PERFORCE change 113402 for review

Todd Miller millert at FreeBSD.org
Mon Jan 22 20:14:25 UTC 2007


http://perforce.freebsd.org/chv.cgi?CH=113402

Change 113402 by millert at millert_macbook on 2007/01/22 20:02:00

	Update.

Affected files ...

.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/configd.te#13 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/loginwindow.te#11 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/securityd.te#12 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/update.te#6 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/services/ntp.te#4 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/system/init.te#10 edit

Differences ...

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/configd.te#13 (text+ko) ====

@@ -67,6 +67,7 @@
 allow configd_t self:rawip_socket create;
 allow configd_t self:socket { bind create listen read write };
 allow configd_t random_device_t:chr_file read;
+allow configd_t fs_t:filesystem { associate getattr };
 allow configd_t nfs_t:dir { add_name getattr read search };
 allow configd_t nfs_t:filesystem { getattr mount };
 allow configd_t nfs_t:lnk_file { create getattr read };
@@ -187,6 +188,7 @@
 # Read/write/manage keychain files
 darwin_allow_keychain_rw(configd_t)
 darwin_allow_keychain_manage(configd_t)
+allow configd_t darwin_keychain_t:dir { add_name remove_name };
 
 # Read files in /tmp
 files_getattr_tmp_dirs(configd_t)
@@ -203,3 +205,5 @@
 userdom_read_all_users_home_content_files(configd_t)
 userdom_manage_all_users_home_content_files(configd_t)
 
+# Search /var/vm
+files_search_vm(configd_t)

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/loginwindow.te#11 (text+ko) ====

@@ -28,7 +28,8 @@
 allow loginwindow_t self:unix_stream_socket create_stream_socket_perms;
 
 # Misc
-allow loginwindow_t console_device_t:chr_file { read setattr write };
+term_use_console(loginwindow_t)
+term_setattr_console(loginwindow_t)
 allow loginwindow_t lib_t:file execute_no_trans;
 allow loginwindow_t self:fd use;
 allow loginwindow_t self:process { taskforpid signal }; # XXX

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/securityd.te#12 (text+ko) ====

@@ -37,7 +37,7 @@
 # Misc
 allow securityd_t mnt_t:dir { getattr search };
 allow securityd_t nfs_t:dir { getattr search };
-allow securityd_t nfs_t:filesystem getattr;
+allow securityd_t { fs_t nfs_t }:filesystem getattr;
 allow securityd_t nfs_t:lnk_file read;
 allow securityd_t usr_t:file { getattr read };
 allow securityd_t random_device_t:chr_file { read write };

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/update.te#6 (text+ko) ====

@@ -25,6 +25,8 @@
 allow update_t self:fifo_file { read write };
 allow update_t self:unix_stream_socket create_stream_socket_perms;
 
+term_use_console(update_t)
+
 # talk to self
 mach_allow_message(update_t, update_t)
 

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/services/ntp.te#4 (text+ko) ====

@@ -101,6 +101,7 @@
 files_read_etc_runtime_files(ntpd_t)
 files_read_usr_files(ntpd_t)
 files_list_var_lib(ntpd_t)
+files_read_var_files(ntpd_t)
 
 init_exec_script_files(ntpd_t)
 init_use_fds(ntpd_t)
@@ -137,6 +138,8 @@
 allow ntpd_t mnt_t:dir search;
 allow ntpd_t nfs_t:lnk_file read;
 
+# Read /private
+darwin_allow_private_read(ntpd_t)
 
 ifdef(`targeted_policy', `
 	term_dontaudit_use_unallocated_ttys(ntpd_t)

==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/system/init.te#10 (text+ko) ====

@@ -670,6 +670,7 @@
 # Allow access to /private
 darwin_allow_private_manage(init_t)
 darwin_allow_private_rw(init_t)
+allow init_t darwin_private_t:dir relabelfrom;
 
 # Allow keychain access
 darwin_allow_keychain_read(init_t)


More information about the trustedbsd-cvs mailing list