From owner-trustedbsd-cvs@FreeBSD.ORG Mon Jan 22 20:02:29 2007 Return-Path: X-Original-To: trustedbsd-cvs@freebsd.org Delivered-To: trustedbsd-cvs@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id AFE7016A40A for ; Mon, 22 Jan 2007 20:02:29 +0000 (UTC) (envelope-from owner-perforce@freebsd.org) Received: from cyrus.watson.org (cyrus.watson.org [209.31.154.42]) by mx1.freebsd.org (Postfix) with ESMTP id 30AB413C45A for ; Mon, 22 Jan 2007 20:02:26 +0000 (UTC) (envelope-from owner-perforce@freebsd.org) Received: from mx2.freebsd.org (mx2.freebsd.org [69.147.83.53]) by cyrus.watson.org (Postfix) with ESMTP id 0F4BC47BF8 for ; Mon, 22 Jan 2007 15:02:24 -0500 (EST) Received: from hub.freebsd.org (hub.freebsd.org [69.147.83.54]) by mx2.freebsd.org (Postfix) with ESMTP id EF39F5B234; Mon, 22 Jan 2007 19:53:58 +0000 (GMT) (envelope-from owner-perforce@freebsd.org) Received: by hub.freebsd.org (Postfix, from userid 32767) id B0BD716A502; Mon, 22 Jan 2007 19:53:51 +0000 (UTC) X-Original-To: perforce@freebsd.org Delivered-To: perforce@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 9358E16A4C4 for ; Mon, 22 Jan 2007 19:53:51 +0000 (UTC) (envelope-from millert@freebsd.org) Received: from repoman.freebsd.org (repoman.freebsd.org [69.147.83.41]) by mx1.freebsd.org (Postfix) with ESMTP id 66B3E13C45D for ; Mon, 22 Jan 2007 19:53:51 +0000 (UTC) (envelope-from millert@freebsd.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.6/8.13.6) with ESMTP id l0MJrpxL084205 for ; Mon, 22 Jan 2007 19:53:51 GMT (envelope-from millert@freebsd.org) Received: (from perforce@localhost) by repoman.freebsd.org (8.13.6/8.13.4/Submit) id l0MJrosM084199 for perforce@freebsd.org; Mon, 22 Jan 2007 19:53:50 GMT (envelope-from millert@freebsd.org) Date: Mon, 22 Jan 2007 19:53:50 GMT Message-Id: <200701221953.l0MJrosM084199@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to millert@freebsd.org using -f From: Todd Miller To: Perforce Change Reviews Cc: Subject: PERFORCE change 113386 for review X-BeenThere: trustedbsd-cvs@FreeBSD.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: TrustedBSD CVS and Perforce commit message list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Jan 2007 20:02:29 -0000 http://perforce.freebsd.org/chv.cgi?CH=113386 Change 113386 by millert@millert_macbook on 2007/01/22 19:53:43 Add permissions for /var/vm. Affected files ... .. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/configd.te#11 edit .. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/diskarbitrationd.te#10 edit .. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/loginwindow.te#8 edit .. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/securityd.te#7 edit .. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/kernel/files.if#5 edit Differences ... ==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/configd.te#11 (text+ko) ==== @@ -165,6 +165,8 @@ # Not sure why it wants to search this dir, it should know what it wants allow configd_t var_log_t:dir search; +# Search /var/vm +files_search_vm(securityd_t) # Read /private darwin_allow_private_read(configd_t) ==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/diskarbitrationd.te#10 (text+ko) ==== @@ -129,4 +129,5 @@ # Read fstools files fstools_read_files(diskarbitrationd_t) - +# Search /var/vm +files_search_vm(diskarbitrationd_t) ==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/loginwindow.te#8 (text+ko) ==== @@ -141,6 +141,8 @@ files_search_var(loginwindow_t) files_read_var_symlinks(loginwindow_t) +# Search /var/vm +files_search_vm(loginwindow_t) + # Write to WTMP auth_write_login_records(loginwindow_t) - ==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/securityd.te#7 (text+ko) ==== @@ -48,6 +48,8 @@ files_manage_var_dirs(securityd_t) files_manage_var_symlinks(securityd_t) +# Search /var/vm +files_search_vm(securityd_t) # Talk to launchd init_allow_ipc(securityd_t) ==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/kernel/files.if#5 (text+ko) ==== @@ -4501,6 +4501,25 @@ ######################################## ## +## Search the contents of vm irectories (/var/vm). +## +## +## +## Domain allowed access. +## +## +# +interface(`files_search_vm',` + gen_require(` + type var_t, var_vm_t; + ') + + allow $1 var_t:dir search_dir_perms; + allow $1 var_vm_t:dir search_dir_perms; +') + +######################################## +## ## Unconfined access to files. ## ##