PERFORCE change 107690 for review
Todd Miller
millert at FreeBSD.org
Wed Oct 11 10:45:00 PDT 2006
http://perforce.freebsd.org/chv.cgi?CH=107690
Change 107690 by millert at millert_macbook on 2006/10/11 17:25:46
Update from bugzilla.
Affected files ...
.. //depot/projects/trustedbsd/sedarwin8/ERRATA#3 edit
Differences ...
==== //depot/projects/trustedbsd/sedarwin8/ERRATA#3 (text+ko) ====
@@ -43,3 +43,20 @@
to get/set this label. Security server methods that return a
label handle or text label can use the port label for access
control.
+
+316: vn_rdwr_64() calls mac_vnode_check_{read,write} (). In the case of
+ Apple Double Extended Attributes the VNODE may not be labeled,
+ causing problems with policies that expect a valid label. The
+ current work around involves a new ioflag (IO_NOAUTH) which bypasses
+ MAC checks. MAC mediation in vn_rdwr_64() needs to be evaluated.
+
+317: The framework uses the VL_LABELED flag to indicate that a vnode has
+ been labeled by the framework/policy. This flag is set regardless of
+ the success/failure of label association/creation. If a policy provides
+ consistency checking for xattr backed labels and fails to provide a valid
+ label, the vnode will not have a valid label. Policy and framework
+ interactions when bad labels is read from the file system needs to be
+ reviewed.
+
+321: Additional documentation is needed in mac_policy.h to specify if an
+ entrypoint may sleep.
More information about the trustedbsd-cvs
mailing list