From 088fedac1cac2c5bbdde986edf0f4bb48969a8ed Mon Sep 17 00:00:00 2001 From: Stefan Schantl Date: Sat, 14 Jan 2012 20:06:34 +0100 Subject: [PATCH] Remove module for usernetctl. --- policy/modules/apps/usernetctl.fc | 2 - policy/modules/apps/usernetctl.if | 60 ------------------------- policy/modules/apps/usernetctl.te | 73 ------------------------------- 3 files changed, 135 deletions(-) delete mode 100644 policy/modules/apps/usernetctl.fc delete mode 100644 policy/modules/apps/usernetctl.if delete mode 100644 policy/modules/apps/usernetctl.te diff --git a/policy/modules/apps/usernetctl.fc b/policy/modules/apps/usernetctl.fc deleted file mode 100644 index aa07e1e4..00000000 --- a/policy/modules/apps/usernetctl.fc +++ /dev/null @@ -1,2 +0,0 @@ - -/usr/sbin/usernetctl -- gen_context(system_u:object_r:usernetctl_exec_t,s0) diff --git a/policy/modules/apps/usernetctl.if b/policy/modules/apps/usernetctl.if deleted file mode 100644 index 09ae47c2..00000000 --- a/policy/modules/apps/usernetctl.if +++ /dev/null @@ -1,60 +0,0 @@ -## User network interface configuration helper - -######################################## -## -## Execute usernetctl in the usernetctl domain. -## -## -## -## Domain allowed to transition. -## -## -# -interface(`usernetctl_domtrans',` - gen_require(` - type usernetctl_t, usernetctl_exec_t; - ') - - domtrans_pattern($1, usernetctl_exec_t, usernetctl_t) -') - -######################################## -## -## Execute usernetctl in the usernetctl domain, and -## allow the specified role the usernetctl domain. -## -## -## -## Domain allowed to transition. -## -## -## -## -## Role allowed access. -## -## -## -# -interface(`usernetctl_run',` - gen_require(` - type usernetctl_t; - ') - - usernetctl_domtrans($1) - role $2 types usernetctl_t; - - sysnet_run_ifconfig(usernetctl_t, $2) - sysnet_run_dhcpc(usernetctl_t, $2) - - optional_policy(` - iptables_run(usernetctl_t, $2) - ') - - optional_policy(` - modutils_run_insmod(usernetctl_t, $2) - ') - - optional_policy(` - ppp_run(usernetctl_t, $2) - ') -') diff --git a/policy/modules/apps/usernetctl.te b/policy/modules/apps/usernetctl.te deleted file mode 100644 index 93edd6b9..00000000 --- a/policy/modules/apps/usernetctl.te +++ /dev/null @@ -1,73 +0,0 @@ -policy_module(usernetctl, 1.5.0) - -######################################## -# -# Declarations -# - -type usernetctl_t; -type usernetctl_exec_t; -application_domain(usernetctl_t, usernetctl_exec_t) -domain_interactive_fd(usernetctl_t) - -######################################## -# -# Local policy -# - -allow usernetctl_t self:capability { setuid setgid dac_override }; -allow usernetctl_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap }; -allow usernetctl_t self:fd use; -allow usernetctl_t self:fifo_file rw_fifo_file_perms; -allow usernetctl_t self:shm create_shm_perms; -allow usernetctl_t self:sem create_sem_perms; -allow usernetctl_t self:msgq create_msgq_perms; -allow usernetctl_t self:msg { send receive }; -allow usernetctl_t self:unix_dgram_socket create_socket_perms; -allow usernetctl_t self:unix_stream_socket create_stream_socket_perms; -allow usernetctl_t self:unix_dgram_socket sendto; -allow usernetctl_t self:unix_stream_socket connectto; - -can_exec(usernetctl_t, usernetctl_exec_t) - -kernel_read_system_state(usernetctl_t) -kernel_read_kernel_sysctls(usernetctl_t) - -corecmd_list_bin(usernetctl_t) -corecmd_exec_bin(usernetctl_t) -corecmd_exec_shell(usernetctl_t) - -domain_dontaudit_read_all_domains_state(usernetctl_t) - -files_read_etc_files(usernetctl_t) -files_exec_etc_files(usernetctl_t) -files_read_etc_runtime_files(usernetctl_t) -files_list_pids(usernetctl_t) -files_list_home(usernetctl_t) -files_read_usr_files(usernetctl_t) - -fs_search_auto_mountpoints(usernetctl_t) - -auth_use_nsswitch(usernetctl_t) - -logging_send_syslog_msg(usernetctl_t) - -miscfiles_read_localization(usernetctl_t) - -seutil_read_config(usernetctl_t) - -sysnet_read_config(usernetctl_t) - -userdom_use_inherited_user_terminals(usernetctl_t) - -optional_policy(` - consoletype_exec(usernetctl_t) -') - -optional_policy(` - hostname_exec(usernetctl_t) -') - -optional_policy(` - nis_use_ypbind(usernetctl_t) -') -- 2.47.3