[selinux-policy: 2037/3172] trunk: whitespace fix; collapse multiple blank lines into one.
Daniel J Walsh
dwalsh at fedoraproject.org
Thu Oct 7 22:00:54 UTC 2010
commit 88cf0a9c2bcbc55d47c2128291f6b37ce0c1bf98
Author: Chris PeBenito <cpebenito at tresys.com>
Date: Fri Oct 17 15:29:51 2008 +0000
trunk: whitespace fix; collapse multiple blank lines into one.
policy/modules/admin/amanda.te | 1 -
policy/modules/admin/bootloader.te | 1 -
policy/modules/apps/usernetctl.if | 1 -
policy/modules/kernel/corecommands.fc | 1 -
policy/modules/kernel/devices.if | 2 --
policy/modules/kernel/files.fc | 1 -
policy/modules/kernel/filesystem.if | 1 -
policy/modules/kernel/kernel.if | 2 --
policy/modules/system/init.fc | 1 -
policy/modules/system/init.if | 1 -
policy/modules/system/unconfined.if | 1 -
policy/modules/system/unconfined.te | 1 -
policy/modules/system/userdomain.if | 1 -
13 files changed, 0 insertions(+), 15 deletions(-)
---
diff --git a/policy/modules/admin/amanda.te b/policy/modules/admin/amanda.te
index 4b5209c..0eb3c67 100644
--- a/policy/modules/admin/amanda.te
+++ b/policy/modules/admin/amanda.te
@@ -161,7 +161,6 @@ auth_read_shadow(amanda_t)
libs_use_ld_so(amanda_t)
libs_use_shared_libs(amanda_t)
-
optional_policy(`
logging_send_syslog_msg(amanda_t)
')
diff --git a/policy/modules/admin/bootloader.te b/policy/modules/admin/bootloader.te
index fc1d5ba..f49310f 100644
--- a/policy/modules/admin/bootloader.te
+++ b/policy/modules/admin/bootloader.te
@@ -93,7 +93,6 @@ fs_manage_dos_files(bootloader_t)
mls_file_read_all_levels(bootloader_t)
mls_file_write_all_levels(bootloader_t)
-
term_getattr_all_user_ttys(bootloader_t)
term_dontaudit_manage_pty_dirs(bootloader_t)
diff --git a/policy/modules/apps/usernetctl.if b/policy/modules/apps/usernetctl.if
index 63b5167..f846690 100644
--- a/policy/modules/apps/usernetctl.if
+++ b/policy/modules/apps/usernetctl.if
@@ -64,7 +64,6 @@ interface(`usernetctl_run',`
modutils_run_insmod(usernetctl_t, $2, $3)
')
-
optional_policy(`
ppp_run(usernetctl_t, $2, $3)
')
diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
index 759a7d3..862ae61 100644
--- a/policy/modules/kernel/corecommands.fc
+++ b/policy/modules/kernel/corecommands.fc
@@ -67,7 +67,6 @@ ifdef(`distro_redhat',`
/etc/security/namespace.init -- gen_context(system_u:object_r:bin_t,s0)
-
/etc/sysconfig/crond -- gen_context(system_u:object_r:bin_t,s0)
/etc/sysconfig/init -- gen_context(system_u:object_r:bin_t,s0)
/etc/sysconfig/libvirtd -- gen_context(system_u:object_r:bin_t,s0)
diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
index a740b04..a1173fd 100644
--- a/policy/modules/kernel/devices.if
+++ b/policy/modules/kernel/devices.if
@@ -87,7 +87,6 @@ interface(`dev_list_all_dev_nodes',`
type device_t;
')
-
list_dirs_pattern($1, device_t, device_t)
read_lnk_files_pattern($1, device_t, device_t)
')
@@ -2668,7 +2667,6 @@ interface(`dev_rw_sysfs',`
type sysfs_t;
')
-
rw_files_pattern($1, sysfs_t, sysfs_t)
read_lnk_files_pattern($1, sysfs_t, sysfs_t)
diff --git a/policy/modules/kernel/files.fc b/policy/modules/kernel/files.fc
index 6def969..0b7acad 100644
--- a/policy/modules/kernel/files.fc
+++ b/policy/modules/kernel/files.fc
@@ -62,7 +62,6 @@ ifdef(`distro_suse',`
/etc/cups/client\.conf -- gen_context(system_u:object_r:etc_t,s0)
-
/etc/ipsec\.d/examples(/.*)? gen_context(system_u:object_r:etc_t,s0)
/etc/network/ifstate -- gen_context(system_u:object_r:etc_runtime_t,s0)
diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if
index e8a526c..60877b0 100644
--- a/policy/modules/kernel/filesystem.if
+++ b/policy/modules/kernel/filesystem.if
@@ -326,7 +326,6 @@ interface(`fs_mount_autofs',`
allow $1 autofs_t:filesystem mount;
')
-
########################################
## <summary>
## Remount an automount pseudo filesystem
diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
index fdb4b03..c16bf9a 100644
--- a/policy/modules/kernel/kernel.if
+++ b/policy/modules/kernel/kernel.if
@@ -57,7 +57,6 @@ interface(`kernel_ranged_domtrans_to',`
type kernel_t;
')
-
kernel_domtrans_to($1,$2)
ifdef(`enable_mcs',`
@@ -1946,7 +1945,6 @@ interface(`kernel_read_unlabeled_state',`
read_lnk_files_pattern($1, unlabeled_t, unlabeled_t)
')
-
########################################
## <summary>
## Do not audit attempts to list unlabeled directories.
diff --git a/policy/modules/system/init.fc b/policy/modules/system/init.fc
index b6639c1..1ff2453 100644
--- a/policy/modules/system/init.fc
+++ b/policy/modules/system/init.fc
@@ -26,7 +26,6 @@ ifdef(`distro_gentoo',`
#
/sbin/init(ng)? -- gen_context(system_u:object_r:init_exec_t,s0)
-
ifdef(`distro_gentoo', `
/sbin/rc -- gen_context(system_u:object_r:initrc_exec_t,s0)
/sbin/runscript -- gen_context(system_u:object_r:initrc_exec_t,s0)
diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if
index 302cc9c..e6a1c83 100644
--- a/policy/modules/system/init.if
+++ b/policy/modules/system/init.if
@@ -756,7 +756,6 @@ interface(`init_run_daemon',`
dontaudit direct_init $3:chr_file rw_file_perms;
')
-
########################################
## <summary>
## Read the process state (/proc/pid) of init.
diff --git a/policy/modules/system/unconfined.if b/policy/modules/system/unconfined.if
index e85b3d0..aa16eeb 100644
--- a/policy/modules/system/unconfined.if
+++ b/policy/modules/system/unconfined.if
@@ -62,7 +62,6 @@ interface(`unconfined_domain_noaudit',`
# auditallow $1 self:process execstack;
')
-
optional_policy(`
auth_unconfined($1)
')
diff --git a/policy/modules/system/unconfined.te b/policy/modules/system/unconfined.te
index bccb830..1c98875 100644
--- a/policy/modules/system/unconfined.te
+++ b/policy/modules/system/unconfined.te
@@ -165,7 +165,6 @@ optional_policy(`
postfix_domtrans_master(unconfined_t)
')
-
optional_policy(`
pyzor_per_role_template(unconfined)
')
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index 96d11e2..00c165d 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -837,7 +837,6 @@ template(`userdom_common_user_template',`
mta_rw_spool($1_t)
')
-
optional_policy(`
tunable_policy(`allow_user_mysql_connect',`
mysql_stream_connect($1_t)
More information about the scm-commits
mailing list