From 7492ef136a49df4db81ebea021bb8cc67111c57c Mon Sep 17 00:00:00 2001 From: Stefan Schantl Date: Fri, 6 Jan 2012 23:13:27 +0100 Subject: [PATCH] Remove module for podsleuth. --- policy/modules/apps/podsleuth.fc | 3 -- policy/modules/apps/podsleuth.if | 45 ---------------- policy/modules/apps/podsleuth.te | 90 -------------------------------- policy/modules/services/hal.te | 4 -- 4 files changed, 142 deletions(-) delete mode 100644 policy/modules/apps/podsleuth.fc delete mode 100644 policy/modules/apps/podsleuth.if delete mode 100644 policy/modules/apps/podsleuth.te diff --git a/policy/modules/apps/podsleuth.fc b/policy/modules/apps/podsleuth.fc deleted file mode 100644 index 6fbc01c3..00000000 --- a/policy/modules/apps/podsleuth.fc +++ /dev/null @@ -1,3 +0,0 @@ -/usr/bin/podsleuth -- gen_context(system_u:object_r:podsleuth_exec_t,s0) -/usr/libexec/hal-podsleuth -- gen_context(system_u:object_r:podsleuth_exec_t,s0) -/var/cache/podsleuth(/.*)? gen_context(system_u:object_r:podsleuth_cache_t,s0) diff --git a/policy/modules/apps/podsleuth.if b/policy/modules/apps/podsleuth.if deleted file mode 100644 index d6d80a0c..00000000 --- a/policy/modules/apps/podsleuth.if +++ /dev/null @@ -1,45 +0,0 @@ -## Podsleuth is a tool to get information about an Apple (TM) iPod (TM) - -######################################## -## -## Execute a domain transition to run podsleuth. -## -## -## -## Domain allowed to transition. -## -## -# -interface(`podsleuth_domtrans',` - gen_require(` - type podsleuth_t, podsleuth_exec_t; - ') - - domtrans_pattern($1, podsleuth_exec_t, podsleuth_t) - allow $1 podsleuth_t:process signal; -') - -######################################## -## -## Execute podsleuth in the podsleuth domain, and -## allow the specified role the podsleuth domain. -## -## -## -## Domain allowed to transition. -## -## -## -## -## Role allowed access. -## -## -# -interface(`podsleuth_run',` - gen_require(` - type podsleuth_t; - ') - - podsleuth_domtrans($1) - role $2 types podsleuth_t; -') diff --git a/policy/modules/apps/podsleuth.te b/policy/modules/apps/podsleuth.te deleted file mode 100644 index 9f88c3a3..00000000 --- a/policy/modules/apps/podsleuth.te +++ /dev/null @@ -1,90 +0,0 @@ -policy_module(podsleuth, 1.4.1) - -######################################## -# -# Declarations -# - -type podsleuth_t; -type podsleuth_exec_t; -application_domain(podsleuth_t, podsleuth_exec_t) -role system_r types podsleuth_t; - -type podsleuth_cache_t; -files_type(podsleuth_cache_t) -ubac_constrained(podsleuth_cache_t) - -type podsleuth_tmp_t; -files_tmp_file(podsleuth_tmp_t) -ubac_constrained(podsleuth_tmp_t) - -type podsleuth_tmpfs_t; -files_tmpfs_file(podsleuth_tmpfs_t) -ubac_constrained(podsleuth_tmpfs_t) - -######################################## -# -# podsleuth local policy -# -allow podsleuth_t self:capability { kill dac_override sys_admin sys_rawio }; -allow podsleuth_t self:process { signal signull getsched execheap execmem execstack }; - -allow podsleuth_t self:fifo_file rw_file_perms; -allow podsleuth_t self:unix_stream_socket create_stream_socket_perms; -allow podsleuth_t self:sem create_sem_perms; -allow podsleuth_t self:tcp_socket create_stream_socket_perms; -allow podsleuth_t self:udp_socket create_socket_perms; - -manage_dirs_pattern(podsleuth_t, podsleuth_cache_t, podsleuth_cache_t) -manage_files_pattern(podsleuth_t, podsleuth_cache_t, podsleuth_cache_t) -files_var_filetrans(podsleuth_t, podsleuth_cache_t, { file dir }) - -allow podsleuth_t podsleuth_tmp_t:dir mounton; -manage_dirs_pattern(podsleuth_t, podsleuth_tmp_t, podsleuth_tmp_t) -manage_files_pattern(podsleuth_t, podsleuth_tmp_t, podsleuth_tmp_t) -files_tmp_filetrans(podsleuth_t, podsleuth_tmp_t, { file dir }) - -manage_dirs_pattern(podsleuth_t, podsleuth_tmpfs_t, podsleuth_tmpfs_t) -manage_files_pattern(podsleuth_t, podsleuth_tmpfs_t, podsleuth_tmpfs_t) -manage_lnk_files_pattern(podsleuth_t, podsleuth_tmpfs_t, podsleuth_tmpfs_t) -fs_tmpfs_filetrans(podsleuth_t, podsleuth_tmpfs_t, { dir file lnk_file }) - -kernel_read_system_state(podsleuth_t) -kernel_request_load_module(podsleuth_t) - -corecmd_exec_bin(podsleuth_t) - -corenet_tcp_connect_http_port(podsleuth_t) - -dev_read_urand(podsleuth_t) - -files_read_etc_files(podsleuth_t) - -fs_mount_dos_fs(podsleuth_t) -fs_unmount_dos_fs(podsleuth_t) -fs_getattr_dos_fs(podsleuth_t) -fs_read_dos_files(podsleuth_t) -fs_search_dos(podsleuth_t) -fs_getattr_tmpfs(podsleuth_t) -fs_list_tmpfs(podsleuth_t) -fs_rw_removable_blk_files(podsleuth_t) - -miscfiles_read_localization(podsleuth_t) - -sysnet_dns_name_resolve(podsleuth_t) - -userdom_signal_unpriv_users(podsleuth_t) -userdom_signull_unpriv_users(podsleuth_t) -userdom_read_user_tmpfs_files(podsleuth_t) - -optional_policy(` - dbus_system_bus_client(podsleuth_t) - - optional_policy(` - hal_dbus_chat(podsleuth_t) - ') -') - -optional_policy(` - mono_exec(podsleuth_t) -') diff --git a/policy/modules/services/hal.te b/policy/modules/services/hal.te index 6fdb0cd1..bd85b8f8 100644 --- a/policy/modules/services/hal.te +++ b/policy/modules/services/hal.te @@ -318,10 +318,6 @@ optional_policy(` pcmcia_manage_pid_chr_files(hald_t) ') -optional_policy(` - podsleuth_domtrans(hald_t) -') - optional_policy(` ppp_domtrans(hald_t) ppp_read_rw_config(hald_t) -- 2.47.3