diff --git a/private/access_vectors b/private/access_vectors index 26286b238a62e9eaa0ac7673b710c40b982e18e5..6393c166d995348191ad8dd70115120593f50de7 100644 --- a/private/access_vectors +++ b/private/access_vectors @@ -24,7 +24,6 @@ common file link rename execute - swapon quotaon mounton } @@ -57,8 +56,6 @@ common socket shutdown recvfrom sendto - recv_msg - send_msg name_bind } @@ -97,7 +94,6 @@ class filesystem getattr relabelfrom relabelto - transition associate quotamod quotaget @@ -184,9 +180,6 @@ inherits socket class tcp_socket inherits socket { - connectto - newconn - acceptfrom node_bind name_connect } @@ -205,29 +198,12 @@ inherits socket class node { - tcp_recv - tcp_send - udp_recv - udp_send - rawip_recv - rawip_send - enforce_dest - dccp_recv - dccp_send recvfrom sendto } class netif { - tcp_recv - tcp_send - udp_recv - udp_send - rawip_recv - rawip_send - dccp_recv - dccp_send ingress egress } @@ -245,8 +221,6 @@ class unix_stream_socket inherits socket { connectto - newconn - acceptfrom } class unix_dgram_socket diff --git a/public/te_macros b/public/te_macros index a826e968303b24a9e78dc673f0c4f8ee12cdf1f6..df171f010002daffe3e17c0390b7c3163b8f4277 100644 --- a/public/te_macros +++ b/public/te_macros @@ -237,7 +237,7 @@ define(`selinux_check_access', ` r_dir_file($1, selinuxfs) allow $1 selinuxfs:file w_file_perms; allow $1 kernel:security compute_av; -allow $1 self:netlink_selinux_socket { read write create getattr setattr lock relabelfrom relabelto append bind connect listen accept getopt setopt shutdown recvfrom sendto recv_msg send_msg name_bind }; +allow $1 self:netlink_selinux_socket { read write create getattr setattr lock relabelfrom relabelto append bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind }; ') #####################################