PERFORCE change 39485 for review

Hrishikesh Dandekar hdandeka at FreeBSD.org
Sat Oct 11 01:07:49 GMT 2003


http://perforce.freebsd.org/chv.cgi?CH=39485

Change 39485 by hdandeka at hdandeka_yash on 2003/10/10 18:07:27

	Make System V IPC and Posix.1b sem related changes.

Affected files ...

.. //depot/projects/trustedbsd/sebsd_policy/policy/flask/access_vectors#3 edit
.. //depot/projects/trustedbsd/sebsd_policy/policy/flask/security_classes#2 edit
.. //depot/projects/trustedbsd/sebsd_policy/policy/macros/global_macros.te#7 edit

Differences ...

==== //depot/projects/trustedbsd/sebsd_policy/policy/flask/access_vectors#3 (text+ko) ====

@@ -261,15 +261,21 @@
 {
 	send
 	receive
+	destroy
 }
 
 class shm
 inherits ipc
+
+class posix_sem
 {
-	lock
+	associate
+	disassociate
+	destroy
+	write
+	read
 }
 
-
 #
 # Define the access vector interpretation for the security server. 
 #

==== //depot/projects/trustedbsd/sebsd_policy/policy/flask/security_classes#2 (text+ko) ====

@@ -40,6 +40,9 @@
 class shm
 class ipc
 
+#Posix.1b-related classes
+class posix_sem
+
 #
 # userspace object manager classes
 #

==== //depot/projects/trustedbsd/sebsd_policy/policy/macros/global_macros.te#7 (text+ko) ====

@@ -163,8 +163,11 @@
 define(`rw_msgq_perms', `{ associate getattr read write enqueue unix_read unix_write }')
 define(`create_msgq_perms', `{ associate getattr setattr create destroy read write enqueue unix_read unix_write }')
 define(`r_shm_perms', `{ associate getattr read unix_read }')
-define(`rw_shm_perms', `{ associate getattr read write lock unix_read unix_write }')
-define(`create_shm_perms', `{ associate getattr setattr create destroy read write lock unix_read unix_write }')
+define(`rw_shm_perms', `{ associate getattr read write unix_read unix_write }')
+define(`create_shm_perms', `{ associate getattr setattr create destroy read write unix_read unix_write }')
+define(`r_posix_sem_perms', `{ associate disassociate read }')
+define(`rw_posix_sem_perms', `{ associate disassociate write read }')
+define(`create_posix_sem_perms', `{ associate disassociate destroy write read }')
 
 #################################
 # 
@@ -719,9 +722,10 @@
 
 # Access System V IPC objects created by processes in the same domain.
 allow $1 self:sem  create_sem_perms;
-allow $1 self:msg  { send receive };
+allow $1 self:msg  { send receive destroy };
 allow $1 self:msgq create_msgq_perms;
 allow $1 self:shm  create_shm_perms;
+allow $1 self:posix_sem  create_posix_sem_perms;
 ')
 
 #
To Unsubscribe: send mail to majordomo at trustedbsd.org
with "unsubscribe trustedbsd-cvs" in the body of the message



More information about the trustedbsd-cvs mailing list