PERFORCE change 111044 for review
Todd Miller
millert at FreeBSD.org
Mon Dec 4 10:34:13 PST 2006
http://perforce.freebsd.org/chv.cgi?CH=111044
Change 111044 by millert at millert_g5tower on 2006/12/04 18:33:04
Remove includes from sebsd_labels.h
Affected files ...
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/avc/avc.h#7 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/avc/avc_audit.c#2 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/sebsd.c#48 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/sebsd_labels.h#4 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/sebsd_syscall.c#4 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/sebsd_sysctl.c#3 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/ss/init.c#4 edit
Differences ...
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/avc/avc.h#7 (text+ko) ====
@@ -14,6 +14,7 @@
#endif
#include <netinet/in.h>
+#include <security/mac_policy.h>
#include <sedarwin/flask.h>
#include <sedarwin/sebsd.h>
#include <sedarwin/avc/av_permissions.h>
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/avc/avc_audit.c#2 (text+ko) ====
@@ -37,6 +37,7 @@
#include <kern/lock.h>
+#include <security/mac_policy.h>
#include <sedarwin/linux-compat.h>
#include <sedarwin/sebsd.h>
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/sebsd.c#48 (text+ko) ====
@@ -81,9 +81,11 @@
#include <security/mac_policy.h>
#include <security/mac_data.h>
+#include <sedarwin/linux-compat.h>
#include <sedarwin/sebsd.h>
#include <sedarwin/sebsd_alloc.h>
#include <sedarwin/sebsd_labels.h>
+#include <sedarwin/avc/avc.h>
#include <sedarwin/ss/policydb.h>
/*
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/sebsd_labels.h#4 (text+ko) ====
@@ -41,14 +41,10 @@
#ifndef _SYS_SECURITY_SEBSD_LABELS_H
#define _SYS_SECURITY_SEBSD_LABELS_H
-#include <sedarwin/sebsd.h>
-#include <sedarwin/linux-compat.h>
-#include <sedarwin/avc/avc.h>
-
struct task_security_struct {
u_int32_t osid;
u_int32_t sid;
-#if 0
+#ifdef notyet
u_int32_t exec_sid; /* exec SID */
u_int32_t create_sid; /* fscreate SID */
#endif
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/sebsd_syscall.c#4 (text+ko) ====
@@ -46,6 +46,7 @@
#include <sys/proc.h>
#include <sys/proc_internal.h>
+#include <security/mac_policy.h>
#include <sedarwin/sebsd.h>
#include <sedarwin/sebsd_alloc.h>
#include <sedarwin/sebsd_syscalls.h>
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/sebsd_sysctl.c#3 (text+ko) ====
@@ -45,6 +45,7 @@
#include <sys/sysctl.h>
#include <sys/malloc.h>
+#include <security/mac_policy.h>
#include <sedarwin/sebsd.h>
#include <sedarwin/sebsd_alloc.h>
#include <sedarwin/ss/global.h>
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/sedarwin/ss/init.c#4 (text+ko) ====
@@ -17,6 +17,7 @@
#include <kern/lock.h>
+#include <security/mac_policy.h>
#include <sedarwin/linux-compat.h>
#include <sedarwin/sebsd.h>
#include <sedarwin/ss/global.h>
More information about the trustedbsd-cvs
mailing list