[selinux-policy: 79/3172] domains not needed for execute interface

Daniel J Walsh dwalsh at fedoraproject.org
Thu Oct 7 19:11:59 UTC 2010


commit fc83dba9a0818c550ba0d55e8003c37145144171
Author: Chris PeBenito <cpebenito at tresys.com>
Date:   Mon May 2 18:36:11 2005 +0000

    domains not needed for execute interface

 refpolicy/policy/modules/system/selinux.if     |   10 +++++-----
 refpolicy/policy/modules/system/selinuxutil.if |   10 +++++-----
 2 files changed, 10 insertions(+), 10 deletions(-)
---
diff --git a/refpolicy/policy/modules/system/selinux.if b/refpolicy/policy/modules/system/selinux.if
index c41ee7c..9804950 100644
--- a/refpolicy/policy/modules/system/selinux.if
+++ b/refpolicy/policy/modules/system/selinux.if
@@ -28,7 +28,7 @@ allow $1 checkpolicy_exec_t:file { getattr read execute execute_no_trans };
 ')
 
 define(`selinux_checkpolicy_execute_depend',`
-type checkpolicy_t, checkpolicy_exec_t;
+type checkpolicy_exec_t;
 class file { getattr read execute execute_no_trans };
 ')
 
@@ -60,7 +60,7 @@ allow $1 load_policy_exec_t:file { getattr read execute execute_no_trans };
 ')
 
 define(`selinux_load_policy_execute_depend',`
-type load_policy_t, load_policy_exec_t;
+type load_policy_exec_t;
 class file { getattr read execute execute_no_trans };
 ')
 
@@ -91,7 +91,7 @@ dontaudit $1 newrole_t:process { noatsecure siginh rlimitinh };
 ')
 
 define(`selinux_newrole_transition_depend',`
-type newrole_t, newrole_exec_t;
+type newrole_exec_t;
 class file { getattr read execute };
 class process { transition noatsecure siginh rlimitinh };
 ')
@@ -137,7 +137,7 @@ dontaudit $1 restorecon_t:process { noatsecure siginh rlimitinh };
 ')
 
 define(`selinux_restorecon_transition_depend',`
-type restorecon_t, restorecon_exec_t;
+type restorecon_exec_t;
 class file { getattr read execute };
 class process { transition noatsecure siginh rlimitinh };
 ')
@@ -184,7 +184,7 @@ allow $1 setfiles_exec_t:file { getattr read execute execute_no_trans };
 ')
 
 define(`selinux_setfiles_execute_depend',`
-type setfiles_t, setfiles_exec_t;
+type setfiles_exec_t;
 class file { getattr read execute execute_no_trans };
 ')
 
diff --git a/refpolicy/policy/modules/system/selinuxutil.if b/refpolicy/policy/modules/system/selinuxutil.if
index c41ee7c..9804950 100644
--- a/refpolicy/policy/modules/system/selinuxutil.if
+++ b/refpolicy/policy/modules/system/selinuxutil.if
@@ -28,7 +28,7 @@ allow $1 checkpolicy_exec_t:file { getattr read execute execute_no_trans };
 ')
 
 define(`selinux_checkpolicy_execute_depend',`
-type checkpolicy_t, checkpolicy_exec_t;
+type checkpolicy_exec_t;
 class file { getattr read execute execute_no_trans };
 ')
 
@@ -60,7 +60,7 @@ allow $1 load_policy_exec_t:file { getattr read execute execute_no_trans };
 ')
 
 define(`selinux_load_policy_execute_depend',`
-type load_policy_t, load_policy_exec_t;
+type load_policy_exec_t;
 class file { getattr read execute execute_no_trans };
 ')
 
@@ -91,7 +91,7 @@ dontaudit $1 newrole_t:process { noatsecure siginh rlimitinh };
 ')
 
 define(`selinux_newrole_transition_depend',`
-type newrole_t, newrole_exec_t;
+type newrole_exec_t;
 class file { getattr read execute };
 class process { transition noatsecure siginh rlimitinh };
 ')
@@ -137,7 +137,7 @@ dontaudit $1 restorecon_t:process { noatsecure siginh rlimitinh };
 ')
 
 define(`selinux_restorecon_transition_depend',`
-type restorecon_t, restorecon_exec_t;
+type restorecon_exec_t;
 class file { getattr read execute };
 class process { transition noatsecure siginh rlimitinh };
 ')
@@ -184,7 +184,7 @@ allow $1 setfiles_exec_t:file { getattr read execute execute_no_trans };
 ')
 
 define(`selinux_setfiles_execute_depend',`
-type setfiles_t, setfiles_exec_t;
+type setfiles_exec_t;
 class file { getattr read execute execute_no_trans };
 ')
 


More information about the scm-commits mailing list