Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Jan 2003 05:30:46 -0800 (PST)
From:      Brian Feldman <green@FreeBSD.org>
To:        Perforce Change Reviews <perforce@freebsd.org>
Subject:   PERFORCE change 24372 for review
Message-ID:  <200301291330.h0TDUknf096034@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
http://perforce.freebsd.org/chv.cgi?CH=24372

Change 24372 by green@green_laptop_2 on 2003/01/29 05:30:27

	Since /home is frequently a link to /usr/home, login(1) needs
	permission to read home directory types of link files as well.

Affected files ...

.. //depot/projects/trustedbsd/sebsd/contrib/sebsd/policy/domains/program/login.te#2 edit

Differences ...

==== //depot/projects/trustedbsd/sebsd/contrib/sebsd/policy/domains/program/login.te#2 (text+ko) ====

@@ -33,11 +33,13 @@
 
 # Run shells in user_t by default.
 domain_auto_trans(local_login_t, shell_exec_t, user_t)
+allow local_login_t user_home_t:lnk_file read;
 allow local_login_t user_home_t:dir r_dir_perms;
 allow local_login_t user_home_t:file r_file_perms;
 
 # Allow shells to be created in sysadm_t as well.
 domain_trans(local_login_t, shell_exec_t, sysadm_t)
+allow local_login_t sysadm_home_t:lnk_file read;
 allow local_login_t sysadm_home_t:dir r_dir_perms;
 allow local_login_t sysadm_home_t:file r_file_perms;
 
@@ -113,6 +115,7 @@
 
 # Run shells in user_t by default.
 domain_auto_trans(remote_login_t, shell_exec_t, user_t)
+allow remote_login_t user_home_t:lnk_file read;
 allow remote_login_t user_home_t:dir r_dir_perms;
 allow remote_login_t user_home_t:file r_file_perms;
 

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe p4-projects" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200301291330.h0TDUknf096034>