PERFORCE change 113386 for review

Todd Miller millert at FreeBSD.org
Mon Jan 22 20:02:29 UTC 2007


http://perforce.freebsd.org/chv.cgi?CH=113386

Change 113386 by millert at millert_macbook on 2007/01/22 19:53:43

	Add permissions for /var/vm.

Affected files ...

.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/configd.te#11 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/diskarbitrationd.te#10 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/loginwindow.te#8 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/securityd.te#7 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/kernel/files.if#5 edit

Differences ...

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/configd.te#11 (text+ko) ====

@@ -165,6 +165,8 @@
 # Not sure why it wants to search this dir, it should know what it wants
 allow configd_t var_log_t:dir search;
 
+# Search /var/vm
+files_search_vm(securityd_t)
 
 # Read /private
 darwin_allow_private_read(configd_t)

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/diskarbitrationd.te#10 (text+ko) ====

@@ -129,4 +129,5 @@
 # Read fstools files
 fstools_read_files(diskarbitrationd_t)
 
-
+# Search /var/vm
+files_search_vm(diskarbitrationd_t)

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/loginwindow.te#8 (text+ko) ====

@@ -141,6 +141,8 @@
 files_search_var(loginwindow_t)
 files_read_var_symlinks(loginwindow_t)
 
+# Search /var/vm
+files_search_vm(loginwindow_t)
+
 # Write to WTMP
 auth_write_login_records(loginwindow_t)
-

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/securityd.te#7 (text+ko) ====

@@ -48,6 +48,8 @@
 files_manage_var_dirs(securityd_t)
 files_manage_var_symlinks(securityd_t)
 
+# Search /var/vm
+files_search_vm(securityd_t)
 
 # Talk to launchd
 init_allow_ipc(securityd_t)

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/kernel/files.if#5 (text+ko) ====

@@ -4501,6 +4501,25 @@
 
 ########################################
 ## <summary>
+##	Search the contents of vm irectories (/var/vm).
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`files_search_vm',`
+	gen_require(`
+		type var_t, var_vm_t;
+	')
+
+	allow $1 var_t:dir search_dir_perms;
+	allow $1 var_vm_t:dir search_dir_perms;
+')
+
+########################################
+## <summary>
 ##	Unconfined access to files.
 ## </summary>
 ## <param name="domain">


More information about the trustedbsd-cvs mailing list