From owner-p4-projects@FreeBSD.ORG Wed Oct 11 17:34:33 2006 Return-Path: X-Original-To: p4-projects@freebsd.org Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id BD4CE16A522; Wed, 11 Oct 2006 17:34:33 +0000 (UTC) X-Original-To: perforce@freebsd.org Delivered-To: perforce@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 96BC116A51F for ; Wed, 11 Oct 2006 17:34:33 +0000 (UTC) (envelope-from millert@freebsd.org) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id CE7CB44104 for ; Wed, 11 Oct 2006 17:26:37 +0000 (GMT) (envelope-from millert@freebsd.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.6/8.13.6) with ESMTP id k9BHQVsf090659 for ; Wed, 11 Oct 2006 17:26:31 GMT (envelope-from millert@freebsd.org) Received: (from perforce@localhost) by repoman.freebsd.org (8.13.6/8.13.4/Submit) id k9BHQVGt090656 for perforce@freebsd.org; Wed, 11 Oct 2006 17:26:31 GMT (envelope-from millert@freebsd.org) Date: Wed, 11 Oct 2006 17:26:31 GMT Message-Id: <200610111726.k9BHQVGt090656@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to millert@freebsd.org using -f From: Todd Miller To: Perforce Change Reviews Cc: Subject: PERFORCE change 107690 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 11 Oct 2006 17:34:34 -0000 http://perforce.freebsd.org/chv.cgi?CH=107690 Change 107690 by millert@millert_macbook on 2006/10/11 17:25:46 Update from bugzilla. Affected files ... .. //depot/projects/trustedbsd/sedarwin8/ERRATA#3 edit Differences ... ==== //depot/projects/trustedbsd/sedarwin8/ERRATA#3 (text+ko) ==== @@ -43,3 +43,20 @@ to get/set this label. Security server methods that return a label handle or text label can use the port label for access control. + +316: vn_rdwr_64() calls mac_vnode_check_{read,write} (). In the case of + Apple Double Extended Attributes the VNODE may not be labeled, + causing problems with policies that expect a valid label. The + current work around involves a new ioflag (IO_NOAUTH) which bypasses + MAC checks. MAC mediation in vn_rdwr_64() needs to be evaluated. + +317: The framework uses the VL_LABELED flag to indicate that a vnode has + been labeled by the framework/policy. This flag is set regardless of + the success/failure of label association/creation. If a policy provides + consistency checking for xattr backed labels and fails to provide a valid + label, the vnode will not have a valid label. Policy and framework + interactions when bad labels is read from the file system needs to be + reviewed. + +321: Additional documentation is needed in mac_policy.h to specify if an + entrypoint may sleep.