kern/161350: securelevel 3 can be lowered thru ddb

2011-10-06 Thread David O'Brien

>Number: 161350
>Category:   kern
>Synopsis:   securelevel 3 can be lowered thru ddb
>Confidential:   no
>Severity:   serious
>Priority:   medium
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Oct 07 05:40:07 UTC 2011
>Closed-Date:
>Last-Modified:
>Originator: David O'Brien
>Release:FreeBSD 9.0-CURRENT i386
>Organization:
The FreeBSD Project
>Environment:
System: FreeBSD dragon.NUXI.org 9.0-CURRENT FreeBSD 9.0-CURRENT #669 r223636M: 
Wed Jun 29 17:54:57 PDT 2011 ro...@dragon.nuxi.org:/sys/i386/compile/DRAGON i386
>Description:
'securelevel' is intended to disallow attempts to lower its value
(when set to 1 or larger).

However, one may trivially enter ddb and lower the value.
Given the behavior changes documented in security(7), I believe this
to be against the spirit of 'securelevel' and against the desire of
users of securelevel at 1+.


>How-To-Repeat:
# sysctl kern.securelevel=3
kern.securelevel: 0 -> 3

# sysctl kern.securelevel=0
kern.securelevel: 3
sysctl: kern.securelevel: Operation not permitted

# sysctl debug.kdb.enter=1
KDB: enter: sysctl debug.kdb.enter
[ thread pid 33529 tid 100134 ]
Stopped at 0x808229ab = kdb_enter+0x3b:  movq $0,0x92d732(%rip)
db> print *(prison0 + 0xfc)
   3
db> write (prison0 + 0xfc) 0
0x8103f85c = prison0+0xfc  0x3 = 0
db> print *(prison0 + 0xfc)
   0
db> c
debug.kdb.enter: 0 -> 0

# sysctl kern.securelevel=0
kern.securelevel: 0 -> 0

>Fix:
>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


bin/156817: WITHOUT_CDDL and NO_CTF ignored if WITH_CTF defined

2011-05-04 Thread David O'Brien

>Number: 156817
>Category:   bin
>Synopsis:   WITHOUT_CDDL and NO_CTF ignored if WITH_CTF defined
>Confidential:   no
>Severity:   serious
>Priority:   medium
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed May 04 15:30:09 UTC 2011
>Closed-Date:
>Last-Modified:
>Originator: David O'Brien
>Release:FreeBSD 9.0-CURRENT i386
>Organization:
The FreeBSD Project
>Environment:
System: FreeBSD dragon.NUXI.org 9.0-CURRENT FreeBSD 9.0-CURRENT #664 r221012M: 
Mon Apr 25 08:32:28 PDT 2011 r...@dragon.nuxi.org:/sys/i386/compile/DRAGON i386
>Description:
Starting with r206082 (I believe), the "-DNO_CTF" became ignored
in the "stage 1.1: legacy release compatibility shims",
"stage 1.2: bootstrap tools", "stage 2.3: build tools", and
"stage 3: cross tools" parts of the build if
WITH_CTF=yes is in '/etc/src.conf'.
John Birrell's claim in r179233 is that these stages of the build
do not require CTF conversion.

Additionally, it appears that WITH_CTF now has higher precidence
than WITHOUT_CDDL.  [WITH_CTF=yes in /etc/src.conf combined with
'make -DWITHOUT_CDDL buildworld' or WITHOUT_CDDL=yes in /etc/make.conf]
If so, I feel this is wrong as if someone has set WITHOUT_CDDL
they have strong licensing needs (restrictions).  And so not
running the CTF tools is of lesser importance than accidently
falling into a legal problem.
>How-To-Repeat:
Perform builds with the above settings and look at the output
>Fix:
revisit r206082.

>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/156579: Tweak to Makefile.in to document which kernel is installed

2011-05-04 Thread David O'Brien
On Wed, May 04, 2011 at 04:34:10AM -0700, David Wolfskill wrote:
> Color me foolish.
[..] 
> >>> Installing kernel GENERIC ALBERT JANUS
> which is ... well, neither useful nor the intent.
> 
> I'll see if I can figure out a clean way to acheive the intent.

Please let me know if you have an update.

-- 
-- David  (obr...@freebsd.org)
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"