PERFORCE change 92987 for review

Todd Miller millert at FreeBSD.org
Wed Mar 8 13:30:45 PST 2006


http://perforce.freebsd.org/chv.cgi?CH=92987

Change 92987 by millert at millert_g5tower on 2006/03/08 21:29:56

	Removed fixed bugs.

Affected files ...

.. //depot/projects/trustedbsd/sedarwin7/ERRATA#4 edit

Differences ...

==== //depot/projects/trustedbsd/sedarwin7/ERRATA#4 (text+ko) ====

@@ -21,9 +21,6 @@
      PowerBook G4, I see a kernel trap involving IOKit modules within
      15 minutes.
 
- 47: Setpmac-spawned processes hang on exit.  The MLS policy does not
-     permit a lower-priority shell to wait(2) on the child process.
-
  52: The fdsec (filesystem) should have labels - The fdesc file system
      provides /dev/fd entries on darwin instead of implementing this
      within devfs.
@@ -32,10 +29,6 @@
      using extended attributes into a file system that is not using
      extended attributes, the system will eventually deadlock.
 
- 89: SEDarwin policy rejecting access to /dev/null when it should
-     not.  Is the general_file_write_access macro not being applied
-     to users?
-
  91: Users who create and attach new disk images cannot then access them.
 
  93: After reboot, the first time a user logs in, after entering correct
@@ -57,7 +50,7 @@
 109: Commands 'ls -Z' and 'ps -Z' fail when no mac config file
      present.  If there is no MAC config file present (no
      /etc/mac.conf, and $MAC_CONFFILE not set), using the '-Z' flag on
-     the ls or ps command results in 'Bus error'
+     the ls or ps command results in 'Bus error'.  Fixed in DSEP.
 
 117: The mpo_check_port_relabel entry point does not hold the task
      label lock.  Policies implmenting this entry point should
@@ -89,8 +82,9 @@
      label handle or text label can use the port label for access
      control.
 
-239: The SLOT() macro may return NULL in the SEDarwin policy.  This
-     causes a panic in sebsd_externalize_cred_label() when the port
-     that holds the label has already been destroyed.  There appears
-     to be a missing lock or out of order operation since we should
-     not be trying to externalized a dead port.
+XXX: Threads are not labeled, only tasks.  We need to investigate
+     whether threads deserve their own labels.  A task may create
+     a thread in any task it holds the kernel port for.  This means
+     that the task that holds the control port for a thread may be
+     different from the task that actually contains the thread.
+     This may have security implicatons.


More information about the trustedbsd-cvs mailing list