[selinux-policy: 79/3172] domains not needed for execute interface
Daniel J Walsh
dwalsh at fedoraproject.org
Thu Oct 7 19:11:59 UTC 2010
commit fc83dba9a0818c550ba0d55e8003c37145144171
Author: Chris PeBenito <cpebenito at tresys.com>
Date: Mon May 2 18:36:11 2005 +0000
domains not needed for execute interface
refpolicy/policy/modules/system/selinux.if | 10 +++++-----
refpolicy/policy/modules/system/selinuxutil.if | 10 +++++-----
2 files changed, 10 insertions(+), 10 deletions(-)
---
diff --git a/refpolicy/policy/modules/system/selinux.if b/refpolicy/policy/modules/system/selinux.if
index c41ee7c..9804950 100644
--- a/refpolicy/policy/modules/system/selinux.if
+++ b/refpolicy/policy/modules/system/selinux.if
@@ -28,7 +28,7 @@ allow $1 checkpolicy_exec_t:file { getattr read execute execute_no_trans };
')
define(`selinux_checkpolicy_execute_depend',`
-type checkpolicy_t, checkpolicy_exec_t;
+type checkpolicy_exec_t;
class file { getattr read execute execute_no_trans };
')
@@ -60,7 +60,7 @@ allow $1 load_policy_exec_t:file { getattr read execute execute_no_trans };
')
define(`selinux_load_policy_execute_depend',`
-type load_policy_t, load_policy_exec_t;
+type load_policy_exec_t;
class file { getattr read execute execute_no_trans };
')
@@ -91,7 +91,7 @@ dontaudit $1 newrole_t:process { noatsecure siginh rlimitinh };
')
define(`selinux_newrole_transition_depend',`
-type newrole_t, newrole_exec_t;
+type newrole_exec_t;
class file { getattr read execute };
class process { transition noatsecure siginh rlimitinh };
')
@@ -137,7 +137,7 @@ dontaudit $1 restorecon_t:process { noatsecure siginh rlimitinh };
')
define(`selinux_restorecon_transition_depend',`
-type restorecon_t, restorecon_exec_t;
+type restorecon_exec_t;
class file { getattr read execute };
class process { transition noatsecure siginh rlimitinh };
')
@@ -184,7 +184,7 @@ allow $1 setfiles_exec_t:file { getattr read execute execute_no_trans };
')
define(`selinux_setfiles_execute_depend',`
-type setfiles_t, setfiles_exec_t;
+type setfiles_exec_t;
class file { getattr read execute execute_no_trans };
')
diff --git a/refpolicy/policy/modules/system/selinuxutil.if b/refpolicy/policy/modules/system/selinuxutil.if
index c41ee7c..9804950 100644
--- a/refpolicy/policy/modules/system/selinuxutil.if
+++ b/refpolicy/policy/modules/system/selinuxutil.if
@@ -28,7 +28,7 @@ allow $1 checkpolicy_exec_t:file { getattr read execute execute_no_trans };
')
define(`selinux_checkpolicy_execute_depend',`
-type checkpolicy_t, checkpolicy_exec_t;
+type checkpolicy_exec_t;
class file { getattr read execute execute_no_trans };
')
@@ -60,7 +60,7 @@ allow $1 load_policy_exec_t:file { getattr read execute execute_no_trans };
')
define(`selinux_load_policy_execute_depend',`
-type load_policy_t, load_policy_exec_t;
+type load_policy_exec_t;
class file { getattr read execute execute_no_trans };
')
@@ -91,7 +91,7 @@ dontaudit $1 newrole_t:process { noatsecure siginh rlimitinh };
')
define(`selinux_newrole_transition_depend',`
-type newrole_t, newrole_exec_t;
+type newrole_exec_t;
class file { getattr read execute };
class process { transition noatsecure siginh rlimitinh };
')
@@ -137,7 +137,7 @@ dontaudit $1 restorecon_t:process { noatsecure siginh rlimitinh };
')
define(`selinux_restorecon_transition_depend',`
-type restorecon_t, restorecon_exec_t;
+type restorecon_exec_t;
class file { getattr read execute };
class process { transition noatsecure siginh rlimitinh };
')
@@ -184,7 +184,7 @@ allow $1 setfiles_exec_t:file { getattr read execute execute_no_trans };
')
define(`selinux_setfiles_execute_depend',`
-type setfiles_t, setfiles_exec_t;
+type setfiles_exec_t;
class file { getattr read execute execute_no_trans };
')
More information about the scm-commits
mailing list