From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id D3FE4139695 for ; Thu, 30 Mar 2017 17:06:25 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 249C821C094; Thu, 30 Mar 2017 17:06:24 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id EB3DF21C094 for ; Thu, 30 Mar 2017 17:06:23 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id AB3A834163E for ; Thu, 30 Mar 2017 17:06:22 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 7502273E4 for ; Thu, 30 Mar 2017 17:06:21 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1490882318.573e8b4182c51b02e9a80369e5e1d319431461c9.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/dbus.te policy/modules/contrib/mailman.te policy/modules/contrib/nagios.te policy/modules/contrib/postfix.te policy/modules/contrib/ppp.te policy/modules/contrib/prelink.te policy/modules/contrib/remotelogin.te policy/modules/contrib/rshd.te policy/modules/contrib/samhain.te policy/modules/contrib/screen.te policy/modules/contrib/vlock.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 573e8b4182c51b02e9a80369e5e1d319431461c9 X-VCS-Branch: master Date: Thu, 30 Mar 2017 17:06:21 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 6ed12199-7463-4fe8-a6f1-72de93807a36 X-Archives-Hash: bc24f12e790b1aa2707540c6ae876fb3 commit: 573e8b4182c51b02e9a80369e5e1d319431461c9 Author: cgzones googlemail com> AuthorDate: Fri Mar 3 11:05:49 2017 +0000 Commit: Jason Zaman gentoo org> CommitDate: Thu Mar 30 13:58:38 2017 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=573e8b41 corecmd_read_bin_symlinks(): remove deprecated and redundant calls after the changes to corecmd_search_bin() corecmd_read_bin_symlinks() is deprecated policy/modules/contrib/dbus.te | 1 - policy/modules/contrib/mailman.te | 1 - policy/modules/contrib/nagios.te | 2 -- policy/modules/contrib/postfix.te | 1 - policy/modules/contrib/ppp.te | 1 - policy/modules/contrib/prelink.te | 1 - policy/modules/contrib/remotelogin.te | 1 - policy/modules/contrib/rshd.te | 4 ++-- policy/modules/contrib/samhain.te | 1 - policy/modules/contrib/screen.te | 1 - policy/modules/contrib/vlock.te | 1 - 11 files changed, 2 insertions(+), 13 deletions(-) diff --git a/policy/modules/contrib/dbus.te b/policy/modules/contrib/dbus.te index 78de2022..551fd2db 100644 --- a/policy/modules/contrib/dbus.te +++ b/policy/modules/contrib/dbus.te @@ -201,7 +201,6 @@ kernel_read_system_state(session_bus_type) kernel_read_kernel_sysctls(session_bus_type) corecmd_list_bin(session_bus_type) -corecmd_read_bin_symlinks(session_bus_type) corecmd_read_bin_files(session_bus_type) corecmd_read_bin_pipes(session_bus_type) corecmd_read_bin_sockets(session_bus_type) diff --git a/policy/modules/contrib/mailman.te b/policy/modules/contrib/mailman.te index 3de43d20..8282fcc4 100644 --- a/policy/modules/contrib/mailman.te +++ b/policy/modules/contrib/mailman.te @@ -241,7 +241,6 @@ kernel_read_system_state(mailman_queue_t) auth_domtrans_chk_passwd(mailman_queue_t) corecmd_read_bin_files(mailman_queue_t) -corecmd_read_bin_symlinks(mailman_queue_t) corenet_sendrecv_innd_client_packets(mailman_queue_t) corenet_tcp_connect_innd_port(mailman_queue_t) corenet_tcp_sendrecv_innd_port(mailman_queue_t) diff --git a/policy/modules/contrib/nagios.te b/policy/modules/contrib/nagios.te index de6a62cf..3f3a60ed 100644 --- a/policy/modules/contrib/nagios.te +++ b/policy/modules/contrib/nagios.te @@ -297,7 +297,6 @@ optional_policy(` # corecmd_read_bin_files(nagios_admin_plugin_t) -corecmd_read_bin_symlinks(nagios_admin_plugin_t) dev_getattr_all_chr_files(nagios_admin_plugin_t) dev_getattr_all_blk_files(nagios_admin_plugin_t) @@ -320,7 +319,6 @@ allow nagios_mail_plugin_t self:tcp_socket { accept listen }; kernel_read_kernel_sysctls(nagios_mail_plugin_t) corecmd_read_bin_files(nagios_mail_plugin_t) -corecmd_read_bin_symlinks(nagios_mail_plugin_t) files_read_etc_files(nagios_mail_plugin_t) diff --git a/policy/modules/contrib/postfix.te b/policy/modules/contrib/postfix.te index 94ac8471..564dd300 100644 --- a/policy/modules/contrib/postfix.te +++ b/policy/modules/contrib/postfix.te @@ -510,7 +510,6 @@ corenet_tcp_connect_all_ports(postfix_map_t) corenet_tcp_sendrecv_all_ports(postfix_map_t) corecmd_list_bin(postfix_map_t) -corecmd_read_bin_symlinks(postfix_map_t) corecmd_read_bin_files(postfix_map_t) corecmd_read_bin_pipes(postfix_map_t) corecmd_read_bin_sockets(postfix_map_t) diff --git a/policy/modules/contrib/ppp.te b/policy/modules/contrib/ppp.te index 1015b4ee..740e03fc 100644 --- a/policy/modules/contrib/ppp.te +++ b/policy/modules/contrib/ppp.te @@ -257,7 +257,6 @@ kernel_read_system_state(pptp_t) kernel_signal(pptp_t) corecmd_exec_shell(pptp_t) -corecmd_read_bin_symlinks(pptp_t) corenet_all_recvfrom_unlabeled(pptp_t) corenet_all_recvfrom_netlabel(pptp_t) diff --git a/policy/modules/contrib/prelink.te b/policy/modules/contrib/prelink.te index 8e262163..d17ba24d 100644 --- a/policy/modules/contrib/prelink.te +++ b/policy/modules/contrib/prelink.te @@ -72,7 +72,6 @@ kernel_read_kernel_sysctls(prelink_t) corecmd_manage_all_executables(prelink_t) corecmd_relabel_all_executables(prelink_t) corecmd_mmap_all_executables(prelink_t) -corecmd_read_bin_symlinks(prelink_t) dev_read_urand(prelink_t) diff --git a/policy/modules/contrib/remotelogin.te b/policy/modules/contrib/remotelogin.te index 3130db86..f88134ce 100644 --- a/policy/modules/contrib/remotelogin.te +++ b/policy/modules/contrib/remotelogin.te @@ -48,7 +48,6 @@ auth_rw_login_records(remote_login_t) auth_rw_faillog(remote_login_t) corecmd_list_bin(remote_login_t) -corecmd_read_bin_symlinks(remote_login_t) domain_read_all_entry_files(remote_login_t) diff --git a/policy/modules/contrib/rshd.te b/policy/modules/contrib/rshd.te index dc327424..1100ec75 100644 --- a/policy/modules/contrib/rshd.te +++ b/policy/modules/contrib/rshd.te @@ -27,6 +27,8 @@ allow rshd_t rshd_keytab_t:file read_file_perms; kernel_read_kernel_sysctls(rshd_t) +corecmd_search_bin(rshd_t) + corenet_all_recvfrom_unlabeled(rshd_t) corenet_all_recvfrom_netlabel(rshd_t) corenet_tcp_sendrecv_generic_if(rshd_t) @@ -40,8 +42,6 @@ corenet_tcp_bind_all_rpc_ports(rshd_t) corenet_tcp_connect_all_ports(rshd_t) corenet_tcp_connect_all_rpc_ports(rshd_t) -corecmd_read_bin_symlinks(rshd_t) - files_list_home(rshd_t) logging_search_logs(rshd_t) diff --git a/policy/modules/contrib/samhain.te b/policy/modules/contrib/samhain.te index 865f9563..ef74778d 100644 --- a/policy/modules/contrib/samhain.te +++ b/policy/modules/contrib/samhain.te @@ -65,7 +65,6 @@ files_pid_filetrans(samhain_domain, samhain_var_run_t, file) kernel_getattr_core_if(samhain_domain) corecmd_list_bin(samhain_domain) -corecmd_read_bin_symlinks(samhain_domain) dev_read_urand(samhain_domain) dev_dontaudit_read_rand(samhain_domain) diff --git a/policy/modules/contrib/screen.te b/policy/modules/contrib/screen.te index e376da59..e5b73a92 100644 --- a/policy/modules/contrib/screen.te +++ b/policy/modules/contrib/screen.te @@ -58,7 +58,6 @@ kernel_read_kernel_sysctls(screen_domain) corecmd_list_bin(screen_domain) corecmd_read_bin_files(screen_domain) -corecmd_read_bin_symlinks(screen_domain) corecmd_read_bin_pipes(screen_domain) corecmd_read_bin_sockets(screen_domain) diff --git a/policy/modules/contrib/vlock.te b/policy/modules/contrib/vlock.te index d4094916..4c9ca7af 100644 --- a/policy/modules/contrib/vlock.te +++ b/policy/modules/contrib/vlock.te @@ -24,7 +24,6 @@ allow vlock_t self:fifo_file rw_fifo_file_perms; kernel_read_system_state(vlock_t) corecmd_list_bin(vlock_t) -corecmd_read_bin_symlinks(vlock_t) domain_use_interactive_fds(vlock_t)