-3.14-rc6.orig/net/socket.c
625++++ linux-3.14-rc6/net/socket.c
626626 @@ -1632,6 +1632,10 @@ SYSCALL_DEFINE4(accept4, int, fd, struct
627627 if (err < 0)
628628 goto out_fd;
@@ -634,8 +634,8 @@
634634 if (upeer_sockaddr) {
635635 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
636636 &len, 2) < 0) {
637---- linux-3.14-rc3.orig/net/unix/af_unix.c
638-+++ linux-3.14-rc3/net/unix/af_unix.c
637+--- linux-3.14-rc6.orig/net/unix/af_unix.c
638++++ linux-3.14-rc6/net/unix/af_unix.c
639639 @@ -1809,6 +1809,10 @@ static int unix_dgram_recvmsg(struct kio
640640 wake_up_interruptible_sync_poll(&u->peer_wait,
641641 POLLOUT | POLLWRNORM | POLLWRBAND);
@@ -647,8 +647,8 @@
647647 if (msg->msg_name)
648648 unix_copy_addr(msg, skb->sk);
649649
650---- linux-3.14-rc3.orig/security/Kconfig
651-+++ linux-3.14-rc3/security/Kconfig
650+--- linux-3.14-rc6.orig/security/Kconfig
651++++ linux-3.14-rc6/security/Kconfig
652652 @@ -167,5 +167,7 @@ config DEFAULT_SECURITY
653653 default "yama" if DEFAULT_SECURITY_YAMA
654654 default "" if DEFAULT_SECURITY_DAC
@@ -657,8 +657,8 @@
657657 +
658658 endmenu
659659
660---- linux-3.14-rc3.orig/security/Makefile
661-+++ linux-3.14-rc3/security/Makefile
660+--- linux-3.14-rc6.orig/security/Makefile
661++++ linux-3.14-rc6/security/Makefile
662662 @@ -27,3 +27,6 @@ obj-$(CONFIG_CGROUP_DEVICE) += device_c
663663 # Object integrity file lists
664664 subdir-$(CONFIG_INTEGRITY) += integrity
@@ -666,8 +666,8 @@
666666 +
667667 +subdir-$(CONFIG_CCSECURITY) += ccsecurity
668668 +obj-$(CONFIG_CCSECURITY) += ccsecurity/built-in.o
669---- linux-3.14-rc3.orig/security/security.c
670-+++ linux-3.14-rc3/security/security.c
669+--- linux-3.14-rc6.orig/security/security.c
670++++ linux-3.14-rc6/security/security.c
671671 @@ -203,7 +203,10 @@ int security_syslog(int type)
672672
673673 int security_settime(const struct timespec *ts, const struct timezone *tz)
--- trunk/1.8.x/ccs-patch/patches/ccs-patch-3.4.diff (revision 6315)
+++ trunk/1.8.x/ccs-patch/patches/ccs-patch-3.4.diff (revision 6316)
@@ -1,6 +1,6 @@
1-This is TOMOYO Linux patch for kernel 3.4.81.
1+This is TOMOYO Linux patch for kernel 3.4.82.
22
3-Source code for this patch is https://www.kernel.org/pub/linux/kernel/v3.x/linux-3.4.81.tar.xz
3+Source code for this patch is https://www.kernel.org/pub/linux/kernel/v3.x/linux-3.4.82.tar.xz
44 ---
55 fs/exec.c | 2
66 fs/open.c | 2
@@ -28,8 +28,8 @@
2828 security/security.c | 134 +++++++++++++++++++++++++++++++++++++---------
2929 24 files changed, 250 insertions(+), 49 deletions(-)
3030
31---- linux-3.4.81.orig/fs/exec.c
32-+++ linux-3.4.81/fs/exec.c
31+--- linux-3.4.82.orig/fs/exec.c
32++++ linux-3.4.82/fs/exec.c
3333 @@ -1562,7 +1562,7 @@ static int do_execve_common(const char *
3434 if (retval < 0)
3535 goto out;
@@ -39,8 +39,8 @@
3939 if (retval < 0)
4040 goto out;
4141
42---- linux-3.4.81.orig/fs/open.c
43-+++ linux-3.4.81/fs/open.c
42+--- linux-3.4.82.orig/fs/open.c
43++++ linux-3.4.82/fs/open.c
4444 @@ -1107,6 +1107,8 @@ EXPORT_SYMBOL(sys_close);
4545 */
4646 SYSCALL_DEFINE0(vhangup)
@@ -50,8 +50,8 @@
5050 if (capable(CAP_SYS_TTY_CONFIG)) {
5151 tty_vhangup_self();
5252 return 0;
53---- linux-3.4.81.orig/fs/proc/version.c
54-+++ linux-3.4.81/fs/proc/version.c
53+--- linux-3.4.82.orig/fs/proc/version.c
54++++ linux-3.4.82/fs/proc/version.c
5555 @@ -32,3 +32,10 @@ static int __init proc_version_init(void
5656 return 0;
5757 }
@@ -59,12 +59,12 @@
5959 +
6060 +static int __init ccs_show_version(void)
6161 +{
62-+ printk(KERN_INFO "Hook version: 3.4.81 2014/02/22\n");
62++ printk(KERN_INFO "Hook version: 3.4.82 2014/03/10\n");
6363 + return 0;
6464 +}
6565 +module_init(ccs_show_version);
66---- linux-3.4.81.orig/include/linux/init_task.h
67-+++ linux-3.4.81/include/linux/init_task.h
66+--- linux-3.4.82.orig/include/linux/init_task.h
67++++ linux-3.4.82/include/linux/init_task.h
6868 @@ -143,6 +143,14 @@ extern struct task_group root_task_group
6969
7070 #define INIT_TASK_COMM "swapper"
@@ -88,8 +88,8 @@
8888 }
8989
9090
91---- linux-3.4.81.orig/include/linux/sched.h
92-+++ linux-3.4.81/include/linux/sched.h
91+--- linux-3.4.82.orig/include/linux/sched.h
92++++ linux-3.4.82/include/linux/sched.h
9393 @@ -44,6 +44,8 @@
9494
9595 #ifdef __KERNEL__
@@ -110,8 +110,8 @@
110110 };
111111
112112 /* Future-safe accessor for struct task_struct's cpus_allowed. */
113---- linux-3.4.81.orig/include/linux/security.h
114-+++ linux-3.4.81/include/linux/security.h
113+--- linux-3.4.82.orig/include/linux/security.h
114++++ linux-3.4.82/include/linux/security.h
115115 @@ -52,6 +52,7 @@ struct msg_queue;
116116 struct xattr;
117117 struct xfrm_sec_ctx;
@@ -313,8 +313,8 @@
313313 }
314314 #endif /* CONFIG_SECURITY_PATH */
315315
316---- linux-3.4.81.orig/include/net/ip.h
317-+++ linux-3.4.81/include/net/ip.h
316+--- linux-3.4.82.orig/include/net/ip.h
317++++ linux-3.4.82/include/net/ip.h
318318 @@ -217,6 +217,8 @@ extern void inet_get_local_port_range(in
319319 extern unsigned long *sysctl_local_reserved_ports;
320320 static inline int inet_is_reserved_local_port(int port)
@@ -324,8 +324,8 @@
324324 return test_bit(port, sysctl_local_reserved_ports);
325325 }
326326
327---- linux-3.4.81.orig/kernel/fork.c
328-+++ linux-3.4.81/kernel/fork.c
327+--- linux-3.4.82.orig/kernel/fork.c
328++++ linux-3.4.82/kernel/fork.c
329329 @@ -199,6 +199,7 @@ void __put_task_struct(struct task_struc
330330 delayacct_tsk_free(tsk);
331331 put_signal_struct(tsk->signal);
@@ -352,8 +352,8 @@
352352 bad_fork_cleanup_policy:
353353 perf_event_free_task(p);
354354 #ifdef CONFIG_NUMA
355---- linux-3.4.81.orig/kernel/kexec.c
356-+++ linux-3.4.81/kernel/kexec.c
355+--- linux-3.4.82.orig/kernel/kexec.c
356++++ linux-3.4.82/kernel/kexec.c
357357 @@ -38,6 +38,7 @@
358358 #include <asm/uaccess.h>
359359 #include <asm/io.h>
@@ -371,8 +371,8 @@
371371
372372 /*
373373 * Verify we have a legal set of flags
374---- linux-3.4.81.orig/kernel/module.c
375-+++ linux-3.4.81/kernel/module.c
374+--- linux-3.4.82.orig/kernel/module.c
375++++ linux-3.4.82/kernel/module.c
376376 @@ -58,6 +58,7 @@
377377 #include <linux/jump_label.h>
378378 #include <linux/pfn.h>
@@ -399,8 +399,8 @@
399399
400400 /* Do all the hard work */
401401 mod = load_module(umod, len, uargs);
402---- linux-3.4.81.orig/kernel/ptrace.c
403-+++ linux-3.4.81/kernel/ptrace.c
402+--- linux-3.4.82.orig/kernel/ptrace.c
403++++ linux-3.4.82/kernel/ptrace.c
404404 @@ -900,6 +900,11 @@ SYSCALL_DEFINE4(ptrace, long, request, l
405405 {
406406 struct task_struct *child;
@@ -425,8 +425,8 @@
425425
426426 if (request == PTRACE_TRACEME) {
427427 ret = ptrace_traceme();
428---- linux-3.4.81.orig/kernel/sched/core.c
429-+++ linux-3.4.81/kernel/sched/core.c
428+--- linux-3.4.82.orig/kernel/sched/core.c
429++++ linux-3.4.82/kernel/sched/core.c
430430 @@ -4121,6 +4121,8 @@ int can_nice(const struct task_struct *p
431431 SYSCALL_DEFINE1(nice, int, increment)
432432 {
@@ -436,8 +436,8 @@
436436
437437 /*
438438 * Setpriority might change our priority at the same moment.
439---- linux-3.4.81.orig/kernel/signal.c
440-+++ linux-3.4.81/kernel/signal.c
439+--- linux-3.4.82.orig/kernel/signal.c
440++++ linux-3.4.82/kernel/signal.c
441441 @@ -2825,6 +2825,8 @@ SYSCALL_DEFINE4(rt_sigtimedwait, const s
442442 SYSCALL_DEFINE2(kill, pid_t, pid, int, sig)
443443 {
@@ -483,8 +483,8 @@
483483
484484 return do_send_specific(tgid, pid, sig, info);
485485 }
486---- linux-3.4.81.orig/kernel/sys.c
487-+++ linux-3.4.81/kernel/sys.c
486+--- linux-3.4.82.orig/kernel/sys.c
487++++ linux-3.4.82/kernel/sys.c
488488 @@ -180,6 +180,10 @@ SYSCALL_DEFINE3(setpriority, int, which,
489489
490490 if (which > PRIO_USER || which < PRIO_PROCESS)
@@ -523,8 +523,8 @@
523523
524524 down_write(&uts_sem);
525525 errno = -EFAULT;
526---- linux-3.4.81.orig/kernel/time/ntp.c
527-+++ linux-3.4.81/kernel/time/ntp.c
526+--- linux-3.4.82.orig/kernel/time/ntp.c
527++++ linux-3.4.82/kernel/time/ntp.c
528528 @@ -15,6 +15,7 @@
529529 #include <linux/time.h>
530530 #include <linux/mm.h>
@@ -558,8 +558,8 @@
558558 if (!(txc->modes & ADJ_NANO))
559559 delta.tv_nsec *= 1000;
560560 result = timekeeping_inject_offset(&delta);
561---- linux-3.4.81.orig/net/ipv4/raw.c
562-+++ linux-3.4.81/net/ipv4/raw.c
561+--- linux-3.4.82.orig/net/ipv4/raw.c
562++++ linux-3.4.82/net/ipv4/raw.c
563563 @@ -696,6 +696,10 @@ static int raw_recvmsg(struct kiocb *ioc
564564 skb = skb_recv_datagram(sk, flags, noblock, &err);
565565 if (!skb)
@@ -571,8 +571,8 @@
571571
572572 copied = skb->len;
573573 if (len < copied) {
574---- linux-3.4.81.orig/net/ipv4/udp.c
575-+++ linux-3.4.81/net/ipv4/udp.c
574+--- linux-3.4.82.orig/net/ipv4/udp.c
575++++ linux-3.4.82/net/ipv4/udp.c
576576 @@ -1185,6 +1185,10 @@ try_again:
577577 &peeked, &off, &err);
578578 if (!skb)
@@ -584,8 +584,8 @@
584584
585585 ulen = skb->len - sizeof(struct udphdr);
586586 copied = len;
587---- linux-3.4.81.orig/net/ipv6/raw.c
588-+++ linux-3.4.81/net/ipv6/raw.c
587+--- linux-3.4.82.orig/net/ipv6/raw.c
588++++ linux-3.4.82/net/ipv6/raw.c
589589 @@ -466,6 +466,10 @@ static int rawv6_recvmsg(struct kiocb *i
590590 skb = skb_recv_datagram(sk, flags, noblock, &err);
591591 if (!skb)
@@ -597,8 +597,8 @@
597597
598598 copied = skb->len;
599599 if (copied > len) {
600---- linux-3.4.81.orig/net/ipv6/udp.c
601-+++ linux-3.4.81/net/ipv6/udp.c
600+--- linux-3.4.82.orig/net/ipv6/udp.c
601++++ linux-3.4.82/net/ipv6/udp.c
602602 @@ -359,6 +359,10 @@ try_again:
603603 &peeked, &off, &err);
604604 if (!skb)
@@ -610,8 +610,8 @@
610610
611611 ulen = skb->len - sizeof(struct udphdr);
612612 copied = len;
613---- linux-3.4.81.orig/net/socket.c
614-+++ linux-3.4.81/net/socket.c
613+--- linux-3.4.82.orig/net/socket.c
614++++ linux-3.4.82/net/socket.c
615615 @@ -1554,6 +1554,10 @@ SYSCALL_DEFINE4(accept4, int, fd, struct
616616 if (err < 0)
617617 goto out_fd;
@@ -623,8 +623,8 @@
623623 if (upeer_sockaddr) {
624624 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
625625 &len, 2) < 0) {
626---- linux-3.4.81.orig/net/unix/af_unix.c
627-+++ linux-3.4.81/net/unix/af_unix.c
626+--- linux-3.4.82.orig/net/unix/af_unix.c
627++++ linux-3.4.82/net/unix/af_unix.c
628628 @@ -1808,6 +1808,10 @@ static int unix_dgram_recvmsg(struct kio
629629 wake_up_interruptible_sync_poll(&u->peer_wait,
630630 POLLOUT | POLLWRNORM | POLLWRBAND);
@@ -636,8 +636,8 @@
636636 if (msg->msg_name)
637637 unix_copy_addr(msg, skb->sk);
638638
639---- linux-3.4.81.orig/security/Kconfig
640-+++ linux-3.4.81/security/Kconfig
639+--- linux-3.4.82.orig/security/Kconfig
640++++ linux-3.4.82/security/Kconfig
641641 @@ -233,5 +233,7 @@ config DEFAULT_SECURITY
642642 default "yama" if DEFAULT_SECURITY_YAMA
643643 default "" if DEFAULT_SECURITY_DAC
@@ -646,8 +646,8 @@
646646 +
647647 endmenu
648648
649---- linux-3.4.81.orig/security/Makefile
650-+++ linux-3.4.81/security/Makefile
649+--- linux-3.4.82.orig/security/Makefile
650++++ linux-3.4.82/security/Makefile
651651 @@ -28,3 +28,6 @@ obj-$(CONFIG_CGROUP_DEVICE) += device_c
652652 # Object integrity file lists
653653 subdir-$(CONFIG_INTEGRITY) += integrity
@@ -655,8 +655,8 @@
655655 +
656656 +subdir-$(CONFIG_CCSECURITY) += ccsecurity
657657 +obj-$(CONFIG_CCSECURITY) += ccsecurity/built-in.o
658---- linux-3.4.81.orig/security/security.c
659-+++ linux-3.4.81/security/security.c
658+--- linux-3.4.82.orig/security/security.c
659++++ linux-3.4.82/security/security.c
660660 @@ -186,7 +186,10 @@ int security_syslog(int type)
661661
662662 int security_settime(const struct timespec *ts, const struct timezone *tz)
--- trunk/1.8.x/ccs-patch/patches/ccs-patch-3.13.diff (revision 6315)
+++ trunk/1.8.x/ccs-patch/patches/ccs-patch-3.13.diff (revision 6316)
@@ -1,6 +1,6 @@
1-This is TOMOYO Linux patch for kernel 3.13.4.
1+This is TOMOYO Linux patch for kernel 3.13.6.
22
3-Source code for this patch is https://www.kernel.org/pub/linux/kernel/v3.x/linux-3.13.4.tar.xz
3+Source code for this patch is https://www.kernel.org/pub/linux/kernel/v3.x/linux-3.13.6.tar.xz
44 ---
55 fs/exec.c | 2
66 fs/open.c | 2
@@ -29,8 +29,8 @@
2929 security/security.c | 107 ++++++++++++++++++++++++++++++++++++++++------
3030 25 files changed, 236 insertions(+), 37 deletions(-)
3131
32---- linux-3.13.4.orig/fs/exec.c
33-+++ linux-3.13.4/fs/exec.c
32+--- linux-3.13.6.orig/fs/exec.c
33++++ linux-3.13.6/fs/exec.c
3434 @@ -1425,7 +1425,7 @@ static int exec_binprm(struct linux_binp
3535 old_vpid = task_pid_nr_ns(current, task_active_pid_ns(current->parent));
3636 rcu_read_unlock();
@@ -40,8 +40,8 @@
4040 if (ret >= 0) {
4141 audit_bprm(bprm);
4242 trace_sched_process_exec(current, old_pid, bprm);
43---- linux-3.13.4.orig/fs/open.c
44-+++ linux-3.13.4/fs/open.c
43+--- linux-3.13.6.orig/fs/open.c
44++++ linux-3.13.6/fs/open.c
4545 @@ -1078,6 +1078,8 @@ EXPORT_SYMBOL(sys_close);
4646 */
4747 SYSCALL_DEFINE0(vhangup)
@@ -51,8 +51,8 @@
5151 if (capable(CAP_SYS_TTY_CONFIG)) {
5252 tty_vhangup_self();
5353 return 0;
54---- linux-3.13.4.orig/fs/proc/version.c
55-+++ linux-3.13.4/fs/proc/version.c
54+--- linux-3.13.6.orig/fs/proc/version.c
55++++ linux-3.13.6/fs/proc/version.c
5656 @@ -32,3 +32,10 @@ static int __init proc_version_init(void
5757 return 0;
5858 }
@@ -60,12 +60,12 @@
6060 +
6161 +static int __init ccs_show_version(void)
6262 +{
63-+ printk(KERN_INFO "Hook version: 3.13.4 2014/02/22\n");
63++ printk(KERN_INFO "Hook version: 3.13.6 2014/03/10\n");
6464 + return 0;
6565 +}
6666 +module_init(ccs_show_version);
67---- linux-3.13.4.orig/include/linux/init_task.h
68-+++ linux-3.13.4/include/linux/init_task.h
67+--- linux-3.13.6.orig/include/linux/init_task.h
68++++ linux-3.13.6/include/linux/init_task.h
6969 @@ -154,6 +154,14 @@ extern struct task_group root_task_group
7070
7171 #define INIT_TASK_COMM "swapper"
@@ -89,8 +89,8 @@
8989 }
9090
9191
92---- linux-3.13.4.orig/include/linux/sched.h
93-+++ linux-3.13.4/include/linux/sched.h
92+--- linux-3.13.6.orig/include/linux/sched.h
93++++ linux-3.13.6/include/linux/sched.h
9494 @@ -4,6 +4,8 @@
9595 #include <uapi/linux/sched.h>
9696
@@ -111,8 +111,8 @@
111111 };
112112
113113 /* Future-safe accessor for struct task_struct's cpus_allowed. */
114---- linux-3.13.4.orig/include/linux/security.h
115-+++ linux-3.13.4/include/linux/security.h
114+--- linux-3.13.6.orig/include/linux/security.h
115++++ linux-3.13.6/include/linux/security.h
116116 @@ -53,6 +53,7 @@ struct msg_queue;
117117 struct xattr;
118118 struct xfrm_sec_ctx;
@@ -314,8 +314,8 @@
314314 }
315315 #endif /* CONFIG_SECURITY_PATH */
316316
317---- linux-3.13.4.orig/include/net/ip.h
318-+++ linux-3.13.4/include/net/ip.h
317+--- linux-3.13.6.orig/include/net/ip.h
318++++ linux-3.13.6/include/net/ip.h
319319 @@ -222,6 +222,8 @@ void inet_get_local_port_range(struct ne
320320 extern unsigned long *sysctl_local_reserved_ports;
321321 static inline int inet_is_reserved_local_port(int port)
@@ -325,8 +325,8 @@
325325 return test_bit(port, sysctl_local_reserved_ports);
326326 }
327327
328---- linux-3.13.4.orig/kernel/fork.c
329-+++ linux-3.13.4/kernel/fork.c
328+--- linux-3.13.6.orig/kernel/fork.c
329++++ linux-3.13.6/kernel/fork.c
330330 @@ -242,6 +242,7 @@ void __put_task_struct(struct task_struc
331331 delayacct_tsk_free(tsk);
332332 put_signal_struct(tsk->signal);
@@ -353,8 +353,8 @@
353353 bad_fork_cleanup_policy:
354354 perf_event_free_task(p);
355355 #ifdef CONFIG_NUMA
356---- linux-3.13.4.orig/kernel/kexec.c
357-+++ linux-3.13.4/kernel/kexec.c
356+--- linux-3.13.6.orig/kernel/kexec.c
357++++ linux-3.13.6/kernel/kexec.c
358358 @@ -37,6 +37,7 @@
359359 #include <asm/uaccess.h>
360360 #include <asm/io.h>
@@ -372,8 +372,8 @@
372372
373373 /*
374374 * Verify we have a legal set of flags
375---- linux-3.13.4.orig/kernel/module.c
376-+++ linux-3.13.4/kernel/module.c
375+--- linux-3.13.6.orig/kernel/module.c
376++++ linux-3.13.6/kernel/module.c
377377 @@ -63,6 +63,7 @@
378378 #include <linux/fips.h>
379379 #include <uapi/linux/module.h>
@@ -400,8 +400,8 @@
400400
401401 return 0;
402402 }
403---- linux-3.13.4.orig/kernel/ptrace.c
404-+++ linux-3.13.4/kernel/ptrace.c
403+--- linux-3.13.6.orig/kernel/ptrace.c
404++++ linux-3.13.6/kernel/ptrace.c
405405 @@ -1038,6 +1038,11 @@ SYSCALL_DEFINE4(ptrace, long, request, l
406406 {
407407 struct task_struct *child;
@@ -426,8 +426,8 @@
426426
427427 if (request == PTRACE_TRACEME) {
428428 ret = ptrace_traceme();
429---- linux-3.13.4.orig/kernel/reboot.c
430-+++ linux-3.13.4/kernel/reboot.c
429+--- linux-3.13.6.orig/kernel/reboot.c
430++++ linux-3.13.6/kernel/reboot.c
431431 @@ -16,6 +16,7 @@
432432 #include <linux/syscalls.h>
433433 #include <linux/syscore_ops.h>
@@ -445,8 +445,8 @@
445445
446446 /*
447447 * If pid namespaces are enabled and the current task is in a child
448---- linux-3.13.4.orig/kernel/sched/core.c
449-+++ linux-3.13.4/kernel/sched/core.c
448+--- linux-3.13.6.orig/kernel/sched/core.c
449++++ linux-3.13.6/kernel/sched/core.c
450450 @@ -2909,6 +2909,8 @@ int can_nice(const struct task_struct *p
451451 SYSCALL_DEFINE1(nice, int, increment)
452452 {
@@ -456,8 +456,8 @@
456456
457457 /*
458458 * Setpriority might change our priority at the same moment.
459---- linux-3.13.4.orig/kernel/signal.c
460-+++ linux-3.13.4/kernel/signal.c
459+--- linux-3.13.6.orig/kernel/signal.c
460++++ linux-3.13.6/kernel/signal.c
461461 @@ -2909,6 +2909,8 @@ SYSCALL_DEFINE4(rt_sigtimedwait, const s
462462 SYSCALL_DEFINE2(kill, pid_t, pid, int, sig)
463463 {
@@ -503,8 +503,8 @@
503503
504504 return do_send_specific(tgid, pid, sig, info);
505505 }
506---- linux-3.13.4.orig/kernel/sys.c
507-+++ linux-3.13.4/kernel/sys.c
506+--- linux-3.13.6.orig/kernel/sys.c
507++++ linux-3.13.6/kernel/sys.c
508508 @@ -171,6 +171,10 @@ SYSCALL_DEFINE3(setpriority, int, which,
509509
510510 if (which > PRIO_USER || which < PRIO_PROCESS)
@@ -534,8 +534,8 @@
534534
535535 down_write(&uts_sem);
536536 errno = -EFAULT;
537---- linux-3.13.4.orig/kernel/time/ntp.c
538-+++ linux-3.13.4/kernel/time/ntp.c
537+--- linux-3.13.6.orig/kernel/time/ntp.c
538++++ linux-3.13.6/kernel/time/ntp.c
539539 @@ -16,6 +16,7 @@
540540 #include <linux/mm.h>
541541 #include <linux/module.h>
@@ -569,8 +569,8 @@
569569
570570 return 0;
571571 }
572---- linux-3.13.4.orig/net/ipv4/raw.c
573-+++ linux-3.13.4/net/ipv4/raw.c
572+--- linux-3.13.6.orig/net/ipv4/raw.c
573++++ linux-3.13.6/net/ipv4/raw.c
574574 @@ -704,6 +704,10 @@ static int raw_recvmsg(struct kiocb *ioc
575575 skb = skb_recv_datagram(sk, flags, noblock, &err);
576576 if (!skb)
@@ -582,8 +582,8 @@
582582
583583 copied = skb->len;
584584 if (len < copied) {
585---- linux-3.13.4.orig/net/ipv4/udp.c
586-+++ linux-3.13.4/net/ipv4/udp.c
585+--- linux-3.13.6.orig/net/ipv4/udp.c
586++++ linux-3.13.6/net/ipv4/udp.c
587587 @@ -1242,6 +1242,10 @@ try_again:
588588 &peeked, &off, &err);
589589 if (!skb)
@@ -595,8 +595,8 @@
595595
596596 ulen = skb->len - sizeof(struct udphdr);
597597 copied = len;
598---- linux-3.13.4.orig/net/ipv6/raw.c
599-+++ linux-3.13.4/net/ipv6/raw.c
598+--- linux-3.13.6.orig/net/ipv6/raw.c
599++++ linux-3.13.6/net/ipv6/raw.c
600600 @@ -474,6 +474,10 @@ static int rawv6_recvmsg(struct kiocb *i
601601 skb = skb_recv_datagram(sk, flags, noblock, &err);
602602 if (!skb)
@@ -608,8 +608,8 @@
608608
609609 copied = skb->len;
610610 if (copied > len) {
611---- linux-3.13.4.orig/net/ipv6/udp.c
612-+++ linux-3.13.4/net/ipv6/udp.c
611+--- linux-3.13.6.orig/net/ipv6/udp.c
612++++ linux-3.13.6/net/ipv6/udp.c
613613 @@ -403,6 +403,10 @@ try_again:
614614 &peeked, &off, &err);
615615 if (!skb)
@@ -621,8 +621,8 @@
621621
622622 ulen = skb->len - sizeof(struct udphdr);
623623 copied = len;
624---- linux-3.13.4.orig/net/socket.c
625-+++ linux-3.13.4/net/socket.c
624+--- linux-3.13.6.orig/net/socket.c
625++++ linux-3.13.6/net/socket.c
626626 @@ -1619,6 +1619,10 @@ SYSCALL_DEFINE4(accept4, int, fd, struct
627627 if (err < 0)
628628 goto out_fd;
@@ -634,8 +634,8 @@
634634 if (upeer_sockaddr) {
635635 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
636636 &len, 2) < 0) {
637---- linux-3.13.4.orig/net/unix/af_unix.c
638-+++ linux-3.13.4/net/unix/af_unix.c
637+--- linux-3.13.6.orig/net/unix/af_unix.c
638++++ linux-3.13.6/net/unix/af_unix.c
639639 @@ -1807,6 +1807,10 @@ static int unix_dgram_recvmsg(struct kio
640640 wake_up_interruptible_sync_poll(&u->peer_wait,
641641 POLLOUT | POLLWRNORM | POLLWRBAND);
@@ -647,8 +647,8 @@
647647 if (msg->msg_name)
648648 unix_copy_addr(msg, skb->sk);
649649
650---- linux-3.13.4.orig/security/Kconfig
651-+++ linux-3.13.4/security/Kconfig
650+--- linux-3.13.6.orig/security/Kconfig
651++++ linux-3.13.6/security/Kconfig
652652 @@ -167,5 +167,7 @@ config DEFAULT_SECURITY
653653 default "yama" if DEFAULT_SECURITY_YAMA
654654 default "" if DEFAULT_SECURITY_DAC
@@ -657,8 +657,8 @@
657657 +
658658 endmenu
659659
660---- linux-3.13.4.orig/security/Makefile
661-+++ linux-3.13.4/security/Makefile
660+--- linux-3.13.6.orig/security/Makefile
661++++ linux-3.13.6/security/Makefile
662662 @@ -27,3 +27,6 @@ obj-$(CONFIG_CGROUP_DEVICE) += device_c
663663 # Object integrity file lists
664664 subdir-$(CONFIG_INTEGRITY) += integrity
@@ -666,8 +666,8 @@
666666 +
667667 +subdir-$(CONFIG_CCSECURITY) += ccsecurity
668668 +obj-$(CONFIG_CCSECURITY) += ccsecurity/built-in.o
669---- linux-3.13.4.orig/security/security.c
670-+++ linux-3.13.4/security/security.c
669+--- linux-3.13.6.orig/security/security.c
670++++ linux-3.13.6/security/security.c
671671 @@ -203,7 +203,10 @@ int security_syslog(int type)
672672
673673 int security_settime(const struct timespec *ts, const struct timezone *tz)
旧リポジトリブラウザで表示