[selinux-policy: 2721/3172] Whitespace fixes in cgroup and init.
Daniel J Walsh
dwalsh at fedoraproject.org
Thu Oct 7 23:02:07 UTC 2010
commit 04dcd73fe3e0c99a0f2a774a9b7e5632e971adcb
Author: Chris PeBenito <cpebenito at tresys.com>
Date: Tue Jun 8 08:47:26 2010 -0400
Whitespace fixes in cgroup and init.
policy/modules/services/cgroup.fc | 8 ++++----
policy/modules/services/cgroup.if | 4 ++--
policy/modules/services/cgroup.te | 1 -
policy/modules/system/init.te | 6 +++---
4 files changed, 9 insertions(+), 10 deletions(-)
---
diff --git a/policy/modules/services/cgroup.fc b/policy/modules/services/cgroup.fc
index abde2f2..4b353d4 100644
--- a/policy/modules/services/cgroup.fc
+++ b/policy/modules/services/cgroup.fc
@@ -1,10 +1,10 @@
-/etc/cgconfig.conf -- gen_context(system_u:object_r:cgconfig_etc_t,s0)
-/etc/cgrules.conf -- gen_context(system_u:object_r:cgrules_etc_t,s0)
+/etc/cgconfig.conf -- gen_context(system_u:object_r:cgconfig_etc_t,s0)
+/etc/cgrules.conf -- gen_context(system_u:object_r:cgrules_etc_t,s0)
/etc/rc\.d/init\.d/cgconfig -- gen_context(system_u:object_r:cgconfig_initrc_exec_t,s0)
/etc/rc\.d/init\.d/cgred -- gen_context(system_u:object_r:cgred_initrc_exec_t,s0)
/sbin/cgconfigparser -- gen_context(system_u:object_r:cgconfigparser_exec_t,s0)
-/sbin/cgrulesengd -- gen_context(system_u:object_r:cgred_exec_t,s0)
+/sbin/cgrulesengd -- gen_context(system_u:object_r:cgred_exec_t,s0)
-/var/run/cgred.* gen_context(system_u:object_r:cgred_var_run_t,s0)
+/var/run/cgred.* gen_context(system_u:object_r:cgred_var_run_t,s0)
diff --git a/policy/modules/services/cgroup.if b/policy/modules/services/cgroup.if
index 4b3fb8d..5770206 100644
--- a/policy/modules/services/cgroup.if
+++ b/policy/modules/services/cgroup.if
@@ -102,7 +102,7 @@ interface(`cgroup_stream_connect', `
########################################
## <summary>
-## All of the rules required to administrate
+## All of the rules required to administrate
## an cgroup environment.
## </summary>
## <param name="domain">
@@ -121,7 +121,7 @@ interface(`cgroup_admin',`
gen_require(`
type cgred_t, cgconfigparser_t, cgred_var_run_t;
type cgconfig_etc_t, cgconfig_initrc_exec_t, cgred_initrc_exec_t;
- type cgred_etc_t, cgroup_t;
+ type cgred_etc_t, cgroup_t;
')
allow $1 cgconfigparser_t:process { ptrace signal_perms getattr };
diff --git a/policy/modules/services/cgroup.te b/policy/modules/services/cgroup.te
index 32baa99..438df21 100644
--- a/policy/modules/services/cgroup.te
+++ b/policy/modules/services/cgroup.te
@@ -56,7 +56,6 @@ files_getattr_all_files(cgred_t)
files_getattr_all_sockets(cgred_t)
files_read_all_symlinks(cgred_t)
files_search_all(cgred_t)
-
files_read_etc_files(cgred_t)
fs_write_cgroup_files(cgred_t)
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 62c1c0d..1b670e1 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -47,7 +47,7 @@ type init_var_run_t;
files_pid_file(init_var_run_t)
#
-# initctl_t is the type of the named pipe created
+# initctl_t is the type of the named pipe created
# by init during initialization. This pipe is used
# to communicate with init.
#
@@ -89,7 +89,7 @@ ifdef(`enable_mls',`
# Use capabilities. old rule:
allow init_t self:capability ~sys_module;
-# is ~sys_module really needed? observed:
+# is ~sys_module really needed? observed:
# sys_boot
# sys_tty_config
# kill: now provided by domain_kill_all_domains()
@@ -344,7 +344,7 @@ files_list_default(initrc_t)
files_mounton_default(initrc_t)
fs_delete_cgroup_dirs(initrc_t)
-fs_list_cgroup_dirs(initrc_t)
+fs_list_cgroup_dirs(initrc_t)
fs_rw_cgroup_files(initrc_t)
fs_list_inotifyfs(initrc_t)
fs_register_binary_executable_type(initrc_t)
More information about the scm-commits
mailing list