オープンソース・ソフトウェアの開発とダウンロード

Subversion リポジトリの参照

Diff of /trunk/1.8.x/ccs-patch/README.ccs

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 4096 by kumaneko, Thu Oct 28 05:37:26 2010 UTC revision 4206 by kumaneko, Fri Dec 17 03:36:18 2010 UTC
# Line 1723  Fix 2008/11/07 Line 1723  Fix 2008/11/07
1723        to see process information. The content of /proc/ccs/.execute_handler is        to see process information. The content of /proc/ccs/.execute_handler is
1724        identical to /proc/ccs/.process_status .        identical to /proc/ccs/.process_status .
1725    
1726  Version 1.6.5   2008/11/11   Third anniversary release.  Version 1.6.5 2008/11/11   Third anniversary release.
1727    
1728  Fix 2008/12/01  Fix 2008/12/01
1729    
# Line 2243  Fix 2009/11/09 Line 2243  Fix 2009/11/09
2243        /proc/ccs/profile (which results in not protecting the system at all),        /proc/ccs/profile (which results in not protecting the system at all),
2244        I added a check for PROFILE_VERSION= .        I added a check for PROFILE_VERSION= .
2245    
2246  Version 1.7.1   2009/11/11   Fourth anniversary release.  Version 1.7.1 2009/11/11   Fourth anniversary release.
2247    
2248  Fix 2009/11/13  Fix 2009/11/13
2249    
# Line 2382  Fix 2010/03/26 Line 2382  Fix 2010/03/26
2382        Since 1.7.0 , ccs_lport_reserved() was by error checking wrong port        Since 1.7.0 , ccs_lport_reserved() was by error checking wrong port
2383        number. As a result, "deny_autobind" keyword was not working as expected.        number. As a result, "deny_autobind" keyword was not working as expected.
2384    
2385  Version 1.7.2   2010/04/01   Feature enhancement release.  Version 1.7.2 2010/04/01   Feature enhancement release.
2386    
2387  Fix 2010/04/10  Fix 2010/04/10
2388    
# Line 2672  Fix 2010/10/28 Line 2672  Fix 2010/10/28
2672          task manual_domain_transition <kernel> //./non-root task.uid!=0          task manual_domain_transition <kernel> //./non-root task.uid!=0
2673    
2674        will jump to "<kernel> //./non-root" domain if current process's UID is        will jump to "<kernel> //./non-root" domain if current process's UID is
2675        not 0 and current process wrote "<kernel> //./non-root" + '\n' to        not 0 and current process wrote "<kernel> //./non-root" to
2676        /proc/ccs/.transition interface.        /proc/ccs/self_domain interface.
2677    
2678        If domain transition failed, current process will be killed by SIGKILL        If domain transition failed, current process will be killed by SIGKILL
2679        signal.        signal.
# Line 2682  Fix 2010/10/28 Line 2682  Fix 2010/10/28
2682    
2683        I merged similar code in order to reduce object's filesize.        I merged similar code in order to reduce object's filesize.
2684    
2685  Version 1.8.0 2010/XX/XX   Feature enhancement release.  Version 1.8.0 2010/11/11   Fifth anniversary release.
2686    
2687    Fix 2010/12/01
2688    
2689        @ Use same interface for audit logs.
2690    
2691          To be able to perform fine grained filtering by /usr/sbin/ccs-auditd ,
2692          I merged /proc/ccs/grant_log and /proc/ccs/reject_log as
2693          /proc/ccs/audit and added granted=yes or granted=no to audit logs.
2694    
2695    Fix 2010/12/17
2696    
2697        @ Split ccs_null_security into ccs_default_security and ccs_oom_security.
2698    
2699          ccs_null_security is used by preserve KABI compatibility option and is
2700          used for providing default values against threads which have not yet
2701          allocated memory for their security contexts.
2702    
2703          If current thread failed to allocate memory for current thread's security
2704          context, current thread uses ccs_null_security. Since current thread is
2705          allowed to modify current thread's security context, current thread might
2706          modify ccs_null_security which should not be modified for any reason.
2707    
2708          Therefore, I split ccs_null_security into ccs_default_security and
2709          ccs_oom_security and use ccs_oom_security when current thread failed to
2710          allocate memory for current thread's security context.
2711    
2712          Threads which do not share ccs_oom_security are not affected by threads
2713          which share ccs_oom_security. Threads which share ccs_oom_security will
2714          experience temporary inconsistency, but such threads are about to be
2715          killed by SIGKILL.

Legend:
Removed from v.4096  
changed lines
  Added in v.4206

Back to OSDN">Back to OSDN
ViewVC Help
Powered by ViewVC 1.1.26