From 3f67f722bbc01be854fea771cf306023694e6f0b Mon Sep 17 00:00:00 2001 From: Chris PeBenito Date: Fri, 26 Jun 2009 14:40:13 +0000 Subject: [PATCH] trunk: whitespace fixes --- policy/modules/admin/amanda.te | 4 +- policy/modules/admin/dpkg.if | 2 +- policy/modules/admin/kudzu.te | 2 +- policy/modules/admin/logrotate.te | 2 +- policy/modules/admin/logwatch.te | 2 +- policy/modules/admin/mrtg.te | 2 +- policy/modules/admin/portage.if | 2 +- policy/modules/admin/rpm.if | 2 +- policy/modules/admin/su.if | 2 +- policy/modules/admin/sxid.te | 2 +- policy/modules/admin/usermanage.te | 4 +- policy/modules/apps/evolution.te | 2 +- policy/modules/apps/mplayer.fc | 2 +- policy/modules/apps/mplayer.if | 8 +-- policy/modules/apps/slocate.if | 2 +- policy/modules/apps/wireshark.te | 2 +- policy/modules/kernel/corecommands.fc | 16 ++--- policy/modules/kernel/corecommands.if | 2 +- policy/modules/kernel/corenetwork.te.in | 2 +- policy/modules/kernel/devices.if | 10 +-- policy/modules/kernel/files.if | 4 +- policy/modules/kernel/filesystem.if | 4 +- policy/modules/kernel/mls.if | 4 +- policy/modules/roles/guest.if | 2 +- policy/modules/roles/logadm.if | 2 +- policy/modules/roles/xguest.if | 2 +- policy/modules/services/afs.te | 8 +-- policy/modules/services/amavis.te | 2 +- policy/modules/services/apache.if | 54 +++++++-------- policy/modules/services/apache.te | 2 +- policy/modules/services/apcupsd.te | 6 +- policy/modules/services/apm.te | 4 +- policy/modules/services/avahi.te | 2 +- policy/modules/services/bind.te | 2 +- policy/modules/services/bluetooth.te | 2 +- policy/modules/services/canna.if | 2 +- policy/modules/services/certmaster.fc | 4 +- policy/modules/services/certmaster.if | 52 +++++++-------- policy/modules/services/clamav.te | 2 +- policy/modules/services/courier.if | 2 +- policy/modules/services/cron.if | 4 +- policy/modules/services/cron.te | 6 +- policy/modules/services/cups.te | 4 +- policy/modules/services/ddclient.te | 2 +- policy/modules/services/dnsmasq.te | 2 +- policy/modules/services/exim.te | 8 +-- policy/modules/services/ftp.te | 2 +- policy/modules/services/gpm.te | 2 +- policy/modules/services/gpsd.fc | 2 +- policy/modules/services/gpsd.if | 70 ++++++++++---------- policy/modules/services/gpsd.te | 2 +- policy/modules/services/ifplugd.fc | 4 +- policy/modules/services/ifplugd.te | 2 +- policy/modules/services/inetd.te | 2 +- policy/modules/services/kerberos.if | 2 +- policy/modules/services/kerberos.te | 2 +- policy/modules/services/ldap.te | 2 +- policy/modules/services/lircd.if | 28 ++++---- policy/modules/services/lpd.te | 10 +-- policy/modules/services/memcached.if | 2 +- policy/modules/services/memcached.te | 2 +- policy/modules/services/mta.if | 2 +- policy/modules/services/munin.te | 2 +- policy/modules/services/mysql.fc | 2 +- policy/modules/services/mysql.if | 64 +++++++++--------- policy/modules/services/mysql.te | 2 +- policy/modules/services/networkmanager.te | 2 +- policy/modules/services/nis.te | 2 +- policy/modules/services/nsd.fc | 4 +- policy/modules/services/ntp.if | 24 +++---- policy/modules/services/ntp.te | 6 +- policy/modules/services/nx.te | 2 +- policy/modules/services/openca.if | 2 +- policy/modules/services/pegasus.fc | 6 +- policy/modules/services/pingd.if | 80 +++++++++++------------ policy/modules/services/postfix.if | 2 +- policy/modules/services/postfix.te | 6 +- policy/modules/services/postgresql.if | 2 +- policy/modules/services/postgresql.te | 4 +- policy/modules/services/procmail.te | 2 +- policy/modules/services/psad.if | 8 +-- policy/modules/services/psad.te | 2 +- policy/modules/services/pyzor.te | 6 +- policy/modules/services/qmail.if | 2 +- policy/modules/services/radius.fc | 2 +- policy/modules/services/rhgb.te | 2 +- policy/modules/services/ricci.if | 2 +- policy/modules/services/rpc.if | 6 +- policy/modules/services/rsync.fc | 4 +- policy/modules/services/rwho.if | 2 +- policy/modules/services/samba.te | 4 +- policy/modules/services/setroubleshoot.te | 2 +- policy/modules/services/snmp.te | 2 +- policy/modules/services/ssh.te | 14 ++-- policy/modules/services/stunnel.fc | 2 +- policy/modules/services/sysstat.if | 2 +- policy/modules/services/ucspitcp.te | 2 +- policy/modules/services/ulogd.if | 14 ++-- policy/modules/services/uptime.fc | 2 +- policy/modules/services/virt.if | 2 +- policy/modules/services/watchdog.te | 2 +- policy/modules/services/xserver.if | 2 +- policy/modules/services/xserver.te | 18 ++--- policy/modules/services/zebra.fc | 2 +- policy/modules/services/zosremote.if | 12 ++-- policy/modules/system/application.te | 3 +- policy/modules/system/authlogin.if | 34 +++++----- policy/modules/system/authlogin.te | 16 ++--- policy/modules/system/clock.if | 4 +- policy/modules/system/clock.te | 2 +- policy/modules/system/daemontools.te | 12 ++-- policy/modules/system/fstools.if | 4 +- policy/modules/system/fstools.te | 10 +-- policy/modules/system/getty.if | 2 +- policy/modules/system/getty.te | 18 ++--- policy/modules/system/hostname.if | 4 +- policy/modules/system/hostname.te | 2 +- policy/modules/system/hotplug.if | 8 +-- policy/modules/system/hotplug.te | 20 +++--- policy/modules/system/init.if | 26 ++++---- policy/modules/system/init.te | 46 ++++++------- policy/modules/system/ipsec.if | 12 ++-- policy/modules/system/ipsec.te | 60 ++++++++--------- policy/modules/system/iptables.if | 4 +- policy/modules/system/iptables.te | 6 +- policy/modules/system/iscsi.if | 2 +- policy/modules/system/iscsi.te | 8 +-- policy/modules/system/libraries.fc | 6 +- policy/modules/system/libraries.if | 40 ++++++------ policy/modules/system/libraries.te | 12 ++-- policy/modules/system/locallogin.if | 6 +- policy/modules/system/locallogin.te | 6 +- policy/modules/system/logging.if | 34 +++++----- policy/modules/system/logging.te | 52 +++++++-------- policy/modules/system/lvm.te | 2 +- policy/modules/system/miscfiles.if | 68 +++++++++---------- policy/modules/system/modutils.te | 18 ++--- policy/modules/system/mount.if | 4 +- policy/modules/system/mount.te | 12 ++-- policy/modules/system/netlabel.if | 2 +- policy/modules/system/netlabel.te | 2 +- policy/modules/system/pcmcia.if | 10 +-- policy/modules/system/pcmcia.te | 12 ++-- policy/modules/system/raid.if | 2 +- policy/modules/system/raid.te | 6 +- policy/modules/system/selinuxutil.if | 70 ++++++++++---------- policy/modules/system/selinuxutil.te | 26 ++++---- policy/modules/system/setrans.if | 2 +- policy/modules/system/setrans.te | 10 +-- policy/modules/system/sysnetwork.if | 8 +-- policy/modules/system/sysnetwork.te | 20 +++--- policy/modules/system/udev.te | 18 ++--- policy/modules/system/unconfined.if | 4 +- policy/modules/system/userdomain.if | 14 ++-- policy/modules/system/userdomain.te | 12 ++-- policy/modules/system/xen.if | 16 ++--- policy/modules/system/xen.te | 68 +++++++++---------- 157 files changed, 796 insertions(+), 797 deletions(-) diff --git a/policy/modules/admin/amanda.te b/policy/modules/admin/amanda.te index 668cc492..78eb5d4b 100644 --- a/policy/modules/admin/amanda.te +++ b/policy/modules/admin/amanda.te @@ -97,8 +97,8 @@ allow amanda_t amanda_gnutarlists_t:dir rw_dir_perms; allow amanda_t amanda_gnutarlists_t:file manage_file_perms; allow amanda_t amanda_gnutarlists_t:lnk_file manage_lnk_file_perms; -manage_dirs_pattern(amanda_t,amanda_var_lib_t,amanda_var_lib_t) -manage_files_pattern(amanda_t,amanda_var_lib_t,amanda_var_lib_t) +manage_dirs_pattern(amanda_t, amanda_var_lib_t, amanda_var_lib_t) +manage_files_pattern(amanda_t, amanda_var_lib_t, amanda_var_lib_t) manage_files_pattern(amanda_t, amanda_log_t, amanda_log_t) manage_dirs_pattern(amanda_t, amanda_log_t, amanda_log_t) diff --git a/policy/modules/admin/dpkg.if b/policy/modules/admin/dpkg.if index 560d0216..c9a03ffa 100644 --- a/policy/modules/admin/dpkg.if +++ b/policy/modules/admin/dpkg.if @@ -38,7 +38,7 @@ interface(`dpkg_domtrans_script',` ') # transition to dpkg script: - corecmd_shell_domtrans($1,dpkg_script_t) + corecmd_shell_domtrans($1, dpkg_script_t) allow dpkg_script_t $1:fd use; allow dpkg_script_t $1:fifo_file rw_file_perms; allow dpkg_script_t $1:process sigchld; diff --git a/policy/modules/admin/kudzu.te b/policy/modules/admin/kudzu.te index d3937510..dfc2e4ab 100644 --- a/policy/modules/admin/kudzu.te +++ b/policy/modules/admin/kudzu.te @@ -89,7 +89,7 @@ files_search_var(kudzu_t) files_search_locks(kudzu_t) files_manage_etc_files(kudzu_t) files_manage_etc_runtime_files(kudzu_t) -files_etc_filetrans_etc_runtime(kudzu_t,file) +files_etc_filetrans_etc_runtime(kudzu_t, file) files_manage_mnt_files(kudzu_t) files_manage_mnt_symlinks(kudzu_t) files_dontaudit_search_src(kudzu_t) diff --git a/policy/modules/admin/logrotate.te b/policy/modules/admin/logrotate.te index fe696deb..402cb7f2 100644 --- a/policy/modules/admin/logrotate.te +++ b/policy/modules/admin/logrotate.te @@ -132,7 +132,7 @@ ifdef(`distro_debian', ` # for syslogd-listfiles logging_read_syslog_config(logrotate_t) - # for "test -x /sbin/syslogd" + # for "test -x /sbin/syslogd" logging_check_exec_syslog(logrotate_t) ') diff --git a/policy/modules/admin/logwatch.te b/policy/modules/admin/logwatch.te index cb860355..ade2bb02 100644 --- a/policy/modules/admin/logwatch.te +++ b/policy/modules/admin/logwatch.te @@ -34,7 +34,7 @@ manage_dirs_pattern(logwatch_t, logwatch_cache_t, logwatch_cache_t) manage_files_pattern(logwatch_t, logwatch_cache_t, logwatch_cache_t) allow logwatch_t logwatch_lock_t:file manage_file_perms; -files_lock_filetrans(logwatch_t,logwatch_lock_t,file) +files_lock_filetrans(logwatch_t, logwatch_lock_t, file) manage_dirs_pattern(logwatch_t, logwatch_tmp_t, logwatch_tmp_t) manage_files_pattern(logwatch_t, logwatch_tmp_t, logwatch_tmp_t) diff --git a/policy/modules/admin/mrtg.te b/policy/modules/admin/mrtg.te index bd7d5187..46c1f520 100644 --- a/policy/modules/admin/mrtg.te +++ b/policy/modules/admin/mrtg.te @@ -54,7 +54,7 @@ manage_files_pattern(mrtg_t, mrtg_var_lib_t, mrtg_var_lib_t) manage_lnk_files_pattern(mrtg_t, mrtg_var_lib_t, mrtg_var_lib_t) allow mrtg_t mrtg_var_run_t:file manage_file_perms; -files_pid_filetrans(mrtg_t,mrtg_var_run_t,file) +files_pid_filetrans(mrtg_t, mrtg_var_run_t, file) kernel_read_system_state(mrtg_t) kernel_read_network_state(mrtg_t) diff --git a/policy/modules/admin/portage.if b/policy/modules/admin/portage.if index b6547f37..83a36fc0 100644 --- a/policy/modules/admin/portage.if +++ b/policy/modules/admin/portage.if @@ -99,7 +99,7 @@ interface(`portage_compile_domain',` allow $1 self:dbus send_msg; allow $1 portage_devpts_t:chr_file { rw_chr_file_perms setattr }; - term_create_pty($1,portage_devpts_t) + term_create_pty($1, portage_devpts_t) # write compile logs allow $1 portage_log_t:dir setattr; diff --git a/policy/modules/admin/rpm.if b/policy/modules/admin/rpm.if index 36f9fa81..c7b136a9 100644 --- a/policy/modules/admin/rpm.if +++ b/policy/modules/admin/rpm.if @@ -36,7 +36,7 @@ interface(`rpm_domtrans_script',` ') # transition to rpm script: - corecmd_shell_domtrans($1,rpm_script_t) + corecmd_shell_domtrans($1, rpm_script_t) allow rpm_script_t $1:fd use; allow rpm_script_t $1:fifo_file rw_file_perms; allow rpm_script_t $1:process sigchld; diff --git a/policy/modules/admin/su.if b/policy/modules/admin/su.if index 6c82b49f..6c779dca 100644 --- a/policy/modules/admin/su.if +++ b/policy/modules/admin/su.if @@ -166,7 +166,7 @@ template(`su_role_template',` ') type $1_su_t, su_domain_type; - domain_entry_file($1_su_t,su_exec_t) + domain_entry_file($1_su_t, su_exec_t) domain_type($1_su_t) domain_interactive_fd($1_su_t) ubac_constrained($1_su_t) diff --git a/policy/modules/admin/sxid.te b/policy/modules/admin/sxid.te index a253e91a..46f53947 100644 --- a/policy/modules/admin/sxid.te +++ b/policy/modules/admin/sxid.te @@ -29,7 +29,7 @@ allow sxid_t self:tcp_socket create_stream_socket_perms; allow sxid_t self:udp_socket create_socket_perms; allow sxid_t sxid_log_t:file manage_file_perms; -logging_log_filetrans(sxid_t,sxid_log_t,file) +logging_log_filetrans(sxid_t, sxid_log_t, file) manage_dirs_pattern(sxid_t, sxid_tmp_t, sxid_tmp_t) manage_files_pattern(sxid_t, sxid_tmp_t, sxid_tmp_t) diff --git a/policy/modules/admin/usermanage.te b/policy/modules/admin/usermanage.te index ac4e7ff0..508014f2 100644 --- a/policy/modules/admin/usermanage.te +++ b/policy/modules/admin/usermanage.te @@ -49,7 +49,7 @@ files_tmp_file(sysadm_passwd_tmp_t) type useradd_t; type useradd_exec_t; domain_obj_id_change_exemption(useradd_t) -init_system_domain(useradd_t,useradd_exec_t) +init_system_domain(useradd_t, useradd_exec_t) role system_r types useradd_t; ######################################## @@ -210,7 +210,7 @@ files_manage_etc_files(groupadd_t) files_relabel_etc_files(groupadd_t) files_read_etc_runtime_files(groupadd_t) -# Execute /usr/bin/{passwd,chfn,chsh} and /usr/sbin/{useradd,vipw}. +# Execute /usr/bin/{passwd, chfn, chsh} and /usr/sbin/{useradd, vipw}. corecmd_exec_bin(groupadd_t) logging_send_audit_msgs(groupadd_t) diff --git a/policy/modules/apps/evolution.te b/policy/modules/apps/evolution.te index 8e56d616..03611448 100644 --- a/policy/modules/apps/evolution.te +++ b/policy/modules/apps/evolution.te @@ -480,7 +480,7 @@ userdom_search_user_home_dirs(evolution_exchange_t) # until properly implemented userdom_dontaudit_read_user_home_content_files(evolution_exchange_t) -xserver_user_x_domain_template(evolution_exchange,evolution_exchange_t, evolution_exchange_tmpfs_t) +xserver_user_x_domain_template(evolution_exchange, evolution_exchange_t, evolution_exchange_tmpfs_t) # Access evolution home tunable_policy(`use_nfs_home_dirs',` diff --git a/policy/modules/apps/mplayer.fc b/policy/modules/apps/mplayer.fc index e1fe8508..5a37c50d 100644 --- a/policy/modules/apps/mplayer.fc +++ b/policy/modules/apps/mplayer.fc @@ -11,4 +11,4 @@ /usr/bin/vlc -- gen_context(system_u:object_r:mplayer_exec_t,s0) /usr/bin/xine -- gen_context(system_u:object_r:mplayer_exec_t,s0) -HOME_DIR/\.mplayer(/.*)? gen_context(system_u:object_r:mplayer_home_t,s0) +HOME_DIR/\.mplayer(/.*)? gen_context(system_u:object_r:mplayer_home_t,s0) diff --git a/policy/modules/apps/mplayer.if b/policy/modules/apps/mplayer.if index 1f9adca0..c7ad0f51 100644 --- a/policy/modules/apps/mplayer.if +++ b/policy/modules/apps/mplayer.if @@ -67,12 +67,12 @@ interface(`mplayer_domtrans',` ######################################## ## -## Execute mplayer in the caller domain. +## Execute mplayer in the caller domain. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # # diff --git a/policy/modules/apps/slocate.if b/policy/modules/apps/slocate.if index d8aec96b..b7505a0b 100644 --- a/policy/modules/apps/slocate.if +++ b/policy/modules/apps/slocate.if @@ -35,7 +35,7 @@ interface(`locate_read_lib_files',` type locate_var_lib_t; ') - read_files_pattern($1,locate_var_lib_t,locate_var_lib_t) + read_files_pattern($1, locate_var_lib_t, locate_var_lib_t) allow $1 locate_var_lib_t:dir list_dir_perms; files_search_var_lib($1) ') diff --git a/policy/modules/apps/wireshark.te b/policy/modules/apps/wireshark.te index 9a03cb6d..0a1901ae 100644 --- a/policy/modules/apps/wireshark.te +++ b/policy/modules/apps/wireshark.te @@ -54,7 +54,7 @@ corecmd_search_bin(wireshark_t) manage_dirs_pattern(wireshark_t, wireshark_home_t, wireshark_home_t) manage_files_pattern(wireshark_t, wireshark_home_t, wireshark_home_t) manage_lnk_files_pattern(wireshark_t, wireshark_home_t, wireshark_home_t) -userdom_user_home_dir_filetrans(wireshark_t, wireshark_home_t,dir) +userdom_user_home_dir_filetrans(wireshark_t, wireshark_home_t, dir) # Store temporary files manage_dirs_pattern(wireshark_t, wireshark_tmp_t, wireshark_tmp_t) diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc index 07d0a843..5052a09f 100644 --- a/policy/modules/kernel/corecommands.fc +++ b/policy/modules/kernel/corecommands.fc @@ -74,7 +74,7 @@ ifdef(`distro_redhat',` /etc/rc\.d/init\.d/functions -- gen_context(system_u:object_r:bin_t,s0) -/etc/security/namespace.init -- gen_context(system_u:object_r:bin_t,s0) +/etc/security/namespace.init -- gen_context(system_u:object_r:bin_t,s0) /etc/sysconfig/crond -- gen_context(system_u:object_r:bin_t,s0) /etc/sysconfig/init -- gen_context(system_u:object_r:bin_t,s0) @@ -218,11 +218,11 @@ ifdef(`distro_gentoo',` /usr/share/PackageKit/pk-upgrade-distro\.sh -- gen_context(system_u:object_r:bin_t,s0) /usr/share/PackageKit/helpers(/.*)? gen_context(system_u:object_r:bin_t,s0) /usr/share/selinux/devel/policygentool -- gen_context(system_u:object_r:bin_t,s0) -/usr/share/shorewall/configpath -- gen_context(system_u:object_r:bin_t,s0) -/usr/share/shorewall-perl(/.*)? gen_context(system_u:object_r:bin_t,s0) -/usr/share/shorewall-shell(/.*)? gen_context(system_u:object_r:bin_t,s0) +/usr/share/shorewall/configpath -- gen_context(system_u:object_r:bin_t,s0) +/usr/share/shorewall-perl(/.*)? gen_context(system_u:object_r:bin_t,s0) +/usr/share/shorewall-shell(/.*)? gen_context(system_u:object_r:bin_t,s0) /usr/share/shorewall-lite(/.*)? gen_context(system_u:object_r:bin_t,s0) -/usr/share/shorewall6-lite(/.*)? gen_context(system_u:object_r:bin_t,s0) +/usr/share/shorewall6-lite(/.*)? gen_context(system_u:object_r:bin_t,s0) /usr/share/turboprint/lib(/.*)? -- gen_context(system_u:object_r:bin_t,s0) /usr/X11R6/lib(64)?/X11/xkb/xkbcomp -- gen_context(system_u:object_r:bin_t,s0) @@ -241,8 +241,8 @@ ifdef(`distro_redhat', ` /usr/lib64/.*/program(/.*)? gen_context(system_u:object_r:bin_t,s0) /usr/lib/bluetooth(/.*)? -- gen_context(system_u:object_r:bin_t,s0) /usr/lib64/bluetooth(/.*)? -- gen_context(system_u:object_r:bin_t,s0) -/usr/lib/vmware-tools/(s)?bin32(/.*)? gen_context(system_u:object_r:bin_t,s0) -/usr/lib/vmware-tools/(s)?bin64(/.*)? gen_context(system_u:object_r:bin_t,s0) +/usr/lib/vmware-tools/(s)?bin32(/.*)? gen_context(system_u:object_r:bin_t,s0) +/usr/lib/vmware-tools/(s)?bin64(/.*)? gen_context(system_u:object_r:bin_t,s0) /usr/share/authconfig/authconfig-gtk\.py -- gen_context(system_u:object_r:bin_t,s0) /usr/share/authconfig/authconfig-tui\.py -- gen_context(system_u:object_r:bin_t,s0) /usr/share/authconfig/authconfig\.py -- gen_context(system_u:object_r:bin_t,s0) @@ -305,7 +305,7 @@ ifdef(`distro_suse', ` /usr/lib/yp/.+ -- gen_context(system_u:object_r:bin_t,s0) /usr/lib64/yp/.+ -- gen_context(system_u:object_r:bin_t,s0) -/var/qmail/bin -d gen_context(system_u:object_r:bin_t,s0) +/var/qmail/bin -d gen_context(system_u:object_r:bin_t,s0) /var/qmail/bin(/.*)? gen_context(system_u:object_r:bin_t,s0) /var/qmail/rc -- gen_context(system_u:object_r:bin_t,s0) diff --git a/policy/modules/kernel/corecommands.if b/policy/modules/kernel/corecommands.if index 49f2e944..52bb5938 100644 --- a/policy/modules/kernel/corecommands.if +++ b/policy/modules/kernel/corecommands.if @@ -70,7 +70,7 @@ interface(`corecmd_bin_entry_type',` type bin_t; ') - domain_entry_file($1,bin_t) + domain_entry_file($1, bin_t) ') ######################################## diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in index 7e624f80..96887cfe 100644 --- a/policy/modules/kernel/corenetwork.te.in +++ b/policy/modules/kernel/corenetwork.te.in @@ -230,7 +230,7 @@ type netif_t, netif_type; sid netif gen_context(system_u:object_r:netif_t,s0 - mls_systemhigh) build_option(`enable_mls',` -network_interface(lo, lo,s0 - mls_systemhigh) +network_interface(lo, lo, s0 - mls_systemhigh) ',` typealias netif_t alias { lo_netif_t netif_lo_t }; ') diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if index 7ddb8e24..a4bb416c 100644 --- a/policy/modules/kernel/devices.if +++ b/policy/modules/kernel/devices.if @@ -68,8 +68,8 @@ interface(`dev_relabel_all_dev_nodes',` relabelfrom_lnk_files_pattern($1, device_t, { device_t device_node }) relabelfrom_fifo_files_pattern($1, device_t, device_node) relabelfrom_sock_files_pattern($1, device_t, device_node) - relabel_blk_files_pattern($1,device_t,{ device_t device_node }) - relabel_chr_files_pattern($1,device_t,{ device_t device_node }) + relabel_blk_files_pattern($1, device_t,{ device_t device_node }) + relabel_chr_files_pattern($1, device_t,{ device_t device_node }) ') ######################################## @@ -1247,7 +1247,7 @@ interface(`dev_create_cardmgr_dev',` create_chr_files_pattern($1, device_t, cardmgr_dev_t) create_blk_files_pattern($1, device_t, cardmgr_dev_t) - filetrans_pattern($1,device_t, cardmgr_dev_t, { chr_file blk_file }) + filetrans_pattern($1, device_t, cardmgr_dev_t, { chr_file blk_file }) ') ######################################## @@ -1709,11 +1709,11 @@ interface(`dev_read_kvm',` ######################################## ## -## Read and write to kvm devices. +## Read and write to kvm devices. ## ## ## -## Domain allowed access. +## Domain allowed access. ## ## # diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if index d76b28bb..87442ecf 100644 --- a/policy/modules/kernel/files.if +++ b/policy/modules/kernel/files.if @@ -2138,7 +2138,7 @@ interface(`files_create_boot_flag',` ') allow $1 etc_runtime_t:file manage_file_perms; - filetrans_pattern($1,root_t,etc_runtime_t,file) + filetrans_pattern($1, root_t, etc_runtime_t, file) ') ######################################## @@ -4662,7 +4662,7 @@ interface(`files_rw_generic_pids',` type var_t, var_run_t; ') - list_dirs_pattern($1,var_t,var_run_t) + list_dirs_pattern($1, var_t, var_run_t) rw_files_pattern($1, var_run_t, var_run_t) ') diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if index b9b367ad..b2c058a4 100644 --- a/policy/modules/kernel/filesystem.if +++ b/policy/modules/kernel/filesystem.if @@ -103,7 +103,7 @@ interface(`fs_exec_noxattr',` attribute noxattrfs; ') - can_exec($1,noxattrfs) + can_exec($1, noxattrfs) ') ######################################## @@ -1455,7 +1455,7 @@ interface(`fs_read_fusefs_files',` type fusefs_t; ') - read_files_pattern($1,fusefs_t,fusefs_t) + read_files_pattern($1, fusefs_t, fusefs_t) ') ######################################## diff --git a/policy/modules/kernel/mls.if b/policy/modules/kernel/mls.if index af86516d..d178478d 100644 --- a/policy/modules/kernel/mls.if +++ b/policy/modules/kernel/mls.if @@ -959,7 +959,7 @@ interface(`mls_dbus_send_all_levels',` attribute mlsdbussend; ') - typeattribute $1 mlsdbussend; + typeattribute $1 mlsdbussend; ') ######################################## @@ -980,5 +980,5 @@ interface(`mls_dbus_recv_all_levels',` attribute mlsdbusrecv; ') - typeattribute $1 mlsdbusrecv; + typeattribute $1 mlsdbusrecv; ') diff --git a/policy/modules/roles/guest.if b/policy/modules/roles/guest.if index ab01ad23..8906a329 100644 --- a/policy/modules/roles/guest.if +++ b/policy/modules/roles/guest.if @@ -6,7 +6,7 @@ ## ## ## -## Role allowed access. +## Role allowed access. ## ## ## diff --git a/policy/modules/roles/logadm.if b/policy/modules/roles/logadm.if index 6bd00f99..c9740e5f 100644 --- a/policy/modules/roles/logadm.if +++ b/policy/modules/roles/logadm.if @@ -6,7 +6,7 @@ ## ## ## -## Role allowed access. +## Role allowed access. ## ## ## diff --git a/policy/modules/roles/xguest.if b/policy/modules/roles/xguest.if index 0f05b1c4..d2234e32 100644 --- a/policy/modules/roles/xguest.if +++ b/policy/modules/roles/xguest.if @@ -6,7 +6,7 @@ ## ## ## -## Role allowed access. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/afs.te b/policy/modules/services/afs.te index 2114d002..b7403e0a 100644 --- a/policy/modules/services/afs.te +++ b/policy/modules/services/afs.te @@ -65,7 +65,7 @@ allow afs_bosserver_t self:process { setsched signal_perms }; allow afs_bosserver_t self:tcp_socket create_stream_socket_perms; allow afs_bosserver_t self:udp_socket create_socket_perms; -can_exec(afs_bosserver_t,afs_bosserver_exec_t) +can_exec(afs_bosserver_t, afs_bosserver_exec_t) manage_dirs_pattern(afs_bosserver_t, afs_config_t, afs_config_t) manage_files_pattern(afs_bosserver_t, afs_config_t, afs_config_t) @@ -236,7 +236,7 @@ allow afs_ptserver_t self:unix_stream_socket create_stream_socket_perms; allow afs_ptserver_t self:tcp_socket create_stream_socket_perms; allow afs_ptserver_t self:udp_socket create_socket_perms; -read_files_pattern(afs_ptserver_t,afs_config_t,afs_config_t) +read_files_pattern(afs_ptserver_t, afs_config_t, afs_config_t) allow afs_ptserver_t afs_config_t:dir list_dir_perms; manage_dirs_pattern(afs_ptserver_t, afs_logfile_t, afs_logfile_t) @@ -274,14 +274,14 @@ allow afs_vlserver_t self:unix_stream_socket create_stream_socket_perms; allow afs_vlserver_t self:tcp_socket create_stream_socket_perms; allow afs_vlserver_t self:udp_socket create_socket_perms; -read_files_pattern(afs_vlserver_t,afs_config_t,afs_config_t) +read_files_pattern(afs_vlserver_t, afs_config_t, afs_config_t) allow afs_vlserver_t afs_config_t:dir list_dir_perms; manage_dirs_pattern(afs_vlserver_t, afs_logfile_t, afs_logfile_t) manage_files_pattern(afs_vlserver_t, afs_logfile_t, afs_logfile_t) manage_files_pattern(afs_vlserver_t, afs_dbdir_t, afs_vl_db_t) -filetrans_pattern(afs_vlserver_t, afs_dbdir_t,afs_vl_db_t, file) +filetrans_pattern(afs_vlserver_t, afs_dbdir_t, afs_vl_db_t, file) corenet_all_recvfrom_unlabeled(afs_vlserver_t) corenet_all_recvfrom_netlabel(afs_vlserver_t) diff --git a/policy/modules/services/amavis.te b/policy/modules/services/amavis.te index 04d430ad..294f4e00 100644 --- a/policy/modules/services/amavis.te +++ b/policy/modules/services/amavis.te @@ -78,7 +78,7 @@ files_search_spool(amavis_t) # tmp files manage_files_pattern(amavis_t, amavis_tmp_t, amavis_tmp_t) allow amavis_t amavis_tmp_t:dir setattr; -files_tmp_filetrans(amavis_t,amavis_tmp_t,file) +files_tmp_filetrans(amavis_t, amavis_tmp_t, file) # var/lib files for amavis manage_dirs_pattern(amavis_t, amavis_var_lib_t, amavis_var_lib_t) diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if index 6e429241..4b6be374 100644 --- a/policy/modules/services/apache.if +++ b/policy/modules/services/apache.if @@ -79,8 +79,8 @@ template(`apache_content_template',` read_lnk_files_pattern(httpd_$1_script_t, httpd_$1_script_ra_t, httpd_$1_script_ra_t) allow httpd_$1_script_t httpd_$1_script_ro_t:dir list_dir_perms; - read_files_pattern(httpd_$1_script_t,httpd_$1_script_ro_t,httpd_$1_script_ro_t) - read_lnk_files_pattern(httpd_$1_script_t,httpd_$1_script_ro_t,httpd_$1_script_ro_t) + read_files_pattern(httpd_$1_script_t, httpd_$1_script_ro_t, httpd_$1_script_ro_t) + read_lnk_files_pattern(httpd_$1_script_t, httpd_$1_script_ro_t, httpd_$1_script_ro_t) manage_dirs_pattern(httpd_$1_script_t, httpd_$1_script_rw_t, httpd_$1_script_rw_t) manage_files_pattern(httpd_$1_script_t, httpd_$1_script_rw_t, httpd_$1_script_rw_t) @@ -268,33 +268,33 @@ interface(`apache_role',` allow $2 httpd_user_htaccess_t:file { manage_file_perms relabelto relabelfrom }; - manage_dirs_pattern($2,httpd_user_script_ra_t,httpd_user_script_ra_t) - manage_files_pattern($2,httpd_user_script_ra_t,httpd_user_script_ra_t) - manage_lnk_files_pattern($2,httpd_user_script_ra_t,httpd_user_script_ra_t) - relabel_dirs_pattern($2,httpd_user_script_ra_t,httpd_user_script_ra_t) - relabel_files_pattern($2,httpd_user_script_ra_t,httpd_user_script_ra_t) - relabel_lnk_files_pattern($2,httpd_user_script_ra_t,httpd_user_script_ra_t) + manage_dirs_pattern($2, httpd_user_script_ra_t, httpd_user_script_ra_t) + manage_files_pattern($2, httpd_user_script_ra_t, httpd_user_script_ra_t) + manage_lnk_files_pattern($2, httpd_user_script_ra_t, httpd_user_script_ra_t) + relabel_dirs_pattern($2, httpd_user_script_ra_t, httpd_user_script_ra_t) + relabel_files_pattern($2, httpd_user_script_ra_t, httpd_user_script_ra_t) + relabel_lnk_files_pattern($2, httpd_user_script_ra_t, httpd_user_script_ra_t) - manage_dirs_pattern($2,httpd_user_script_ro_t,httpd_user_script_ro_t) - manage_files_pattern($2,httpd_user_script_ro_t,httpd_user_script_ro_t) - manage_lnk_files_pattern($2,httpd_user_script_ro_t,httpd_user_script_ro_t) - relabel_dirs_pattern($2,httpd_user_script_ro_t,httpd_user_script_ro_t) - relabel_files_pattern($2,httpd_user_script_ro_t,httpd_user_script_ro_t) - relabel_lnk_files_pattern($2,httpd_user_script_ro_t,httpd_user_script_ro_t) + manage_dirs_pattern($2, httpd_user_script_ro_t, httpd_user_script_ro_t) + manage_files_pattern($2, httpd_user_script_ro_t, httpd_user_script_ro_t) + manage_lnk_files_pattern($2, httpd_user_script_ro_t, httpd_user_script_ro_t) + relabel_dirs_pattern($2, httpd_user_script_ro_t, httpd_user_script_ro_t) + relabel_files_pattern($2, httpd_user_script_ro_t, httpd_user_script_ro_t) + relabel_lnk_files_pattern($2, httpd_user_script_ro_t, httpd_user_script_ro_t) - manage_dirs_pattern($2,httpd_user_script_rw_t,httpd_user_script_rw_t) - manage_files_pattern($2,httpd_user_script_rw_t,httpd_user_script_rw_t) - manage_lnk_files_pattern($2,httpd_user_script_rw_t,httpd_user_script_rw_t) - relabel_dirs_pattern($2,httpd_user_script_rw_t,httpd_user_script_rw_t) - relabel_files_pattern($2,httpd_user_script_rw_t,httpd_user_script_rw_t) - relabel_lnk_files_pattern($2,httpd_user_script_rw_t,httpd_user_script_rw_t) + manage_dirs_pattern($2, httpd_user_script_rw_t, httpd_user_script_rw_t) + manage_files_pattern($2, httpd_user_script_rw_t, httpd_user_script_rw_t) + manage_lnk_files_pattern($2, httpd_user_script_rw_t, httpd_user_script_rw_t) + relabel_dirs_pattern($2, httpd_user_script_rw_t, httpd_user_script_rw_t) + relabel_files_pattern($2, httpd_user_script_rw_t, httpd_user_script_rw_t) + relabel_lnk_files_pattern($2, httpd_user_script_rw_t, httpd_user_script_rw_t) - manage_dirs_pattern($2,httpd_user_script_exec_t,httpd_user_script_exec_t) - manage_files_pattern($2,httpd_user_script_exec_t,httpd_user_script_exec_t) - manage_lnk_files_pattern($2,httpd_user_script_exec_t,httpd_user_script_exec_t) - relabel_dirs_pattern($2,httpd_user_script_exec_t,httpd_user_script_exec_t) - relabel_files_pattern($2,httpd_user_script_exec_t,httpd_user_script_exec_t) - relabel_lnk_files_pattern($2,httpd_user_script_exec_t,httpd_user_script_exec_t) + manage_dirs_pattern($2, httpd_user_script_exec_t, httpd_user_script_exec_t) + manage_files_pattern($2, httpd_user_script_exec_t, httpd_user_script_exec_t) + manage_lnk_files_pattern($2, httpd_user_script_exec_t, httpd_user_script_exec_t) + relabel_dirs_pattern($2, httpd_user_script_exec_t, httpd_user_script_exec_t) + relabel_files_pattern($2, httpd_user_script_exec_t, httpd_user_script_exec_t) + relabel_lnk_files_pattern($2, httpd_user_script_exec_t, httpd_user_script_exec_t) tunable_policy(`httpd_enable_cgi',` # If a user starts a script by hand it gets the proper context @@ -735,7 +735,7 @@ interface(`apache_exec_modules',` allow $1 httpd_modules_t:dir list_dir_perms; allow $1 httpd_modules_t:lnk_file read_lnk_file_perms; - can_exec($1,httpd_modules_t) + can_exec($1, httpd_modules_t) ') ######################################## diff --git a/policy/modules/services/apache.te b/policy/modules/services/apache.te index cf86f523..aa63901f 100644 --- a/policy/modules/services/apache.te +++ b/policy/modules/services/apache.te @@ -430,7 +430,7 @@ tunable_policy(`httpd_enable_homedirs && use_samba_home_dirs',` ') tunable_policy(`httpd_ssi_exec',` - corecmd_shell_domtrans(httpd_t,httpd_sys_script_t) + corecmd_shell_domtrans(httpd_t, httpd_sys_script_t) allow httpd_sys_script_t httpd_t:fd use; allow httpd_sys_script_t httpd_t:fifo_file rw_file_perms; allow httpd_sys_script_t httpd_t:process sigchld; diff --git a/policy/modules/services/apcupsd.te b/policy/modules/services/apcupsd.te index ee8cf513..b037ba9d 100644 --- a/policy/modules/services/apcupsd.te +++ b/policy/modules/services/apcupsd.te @@ -37,7 +37,7 @@ allow apcupsd_t self:unix_stream_socket create_stream_socket_perms; allow apcupsd_t self:tcp_socket create_stream_socket_perms; allow apcupsd_t apcupsd_lock_t:file manage_file_perms; -files_lock_filetrans(apcupsd_t,apcupsd_lock_t,file) +files_lock_filetrans(apcupsd_t, apcupsd_lock_t, file) allow apcupsd_t apcupsd_log_t:dir setattr; manage_files_pattern(apcupsd_t, apcupsd_log_t, apcupsd_log_t) @@ -47,7 +47,7 @@ manage_files_pattern(apcupsd_t, apcupsd_tmp_t, apcupsd_tmp_t) files_tmp_filetrans(apcupsd_t, apcupsd_tmp_t, file) manage_files_pattern(apcupsd_t, apcupsd_var_run_t, apcupsd_var_run_t) -files_pid_filetrans(apcupsd_t,apcupsd_var_run_t, file) +files_pid_filetrans(apcupsd_t, apcupsd_var_run_t, file) kernel_read_system_state(apcupsd_t) @@ -73,7 +73,7 @@ files_read_etc_files(apcupsd_t) files_search_locks(apcupsd_t) # Creates /etc/nologin files_manage_etc_runtime_files(apcupsd_t) -files_etc_filetrans_etc_runtime(apcupsd_t,file) +files_etc_filetrans_etc_runtime(apcupsd_t, file) # https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240805 term_use_unallocated_ttys(apcupsd_t) diff --git a/policy/modules/services/apm.te b/policy/modules/services/apm.te index 5dd72f71..46cee510 100644 --- a/policy/modules/services/apm.te +++ b/policy/modules/services/apm.te @@ -67,7 +67,7 @@ allow apmd_t self:unix_dgram_socket create_socket_perms; allow apmd_t self:unix_stream_socket create_stream_socket_perms; allow apmd_t apmd_log_t:file manage_file_perms; -logging_log_filetrans(apmd_t,apmd_log_t,file) +logging_log_filetrans(apmd_t, apmd_log_t, file) manage_dirs_pattern(apmd_t, apmd_tmp_t, apmd_tmp_t) manage_files_pattern(apmd_t, apmd_tmp_t, apmd_tmp_t) @@ -139,7 +139,7 @@ userdom_dontaudit_search_user_home_content(apmd_t) # Excessive? ifdef(`distro_redhat',` allow apmd_t apmd_lock_t:file manage_file_perms; - files_lock_filetrans(apmd_t,apmd_lock_t,file) + files_lock_filetrans(apmd_t, apmd_lock_t, file) can_exec(apmd_t, apmd_var_run_t) diff --git a/policy/modules/services/avahi.te b/policy/modules/services/avahi.te index d1c43f95..a03336e1 100644 --- a/policy/modules/services/avahi.te +++ b/policy/modules/services/avahi.te @@ -40,7 +40,7 @@ files_var_lib_filetrans(avahi_t, avahi_var_lib_t, { dir file }) manage_files_pattern(avahi_t, avahi_var_run_t, avahi_var_run_t) manage_sock_files_pattern(avahi_t, avahi_var_run_t, avahi_var_run_t) allow avahi_t avahi_var_run_t:dir setattr; -files_pid_filetrans(avahi_t,avahi_var_run_t,file) +files_pid_filetrans(avahi_t, avahi_var_run_t, file) kernel_read_kernel_sysctls(avahi_t) kernel_list_proc(avahi_t) diff --git a/policy/modules/services/bind.te b/policy/modules/services/bind.te index 2c438594..f5f80a89 100644 --- a/policy/modules/services/bind.te +++ b/policy/modules/services/bind.te @@ -151,7 +151,7 @@ userdom_dontaudit_search_user_home_dirs(named_t) tunable_policy(`named_write_master_zones',` manage_dirs_pattern(named_t, named_zone_t, named_zone_t) - manage_files_pattern(named_t, named_zone_t,named_zone_t) + manage_files_pattern(named_t, named_zone_t, named_zone_t) manage_lnk_files_pattern(named_t, named_zone_t, named_zone_t) ') diff --git a/policy/modules/services/bluetooth.te b/policy/modules/services/bluetooth.te index c5d67be8..9b131e1a 100644 --- a/policy/modules/services/bluetooth.te +++ b/policy/modules/services/bluetooth.te @@ -77,7 +77,7 @@ filetrans_pattern(bluetooth_t, bluetooth_conf_t, bluetooth_conf_rw_t, { dir file can_exec(bluetooth_t, bluetooth_helper_exec_t) allow bluetooth_t bluetooth_lock_t:file manage_file_perms; -files_lock_filetrans(bluetooth_t,bluetooth_lock_t,file) +files_lock_filetrans(bluetooth_t, bluetooth_lock_t, file) manage_dirs_pattern(bluetooth_t, bluetooth_tmp_t, bluetooth_tmp_t) manage_files_pattern(bluetooth_t, bluetooth_tmp_t, bluetooth_tmp_t) diff --git a/policy/modules/services/canna.if b/policy/modules/services/canna.if index af2e6a08..4a26b0cb 100644 --- a/policy/modules/services/canna.if +++ b/policy/modules/services/canna.if @@ -16,7 +16,7 @@ interface(`canna_stream_connect',` ') files_search_pids($1) - stream_connect_pattern($1, canna_var_run_t, canna_var_run_t,canna_t) + stream_connect_pattern($1, canna_var_run_t, canna_var_run_t, canna_t) ') ######################################## diff --git a/policy/modules/services/certmaster.fc b/policy/modules/services/certmaster.fc index 914a1841..f27a5847 100644 --- a/policy/modules/services/certmaster.fc +++ b/policy/modules/services/certmaster.fc @@ -1,7 +1,7 @@ /etc/certmaster(/.*)? gen_context(system_u:object_r:certmaster_etc_rw_t,s0) -/etc/rc\.d/init\.d/certmaster -- gen_context(system_u:object_r:certmaster_initrc_exec_t,s0) +/etc/rc\.d/init\.d/certmaster -- gen_context(system_u:object_r:certmaster_initrc_exec_t,s0) /usr/bin/certmaster -- gen_context(system_u:object_r:certmaster_exec_t,s0) -/var/log/certmaster(/.*)? gen_context(system_u:object_r:certmaster_var_log_t,s0) +/var/log/certmaster(/.*)? gen_context(system_u:object_r:certmaster_var_log_t,s0) /var/run/certmaster.* gen_context(system_u:object_r:certmaster_var_run_t,s0) diff --git a/policy/modules/services/certmaster.if b/policy/modules/services/certmaster.if index b9dd5e3c..27fe7cab 100644 --- a/policy/modules/services/certmaster.if +++ b/policy/modules/services/certmaster.if @@ -20,60 +20,60 @@ interface(`certmaster_domtrans',` ####################################### ## -## read certmaster logs. +## read certmaster logs. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`certmaster_read_log',` - gen_require(` - type certmaster_var_log_t; - ') + gen_require(` + type certmaster_var_log_t; + ') - read_files_pattern($1, certmaster_var_log_t, certmaster_var_log_t) + read_files_pattern($1, certmaster_var_log_t, certmaster_var_log_t) logging_search_logs($1) ') ####################################### ## -## Append to certmaster logs. +## Append to certmaster logs. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`certmaster_append_log',` - gen_require(` - type certmaster_var_log_t; - ') + gen_require(` + type certmaster_var_log_t; + ') - append_files_pattern($1, certmaster_var_log_t, certmaster_var_log_t) + append_files_pattern($1, certmaster_var_log_t, certmaster_var_log_t) logging_search_logs($1) ') ####################################### ## -## Create, read, write, and delete -## certmaster logs. +## Create, read, write, and delete +## certmaster logs. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`certmaster_manage_log',` - gen_require(` - type certmaster_var_log_t; - ') + gen_require(` + type certmaster_var_log_t; + ') - manage_files_pattern($1, certmaster_var_log_t, certmaster_var_log_t) - manage_lnk_files_pattern($1, certmaster_var_log_t, certmaster_var_log_t) + manage_files_pattern($1, certmaster_var_log_t, certmaster_var_log_t) + manage_lnk_files_pattern($1, certmaster_var_log_t, certmaster_var_log_t) logging_search_logs($1) ') diff --git a/policy/modules/services/clamav.te b/policy/modules/services/clamav.te index 904098a1..0ecdf667 100644 --- a/policy/modules/services/clamav.te +++ b/policy/modules/services/clamav.te @@ -120,7 +120,7 @@ cron_rw_pipes(clamd_t) optional_policy(` amavis_read_lib_files(clamd_t) amavis_read_spool_files(clamd_t) - amavis_spool_filetrans(clamd_t,clamd_var_run_t,sock_file) + amavis_spool_filetrans(clamd_t, clamd_var_run_t, sock_file) amavis_create_pid_files(clamd_t) ') diff --git a/policy/modules/services/courier.if b/policy/modules/services/courier.if index 9354611c..529c6d88 100644 --- a/policy/modules/services/courier.if +++ b/policy/modules/services/courier.if @@ -35,7 +35,7 @@ template(`courier_domain_template',` can_exec(courier_$1_t, courier_$1_exec_t) - read_files_pattern(courier_$1_t,courier_etc_t,courier_etc_t) + read_files_pattern(courier_$1_t, courier_etc_t, courier_etc_t) allow courier_$1_t courier_etc_t:dir list_dir_perms; manage_files_pattern(courier_$1_t, courier_var_run_t, courier_var_run_t) diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if index e75526a5..8933f6d6 100644 --- a/policy/modules/services/cron.if +++ b/policy/modules/services/cron.if @@ -34,7 +34,7 @@ template(`cron_common_crontab_template',` allow $1_t self:process signal_perms; allow $1_t $1_tmp_t:file manage_file_perms; - files_tmp_filetrans($1_t,$1_tmp_t,file) + files_tmp_filetrans($1_t,$1_tmp_t, file) # create files in /var/spool/cron # cjp: change this to a role transition @@ -411,7 +411,7 @@ interface(`cron_anacron_domtrans_system_job',` type system_cronjob_t, anacron_exec_t; ') - domtrans_pattern($1,anacron_exec_t,system_cronjob_t) + domtrans_pattern($1, anacron_exec_t, system_cronjob_t) ') ######################################## diff --git a/policy/modules/services/cron.te b/policy/modules/services/cron.te index 9b0d6cc3..7daabfb1 100644 --- a/policy/modules/services/cron.te +++ b/policy/modules/services/cron.te @@ -90,7 +90,7 @@ type system_cronjob_tmp_t alias system_crond_tmp_t; files_tmp_file(system_cronjob_tmp_t) ifdef(`enable_mcs',` - init_ranged_daemon_domain(crond_t,crond_exec_t,s0 - mcs_systemhigh) + init_ranged_daemon_domain(crond_t, crond_exec_t, s0 - mcs_systemhigh) ') type unconfined_cronjob_t; @@ -147,7 +147,7 @@ allow crond_t self:msg { send receive }; allow crond_t self:key { search write link }; allow crond_t crond_var_run_t:file manage_file_perms; -files_pid_filetrans(crond_t,crond_var_run_t,file) +files_pid_filetrans(crond_t, crond_var_run_t, file) allow crond_t cron_spool_t:dir rw_dir_perms; allow crond_t cron_spool_t:file read_file_perms; @@ -306,7 +306,7 @@ allow system_cronjob_t crond_t:process sigchld; # Write /var/lock/makewhatis.lock. allow system_cronjob_t system_cronjob_lock_t:file manage_file_perms; -files_lock_filetrans(system_cronjob_t,system_cronjob_lock_t,file) +files_lock_filetrans(system_cronjob_t, system_cronjob_lock_t, file) # write temporary files manage_files_pattern(system_cronjob_t, crond_tmp_t, system_cronjob_tmp_t) diff --git a/policy/modules/services/cups.te b/policy/modules/services/cups.te index 96a0f04f..ced61ac7 100644 --- a/policy/modules/services/cups.te +++ b/policy/modules/services/cups.te @@ -66,11 +66,11 @@ type ptal_var_run_t; files_pid_file(ptal_var_run_t) ifdef(`enable_mcs',` - init_ranged_daemon_domain(cupsd_t,cupsd_exec_t,s0 - mcs_systemhigh) + init_ranged_daemon_domain(cupsd_t, cupsd_exec_t, s0 - mcs_systemhigh) ') ifdef(`enable_mls',` - init_ranged_daemon_domain(cupsd_t,cupsd_exec_t,mls_systemhigh) + init_ranged_daemon_domain(cupsd_t, cupsd_exec_t, mls_systemhigh) ') ######################################## diff --git a/policy/modules/services/ddclient.te b/policy/modules/services/ddclient.te index 60430a43..f19030a0 100644 --- a/policy/modules/services/ddclient.te +++ b/policy/modules/services/ddclient.te @@ -42,7 +42,7 @@ allow ddclient_t self:udp_socket create_socket_perms; allow ddclient_t ddclient_etc_t:file read_file_perms; allow ddclient_t ddclient_log_t:file manage_file_perms; -logging_log_filetrans(ddclient_t,ddclient_log_t,file) +logging_log_filetrans(ddclient_t, ddclient_log_t, file) manage_dirs_pattern(ddclient_t, ddclient_var_t, ddclient_var_t) manage_files_pattern(ddclient_t, ddclient_var_t, ddclient_var_t) diff --git a/policy/modules/services/dnsmasq.te b/policy/modules/services/dnsmasq.te index bb77a2f2..3c3e624e 100644 --- a/policy/modules/services/dnsmasq.te +++ b/policy/modules/services/dnsmasq.te @@ -36,7 +36,7 @@ allow dnsmasq_t self:rawip_socket create_socket_perms; # dhcp leases manage_files_pattern(dnsmasq_t, dnsmasq_lease_t, dnsmasq_lease_t) -files_var_lib_filetrans(dnsmasq_t,dnsmasq_lease_t,file) +files_var_lib_filetrans(dnsmasq_t, dnsmasq_lease_t, file) manage_files_pattern(dnsmasq_t, dnsmasq_var_run_t, dnsmasq_var_run_t) files_pid_filetrans(dnsmasq_t, dnsmasq_var_run_t, file) diff --git a/policy/modules/services/exim.te b/policy/modules/services/exim.te index d7578876..b9525ce2 100644 --- a/policy/modules/services/exim.te +++ b/policy/modules/services/exim.te @@ -53,14 +53,14 @@ files_pid_file(exim_var_run_t) # exim local policy # -allow exim_t self:capability { chown dac_override dac_read_search fowner setuid setgid sys_resource }; +allow exim_t self:capability { chown dac_override dac_read_search fowner setuid setgid sys_resource }; allow exim_t self:process { setrlimit setpgid }; allow exim_t self:fifo_file rw_fifo_file_perms; allow exim_t self:unix_stream_socket create_stream_socket_perms; allow exim_t self:tcp_socket create_stream_socket_perms; allow exim_t self:udp_socket create_socket_perms; -can_exec(exim_t,exim_exec_t) +can_exec(exim_t, exim_exec_t) manage_files_pattern(exim_t, exim_log_t, exim_log_t) logging_log_filetrans(exim_t, exim_log_t, { file dir }) @@ -132,8 +132,8 @@ mta_mailserver_delivery(exim_t) tunable_policy(`exim_can_connect_db',` corenet_tcp_connect_mysqld_port(exim_t) corenet_sendrecv_mysqld_client_packets(exim_t) - corenet_tcp_connect_postgresql_port(exim_t) - corenet_sendrecv_postgresql_client_packets(exim_t) + corenet_tcp_connect_postgresql_port(exim_t) + corenet_sendrecv_postgresql_client_packets(exim_t) ') tunable_policy(`exim_read_user_files',` diff --git a/policy/modules/services/ftp.te b/policy/modules/services/ftp.te index a8b00fd7..e86e9c64 100644 --- a/policy/modules/services/ftp.te +++ b/policy/modules/services/ftp.te @@ -246,7 +246,7 @@ optional_policy(` files_read_usr_files(ftpd_t) - cron_system_entry(ftpd_t, ftpd_exec_t) + cron_system_entry(ftpd_t, ftpd_exec_t) optional_policy(` logrotate_exec(ftpd_t) diff --git a/policy/modules/services/gpm.te b/policy/modules/services/gpm.te index 70ec2ab4..24884e8f 100644 --- a/policy/modules/services/gpm.te +++ b/policy/modules/services/gpm.te @@ -39,7 +39,7 @@ manage_files_pattern(gpm_t, gpm_tmp_t, gpm_tmp_t) files_tmp_filetrans(gpm_t, gpm_tmp_t, { file dir }) allow gpm_t gpm_var_run_t:file manage_file_perms; -files_pid_filetrans(gpm_t,gpm_var_run_t,file) +files_pid_filetrans(gpm_t, gpm_var_run_t, file) allow gpm_t gpmctl_t:sock_file manage_sock_file_perms; allow gpm_t gpmctl_t:fifo_file manage_fifo_file_perms; diff --git a/policy/modules/services/gpsd.fc b/policy/modules/services/gpsd.fc index 200f834a..e7bbeb14 100644 --- a/policy/modules/services/gpsd.fc +++ b/policy/modules/services/gpsd.fc @@ -1 +1 @@ -/usr/sbin/gpsd -- gen_context(system_u:object_r:gpsd_exec_t,s0) +/usr/sbin/gpsd -- gen_context(system_u:object_r:gpsd_exec_t,s0) diff --git a/policy/modules/services/gpsd.if b/policy/modules/services/gpsd.if index 96018c79..7597332d 100644 --- a/policy/modules/services/gpsd.if +++ b/policy/modules/services/gpsd.if @@ -2,71 +2,71 @@ ######################################## ## -## Execute a domain transition to run gpsd. +## Execute a domain transition to run gpsd. ## ## ## -## Domain allowed to transition. +## Domain allowed to transition. ## ## # interface(`gpsd_domtrans',` - gen_require(` - type gpsd_t, gpsd_exec_t; - ') + gen_require(` + type gpsd_t, gpsd_exec_t; + ') - domtrans_pattern($1, gpsd_exec_t, gpsd_t) + domtrans_pattern($1, gpsd_exec_t, gpsd_t) ') ######################################## ## -## Execute gpsd in the gpsd domain, and -## allow the specified role the gpsd domain. +## Execute gpsd in the gpsd domain, and +## allow the specified role the gpsd domain. ## ## -## -## Domain allowed access -## +## +## Domain allowed access +## ## ## -## -## The role to be allowed the gpsd domain. -## +## +## The role to be allowed the gpsd domain. +## ## ## -## -## The type of the role's terminal. -## +## +## The type of the role's terminal. +## ## # interface(`gpsd_run',` - gen_require(` - type gpsd_t; - ') + gen_require(` + type gpsd_t; + ') - gpsd_domtrans($1) - role $2 types gpsd_t; - allow gpsd_t $3:chr_file rw_term_perms; + gpsd_domtrans($1) + role $2 types gpsd_t; + allow gpsd_t $3:chr_file rw_term_perms; ') ######################################## ## -## Read and write gpsd shared memory. +## Read and write gpsd shared memory. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`gpsd_rw_shm',` - gen_require(` - type gpsd_t, gpsd_tmpfs_t; - ') + gen_require(` + type gpsd_t, gpsd_tmpfs_t; + ') - allow $1 gpsd_t:shm rw_shm_perms; - allow $1 gpsd_tmpfs_t:dir list_dir_perms; - rw_files_pattern($1, gpsd_tmpfs_t, gpsd_tmpfs_t) - read_lnk_files_pattern($1, gpsd_tmpfs_t, gpsd_tmpfs_t) - fs_search_tmpfs($1) + allow $1 gpsd_t:shm rw_shm_perms; + allow $1 gpsd_tmpfs_t:dir list_dir_perms; + rw_files_pattern($1, gpsd_tmpfs_t, gpsd_tmpfs_t) + read_lnk_files_pattern($1, gpsd_tmpfs_t, gpsd_tmpfs_t) + fs_search_tmpfs($1) ') diff --git a/policy/modules/services/gpsd.te b/policy/modules/services/gpsd.te index 2095e495..9cdc1f14 100644 --- a/policy/modules/services/gpsd.te +++ b/policy/modules/services/gpsd.te @@ -47,7 +47,7 @@ logging_send_syslog_msg(gpsd_t) miscfiles_read_localization(gpsd_t) optional_policy(` - dbus_system_bus_client(gpsd_t) + dbus_system_bus_client(gpsd_t) ') optional_policy(` diff --git a/policy/modules/services/ifplugd.fc b/policy/modules/services/ifplugd.fc index 8172803b..2eda96f7 100644 --- a/policy/modules/services/ifplugd.fc +++ b/policy/modules/services/ifplugd.fc @@ -1,6 +1,6 @@ -/etc/ifplugd(/.*)? gen_context(system_u:object_r:ifplugd_etc_t,s0) +/etc/ifplugd(/.*)? gen_context(system_u:object_r:ifplugd_etc_t,s0) -/etc/rc\.d/init\.d/ifplugd -- gen_context(system_u:object_r:ifplugd_initrc_exec_t,s0) +/etc/rc\.d/init\.d/ifplugd -- gen_context(system_u:object_r:ifplugd_initrc_exec_t,s0) /usr/sbin/ifplugd -- gen_context(system_u:object_r:ifplugd_exec_t,s0) diff --git a/policy/modules/services/ifplugd.te b/policy/modules/services/ifplugd.te index b6631691..29414439 100644 --- a/policy/modules/services/ifplugd.te +++ b/policy/modules/services/ifplugd.te @@ -73,5 +73,5 @@ sysnet_read_dhcpc_pid(ifplugd_t) sysnet_signal_dhcpc(ifplugd_t) optional_policy(` - consoletype_exec(ifplugd_t) + consoletype_exec(ifplugd_t) ') diff --git a/policy/modules/services/inetd.te b/policy/modules/services/inetd.te index 60a34f1c..b0d82ba4 100644 --- a/policy/modules/services/inetd.te +++ b/policy/modules/services/inetd.te @@ -31,7 +31,7 @@ type inetd_child_var_run_t; files_pid_file(inetd_child_var_run_t) ifdef(`enable_mcs',` - init_ranged_daemon_domain(inetd_t, inetd_exec_t,s0 - mcs_systemhigh) + init_ranged_daemon_domain(inetd_t, inetd_exec_t, s0 - mcs_systemhigh) ') ######################################## diff --git a/policy/modules/services/kerberos.if b/policy/modules/services/kerberos.if index 1433ed76..82b99295 100644 --- a/policy/modules/services/kerberos.if +++ b/policy/modules/services/kerberos.if @@ -281,7 +281,7 @@ interface(`kerberos_connect_524',` tunable_policy(`allow_kerberos',` allow $1 self:udp_socket create_socket_perms; - corenet_all_recvfrom_unlabeled($1) + corenet_all_recvfrom_unlabeled($1) corenet_udp_sendrecv_generic_if($1) corenet_udp_sendrecv_generic_node($1) corenet_udp_sendrecv_kerberos_master_port($1) diff --git a/policy/modules/services/kerberos.te b/policy/modules/services/kerberos.te index a66fb18b..da703187 100644 --- a/policy/modules/services/kerberos.te +++ b/policy/modules/services/kerberos.te @@ -84,7 +84,7 @@ allow kadmind_t self:tcp_socket connected_stream_socket_perms; allow kadmind_t self:udp_socket create_socket_perms; allow kadmind_t kadmind_log_t:file manage_file_perms; -logging_log_filetrans(kadmind_t,kadmind_log_t,file) +logging_log_filetrans(kadmind_t, kadmind_log_t, file) allow kadmind_t krb5_conf_t:file read_file_perms; dontaudit kadmind_t krb5_conf_t:file write; diff --git a/policy/modules/services/ldap.te b/policy/modules/services/ldap.te index 4830af9c..91c67468 100644 --- a/policy/modules/services/ldap.te +++ b/policy/modules/services/ldap.te @@ -61,7 +61,7 @@ manage_lnk_files_pattern(slapd_t, slapd_db_t, slapd_db_t) allow slapd_t slapd_etc_t:file read_file_perms; allow slapd_t slapd_lock_t:file manage_file_perms; -files_lock_filetrans(slapd_t,slapd_lock_t,file) +files_lock_filetrans(slapd_t, slapd_lock_t, file) # Allow access to write the replication log (should tighten this) manage_dirs_pattern(slapd_t, slapd_replog_t, slapd_replog_t) diff --git a/policy/modules/services/lircd.if b/policy/modules/services/lircd.if index a24b7cd6..2cd228a3 100644 --- a/policy/modules/services/lircd.if +++ b/policy/modules/services/lircd.if @@ -21,39 +21,39 @@ interface(`lircd_domtrans',` ###################################### ## -## Connect to lircd over a unix domain -## stream socket. +## Connect to lircd over a unix domain +## stream socket. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`lircd_stream_connect',` - gen_require(` - type lircd_sock_t, lircd_t; - ') + gen_require(` + type lircd_sock_t, lircd_t; + ') - allow $1 lircd_t:unix_stream_socket connectto; - allow $1 lircd_sock_t:sock_file write_sock_file_perms; - files_search_pids($1) + allow $1 lircd_t:unix_stream_socket connectto; + allow $1 lircd_sock_t:sock_file write_sock_file_perms; + files_search_pids($1) ') ####################################### ## -## Read lircd etc file +## Read lircd etc file ## ## ## -## The type of the process performing this action. +## The type of the process performing this action. ## ## # interface(`lircd_read_config',` gen_require(` type lircd_etc_t; - ') + ') read_files_pattern($1, lircd_etc_t, lircd_etc_t) ') diff --git a/policy/modules/services/lpd.te b/policy/modules/services/lpd.te index 9c6b9ce9..39915eb7 100644 --- a/policy/modules/services/lpd.te +++ b/policy/modules/services/lpd.te @@ -148,7 +148,7 @@ files_tmp_filetrans(lpd_t, lpd_tmp_t, { file dir }) manage_files_pattern(lpd_t, lpd_var_run_t, lpd_var_run_t) manage_sock_files_pattern(lpd_t, lpd_var_run_t, lpd_var_run_t) -files_pid_filetrans(lpd_t, lpd_var_run_t,file) +files_pid_filetrans(lpd_t, lpd_var_run_t, file) # Write to /var/spool/lpd. manage_files_pattern(lpd_t, print_spool_t, print_spool_t) @@ -304,14 +304,14 @@ tunable_policy(`use_lpd_server',` manage_files_pattern(lpr_t, lpr_tmp_t, lpr_tmp_t) files_tmp_filetrans(lpr_t, lpr_tmp_t, { file dir }) - manage_files_pattern(lpr_t,print_spool_t,print_spool_t) - filetrans_pattern(lpr_t,print_spool_t,print_spool_t,file) + manage_files_pattern(lpr_t, print_spool_t, print_spool_t) + filetrans_pattern(lpr_t, print_spool_t, print_spool_t, file) # Read and write shared files in the spool directory. allow lpr_t print_spool_t:file rw_file_perms; allow lpr_t printconf_t:dir list_dir_perms; - read_files_pattern(lpr_t,printconf_t,printconf_t) - read_lnk_files_pattern(lpr_t,printconf_t,printconf_t) + read_files_pattern(lpr_t, printconf_t, printconf_t) + read_lnk_files_pattern(lpr_t, printconf_t, printconf_t) ') tunable_policy(`use_nfs_home_dirs',` diff --git a/policy/modules/services/memcached.if b/policy/modules/services/memcached.if index 5b282377..db4fd6fb 100644 --- a/policy/modules/services/memcached.if +++ b/policy/modules/services/memcached.if @@ -16,7 +16,7 @@ interface(`memcached_domtrans',` type memcached_exec_t; ') - domtrans_pattern($1,memcached_exec_t,memcached_t) + domtrans_pattern($1, memcached_exec_t, memcached_t) ') ######################################## diff --git a/policy/modules/services/memcached.te b/policy/modules/services/memcached.te index 0311b912..2222b767 100644 --- a/policy/modules/services/memcached.te +++ b/policy/modules/services/memcached.te @@ -40,7 +40,7 @@ corenet_udp_bind_memcache_port(memcached_t) manage_dirs_pattern(memcached_t, memcached_var_run_t, memcached_var_run_t) manage_files_pattern(memcached_t, memcached_var_run_t, memcached_var_run_t) -files_pid_filetrans(memcached_t,memcached_var_run_t, { file dir }) +files_pid_filetrans(memcached_t, memcached_var_run_t, { file dir }) files_read_etc_files(memcached_t) diff --git a/policy/modules/services/mta.if b/policy/modules/services/mta.if index a437f026..6641292d 100644 --- a/policy/modules/services/mta.if +++ b/policy/modules/services/mta.if @@ -257,7 +257,7 @@ interface(`mta_sendmail_mailserver',` type sendmail_exec_t; ') - init_system_domain($1,sendmail_exec_t) + init_system_domain($1, sendmail_exec_t) typeattribute $1 mailserver_domain; ') diff --git a/policy/modules/services/munin.te b/policy/modules/services/munin.te index f0aab757..80afc143 100644 --- a/policy/modules/services/munin.te +++ b/policy/modules/services/munin.te @@ -101,7 +101,7 @@ optional_policy(` ') optional_policy(` - cron_system_entry(munin_t,munin_exec_t) + cron_system_entry(munin_t, munin_exec_t) ') optional_policy(` diff --git a/policy/modules/services/mysql.fc b/policy/modules/services/mysql.fc index 4b567dfe..03db93a0 100644 --- a/policy/modules/services/mysql.fc +++ b/policy/modules/services/mysql.fc @@ -10,7 +10,7 @@ # # /usr # -/usr/bin/mysqld_safe -- gen_context(system_u:object_r:mysqld_safe_exec_t,s0) +/usr/bin/mysqld_safe -- gen_context(system_u:object_r:mysqld_safe_exec_t,s0) /usr/libexec/mysqld -- gen_context(system_u:object_r:mysqld_exec_t,s0) diff --git a/policy/modules/services/mysql.if b/policy/modules/services/mysql.if index 51556e93..3f6833d4 100644 --- a/policy/modules/services/mysql.if +++ b/policy/modules/services/mysql.if @@ -142,18 +142,18 @@ interface(`mysql_manage_db_dirs',` ####################################### ## -## Append to the MySQL database directory. +## Append to the MySQL database directory. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`mysql_append_db_files',` - gen_require(` - type mysqld_db_t; - ') + gen_require(` + type mysqld_db_t; + ') files_search_var_lib($1) append_files_pattern($1, mysqld_db_t, mysqld_db_t) @@ -161,40 +161,40 @@ interface(`mysql_append_db_files',` ####################################### ## -## Read and write to the MySQL database directory. +## Read and write to the MySQL database directory. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`mysql_rw_db_files',` - gen_require(` - type mysqld_db_t; - ') + gen_require(` + type mysqld_db_t; + ') - files_search_var_lib($1) + files_search_var_lib($1) rw_files_pattern($1, mysqld_db_t, mysqld_db_t) ') ####################################### ## -## Create, read, write, and delete MySQL database files. +## Create, read, write, and delete MySQL database files. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`mysql_manage_db_files',` - gen_require(` - type mysqld_db_t; - ') + gen_require(` + type mysqld_db_t; + ') - files_search_var_lib($1) - manage_files_pattern($1, mysqld_db_t, mysqld_db_t) + files_search_var_lib($1) + manage_files_pattern($1, mysqld_db_t, mysqld_db_t) ') ######################################## @@ -239,21 +239,21 @@ interface(`mysql_write_log',` ##################################### ## -## Search MySQL PID files. +## Search MySQL PID files. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## ## # interface(`mysql_search_pid_files',` - gen_require(` - type mysqld_var_run_t; - ') + gen_require(` + type mysqld_var_run_t; + ') - search_dirs_pattern($1, mysqld_var_run_t, mysqld_var_run_t) + search_dirs_pattern($1, mysqld_var_run_t, mysqld_var_run_t) ') ######################################## diff --git a/policy/modules/services/mysql.te b/policy/modules/services/mysql.te index faf5bb29..0dee8b9d 100644 --- a/policy/modules/services/mysql.te +++ b/policy/modules/services/mysql.te @@ -152,7 +152,7 @@ hostname_exec(mysqld_safe_t) miscfiles_read_localization(mysqld_safe_t) -mysql_append_db_files(mysqld_safe_t) +mysql_append_db_files(mysqld_safe_t) mysql_read_config(mysqld_safe_t) mysql_search_pid_files(mysqld_safe_t) mysql_write_log(mysqld_safe_t) diff --git a/policy/modules/services/networkmanager.te b/policy/modules/services/networkmanager.te index d8c59128..704c68a2 100644 --- a/policy/modules/services/networkmanager.te +++ b/policy/modules/services/networkmanager.te @@ -57,7 +57,7 @@ files_search_tmp(NetworkManager_t) manage_dirs_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_var_run_t) manage_files_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_var_run_t) manage_sock_files_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_var_run_t) -files_pid_filetrans(NetworkManager_t,NetworkManager_var_run_t, { dir file sock_file }) +files_pid_filetrans(NetworkManager_t, NetworkManager_var_run_t, { dir file sock_file }) kernel_read_system_state(NetworkManager_t) kernel_read_network_state(NetworkManager_t) diff --git a/policy/modules/services/nis.te b/policy/modules/services/nis.te index fbc6609a..706b7a14 100644 --- a/policy/modules/services/nis.te +++ b/policy/modules/services/nis.te @@ -225,7 +225,7 @@ allow ypserv_t self:netlink_route_socket r_netlink_socket_perms; allow ypserv_t self:tcp_socket connected_stream_socket_perms; allow ypserv_t self:udp_socket create_socket_perms; -manage_files_pattern(ypserv_t,var_yp_t,var_yp_t) +manage_files_pattern(ypserv_t, var_yp_t, var_yp_t) allow ypserv_t ypserv_conf_t:file read_file_perms; diff --git a/policy/modules/services/nsd.fc b/policy/modules/services/nsd.fc index 3d261d1c..53cc8004 100644 --- a/policy/modules/services/nsd.fc +++ b/policy/modules/services/nsd.fc @@ -1,10 +1,10 @@ -/etc/nsd(/.*)? gen_context(system_u:object_r:nsd_conf_t,s0) +/etc/nsd(/.*)? gen_context(system_u:object_r:nsd_conf_t,s0) /etc/nsd/nsd\.db -- gen_context(system_u:object_r:nsd_db_t,s0) /etc/nsd/primary(/.*)? gen_context(system_u:object_r:nsd_zone_t,s0) /etc/nsd/secondary(/.*)? gen_context(system_u:object_r:nsd_zone_t,s0) -/usr/sbin/nsd -- gen_context(system_u:object_r:nsd_exec_t,s0) +/usr/sbin/nsd -- gen_context(system_u:object_r:nsd_exec_t,s0) /usr/sbin/nsdc -- gen_context(system_u:object_r:nsd_exec_t,s0) /usr/sbin/nsd-notify -- gen_context(system_u:object_r:nsd_exec_t,s0) /usr/sbin/zonec -- gen_context(system_u:object_r:nsd_exec_t,s0) diff --git a/policy/modules/services/ntp.if b/policy/modules/services/ntp.if index 3a546a81..bb0089ea 100644 --- a/policy/modules/services/ntp.if +++ b/policy/modules/services/ntp.if @@ -56,24 +56,24 @@ interface(`ntp_domtrans_ntpdate',` ######################################## ## -## Read and write ntpd shared memory. +## Read and write ntpd shared memory. ## ## -## -## The type of the process performing this action. -## +## +## The type of the process performing this action. +## ## # interface(`ntpd_rw_shm',` - gen_require(` - type ntpd_t, ntpd_tmpfs_t; - ') + gen_require(` + type ntpd_t, ntpd_tmpfs_t; + ') - allow $1 ntpd_t:shm rw_shm_perms; - list_dirs_pattern($1, ntpd_tmpfs_t, ntpd_tmpfs_t) - rw_files_pattern($1, ntpd_tmpfs_t, ntpd_tmpfs_t) - read_lnk_files_pattern($1, ntpd_tmpfs_t, ntpd_tmpfs_t) - fs_search_tmpfs($1) + allow $1 ntpd_t:shm rw_shm_perms; + list_dirs_pattern($1, ntpd_tmpfs_t, ntpd_tmpfs_t) + rw_files_pattern($1, ntpd_tmpfs_t, ntpd_tmpfs_t) + read_lnk_files_pattern($1, ntpd_tmpfs_t, ntpd_tmpfs_t) + fs_search_tmpfs($1) ') ######################################## diff --git a/policy/modules/services/ntp.te b/policy/modules/services/ntp.te index 56066706..f293779e 100644 --- a/policy/modules/services/ntp.te +++ b/policy/modules/services/ntp.te @@ -52,13 +52,13 @@ allow ntpd_t self:udp_socket create_socket_perms; manage_files_pattern(ntpd_t, ntp_drift_t, ntp_drift_t) -can_exec(ntpd_t,ntpd_exec_t) +can_exec(ntpd_t, ntpd_exec_t) read_files_pattern(ntpd_t, ntpd_key_t, ntpd_key_t) allow ntpd_t ntpd_log_t:dir setattr; -manage_files_pattern(ntpd_t,ntpd_log_t,ntpd_log_t) -logging_log_filetrans(ntpd_t,ntpd_log_t,{ file dir }) +manage_files_pattern(ntpd_t, ntpd_log_t, ntpd_log_t) +logging_log_filetrans(ntpd_t, ntpd_log_t, { file dir }) # for some reason it creates a file in /tmp manage_dirs_pattern(ntpd_t, ntpd_tmp_t, ntpd_tmp_t) diff --git a/policy/modules/services/nx.te b/policy/modules/services/nx.te index 15f175d1..449ed417 100644 --- a/policy/modules/services/nx.te +++ b/policy/modules/services/nx.te @@ -35,7 +35,7 @@ allow nx_server_t self:tcp_socket create_socket_perms; allow nx_server_t self:udp_socket create_socket_perms; allow nx_server_t nx_server_devpts_t:chr_file { rw_chr_file_perms setattr }; -term_create_pty(nx_server_t,nx_server_devpts_t) +term_create_pty(nx_server_t, nx_server_devpts_t) manage_dirs_pattern(nx_server_t, nx_server_tmp_t, nx_server_tmp_t) manage_files_pattern(nx_server_t, nx_server_tmp_t, nx_server_tmp_t) diff --git a/policy/modules/services/openca.if b/policy/modules/services/openca.if index 52c5acb4..43bb38b1 100644 --- a/policy/modules/services/openca.if +++ b/policy/modules/services/openca.if @@ -16,7 +16,7 @@ interface(`openca_domtrans',` type openca_ca_t, openca_ca_exec_t, openca_usr_share_t; ') - domtrans_pattern($1,openca_ca_exec_t,openca_ca_t) + domtrans_pattern($1, openca_ca_exec_t, openca_ca_t) allow $1 openca_usr_share_t:dir search_dir_perms; files_search_usr($1) ') diff --git a/policy/modules/services/pegasus.fc b/policy/modules/services/pegasus.fc index cd4c544b..95150438 100644 --- a/policy/modules/services/pegasus.fc +++ b/policy/modules/services/pegasus.fc @@ -5,8 +5,8 @@ /usr/sbin/cimserver -- gen_context(system_u:object_r:pegasus_exec_t,s0) /usr/sbin/init_repository -- gen_context(system_u:object_r:pegasus_exec_t,s0) -/var/lib/Pegasus(/.*)? gen_context(system_u:object_r:pegasus_data_t,s0) +/var/lib/Pegasus(/.*)? gen_context(system_u:object_r:pegasus_data_t,s0) -/var/run/tog-pegasus(/.*)? gen_context(system_u:object_r:pegasus_var_run_t,s0) +/var/run/tog-pegasus(/.*)? gen_context(system_u:object_r:pegasus_var_run_t,s0) -/usr/share/Pegasus/mof(/.*)?/.*\.mof gen_context(system_u:object_r:pegasus_mof_t,s0) +/usr/share/Pegasus/mof(/.*)?/.*\.mof gen_context(system_u:object_r:pegasus_mof_t,s0) diff --git a/policy/modules/services/pingd.if b/policy/modules/services/pingd.if index c79589df..8688aaec 100644 --- a/policy/modules/services/pingd.if +++ b/policy/modules/services/pingd.if @@ -20,78 +20,78 @@ interface(`pingd_domtrans',` ####################################### ## -## Read pingd etc configuration files. +## Read pingd etc configuration files. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`pingd_read_config',` - gen_require(` - type pingd_etc_t; - ') + gen_require(` + type pingd_etc_t; + ') - files_search_etc($1) - read_files_pattern($1, pingd_etc_t, pingd_etc_t) + files_search_etc($1) + read_files_pattern($1, pingd_etc_t, pingd_etc_t) ') ####################################### ## -## Manage pingd etc configuration files. +## Manage pingd etc configuration files. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`pingd_manage_config',` - gen_require(` - type pingd_etc_t; - ') + gen_require(` + type pingd_etc_t; + ') - files_search_etc($1) - manage_dirs_pattern($1, pingd_etc_t, pingd_etc_t) - manage_files_pattern($1, pingd_etc_t, pingd_etc_t) + files_search_etc($1) + manage_dirs_pattern($1, pingd_etc_t, pingd_etc_t) + manage_files_pattern($1, pingd_etc_t, pingd_etc_t) ') ####################################### ## -## All of the rules required to administrate -## an pingd environment +## All of the rules required to administrate +## an pingd environment ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## ## -## -## The role to be allowed to manage the pingd domain. -## +## +## The role to be allowed to manage the pingd domain. +## ## ## # interface(`pingd_admin',` - gen_require(` - type pingd_t, pingd_etc_t; - type pingd_initrc_exec_t, pingd_modules_t; - ') + gen_require(` + type pingd_t, pingd_etc_t; + type pingd_initrc_exec_t, pingd_modules_t; + ') - allow $1 pingd_t:process { ptrace signal_perms }; - ps_process_pattern($1, pingd_t) + allow $1 pingd_t:process { ptrace signal_perms }; + ps_process_pattern($1, pingd_t) - init_labeled_script_domtrans($1, pingd_initrc_exec_t) - domain_system_change_exemption($1) - role_transition $2 pingd_initrc_exec_t system_r; - allow $2 system_r; + init_labeled_script_domtrans($1, pingd_initrc_exec_t) + domain_system_change_exemption($1) + role_transition $2 pingd_initrc_exec_t system_r; + allow $2 system_r; - files_list_etc($1) - admin_pattern($1, pingd_etc_t) + files_list_etc($1) + admin_pattern($1, pingd_etc_t) files_list_usr($1) - admin_pattern($1, pingd_modules_t) + admin_pattern($1, pingd_modules_t) ') diff --git a/policy/modules/services/postfix.if b/policy/modules/services/postfix.if index 30a826ca..988c9a79 100644 --- a/policy/modules/services/postfix.if +++ b/policy/modules/services/postfix.if @@ -365,7 +365,7 @@ interface(`postfix_exec_master',` type postfix_master_exec_t; ') - can_exec($1,postfix_master_exec_t) + can_exec($1, postfix_master_exec_t) ') ######################################## diff --git a/policy/modules/services/postfix.te b/policy/modules/services/postfix.te index 9527d125..12aed734 100644 --- a/policy/modules/services/postfix.te +++ b/policy/modules/services/postfix.te @@ -106,7 +106,7 @@ allow postfix_master_t self:udp_socket create_socket_perms; allow postfix_master_t postfix_etc_t:file rw_file_perms; -can_exec(postfix_master_t,postfix_exec_t) +can_exec(postfix_master_t, postfix_exec_t) allow postfix_master_t postfix_data_t:dir manage_dir_perms; allow postfix_master_t postfix_data_t:file manage_file_perms; @@ -363,7 +363,7 @@ optional_policy(` allow postfix_pickup_t self:tcp_socket create_socket_perms; -stream_connect_pattern(postfix_pickup_t,postfix_private_t,postfix_private_t,postfix_master_t) +stream_connect_pattern(postfix_pickup_t, postfix_private_t, postfix_private_t, postfix_master_t) rw_fifo_files_pattern(postfix_pickup_t, postfix_public_t, postfix_public_t) rw_sock_files_pattern(postfix_pickup_t, postfix_public_t, postfix_public_t) @@ -445,7 +445,7 @@ allow postfix_postqueue_t self:tcp_socket create; allow postfix_postqueue_t self:udp_socket { create ioctl }; # wants to write to /var/spool/postfix/public/showq -stream_connect_pattern(postfix_postqueue_t, postfix_public_t, postfix_public_t,postfix_master_t) +stream_connect_pattern(postfix_postqueue_t, postfix_public_t, postfix_public_t, postfix_master_t) # write to /var/spool/postfix/public/qmgr write_fifo_files_pattern(postfix_postqueue_t, postfix_public_t, postfix_public_t) diff --git a/policy/modules/services/postgresql.if b/policy/modules/services/postgresql.if index beb53fb1..f74c7316 100644 --- a/policy/modules/services/postgresql.if +++ b/policy/modules/services/postgresql.if @@ -53,7 +53,7 @@ interface(`postgresql_role',` allow $2 user_sepgsql_proc_exec_t:db_procedure { create drop setattr }; ') - allow $2 user_sepgsql_table_t:db_table { getattr use select update insert delete lock }; + allow $2 user_sepgsql_table_t:db_table { getattr use select update insert delete lock }; allow $2 user_sepgsql_table_t:db_column { getattr use select update insert }; allow $2 user_sepgsql_table_t:db_tuple { use select update insert delete }; type_transition $2 sepgsql_database_type:db_table user_sepgsql_table_t; diff --git a/policy/modules/services/postgresql.te b/policy/modules/services/postgresql.te index bcd14cfc..2603506f 100644 --- a/policy/modules/services/postgresql.te +++ b/policy/modules/services/postgresql.te @@ -178,7 +178,7 @@ allow postgresql_t postgresql_exec_t:lnk_file { getattr read }; can_exec(postgresql_t, postgresql_exec_t ) allow postgresql_t postgresql_lock_t:file manage_file_perms; -files_lock_filetrans(postgresql_t,postgresql_lock_t,file) +files_lock_filetrans(postgresql_t, postgresql_lock_t, file) manage_files_pattern(postgresql_t, postgresql_log_t, postgresql_log_t) logging_log_filetrans(postgresql_t, postgresql_log_t, { file dir }) @@ -268,7 +268,7 @@ optional_policy(` optional_policy(` cron_search_spool(postgresql_t) - cron_system_entry(postgresql_t,postgresql_exec_t) + cron_system_entry(postgresql_t, postgresql_exec_t) ') optional_policy(` diff --git a/policy/modules/services/procmail.te b/policy/modules/services/procmail.te index 188bad54..81d41206 100644 --- a/policy/modules/services/procmail.te +++ b/policy/modules/services/procmail.te @@ -30,7 +30,7 @@ allow procmail_t self:unix_dgram_socket create_socket_perms; allow procmail_t self:tcp_socket create_stream_socket_perms; allow procmail_t self:udp_socket create_socket_perms; -can_exec(procmail_t,procmail_exec_t) +can_exec(procmail_t, procmail_exec_t) # Write log to /var/log/procmail.log or /var/log/procmail/.* allow procmail_t procmail_log_t:dir setattr; diff --git a/policy/modules/services/psad.if b/policy/modules/services/psad.if index 97ab7e3d..bc329d18 100644 --- a/policy/modules/services/psad.if +++ b/policy/modules/services/psad.if @@ -84,13 +84,13 @@ interface(`psad_read_config',` ## # interface(`psad_manage_config',` - gen_require(` - type psad_etc_t; - ') + gen_require(` + type psad_etc_t; + ') files_search_etc($1) manage_dirs_pattern($1, psad_etc_t, psad_etc_t) - manage_files_pattern($1, psad_etc_t, psad_etc_t) + manage_files_pattern($1, psad_etc_t, psad_etc_t) ') diff --git a/policy/modules/services/psad.te b/policy/modules/services/psad.te index a59cef5d..992419e8 100644 --- a/policy/modules/services/psad.te +++ b/policy/modules/services/psad.te @@ -102,6 +102,6 @@ miscfiles_read_localization(psad_t) sysnet_exec_ifconfig(psad_t) optional_policy(` - mta_send_mail(psad_t) + mta_send_mail(psad_t) mta_read_queue(psad_t) ') diff --git a/policy/modules/services/pyzor.te b/policy/modules/services/pyzor.te index 1293325e..3951becf 100644 --- a/policy/modules/services/pyzor.te +++ b/policy/modules/services/pyzor.te @@ -36,7 +36,7 @@ ubac_constrained(pyzor_var_lib_t) type pyzord_t; type pyzord_exec_t; -init_daemon_domain(pyzord_t,pyzord_exec_t) +init_daemon_domain(pyzord_t, pyzord_exec_t) type pyzord_log_t; logging_log_file(pyzord_log_t) @@ -54,14 +54,14 @@ manage_lnk_files_pattern(pyzor_t, pyzor_home_t, pyzor_home_t) userdom_user_home_dir_filetrans(pyzor_t, pyzor_home_t, { dir file lnk_file }) allow pyzor_t pyzor_var_lib_t:dir list_dir_perms; -read_files_pattern(pyzor_t,pyzor_var_lib_t,pyzor_var_lib_t) +read_files_pattern(pyzor_t, pyzor_var_lib_t, pyzor_var_lib_t) files_search_var_lib(pyzor_t) manage_files_pattern(pyzor_t, pyzor_tmp_t, pyzor_tmp_t) manage_dirs_pattern(pyzor_t, pyzor_tmp_t, pyzor_tmp_t) files_tmp_filetrans(pyzor_t, pyzor_tmp_t, { file dir }) -kernel_read_kernel_sysctls(pyzor_t) +kernel_read_kernel_sysctls(pyzor_t) kernel_read_system_state(pyzor_t) corecmd_list_bin(pyzor_t) diff --git a/policy/modules/services/qmail.if b/policy/modules/services/qmail.if index 51123229..27fd19e3 100644 --- a/policy/modules/services/qmail.if +++ b/policy/modules/services/qmail.if @@ -147,5 +147,5 @@ interface(`qmail_smtpd_service_domain',` type qmail_smtpd_t; ') - domtrans_pattern(qmail_smtpd_t, $2, $1) + domtrans_pattern(qmail_smtpd_t, $2, $1) ') diff --git a/policy/modules/services/radius.fc b/policy/modules/services/radius.fc index cdf6b555..09f7b501 100644 --- a/policy/modules/services/radius.fc +++ b/policy/modules/services/radius.fc @@ -3,7 +3,7 @@ /etc/cron\.(daily|weekly|monthly)/freeradius -- gen_context(system_u:object_r:radiusd_exec_t,s0) /etc/rc\.d/init\.d/radiusd -- gen_context(system_u:object_r:radiusd_initrc_exec_t,s0) -/etc/raddb(/.*)? gen_context(system_u:object_r:radiusd_etc_t,s0) +/etc/raddb(/.*)? gen_context(system_u:object_r:radiusd_etc_t,s0) /etc/raddb/db\.daily -- gen_context(system_u:object_r:radiusd_etc_rw_t,s0) /usr/sbin/radiusd -- gen_context(system_u:object_r:radiusd_exec_t,s0) diff --git a/policy/modules/services/rhgb.te b/policy/modules/services/rhgb.te index ec3dfcf5..4a200a3f 100644 --- a/policy/modules/services/rhgb.te +++ b/policy/modules/services/rhgb.te @@ -32,7 +32,7 @@ allow rhgb_t self:udp_socket create_socket_perms; allow rhgb_t self:netlink_route_socket r_netlink_socket_perms; allow rhgb_t rhgb_devpts_t:chr_file { rw_chr_file_perms setattr }; -term_create_pty(rhgb_t,rhgb_devpts_t) +term_create_pty(rhgb_t, rhgb_devpts_t) manage_dirs_pattern(rhgb_t, rhgb_tmpfs_t, rhgb_tmpfs_t) manage_files_pattern(rhgb_t, rhgb_tmpfs_t, rhgb_tmpfs_t) diff --git a/policy/modules/services/ricci.if b/policy/modules/services/ricci.if index 9f3641b6..c291ce3e 100644 --- a/policy/modules/services/ricci.if +++ b/policy/modules/services/ricci.if @@ -71,7 +71,7 @@ interface(`ricci_dontaudit_rw_modcluster_pipes',` type ricci_modcluster_t; ') - dontaudit $1 ricci_modcluster_t:fifo_file { read write }; + dontaudit $1 ricci_modcluster_t:fifo_file { read write }; ') ######################################## diff --git a/policy/modules/services/rpc.if b/policy/modules/services/rpc.if index 20b2e7be..2f879f04 100644 --- a/policy/modules/services/rpc.if +++ b/policy/modules/services/rpc.if @@ -206,11 +206,11 @@ interface(`rpc_domtrans_nfsd',` ######################################## ## -## Execute domain in nfsd domain. +## Execute domain in nfsd domain. ## ## ## -## The type of the process performing this action. +## The type of the process performing this action. ## ## # @@ -362,7 +362,7 @@ interface(`rpc_read_nfs_state_data',` ## ## ## -## Domain allowed access. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/rsync.fc b/policy/modules/services/rsync.fc index 89e09a5b..299f7a44 100644 --- a/policy/modules/services/rsync.fc +++ b/policy/modules/services/rsync.fc @@ -1,6 +1,6 @@ /usr/bin/rsync -- gen_context(system_u:object_r:rsync_exec_t,s0) -/var/log/rsync\.log -- gen_context(system_u:object_r:rsync_log_t,s0) +/var/log/rsync\.log -- gen_context(system_u:object_r:rsync_log_t,s0) -/var/run/rsyncd\.lock -- gen_context(system_u:object_r:rsync_var_run_t,s0) +/var/run/rsyncd\.lock -- gen_context(system_u:object_r:rsync_var_run_t,s0) diff --git a/policy/modules/services/rwho.if b/policy/modules/services/rwho.if index 9991f17b..71ea0eab 100644 --- a/policy/modules/services/rwho.if +++ b/policy/modules/services/rwho.if @@ -111,7 +111,7 @@ interface(`rwho_manage_spool_files',` type rwho_spool_t; ') - manage_files_pattern($1,rwho_spool_t,rwho_spool_t) + manage_files_pattern($1, rwho_spool_t, rwho_spool_t) files_search_spool($1) ') diff --git a/policy/modules/services/samba.te b/policy/modules/services/samba.te index 22dff5b6..fd85b238 100644 --- a/policy/modules/services/samba.te +++ b/policy/modules/services/samba.te @@ -537,7 +537,7 @@ corecmd_list_bin(smbmount_t) files_list_mnt(smbmount_t) files_mounton_mnt(smbmount_t) files_manage_etc_runtime_files(smbmount_t) -files_etc_filetrans_etc_runtime(smbmount_t,file) +files_etc_filetrans_etc_runtime(smbmount_t, file) files_read_etc_files(smbmount_t) auth_use_nsswitch(smbmount_t) @@ -672,7 +672,7 @@ files_list_var_lib(winbind_t) rw_files_pattern(winbind_t, smbd_tmp_t, smbd_tmp_t) allow winbind_t winbind_log_t:file manage_file_perms; -logging_log_filetrans(winbind_t,winbind_log_t,file) +logging_log_filetrans(winbind_t, winbind_log_t, file) manage_dirs_pattern(winbind_t, winbind_tmp_t, winbind_tmp_t) manage_files_pattern(winbind_t, winbind_tmp_t, winbind_tmp_t) diff --git a/policy/modules/services/setroubleshoot.te b/policy/modules/services/setroubleshoot.te index 6614dc85..ac3dfeb0 100644 --- a/policy/modules/services/setroubleshoot.te +++ b/policy/modules/services/setroubleshoot.te @@ -48,7 +48,7 @@ logging_log_filetrans(setroubleshootd_t, setroubleshoot_var_log_t, { file dir }) # pid file manage_files_pattern(setroubleshootd_t, setroubleshoot_var_run_t, setroubleshoot_var_run_t) manage_sock_files_pattern(setroubleshootd_t, setroubleshoot_var_run_t, setroubleshoot_var_run_t) -files_pid_filetrans(setroubleshootd_t,setroubleshoot_var_run_t, { file sock_file }) +files_pid_filetrans(setroubleshootd_t, setroubleshoot_var_run_t, { file sock_file }) kernel_read_kernel_sysctls(setroubleshootd_t) kernel_read_system_state(setroubleshootd_t) diff --git a/policy/modules/services/snmp.te b/policy/modules/services/snmp.te index 58e79fd2..93eebbb5 100644 --- a/policy/modules/services/snmp.te +++ b/policy/modules/services/snmp.te @@ -35,7 +35,7 @@ allow snmpd_t self:tcp_socket create_stream_socket_perms; allow snmpd_t self:udp_socket connected_stream_socket_perms; allow snmpd_t snmpd_log_t:file manage_file_perms; -logging_log_filetrans(snmpd_t,snmpd_log_t,file) +logging_log_filetrans(snmpd_t, snmpd_log_t, file) manage_dirs_pattern(snmpd_t, snmpd_var_lib_t, snmpd_var_lib_t) manage_files_pattern(snmpd_t, snmpd_var_lib_t, snmpd_var_lib_t) diff --git a/policy/modules/services/ssh.te b/policy/modules/services/ssh.te index d727a755..5e62ab4b 100644 --- a/policy/modules/services/ssh.te +++ b/policy/modules/services/ssh.te @@ -42,7 +42,7 @@ files_tmp_file(sshd_tmp_t) files_poly_parent(sshd_tmp_t) ifdef(`enable_mcs',` - init_ranged_daemon_domain(sshd_t,sshd_exec_t,s0 - mcs_systemhigh) + init_ranged_daemon_domain(sshd_t, sshd_exec_t, s0 - mcs_systemhigh) ') type ssh_t; @@ -112,8 +112,8 @@ manage_fifo_files_pattern(ssh_t, ssh_tmpfs_t, ssh_tmpfs_t) manage_sock_files_pattern(ssh_t, ssh_tmpfs_t, ssh_tmpfs_t) fs_tmpfs_filetrans(ssh_t, ssh_tmpfs_t,{ dir file lnk_file sock_file fifo_file }) -manage_dirs_pattern(ssh_t,home_ssh_t,home_ssh_t) -manage_sock_files_pattern(ssh_t,home_ssh_t,home_ssh_t) +manage_dirs_pattern(ssh_t, home_ssh_t, home_ssh_t) +manage_sock_files_pattern(ssh_t, home_ssh_t, home_ssh_t) userdom_user_home_dir_filetrans(ssh_t, home_ssh_t, { dir sock_file }) # Allow the ssh program to communicate with ssh-agent. @@ -122,13 +122,13 @@ stream_connect_pattern(ssh_t, ssh_agent_tmp_t, ssh_agent_tmp_t, ssh_agent_type) allow ssh_t sshd_t:unix_stream_socket connectto; # ssh client can manage the keys and config -manage_files_pattern(ssh_t,home_ssh_t,home_ssh_t) -read_lnk_files_pattern(ssh_t,home_ssh_t,home_ssh_t) +manage_files_pattern(ssh_t, home_ssh_t, home_ssh_t) +read_lnk_files_pattern(ssh_t, home_ssh_t, home_ssh_t) # ssh servers can read the user keys and config allow ssh_server home_ssh_t:dir list_dir_perms; -read_files_pattern(ssh_server,home_ssh_t,home_ssh_t) -read_lnk_files_pattern(ssh_server,home_ssh_t,home_ssh_t) +read_files_pattern(ssh_server, home_ssh_t, home_ssh_t) +read_lnk_files_pattern(ssh_server, home_ssh_t, home_ssh_t) kernel_read_kernel_sysctls(ssh_t) diff --git a/policy/modules/services/stunnel.fc b/policy/modules/services/stunnel.fc index c3aec89f..50e29aa8 100644 --- a/policy/modules/services/stunnel.fc +++ b/policy/modules/services/stunnel.fc @@ -1,4 +1,4 @@ -/etc/stunnel(/.*)? gen_context(system_u:object_r:stunnel_etc_t,s0) +/etc/stunnel(/.*)? gen_context(system_u:object_r:stunnel_etc_t,s0) /usr/bin/stunnel -- gen_context(system_u:object_r:stunnel_exec_t,s0) diff --git a/policy/modules/services/sysstat.if b/policy/modules/services/sysstat.if index a5fad30f..7a23b3b8 100644 --- a/policy/modules/services/sysstat.if +++ b/policy/modules/services/sysstat.if @@ -16,6 +16,6 @@ interface(`sysstat_manage_log',` type sysstat_log_t; ') - logging_search_logs($1) + logging_search_logs($1) manage_files_pattern($1, sysstat_log_t, sysstat_log_t) ') diff --git a/policy/modules/services/ucspitcp.te b/policy/modules/services/ucspitcp.te index 920dc655..13a9d9b7 100644 --- a/policy/modules/services/ucspitcp.te +++ b/policy/modules/services/ucspitcp.te @@ -89,6 +89,6 @@ files_read_etc_files(ucspitcp_t) sysnet_read_config(ucspitcp_t) optional_policy(` - daemontools_service_domain(ucspitcp_t,ucspitcp_exec_t) + daemontools_service_domain(ucspitcp_t, ucspitcp_exec_t) daemontools_read_svc(ucspitcp_t) ') diff --git a/policy/modules/services/ulogd.if b/policy/modules/services/ulogd.if index 4a2118e0..d04b833a 100644 --- a/policy/modules/services/ulogd.if +++ b/policy/modules/services/ulogd.if @@ -62,21 +62,21 @@ interface(`ulogd_read_log',` ####################################### ## -## Allow the specified domain to search ulogd's log files. +## Allow the specified domain to search ulogd's log files. ## ## ## -## Domain allowed to transition. +## Domain allowed to transition. ## ## # interface(`ulogd_search_log',` - gen_require(` - type ulogd_var_log_t; - ') + gen_require(` + type ulogd_var_log_t; + ') - logging_search_logs($1) - allow $1 ulogd_var_log_t:dir search_dir_perms; + logging_search_logs($1) + allow $1 ulogd_var_log_t:dir search_dir_perms; ') ######################################## diff --git a/policy/modules/services/uptime.fc b/policy/modules/services/uptime.fc index 1f22545f..e30d6fc0 100644 --- a/policy/modules/services/uptime.fc +++ b/policy/modules/services/uptime.fc @@ -3,4 +3,4 @@ /usr/sbin/uptimed -- gen_context(system_u:object_r:uptimed_exec_t,s0) -/var/spool/uptimed(/.*)? gen_context(system_u:object_r:uptimed_spool_t,s0) +/var/spool/uptimed(/.*)? gen_context(system_u:object_r:uptimed_spool_t,s0) diff --git a/policy/modules/services/virt.if b/policy/modules/services/virt.if index dfd0b0bc..8dc8acf7 100644 --- a/policy/modules/services/virt.if +++ b/policy/modules/services/virt.if @@ -135,7 +135,7 @@ interface(`virt_manage_pid_files',` type virt_var_run_t; ') - manage_files_pattern($1, virt_var_run_t, virt_var_run_t) + manage_files_pattern($1, virt_var_run_t, virt_var_run_t) ') ######################################## diff --git a/policy/modules/services/watchdog.te b/policy/modules/services/watchdog.te index 4ba63a45..8b0b4637 100644 --- a/policy/modules/services/watchdog.te +++ b/policy/modules/services/watchdog.te @@ -71,7 +71,7 @@ domain_kill_all_domains(watchdog_t) files_read_etc_files(watchdog_t) # for updating mtab on umount files_manage_etc_runtime_files(watchdog_t) -files_etc_filetrans_etc_runtime(watchdog_t,file) +files_etc_filetrans_etc_runtime(watchdog_t, file) fs_unmount_xattr_fs(watchdog_t) fs_getattr_all_fs(watchdog_t) diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if index 783a19bb..208ea7a9 100644 --- a/policy/modules/services/xserver.if +++ b/policy/modules/services/xserver.if @@ -85,7 +85,7 @@ interface(`xserver_role',` allow $2 xauth_t:process signal; # allow ps to show xauth - ps_process_pattern($2,xauth_t) + ps_process_pattern($2, xauth_t) allow $2 xauth_home_t:file manage_file_perms; allow $2 xauth_home_t:file { relabelfrom relabelto }; diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te index 260252d6..c656d421 100644 --- a/policy/modules/services/xserver.te +++ b/policy/modules/services/xserver.te @@ -191,7 +191,7 @@ type xserver_exec_t; typealias xserver_t alias { user_xserver_t staff_xserver_t sysadm_xserver_t }; typealias xserver_t alias { auditadm_xserver_t secadm_xserver_t }; xserver_object_types_template(xdm) -xserver_common_x_domain_template(xdm,xdm_t) +xserver_common_x_domain_template(xdm, xdm_t) init_system_domain(xserver_t, xserver_exec_t) ubac_constrained(xserver_t) @@ -215,8 +215,8 @@ type xserver_log_t; logging_log_file(xserver_log_t) ifdef(`enable_mcs',` - init_ranged_domain(xdm_t,xdm_exec_t,s0 - mcs_systemhigh) - init_ranged_daemon_domain(xdm_t,xdm_exec_t,s0 - mcs_systemhigh) + init_ranged_domain(xdm_t, xdm_exec_t, s0 - mcs_systemhigh) + init_ranged_daemon_domain(xdm_t, xdm_exec_t, s0 - mcs_systemhigh) ') optional_policy(` @@ -360,11 +360,11 @@ allow xdm_t xserver_t:process { noatsecure siginh rlimitinh signal sigkill }; allow xdm_t xserver_t:shm rw_shm_perms; # connect to xdm xserver over stream socket -stream_connect_pattern(xdm_t,xserver_tmp_t,xserver_tmp_t,xserver_t) +stream_connect_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t, xserver_t) # Remove /tmp/.X11-unix/X0. -delete_files_pattern(xdm_t,xserver_tmp_t,xserver_tmp_t) -delete_sock_files_pattern(xdm_t,xserver_tmp_t,xserver_tmp_t) +delete_files_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t) +delete_sock_files_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t) manage_dirs_pattern(xdm_t, xserver_log_t, xserver_log_t) manage_files_pattern(xdm_t, xserver_log_t, xserver_log_t) @@ -473,7 +473,7 @@ userdom_read_user_home_content_files(xdm_t) userdom_read_all_users_state(xdm_t) userdom_signal_all_users(xdm_t) -xserver_rw_session(xdm_t,xdm_tmpfs_t) +xserver_rw_session(xdm_t, xdm_tmpfs_t) xserver_unconfined(xdm_t) tunable_policy(`use_nfs_home_dirs',` @@ -622,7 +622,7 @@ manage_files_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) manage_sock_files_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) files_tmp_filetrans(xserver_t, xserver_tmp_t, { file dir sock_file }) -filetrans_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t,sock_file) +filetrans_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t, sock_file) manage_dirs_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t) manage_files_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t) @@ -637,7 +637,7 @@ files_search_var_lib(xserver_t) # Create files in /var/log with the xserver_log_t type. manage_files_pattern(xserver_t, xserver_log_t, xserver_log_t) -logging_log_filetrans(xserver_t, xserver_log_t,file) +logging_log_filetrans(xserver_t, xserver_log_t, file) kernel_read_system_state(xserver_t) kernel_read_device_sysctls(xserver_t) diff --git a/policy/modules/services/zebra.fc b/policy/modules/services/zebra.fc index 73c2f74b..e1b30b25 100644 --- a/policy/modules/services/zebra.fc +++ b/policy/modules/services/zebra.fc @@ -11,7 +11,7 @@ /etc/quagga(/.*)? gen_context(system_u:object_r:zebra_conf_t,s0) /etc/zebra(/.*)? gen_context(system_u:object_r:zebra_conf_t,s0) -/usr/sbin/ospf.* -- gen_context(system_u:object_r:zebra_exec_t,s0) +/usr/sbin/ospf.* -- gen_context(system_u:object_r:zebra_exec_t,s0) /usr/sbin/rip.* -- gen_context(system_u:object_r:zebra_exec_t,s0) /var/log/quagga(/.*)? gen_context(system_u:object_r:zebra_log_t,s0) diff --git a/policy/modules/services/zosremote.if b/policy/modules/services/zosremote.if index 84d4ddf1..f2f23891 100644 --- a/policy/modules/services/zosremote.if +++ b/policy/modules/services/zosremote.if @@ -2,20 +2,20 @@ ######################################## ## -## Execute a domain transition to run audispd-zos-remote. +## Execute a domain transition to run audispd-zos-remote. ## ## ## -## Domain allowed to transition. +## Domain allowed to transition. ## ## # interface(`zosremote_domtrans',` - gen_require(` - type zos_remote_t, zos_remote_exec_t; - ') + gen_require(` + type zos_remote_t, zos_remote_exec_t; + ') - domtrans_pattern($1, zos_remote_exec_t, zos_remote_t) + domtrans_pattern($1, zos_remote_exec_t, zos_remote_t) ') ######################################## diff --git a/policy/modules/system/application.te b/policy/modules/system/application.te index b14091c6..c80f2cea 100644 --- a/policy/modules/system/application.te +++ b/policy/modules/system/application.te @@ -1,5 +1,5 @@ -policy_module(application,1.1.0) +policy_module(application, 1.1.0) # Attribute of user applications attribute application_domain_type; @@ -11,4 +11,3 @@ optional_policy(` ssh_sigchld(application_domain_type) ssh_rw_stream_sockets(application_domain_type) ') - diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if index a18d1f27..8d1d529f 100644 --- a/policy/modules/system/authlogin.if +++ b/policy/modules/system/authlogin.if @@ -125,7 +125,7 @@ interface(`auth_login_entry_type',` type login_exec_t; ') - domain_entry_file($1,login_exec_t) + domain_entry_file($1, login_exec_t) ') ######################################## @@ -149,7 +149,7 @@ interface(`auth_domtrans_login_program',` ') corecmd_search_bin($1) - domtrans_pattern($1,login_exec_t,$2) + domtrans_pattern($1, login_exec_t,$2) ') ######################################## @@ -204,7 +204,7 @@ interface(`auth_search_cache',` type auth_cache_t; ') - allow $1 auth_cache_t:dir search_dir_perms; + allow $1 auth_cache_t:dir search_dir_perms; ') ######################################## @@ -222,7 +222,7 @@ interface(`auth_read_cache',` type auth_cache_t; ') - read_files_pattern($1, auth_cache_t, auth_cache_t) + read_files_pattern($1, auth_cache_t, auth_cache_t) ') ######################################## @@ -240,7 +240,7 @@ interface(`auth_rw_cache',` type auth_cache_t; ') - rw_files_pattern($1, auth_cache_t, auth_cache_t) + rw_files_pattern($1, auth_cache_t, auth_cache_t) ') ######################################## @@ -258,7 +258,7 @@ interface(`auth_manage_cache',` type auth_cache_t; ') - manage_files_pattern($1, auth_cache_t, auth_cache_t) + manage_files_pattern($1, auth_cache_t, auth_cache_t) ') ####################################### @@ -276,7 +276,7 @@ interface(`auth_var_filetrans_cache',` type auth_cache_t; ') - files_var_filetrans($1,auth_cache_t,{ file dir } ) + files_var_filetrans($1, auth_cache_t, { file dir } ) ') ######################################## @@ -369,7 +369,7 @@ interface(`auth_domtrans_upd_passwd',` type updpwd_t, updpwd_exec_t; ') - domtrans_pattern($1,updpwd_exec_t,updpwd_t) + domtrans_pattern($1, updpwd_exec_t, updpwd_t) auth_dontaudit_read_shadow($1) ') @@ -585,7 +585,7 @@ interface(`auth_etc_filetrans_shadow',` type shadow_t; ') - files_etc_filetrans($1,shadow_t,file) + files_etc_filetrans($1, shadow_t, file) ') ####################################### @@ -743,7 +743,7 @@ interface(`auth_domtrans_pam',` type pam_t, pam_exec_t; ') - domtrans_pattern($1,pam_exec_t,pam_t) + domtrans_pattern($1, pam_exec_t, pam_t) ') ######################################## @@ -803,7 +803,7 @@ interface(`auth_exec_pam',` type pam_exec_t; ') - can_exec($1,pam_exec_t) + can_exec($1, pam_exec_t) ') ######################################## @@ -921,7 +921,7 @@ interface(`auth_domtrans_pam_console',` type pam_console_t, pam_console_exec_t; ') - domtrans_pattern($1,pam_console_exec_t,pam_console_t) + domtrans_pattern($1, pam_console_exec_t, pam_console_t) ') ######################################## @@ -1001,8 +1001,8 @@ interface(`auth_manage_pam_console_data',` ') files_search_pids($1) - manage_files_pattern($1,pam_var_console_t,pam_var_console_t) - manage_lnk_files_pattern($1,pam_var_console_t,pam_var_console_t) + manage_files_pattern($1, pam_var_console_t, pam_var_console_t) + manage_lnk_files_pattern($1, pam_var_console_t, pam_var_console_t) ') ####################################### @@ -1022,7 +1022,7 @@ interface(`auth_delete_pam_console_data',` files_search_var($1) files_search_pids($1) - delete_files_pattern($1,pam_var_console_t,pam_var_console_t) + delete_files_pattern($1, pam_var_console_t, pam_var_console_t) ') ######################################## @@ -1168,7 +1168,7 @@ interface(`auth_domtrans_utempter',` type utempter_t, utempter_exec_t; ') - domtrans_pattern($1,utempter_exec_t,utempter_t) + domtrans_pattern($1, utempter_exec_t, utempter_t) ') ######################################## @@ -1343,7 +1343,7 @@ interface(`auth_log_filetrans_login_records',` type wtmp_t; ') - logging_log_filetrans($1,wtmp_t,file) + logging_log_filetrans($1, wtmp_t, file) ') ######################################## diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te index 75423022..98eee686 100644 --- a/policy/modules/system/authlogin.te +++ b/policy/modules/system/authlogin.te @@ -31,7 +31,7 @@ application_executable_file(login_exec_t) type pam_console_t; type pam_console_exec_t; -init_system_domain(pam_console_t,pam_console_exec_t) +init_system_domain(pam_console_t, pam_console_exec_t) role system_r types pam_console_t; type pam_t; @@ -39,7 +39,7 @@ domain_type(pam_t) role system_r types pam_t; type pam_exec_t; -domain_entry_file(pam_t,pam_exec_t) +domain_entry_file(pam_t, pam_exec_t) type pam_tmp_t; files_tmp_file(pam_tmp_t) @@ -59,13 +59,13 @@ neverallow ~can_relabelto_shadow_passwords shadow_t:file relabelto; type updpwd_t; type updpwd_exec_t; domain_type(updpwd_t) -domain_entry_file(updpwd_t,updpwd_exec_t) +domain_entry_file(updpwd_t, updpwd_exec_t) domain_obj_id_change_exemption(updpwd_t) role system_r types updpwd_t; type utempter_t; type utempter_exec_t; -application_domain(utempter_t,utempter_exec_t) +application_domain(utempter_t, utempter_exec_t) # # var_auth_t is the type of /var/lib/auth, usually @@ -147,8 +147,8 @@ allow pam_t self:sem create_sem_perms; allow pam_t self:msgq create_msgq_perms; allow pam_t self:msg { send receive }; -delete_files_pattern(pam_t,pam_var_run_t,pam_var_run_t) -read_files_pattern(pam_t,pam_var_run_t,pam_var_run_t) +delete_files_pattern(pam_t, pam_var_run_t, pam_var_run_t) +read_files_pattern(pam_t, pam_var_run_t, pam_var_run_t) files_list_pids(pam_t) allow pam_t pam_tmp_t:dir manage_dir_perms; @@ -193,8 +193,8 @@ dontaudit pam_console_t self:capability sys_tty_config; allow pam_console_t self:process { sigchld sigkill sigstop signull signal }; # for /var/run/console.lock checking -read_files_pattern(pam_console_t,pam_var_console_t,pam_var_console_t) -read_lnk_files_pattern(pam_console_t,pam_var_console_t,pam_var_console_t) +read_files_pattern(pam_console_t, pam_var_console_t, pam_var_console_t) +read_lnk_files_pattern(pam_console_t, pam_var_console_t, pam_var_console_t) dontaudit pam_console_t pam_var_console_t:file write; kernel_read_kernel_sysctls(pam_console_t) diff --git a/policy/modules/system/clock.if b/policy/modules/system/clock.if index f76522ea..4cf09f6f 100644 --- a/policy/modules/system/clock.if +++ b/policy/modules/system/clock.if @@ -15,7 +15,7 @@ interface(`clock_domtrans',` type hwclock_t, hwclock_exec_t; ') - domtrans_pattern($1,hwclock_exec_t,hwclock_t) + domtrans_pattern($1, hwclock_exec_t, hwclock_t) ') ######################################## @@ -59,7 +59,7 @@ interface(`clock_exec',` type hwclock_exec_t; ') - can_exec($1,hwclock_exec_t) + can_exec($1, hwclock_exec_t) ') ######################################## diff --git a/policy/modules/system/clock.te b/policy/modules/system/clock.te index 1cc3ae93..e935c7c5 100644 --- a/policy/modules/system/clock.te +++ b/policy/modules/system/clock.te @@ -11,7 +11,7 @@ files_type(adjtime_t) type hwclock_t; type hwclock_exec_t; -init_system_domain(hwclock_t,hwclock_exec_t) +init_system_domain(hwclock_t, hwclock_exec_t) role system_r types hwclock_t; ######################################## diff --git a/policy/modules/system/daemontools.te b/policy/modules/system/daemontools.te index 287b1914..1e574041 100644 --- a/policy/modules/system/daemontools.te +++ b/policy/modules/system/daemontools.te @@ -1,5 +1,5 @@ -policy_module(daemontools,1.2.0) +policy_module(daemontools, 1.2.0) ######################################## # @@ -14,18 +14,18 @@ files_type(svc_log_t) type svc_multilog_t; type svc_multilog_exec_t; -application_domain(svc_multilog_t,svc_multilog_exec_t) +application_domain(svc_multilog_t, svc_multilog_exec_t) role system_r types svc_multilog_t; type svc_run_t; type svc_run_exec_t; -application_domain(svc_run_t,svc_run_exec_t) +application_domain(svc_run_t, svc_run_exec_t) role system_r types svc_run_t; type svc_start_t; type svc_start_exec_t; -init_domain(svc_start_t,svc_start_exec_t) -init_system_domain(svc_start_t,svc_start_exec_t) +init_domain(svc_start_t, svc_start_exec_t) +init_system_domain(svc_start_t, svc_start_exec_t) role system_r types svc_start_t; type svc_svc_t; @@ -37,7 +37,7 @@ files_type(svc_svc_t) # # multilog creates /service/*/log/status -manage_files_pattern(svc_multilog_t,svc_svc_t,svc_svc_t) +manage_files_pattern(svc_multilog_t, svc_svc_t, svc_svc_t) init_use_fds(svc_multilog_t) diff --git a/policy/modules/system/fstools.if b/policy/modules/system/fstools.if index 732b54a1..1c51b4b1 100644 --- a/policy/modules/system/fstools.if +++ b/policy/modules/system/fstools.if @@ -16,7 +16,7 @@ interface(`fstools_domtrans',` ') corecmd_search_bin($1) - domtrans_pattern($1,fsadm_exec_t,fsadm_t) + domtrans_pattern($1, fsadm_exec_t, fsadm_t) ') ######################################## @@ -60,7 +60,7 @@ interface(`fstools_exec',` type fsadm_exec_t; ') - can_exec($1,fsadm_exec_t) + can_exec($1, fsadm_exec_t) ') ######################################## diff --git a/policy/modules/system/fstools.te b/policy/modules/system/fstools.te index 2ae2f1cb..e204c3ae 100644 --- a/policy/modules/system/fstools.te +++ b/policy/modules/system/fstools.te @@ -8,7 +8,7 @@ policy_module(fstools, 1.12.1) type fsadm_t; type fsadm_exec_t; -init_system_domain(fsadm_t,fsadm_exec_t) +init_system_domain(fsadm_t, fsadm_exec_t) role system_r types fsadm_t; type fsadm_log_t; @@ -48,8 +48,8 @@ files_tmp_filetrans(fsadm_t, fsadm_tmp_t, { file dir }) # log files allow fsadm_t fsadm_log_t:dir setattr; -manage_files_pattern(fsadm_t,fsadm_log_t,fsadm_log_t) -logging_log_filetrans(fsadm_t,fsadm_log_t,file) +manage_files_pattern(fsadm_t, fsadm_log_t, fsadm_log_t) +logging_log_filetrans(fsadm_t, fsadm_log_t, file) # Enable swapping to files allow fsadm_t swapfile_t:file { rw_file_perms swapon }; @@ -127,7 +127,7 @@ files_manage_lost_found(fsadm_t) files_manage_isid_type_dirs(fsadm_t) # Write to /etc/mtab. files_manage_etc_runtime_files(fsadm_t) -files_etc_filetrans_etc_runtime(fsadm_t,file) +files_etc_filetrans_etc_runtime(fsadm_t, file) # Access to /initrd devices files_rw_isid_type_dirs(fsadm_t) files_rw_isid_type_blk_files(fsadm_t) @@ -174,7 +174,7 @@ optional_policy(` optional_policy(` # for smartctl cron jobs - cron_system_entry(fsadm_t,fsadm_exec_t) + cron_system_entry(fsadm_t, fsadm_exec_t) ') optional_policy(` diff --git a/policy/modules/system/getty.if b/policy/modules/system/getty.if index 9ae3682e..b2b003df 100644 --- a/policy/modules/system/getty.if +++ b/policy/modules/system/getty.if @@ -16,7 +16,7 @@ interface(`getty_domtrans',` ') corecmd_search_bin($1) - domtrans_pattern($1,getty_exec_t,getty_t) + domtrans_pattern($1, getty_exec_t, getty_t) ') ######################################## diff --git a/policy/modules/system/getty.te b/policy/modules/system/getty.te index 077e95df..dc4a1e81 100644 --- a/policy/modules/system/getty.te +++ b/policy/modules/system/getty.te @@ -8,7 +8,7 @@ policy_module(getty, 1.7.0) type getty_t; type getty_exec_t; -init_domain(getty_t,getty_exec_t) +init_domain(getty_t, getty_exec_t) init_system_domain(getty_t, getty_exec_t) domain_interactive_fd(getty_t) @@ -39,22 +39,22 @@ dontaudit getty_t self:capability sys_tty_config; allow getty_t self:process { getpgid setpgid getsession signal_perms }; allow getty_t self:fifo_file rw_fifo_file_perms; -read_files_pattern(getty_t,getty_etc_t,getty_etc_t) -read_lnk_files_pattern(getty_t,getty_etc_t,getty_etc_t) -files_etc_filetrans(getty_t,getty_etc_t,{ file dir }) +read_files_pattern(getty_t, getty_etc_t, getty_etc_t) +read_lnk_files_pattern(getty_t, getty_etc_t, getty_etc_t) +files_etc_filetrans(getty_t, getty_etc_t,{ file dir }) allow getty_t getty_lock_t:file manage_file_perms; -files_lock_filetrans(getty_t,getty_lock_t,file) +files_lock_filetrans(getty_t, getty_lock_t, file) allow getty_t getty_log_t:file manage_file_perms; -logging_log_filetrans(getty_t,getty_log_t,file) +logging_log_filetrans(getty_t, getty_log_t, file) allow getty_t getty_tmp_t:file manage_file_perms; allow getty_t getty_tmp_t:dir manage_dir_perms; -files_tmp_filetrans(getty_t,getty_tmp_t,{ file dir }) +files_tmp_filetrans(getty_t, getty_tmp_t, { file dir }) -manage_files_pattern(getty_t,getty_var_run_t,getty_var_run_t) -files_pid_filetrans(getty_t,getty_var_run_t,file) +manage_files_pattern(getty_t, getty_var_run_t, getty_var_run_t) +files_pid_filetrans(getty_t, getty_var_run_t, file) kernel_list_proc(getty_t) kernel_read_proc_symlinks(getty_t) diff --git a/policy/modules/system/hostname.if b/policy/modules/system/hostname.if index 1ce151a9..8fdea3b6 100644 --- a/policy/modules/system/hostname.if +++ b/policy/modules/system/hostname.if @@ -16,7 +16,7 @@ interface(`hostname_domtrans',` ') corecmd_search_bin($1) - domtrans_pattern($1,hostname_exec_t,hostname_t) + domtrans_pattern($1, hostname_exec_t, hostname_t) ') ######################################## @@ -61,5 +61,5 @@ interface(`hostname_exec',` ') corecmd_search_bin($1) - can_exec($1,hostname_exec_t) + can_exec($1, hostname_exec_t) ') diff --git a/policy/modules/system/hostname.te b/policy/modules/system/hostname.te index bf6bc235..7cdd8a7a 100644 --- a/policy/modules/system/hostname.te +++ b/policy/modules/system/hostname.te @@ -8,7 +8,7 @@ policy_module(hostname, 1.6.0) type hostname_t; type hostname_exec_t; -init_system_domain(hostname_t,hostname_exec_t) +init_system_domain(hostname_t, hostname_exec_t) role system_r types hostname_t; ######################################## diff --git a/policy/modules/system/hotplug.if b/policy/modules/system/hotplug.if index 3741a18d..321d2e6b 100644 --- a/policy/modules/system/hotplug.if +++ b/policy/modules/system/hotplug.if @@ -19,7 +19,7 @@ interface(`hotplug_domtrans',` ') corecmd_search_bin($1) - domtrans_pattern($1,hotplug_exec_t,hotplug_t) + domtrans_pattern($1, hotplug_exec_t, hotplug_t) ') ######################################## @@ -38,7 +38,7 @@ interface(`hotplug_exec',` ') corecmd_search_bin($1) - can_exec($1,hotplug_exec_t) + can_exec($1, hotplug_exec_t) ') ######################################## @@ -151,8 +151,8 @@ interface(`hotplug_read_config',` files_search_etc($1) allow $1 hotplug_etc_t:dir list_dir_perms; - read_files_pattern($1,hotplug_etc_t,hotplug_etc_t) - read_lnk_files_pattern($1,hotplug_etc_t,hotplug_etc_t) + read_files_pattern($1, hotplug_etc_t, hotplug_etc_t) + read_lnk_files_pattern($1, hotplug_etc_t, hotplug_etc_t) ') ######################################## diff --git a/policy/modules/system/hotplug.te b/policy/modules/system/hotplug.te index 6e017458..12a3cb64 100644 --- a/policy/modules/system/hotplug.te +++ b/policy/modules/system/hotplug.te @@ -8,12 +8,12 @@ policy_module(hotplug, 1.11.2) type hotplug_t; type hotplug_exec_t; -kernel_domtrans_to(hotplug_t,hotplug_exec_t) -init_daemon_domain(hotplug_t,hotplug_exec_t) +kernel_domtrans_to(hotplug_t, hotplug_exec_t) +init_daemon_domain(hotplug_t, hotplug_exec_t) type hotplug_etc_t; files_config_file(hotplug_etc_t) -init_daemon_domain(hotplug_t,hotplug_etc_t) +init_daemon_domain(hotplug_t, hotplug_etc_t) type hotplug_var_run_t; files_pid_file(hotplug_var_run_t) @@ -33,15 +33,15 @@ allow hotplug_t self:netlink_route_socket r_netlink_socket_perms; allow hotplug_t self:udp_socket create_socket_perms; allow hotplug_t self:tcp_socket connected_stream_socket_perms; -read_files_pattern(hotplug_t,hotplug_etc_t,hotplug_etc_t) -read_lnk_files_pattern(hotplug_t,hotplug_etc_t,hotplug_etc_t) -can_exec(hotplug_t,hotplug_etc_t) +read_files_pattern(hotplug_t, hotplug_etc_t, hotplug_etc_t) +read_lnk_files_pattern(hotplug_t, hotplug_etc_t, hotplug_etc_t) +can_exec(hotplug_t, hotplug_etc_t) allow hotplug_t hotplug_etc_t:dir list_dir_perms; -can_exec(hotplug_t,hotplug_exec_t) +can_exec(hotplug_t, hotplug_exec_t) -manage_files_pattern(hotplug_t,hotplug_var_run_t,hotplug_var_run_t) -files_pid_filetrans(hotplug_t,hotplug_var_run_t,file) +manage_files_pattern(hotplug_t, hotplug_var_run_t, hotplug_var_run_t) +files_pid_filetrans(hotplug_t, hotplug_var_run_t, file) kernel_sigchld(hotplug_t) kernel_setpgid(hotplug_t) @@ -83,7 +83,7 @@ domain_dontaudit_getattr_all_domains(hotplug_t) files_read_etc_files(hotplug_t) files_manage_etc_runtime_files(hotplug_t) -files_etc_filetrans_etc_runtime(hotplug_t,file) +files_etc_filetrans_etc_runtime(hotplug_t, file) files_exec_etc_files(hotplug_t) # for when filesystems are not mounted early in the boot: files_dontaudit_search_isid_type_dirs(hotplug_t) diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if index 5f9f21e5..7637333d 100644 --- a/policy/modules/system/init.if +++ b/policy/modules/system/init.if @@ -334,7 +334,7 @@ interface(`init_domtrans',` type init_t, init_exec_t; ') - domtrans_pattern($1,init_exec_t,init_t) + domtrans_pattern($1, init_exec_t, init_t) ') ######################################## @@ -354,7 +354,7 @@ interface(`init_exec',` ') corecmd_search_bin($1) - can_exec($1,init_exec_t) + can_exec($1, init_exec_t) ') ######################################## @@ -604,7 +604,7 @@ interface(`init_script_file_entry_type',` type initrc_exec_t; ') - domain_entry_file($1,initrc_exec_t) + domain_entry_file($1, initrc_exec_t) ') ######################################## @@ -623,7 +623,7 @@ interface(`init_spec_domtrans_script',` ') files_list_etc($1) - spec_domtrans_pattern($1,initrc_exec_t,initrc_t) + spec_domtrans_pattern($1, initrc_exec_t, initrc_t) ifdef(`enable_mcs',` range_transition $1 initrc_exec_t:process s0; @@ -650,7 +650,7 @@ interface(`init_domtrans_script',` ') files_list_etc($1) - domtrans_pattern($1,initrc_exec_t,initrc_t) + domtrans_pattern($1, initrc_exec_t, initrc_t) ifdef(`enable_mcs',` range_transition $1 initrc_exec_t:process s0; @@ -692,7 +692,7 @@ interface(`init_script_file_domtrans',` ') files_list_etc($1) - domain_auto_trans($1,initrc_exec_t,$2) + domain_auto_trans($1, initrc_exec_t,$2) ') ######################################## @@ -863,7 +863,7 @@ interface(`init_exec_script_files',` ') files_list_etc($1) - can_exec($1,initrc_exec_t) + can_exec($1, initrc_exec_t) ') ######################################## @@ -939,9 +939,9 @@ interface(`init_read_script_state',` ') kernel_search_proc($1) - read_files_pattern($1,initrc_t,initrc_t) - read_lnk_files_pattern($1,initrc_t,initrc_t) - list_dirs_pattern($1,initrc_t,initrc_t) + read_files_pattern($1, initrc_t, initrc_t) + read_lnk_files_pattern($1, initrc_t, initrc_t) + list_dirs_pattern($1, initrc_t, initrc_t) # should move this to separate interface allow $1 initrc_t:process getattr; @@ -1247,7 +1247,7 @@ interface(`init_getattr_script_status_files',` type initrc_state_t; ') - getattr_files_pattern($1,initrc_state_t,initrc_state_t) + getattr_files_pattern($1, initrc_state_t, initrc_state_t) ') ######################################## @@ -1286,7 +1286,7 @@ interface(`init_rw_script_tmp_files',` ') files_search_tmp($1) - rw_files_pattern($1,initrc_tmp_t,initrc_tmp_t) + rw_files_pattern($1, initrc_tmp_t, initrc_tmp_t) ') ######################################## @@ -1316,7 +1316,7 @@ interface(`init_script_tmp_filetrans',` ') files_search_tmp($1) - filetrans_pattern($1,initrc_tmp_t,$2,$3) + filetrans_pattern($1, initrc_tmp_t, $2, $3) ') ######################################## diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te index f954c0cb..fbea5b1b 100644 --- a/policy/modules/system/init.te +++ b/policy/modules/system/init.te @@ -15,7 +15,7 @@ gen_require(` ## Enable support for upstart as the init program. ##

## -gen_tunable(init_upstart,false) +gen_tunable(init_upstart, false) # used for direct running of init scripts # by admin domains @@ -36,8 +36,8 @@ attribute daemon; type init_t; type init_exec_t; domain_type(init_t) -domain_entry_file(init_t,init_exec_t) -kernel_domtrans_to(init_t,init_exec_t) +domain_entry_file(init_t, init_exec_t) +kernel_domtrans_to(init_t, init_exec_t) role system_r types init_t; # @@ -58,7 +58,7 @@ mls_trusted_object(initctl_t) type initrc_t, init_script_domain_type, init_run_all_scripts_domain; type initrc_exec_t, init_script_file_type; domain_type(initrc_t) -domain_entry_file(initrc_t,initrc_exec_t) +domain_entry_file(initrc_t, initrc_exec_t) role system_r types initrc_t; # should be part of the true block # of the below init_upstart tunable @@ -79,7 +79,7 @@ type initrc_var_run_t; files_pid_file(initrc_var_run_t) ifdef(`enable_mls',` - kernel_ranged_domtrans_to(init_t,init_exec_t,s0 - mls_systemhigh) + kernel_ranged_domtrans_to(init_t, init_exec_t, s0 - mls_systemhigh) ') ######################################## @@ -99,16 +99,16 @@ allow init_t self:capability ~sys_module; allow init_t self:fifo_file rw_fifo_file_perms; # Re-exec itself -can_exec(init_t,init_exec_t) +can_exec(init_t, init_exec_t) allow init_t initrc_t:unix_stream_socket connectto; # For /var/run/shutdown.pid. allow init_t init_var_run_t:file manage_file_perms; -files_pid_filetrans(init_t,init_var_run_t,file) +files_pid_filetrans(init_t, init_var_run_t, file) allow init_t initctl_t:fifo_file manage_fifo_file_perms; -dev_filetrans(init_t,initctl_t,fifo_file) +dev_filetrans(init_t, initctl_t, fifo_file) fs_associate_tmpfs(initctl_t) # Modify utmp. @@ -133,7 +133,7 @@ files_read_etc_files(init_t) files_rw_generic_pids(init_t) files_dontaudit_search_isid_type_dirs(init_t) files_manage_etc_runtime_files(init_t) -files_etc_filetrans_etc_runtime(init_t,file) +files_etc_filetrans_etc_runtime(init_t, file) # Run /etc/X11/prefdm: files_exec_etc_files(init_t) # file descriptors inherited from the rootfs: @@ -173,11 +173,11 @@ ifdef(`distro_gentoo',` ifdef(`distro_redhat',` fs_rw_tmpfs_chr_files(init_t) - fs_tmpfs_filetrans(init_t,initctl_t,fifo_file) + fs_tmpfs_filetrans(init_t, initctl_t, fifo_file) ') tunable_policy(`init_upstart',` - corecmd_shell_domtrans(init_t,initrc_t) + corecmd_shell_domtrans(init_t, initrc_t) ',` # Run the shell in the sysadm role for single-user mode. # causes problems with upstart @@ -214,7 +214,7 @@ allow initrc_t self:udp_socket create_socket_perms; allow initrc_t self:fifo_file rw_file_perms; allow initrc_t initrc_devpts_t:chr_file rw_term_perms; -term_create_pty(initrc_t,initrc_devpts_t) +term_create_pty(initrc_t, initrc_devpts_t) # Going to single user mode init_exec(initrc_t) @@ -223,18 +223,18 @@ can_exec(initrc_t, init_script_file_type) domtrans_pattern(init_run_all_scripts_domain, initrc_exec_t, initrc_t) -manage_dirs_pattern(initrc_t,initrc_state_t,initrc_state_t) -manage_files_pattern(initrc_t,initrc_state_t,initrc_state_t) -manage_lnk_files_pattern(initrc_t,initrc_state_t,initrc_state_t) -manage_fifo_files_pattern(initrc_t,initrc_state_t,initrc_state_t) +manage_dirs_pattern(initrc_t, initrc_state_t, initrc_state_t) +manage_files_pattern(initrc_t, initrc_state_t, initrc_state_t) +manage_lnk_files_pattern(initrc_t, initrc_state_t, initrc_state_t) +manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t) allow initrc_t initrc_var_run_t:file manage_file_perms; -files_pid_filetrans(initrc_t,initrc_var_run_t,file) +files_pid_filetrans(initrc_t, initrc_var_run_t, file) -can_exec(initrc_t,initrc_tmp_t) +can_exec(initrc_t, initrc_tmp_t) allow initrc_t initrc_tmp_t:file manage_file_perms; allow initrc_t initrc_tmp_t:dir manage_dir_perms; -files_tmp_filetrans(initrc_t,initrc_tmp_t, { file dir }) +files_tmp_filetrans(initrc_t, initrc_tmp_t, { file dir }) init_write_initctl(initrc_t) @@ -349,7 +349,7 @@ files_delete_all_pids(initrc_t) files_delete_all_pid_dirs(initrc_t) files_read_etc_files(initrc_t) files_manage_etc_runtime_files(initrc_t) -files_etc_filetrans_etc_runtime(initrc_t,file) +files_etc_filetrans_etc_runtime(initrc_t, file) files_manage_generic_locks(initrc_t) files_exec_etc_files(initrc_t) files_read_usr_files(initrc_t) @@ -391,7 +391,7 @@ userdom_use_user_terminals(initrc_t) ifdef(`distro_debian',` dev_setattr_generic_dirs(initrc_t) - fs_tmpfs_filetrans(initrc_t,initrc_var_run_t,dir) + fs_tmpfs_filetrans(initrc_t, initrc_var_run_t, dir) # for storing state under /dev/shm fs_setattr_tmpfs_dirs(initrc_t) @@ -420,7 +420,7 @@ ifdef(`distro_gentoo',` # needed until baselayout is fixed to have the # restorecon on /dev to again be immediately after # mounting tmpfs on /dev - fs_tmpfs_filetrans(initrc_t,initrc_state_t,file) + fs_tmpfs_filetrans(initrc_t, initrc_state_t, file) # init scripts touch this clock_dontaudit_write_adjtime(initrc_t) @@ -735,7 +735,7 @@ optional_policy(` optional_policy(` # allow init scripts to su - su_restricted_domain_template(initrc,initrc_t,system_r) + su_restricted_domain_template(initrc, initrc_t, system_r) ') optional_policy(` diff --git a/policy/modules/system/ipsec.if b/policy/modules/system/ipsec.if index 27cacf54..a162c772 100644 --- a/policy/modules/system/ipsec.if +++ b/policy/modules/system/ipsec.if @@ -15,7 +15,7 @@ interface(`ipsec_domtrans',` type ipsec_t, ipsec_exec_t; ') - domtrans_pattern($1,ipsec_exec_t,ipsec_t) + domtrans_pattern($1, ipsec_exec_t, ipsec_t) ') ######################################## @@ -34,7 +34,7 @@ interface(`ipsec_stream_connect',` ') files_search_pids($1) - stream_connect_pattern($1,ipsec_var_run_t,ipsec_var_run_t,ipsec_t) + stream_connect_pattern($1, ipsec_var_run_t, ipsec_var_run_t, ipsec_t) ') ######################################## @@ -70,7 +70,7 @@ interface(`ipsec_exec_mgmt',` type ipsec_exec_t; ') - can_exec($1,ipsec_exec_t) + can_exec($1, ipsec_exec_t) ') ######################################## @@ -166,7 +166,7 @@ interface(`ipsec_manage_pid',` ') files_search_pids($1) - manage_files_pattern($1,ipsec_var_run_t,ipsec_var_run_t) + manage_files_pattern($1, ipsec_var_run_t, ipsec_var_run_t) ') ######################################## @@ -184,7 +184,7 @@ interface(`ipsec_domtrans_racoon',` type racoon_t, racoon_exec_t; ') - domtrans_pattern($1,racoon_exec_t,racoon_t) + domtrans_pattern($1, racoon_exec_t, racoon_t) ') ######################################## @@ -202,7 +202,7 @@ interface(`ipsec_domtrans_setkey',` type setkey_t, setkey_exec_t; ') - domtrans_pattern($1,setkey_exec_t,setkey_t) + domtrans_pattern($1, setkey_exec_t, setkey_t) ') ######################################## diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te index 4f9df303..bc0fd7ff 100644 --- a/policy/modules/system/ipsec.te +++ b/policy/modules/system/ipsec.te @@ -8,7 +8,7 @@ policy_module(ipsec, 1.9.1) type ipsec_t; type ipsec_exec_t; -init_daemon_domain(ipsec_t,ipsec_exec_t) +init_daemon_domain(ipsec_t, ipsec_exec_t) role system_r types ipsec_t; # type for ipsec configuration file(s) - not for keys @@ -28,7 +28,7 @@ files_pid_file(ipsec_var_run_t) type ipsec_mgmt_t; type ipsec_mgmt_exec_t; -init_system_domain(ipsec_mgmt_t,ipsec_mgmt_exec_t) +init_system_domain(ipsec_mgmt_t, ipsec_mgmt_exec_t) corecmd_shell_entry_type(ipsec_mgmt_t) role system_r types ipsec_mgmt_t; @@ -40,12 +40,12 @@ files_pid_file(ipsec_mgmt_var_run_t) type racoon_t; type racoon_exec_t; -init_daemon_domain(racoon_t,racoon_exec_t) +init_daemon_domain(racoon_t, racoon_exec_t) role system_r types racoon_t; type setkey_t; type setkey_exec_t; -init_system_domain(setkey_t,setkey_exec_t) +init_system_domain(setkey_t, setkey_exec_t) role system_r types setkey_t; ######################################## @@ -63,12 +63,12 @@ allow ipsec_t self:fifo_file read_fifo_file_perms; allow ipsec_t self:netlink_xfrm_socket { create_netlink_socket_perms nlmsg_write }; allow ipsec_t ipsec_conf_file_t:dir list_dir_perms; -read_files_pattern(ipsec_t,ipsec_conf_file_t,ipsec_conf_file_t) -read_lnk_files_pattern(ipsec_t,ipsec_conf_file_t,ipsec_conf_file_t) +read_files_pattern(ipsec_t, ipsec_conf_file_t, ipsec_conf_file_t) +read_lnk_files_pattern(ipsec_t, ipsec_conf_file_t, ipsec_conf_file_t) allow ipsec_t ipsec_key_file_t:dir list_dir_perms; -read_files_pattern(ipsec_t,ipsec_key_file_t,ipsec_key_file_t) -read_lnk_files_pattern(ipsec_t,ipsec_key_file_t,ipsec_key_file_t) +read_files_pattern(ipsec_t, ipsec_key_file_t, ipsec_key_file_t) +read_lnk_files_pattern(ipsec_t, ipsec_key_file_t, ipsec_key_file_t) manage_files_pattern(ipsec_t, ipsec_var_run_t, ipsec_var_run_t) manage_sock_files_pattern(ipsec_t, ipsec_var_run_t, ipsec_var_run_t) @@ -80,7 +80,7 @@ can_exec(ipsec_t, ipsec_mgmt_exec_t) # a shell script, we need to find a way to make things work without # letting all sorts of stuff possibly be run... # so try flipping back into the ipsec_mgmt_t domain -corecmd_shell_domtrans(ipsec_t,ipsec_mgmt_t) +corecmd_shell_domtrans(ipsec_t, ipsec_mgmt_t) allow ipsec_mgmt_t ipsec_t:fd use; allow ipsec_mgmt_t ipsec_t:fifo_file rw_file_perms; allow ipsec_mgmt_t ipsec_t:process sigchld; @@ -162,21 +162,21 @@ allow ipsec_mgmt_t self:key_socket create_socket_perms; allow ipsec_mgmt_t self:fifo_file rw_file_perms; allow ipsec_mgmt_t ipsec_mgmt_lock_t:file manage_file_perms; -files_lock_filetrans(ipsec_mgmt_t,ipsec_mgmt_lock_t,file) +files_lock_filetrans(ipsec_mgmt_t, ipsec_mgmt_lock_t, file) allow ipsec_mgmt_t ipsec_mgmt_var_run_t:file manage_file_perms; -files_pid_filetrans(ipsec_mgmt_t,ipsec_mgmt_var_run_t,file) +files_pid_filetrans(ipsec_mgmt_t, ipsec_mgmt_var_run_t, file) -manage_files_pattern(ipsec_mgmt_t,ipsec_var_run_t,ipsec_var_run_t) -manage_lnk_files_pattern(ipsec_mgmt_t,ipsec_var_run_t,ipsec_var_run_t) +manage_files_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t) +manage_lnk_files_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t) allow ipsec_mgmt_t ipsec_var_run_t:sock_file manage_sock_file_perms; -files_pid_filetrans(ipsec_mgmt_t,ipsec_var_run_t,sock_file) +files_pid_filetrans(ipsec_mgmt_t, ipsec_var_run_t, sock_file) # _realsetup needs to be able to cat /var/run/pluto.pid, # run ps on that pid, and delete the file -read_files_pattern(ipsec_mgmt_t,ipsec_t,ipsec_t) -read_lnk_files_pattern(ipsec_mgmt_t,ipsec_t,ipsec_t) +read_files_pattern(ipsec_mgmt_t, ipsec_t, ipsec_t) +read_lnk_files_pattern(ipsec_mgmt_t, ipsec_t, ipsec_t) # logger, running in ipsec_mgmt_t needs to use sockets allow ipsec_mgmt_t self:unix_dgram_socket { create connect write }; @@ -184,18 +184,18 @@ allow ipsec_mgmt_t ipsec_t:unix_dgram_socket { create connect write }; allow ipsec_mgmt_t ipsec_conf_file_t:file read_file_perms; -manage_files_pattern(ipsec_mgmt_t,ipsec_key_file_t,ipsec_key_file_t) -manage_lnk_files_pattern(ipsec_mgmt_t,ipsec_key_file_t,ipsec_key_file_t) -files_etc_filetrans(ipsec_mgmt_t,ipsec_key_file_t,file) +manage_files_pattern(ipsec_mgmt_t, ipsec_key_file_t, ipsec_key_file_t) +manage_lnk_files_pattern(ipsec_mgmt_t, ipsec_key_file_t, ipsec_key_file_t) +files_etc_filetrans(ipsec_mgmt_t, ipsec_key_file_t, file) # whack needs to connect to pluto -stream_connect_pattern(ipsec_mgmt_t,ipsec_var_run_t,ipsec_var_run_t,ipsec_t) +stream_connect_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t, ipsec_t) can_exec(ipsec_mgmt_t, ipsec_exec_t) can_exec(ipsec_mgmt_t, ipsec_mgmt_exec_t) allow ipsec_mgmt_t ipsec_mgmt_exec_t:lnk_file read; -domtrans_pattern(ipsec_mgmt_t,ipsec_exec_t,ipsec_t) +domtrans_pattern(ipsec_mgmt_t, ipsec_exec_t, ipsec_t) kernel_rw_net_sysctls(ipsec_mgmt_t) # allow pluto to access /proc/net/ipsec_eroute; @@ -282,17 +282,17 @@ allow racoon_t self:udp_socket create_socket_perms; allow racoon_t self:key_socket create_socket_perms; # manage pid file -manage_files_pattern(racoon_t,ipsec_var_run_t,ipsec_var_run_t) -manage_sock_files_pattern(racoon_t,ipsec_var_run_t,ipsec_var_run_t) -files_pid_filetrans(racoon_t,ipsec_var_run_t,file) +manage_files_pattern(racoon_t, ipsec_var_run_t, ipsec_var_run_t) +manage_sock_files_pattern(racoon_t, ipsec_var_run_t, ipsec_var_run_t) +files_pid_filetrans(racoon_t, ipsec_var_run_t, file) allow racoon_t ipsec_conf_file_t:dir list_dir_perms; -read_files_pattern(racoon_t,ipsec_conf_file_t,ipsec_conf_file_t) -read_lnk_files_pattern(racoon_t,ipsec_conf_file_t,ipsec_conf_file_t) +read_files_pattern(racoon_t, ipsec_conf_file_t, ipsec_conf_file_t) +read_lnk_files_pattern(racoon_t, ipsec_conf_file_t, ipsec_conf_file_t) allow racoon_t ipsec_key_file_t:dir list_dir_perms; -read_files_pattern(racoon_t,ipsec_key_file_t,ipsec_key_file_t) -read_lnk_files_pattern(racoon_t,ipsec_key_file_t,ipsec_key_file_t) +read_files_pattern(racoon_t, ipsec_key_file_t, ipsec_key_file_t) +read_lnk_files_pattern(racoon_t, ipsec_key_file_t, ipsec_key_file_t) kernel_read_system_state(racoon_t) kernel_read_network_state(racoon_t) @@ -338,8 +338,8 @@ allow setkey_t self:key_socket create_socket_perms; allow setkey_t self:netlink_route_socket create_netlink_socket_perms; allow setkey_t ipsec_conf_file_t:dir list_dir_perms; -read_files_pattern(setkey_t,ipsec_conf_file_t,ipsec_conf_file_t) -read_lnk_files_pattern(setkey_t,ipsec_conf_file_t,ipsec_conf_file_t) +read_files_pattern(setkey_t, ipsec_conf_file_t, ipsec_conf_file_t) +read_lnk_files_pattern(setkey_t, ipsec_conf_file_t, ipsec_conf_file_t) # allow setkey utility to set contexts on SA's and policy domain_ipsec_setcontext_all_domains(setkey_t) diff --git a/policy/modules/system/iptables.if b/policy/modules/system/iptables.if index bab19d2b..90127837 100644 --- a/policy/modules/system/iptables.if +++ b/policy/modules/system/iptables.if @@ -16,7 +16,7 @@ interface(`iptables_domtrans',` ') corecmd_search_bin($1) - domtrans_pattern($1,iptables_exec_t,iptables_t) + domtrans_pattern($1, iptables_exec_t, iptables_t) ') ######################################## @@ -67,5 +67,5 @@ interface(`iptables_exec',` ') corecmd_search_bin($1) - can_exec($1,iptables_exec_t) + can_exec($1, iptables_exec_t) ') diff --git a/policy/modules/system/iptables.te b/policy/modules/system/iptables.te index ab529fbb..68d022ae 100644 --- a/policy/modules/system/iptables.te +++ b/policy/modules/system/iptables.te @@ -8,7 +8,7 @@ policy_module(iptables, 1.8.1) type iptables_t; type iptables_exec_t; -init_system_domain(iptables_t,iptables_exec_t) +init_system_domain(iptables_t, iptables_exec_t) role system_r types iptables_t; type iptables_tmp_t; @@ -28,9 +28,9 @@ allow iptables_t self:process { sigchld sigkill sigstop signull signal }; allow iptables_t self:rawip_socket create_socket_perms; manage_files_pattern(iptables_t, iptables_var_run_t, iptables_var_run_t) -files_pid_filetrans(iptables_t,iptables_var_run_t,file) +files_pid_filetrans(iptables_t, iptables_var_run_t, file) -can_exec(iptables_t,iptables_exec_t) +can_exec(iptables_t, iptables_exec_t) allow iptables_t iptables_tmp_t:dir manage_dir_perms; allow iptables_t iptables_tmp_t:file manage_file_perms; diff --git a/policy/modules/system/iscsi.if b/policy/modules/system/iscsi.if index b8e8f4a8..6f0b2063 100644 --- a/policy/modules/system/iscsi.if +++ b/policy/modules/system/iscsi.if @@ -15,5 +15,5 @@ interface(`iscsid_domtrans',` type iscsid_t, iscsid_exec_t; ') - domtrans_pattern($1,iscsid_exec_t,iscsid_t) + domtrans_pattern($1, iscsid_exec_t, iscsid_t) ') diff --git a/policy/modules/system/iscsi.te b/policy/modules/system/iscsi.te index bfa8bbfa..df83ad41 100644 --- a/policy/modules/system/iscsi.te +++ b/policy/modules/system/iscsi.te @@ -47,12 +47,12 @@ allow iscsid_t iscsi_tmp_t:file manage_file_perms; fs_tmpfs_filetrans(iscsid_t, iscsi_tmp_t, file ) allow iscsid_t iscsi_var_lib_t:dir list_dir_perms; -read_files_pattern(iscsid_t,iscsi_var_lib_t,iscsi_var_lib_t) -read_lnk_files_pattern(iscsid_t,iscsi_var_lib_t,iscsi_var_lib_t) +read_files_pattern(iscsid_t, iscsi_var_lib_t, iscsi_var_lib_t) +read_lnk_files_pattern(iscsid_t, iscsi_var_lib_t, iscsi_var_lib_t) files_search_var_lib(iscsid_t) -manage_files_pattern(iscsid_t,iscsi_var_run_t,iscsi_var_run_t) -files_pid_filetrans(iscsid_t,iscsi_var_run_t,file) +manage_files_pattern(iscsid_t, iscsi_var_run_t, iscsi_var_run_t) +files_pid_filetrans(iscsid_t, iscsi_var_run_t, file) kernel_read_system_state(iscsid_t) diff --git a/policy/modules/system/libraries.fc b/policy/modules/system/libraries.fc index 1cfa7c11..f0ff86be 100644 --- a/policy/modules/system/libraries.fc +++ b/policy/modules/system/libraries.fc @@ -42,7 +42,7 @@ ifdef(`distro_redhat',` /lib/ld-[^/]*\.so(\.[^/]*)* -- gen_context(system_u:object_r:ld_so_t,s0) /lib64/ld-[^/]*\.so(\.[^/]*)* -- gen_context(system_u:object_r:ld_so_t,s0) -/lib/security/pam_poldi\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) +/lib/security/pam_poldi\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) /lib64/security/pam_poldi\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) ifdef(`distro_debian',` @@ -115,7 +115,7 @@ ifdef(`distro_redhat',` /usr/(.*/)?nvidia/.+\.so(\..*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0) -/usr/lib/vlc/codec/libdmo_plugin\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) +/usr/lib/vlc/codec/libdmo_plugin\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) /usr/lib/vlc/codec/librealaudio_plugin\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) /usr/(.*/)?lib(64)?(/.*)?/nvidia/.+\.so(\..*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0) @@ -259,7 +259,7 @@ HOME_DIR/.*/plugins/nprhapengine\.so.* -- gen_context(system_u:object_r:textrel_ /usr/lib(64)?/libdivxdecore\.so\.0 -- gen_context(system_u:object_r:textrel_shlib_t,s0) /usr/lib(64)?/libdivxencore\.so\.0 -- gen_context(system_u:object_r:textrel_shlib_t,s0) -/usr/lib(64)?/libdvdcss\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0) +/usr/lib(64)?/libdvdcss\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0) /usr/lib(64)?/python2.4/site-packages/M2Crypto/__m2crypto\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) diff --git a/policy/modules/system/libraries.if b/policy/modules/system/libraries.if index 7c9b27b9..ab261bea 100644 --- a/policy/modules/system/libraries.if +++ b/policy/modules/system/libraries.if @@ -16,7 +16,7 @@ interface(`libs_domtrans_ldconfig',` ') corecmd_search_bin($1) - domtrans_pattern($1,ldconfig_exec_t,ldconfig_t) + domtrans_pattern($1, ldconfig_exec_t, ldconfig_t) ') ######################################## @@ -63,8 +63,8 @@ interface(`libs_use_ld_so',` files_list_etc($1) allow $1 lib_t:dir list_dir_perms; - read_lnk_files_pattern($1,lib_t,{ lib_t ld_so_t }) - mmap_files_pattern($1,lib_t,ld_so_t) + read_lnk_files_pattern($1, lib_t, { lib_t ld_so_t }) + mmap_files_pattern($1, lib_t, ld_so_t) allow $1 ld_so_cache_t:file read_file_perms; ') @@ -106,8 +106,8 @@ interface(`libs_exec_ld_so',` ') allow $1 lib_t:dir list_dir_perms; - read_lnk_files_pattern($1,lib_t,{ lib_t ld_so_t }) - exec_files_pattern($1,lib_t,ld_so_t) + read_lnk_files_pattern($1, lib_t, { lib_t ld_so_t }) + exec_files_pattern($1, lib_t, ld_so_t) ') ######################################## @@ -127,7 +127,7 @@ interface(`libs_manage_ld_so',` type lib_t, ld_so_t; ') - manage_files_pattern($1,lib_t,ld_so_t) + manage_files_pattern($1, lib_t, ld_so_t) ') ######################################## @@ -147,7 +147,7 @@ interface(`libs_relabel_ld_so',` type lib_t, ld_so_t; ') - relabel_files_pattern($1,lib_t,ld_so_t) + relabel_files_pattern($1, lib_t, ld_so_t) ') ######################################## @@ -248,9 +248,9 @@ interface(`libs_read_lib_files',` ') files_search_usr($1) - list_dirs_pattern($1,lib_t,lib_t) - read_files_pattern($1,lib_t,lib_t) - read_lnk_files_pattern($1,lib_t,lib_t) + list_dirs_pattern($1, lib_t, lib_t) + read_files_pattern($1, lib_t, lib_t) + read_lnk_files_pattern($1, lib_t, lib_t) ') ######################################## @@ -270,8 +270,8 @@ interface(`libs_exec_lib_files',` files_search_usr($1) allow $1 lib_t:dir list_dir_perms; - read_lnk_files_pattern($1,lib_t,lib_t) - exec_files_pattern($1,lib_t,lib_t) + read_lnk_files_pattern($1, lib_t, lib_t) + exec_files_pattern($1, lib_t, lib_t) ') ######################################## @@ -307,7 +307,7 @@ interface(`libs_manage_lib_files',` type lib_t; ') - manage_files_pattern($1,lib_t,lib_t) + manage_files_pattern($1, lib_t, lib_t) ') ######################################## @@ -325,7 +325,7 @@ interface(`libs_relabelto_lib_files',` type lib_t; ') - relabelto_files_pattern($1,lib_t,lib_t) + relabelto_files_pattern($1, lib_t, lib_t) ') ######################################## @@ -345,7 +345,7 @@ interface(`libs_relabel_lib_files',` type lib_t; ') - relabel_files_pattern($1,lib_t,lib_t) + relabel_files_pattern($1, lib_t, lib_t) ') ######################################## @@ -364,7 +364,7 @@ interface(`libs_delete_lib_symlinks',` type lib_t; ') - delete_lnk_files_pattern($1,lib_t,lib_t) + delete_lnk_files_pattern($1, lib_t, lib_t) ') ######################################## @@ -383,7 +383,7 @@ interface(`libs_manage_shared_libs',` type lib_t, textrel_shlib_t; ') - manage_files_pattern($1,lib_t,{ lib_t textrel_shlib_t }) + manage_files_pattern($1, lib_t, { lib_t textrel_shlib_t }) ') ######################################## @@ -403,8 +403,8 @@ interface(`libs_use_shared_libs',` files_list_usr($1) allow $1 lib_t:dir list_dir_perms; - read_lnk_files_pattern($1,lib_t,{ lib_t textrel_shlib_t }) - mmap_files_pattern($1,lib_t,{ lib_t textrel_shlib_t }) + read_lnk_files_pattern($1, lib_t, { lib_t textrel_shlib_t }) + mmap_files_pattern($1, lib_t, { lib_t textrel_shlib_t }) allow $1 textrel_shlib_t:file execmod; ') @@ -445,7 +445,7 @@ interface(`libs_relabel_shared_libs',` type lib_t, textrel_shlib_t; ') - relabel_files_pattern($1,lib_t,{ lib_t textrel_shlib_t }) + relabel_files_pattern($1, lib_t, { lib_t textrel_shlib_t }) ') ######################################## diff --git a/policy/modules/system/libraries.te b/policy/modules/system/libraries.te index 7416e51c..185a7d1f 100644 --- a/policy/modules/system/libraries.te +++ b/policy/modules/system/libraries.te @@ -20,7 +20,7 @@ files_type(ld_so_t) type ldconfig_t; type ldconfig_exec_t; -init_system_domain(ldconfig_t,ldconfig_exec_t) +init_system_domain(ldconfig_t, ldconfig_exec_t) role system_r types ldconfig_t; type ldconfig_cache_t; @@ -57,14 +57,14 @@ allow ldconfig_t self:capability sys_chroot; manage_files_pattern(ldconfig_t, ldconfig_cache_t, ldconfig_cache_t) allow ldconfig_t ld_so_cache_t:file manage_file_perms; -files_etc_filetrans(ldconfig_t,ld_so_cache_t,file) +files_etc_filetrans(ldconfig_t, ld_so_cache_t, file) -manage_dirs_pattern(ldconfig_t,ldconfig_tmp_t,ldconfig_tmp_t) -manage_files_pattern(ldconfig_t,ldconfig_tmp_t,ldconfig_tmp_t) -manage_lnk_files_pattern(ldconfig_t,ldconfig_tmp_t,ldconfig_tmp_t) +manage_dirs_pattern(ldconfig_t, ldconfig_tmp_t, ldconfig_tmp_t) +manage_files_pattern(ldconfig_t, ldconfig_tmp_t, ldconfig_tmp_t) +manage_lnk_files_pattern(ldconfig_t, ldconfig_tmp_t, ldconfig_tmp_t) files_tmp_filetrans(ldconfig_t, ldconfig_tmp_t, { file dir lnk_file }) -manage_lnk_files_pattern(ldconfig_t,lib_t,lib_t) +manage_lnk_files_pattern(ldconfig_t, lib_t, lib_t) kernel_read_system_state(ldconfig_t) diff --git a/policy/modules/system/locallogin.if b/policy/modules/system/locallogin.if index 447fe0b7..37292fd7 100644 --- a/policy/modules/system/locallogin.if +++ b/policy/modules/system/locallogin.if @@ -15,10 +15,10 @@ interface(`locallogin_domtrans',` type local_login_t; ') - auth_domtrans_login_program($1,local_login_t) + auth_domtrans_login_program($1, local_login_t) ifdef(`enable_mcs',` - auth_ranged_domtrans_login_program($1,local_login_t,s0 - mcs_systemhigh) + auth_ranged_domtrans_login_program($1, local_login_t, s0 - mcs_systemhigh) ') ') @@ -127,5 +127,5 @@ interface(`locallogin_domtrans_sulogin',` type sulogin_exec_t, sulogin_t; ') - domtrans_pattern($1,sulogin_exec_t,sulogin_t) + domtrans_pattern($1, sulogin_exec_t, sulogin_t) ') diff --git a/policy/modules/system/locallogin.te b/policy/modules/system/locallogin.te index 6a9b4142..10889513 100644 --- a/policy/modules/system/locallogin.te +++ b/policy/modules/system/locallogin.te @@ -24,8 +24,8 @@ domain_obj_id_change_exemption(sulogin_t) domain_subj_id_change_exemption(sulogin_t) domain_role_change_exemption(sulogin_t) domain_interactive_fd(sulogin_t) -init_domain(sulogin_t,sulogin_exec_t) -init_system_domain(sulogin_t,sulogin_exec_t) +init_domain(sulogin_t, sulogin_exec_t) +init_system_domain(sulogin_t, sulogin_exec_t) role system_r types sulogin_t; ######################################## @@ -50,7 +50,7 @@ allow local_login_t self:msg { send receive }; allow local_login_t self:key { search write link }; allow local_login_t local_login_lock_t:file manage_file_perms; -files_lock_filetrans(local_login_t,local_login_lock_t,file) +files_lock_filetrans(local_login_t, local_login_lock_t, file) allow local_login_t local_login_tmp_t:dir manage_dir_perms; allow local_login_t local_login_tmp_t:file manage_file_perms; diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if index 59fa98b8..e93c3449 100644 --- a/policy/modules/system/logging.if +++ b/policy/modules/system/logging.if @@ -99,7 +99,7 @@ interface(`logging_read_audit_log',` ') files_search_var($1) - read_files_pattern($1,auditd_log_t,auditd_log_t) + read_files_pattern($1, auditd_log_t, auditd_log_t) allow $1 auditd_log_t:dir list_dir_perms; ') @@ -118,7 +118,7 @@ interface(`logging_domtrans_auditctl',` type auditctl_t, auditctl_exec_t; ') - domtrans_pattern($1,auditctl_exec_t,auditctl_t) + domtrans_pattern($1, auditctl_exec_t, auditctl_t) ') ######################################## @@ -162,7 +162,7 @@ interface(`logging_domtrans_auditd',` type auditd_t, auditd_exec_t; ') - domtrans_pattern($1,auditd_exec_t,auditd_t) + domtrans_pattern($1, auditd_exec_t, auditd_t) ') ######################################## @@ -311,7 +311,7 @@ interface(`logging_manage_audit_config',` ') files_search_etc($1) - manage_files_pattern($1,auditd_etc_t,auditd_etc_t) + manage_files_pattern($1, auditd_etc_t, auditd_etc_t) ') ######################################## @@ -331,8 +331,8 @@ interface(`logging_manage_audit_log',` ') files_search_var($1) - manage_dirs_pattern($1,auditd_log_t,auditd_log_t) - manage_files_pattern($1,auditd_log_t,auditd_log_t) + manage_dirs_pattern($1, auditd_log_t, auditd_log_t) + manage_files_pattern($1, auditd_log_t, auditd_log_t) ') ######################################## @@ -351,7 +351,7 @@ interface(`logging_domtrans_klog',` ') corecmd_search_bin($1) - domtrans_pattern($1,klogd_exec_t,klogd_t) + domtrans_pattern($1, klogd_exec_t, klogd_t) ') ######################################## @@ -390,7 +390,7 @@ interface(`logging_domtrans_syslog',` ') corecmd_search_bin($1) - domtrans_pattern($1,syslogd_exec_t,syslogd_t) + domtrans_pattern($1, syslogd_exec_t, syslogd_t) ') ######################################## @@ -420,7 +420,7 @@ interface(`logging_log_filetrans',` ') files_search_var($1) - filetrans_pattern($1,var_log_t,$2,$3) + filetrans_pattern($1, var_log_t, $2, $3) ') ######################################## @@ -468,7 +468,7 @@ interface(`logging_read_audit_config',` ') files_search_etc($1) - read_files_pattern($1,auditd_etc_t,auditd_etc_t) + read_files_pattern($1, auditd_etc_t, auditd_etc_t) allow $1 auditd_etc_t:dir list_dir_perms; ') @@ -666,7 +666,7 @@ interface(`logging_exec_all_logs',` files_search_var($1) allow $1 logfile:dir list_dir_perms; - can_exec($1,logfile) + can_exec($1, logfile) ') ######################################## @@ -705,8 +705,8 @@ interface(`logging_manage_all_logs',` ') files_search_var($1) - manage_files_pattern($1,logfile,logfile) - read_lnk_files_pattern($1,logfile,logfile) + manage_files_pattern($1, logfile, logfile) + read_lnk_files_pattern($1, logfile, logfile) ') ######################################## @@ -727,7 +727,7 @@ interface(`logging_read_generic_logs',` files_search_var($1) allow $1 var_log_t:dir list_dir_perms; - read_files_pattern($1,var_log_t,var_log_t) + read_files_pattern($1, var_log_t, var_log_t) ') ######################################## @@ -747,7 +747,7 @@ interface(`logging_write_generic_logs',` files_search_var($1) allow $1 var_log_t:dir list_dir_perms; - write_files_pattern($1,var_log_t,var_log_t) + write_files_pattern($1, var_log_t, var_log_t) ') ######################################## @@ -785,7 +785,7 @@ interface(`logging_rw_generic_logs',` files_search_var($1) allow $1 var_log_t:dir list_dir_perms; - rw_files_pattern($1,var_log_t,var_log_t) + rw_files_pattern($1, var_log_t, var_log_t) ') ######################################## @@ -806,7 +806,7 @@ interface(`logging_manage_generic_logs',` ') files_search_var($1) - manage_files_pattern($1,var_log_t,var_log_t) + manage_files_pattern($1, var_log_t, var_log_t) ') ######################################## diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te index 20132d7e..d2fe3b76 100644 --- a/policy/modules/system/logging.te +++ b/policy/modules/system/logging.te @@ -10,7 +10,7 @@ attribute logfile; type auditctl_t; type auditctl_exec_t; -init_system_domain(auditctl_t,auditctl_exec_t) +init_system_domain(auditctl_t, auditctl_exec_t) role system_r types auditctl_t; type auditd_etc_t; @@ -22,7 +22,7 @@ files_security_mountpoint(auditd_log_t) type auditd_t; type auditd_exec_t; -init_daemon_domain(auditd_t,auditd_exec_t) +init_daemon_domain(auditd_t, auditd_exec_t) type auditd_initrc_exec_t; init_script_file(auditd_initrc_exec_t) @@ -47,7 +47,7 @@ mls_trusted_object(devlog_t) type klogd_t; type klogd_exec_t; -init_daemon_domain(klogd_t,klogd_exec_t) +init_daemon_domain(klogd_t, klogd_exec_t) type klogd_tmp_t; files_tmp_file(klogd_tmp_t) @@ -60,7 +60,7 @@ files_type(syslog_conf_t) type syslogd_t; type syslogd_exec_t; -init_daemon_domain(syslogd_t,syslogd_exec_t) +init_daemon_domain(syslogd_t, syslogd_exec_t) type syslogd_initrc_exec_t; init_script_file(syslogd_initrc_exec_t) @@ -91,7 +91,7 @@ ifdef(`enable_mls',` allow auditctl_t self:capability { fsetid dac_read_search dac_override }; allow auditctl_t self:netlink_audit_socket nlmsg_readpriv; -read_files_pattern(auditctl_t,auditd_etc_t,auditd_etc_t) +read_files_pattern(auditctl_t, auditd_etc_t, auditd_etc_t) allow auditctl_t auditd_etc_t:dir list_dir_perms; # Needed for adding watches @@ -132,13 +132,13 @@ allow auditd_t self:tcp_socket create_stream_socket_perms; allow auditd_t auditd_etc_t:dir list_dir_perms; allow auditd_t auditd_etc_t:file read_file_perms; -manage_files_pattern(auditd_t,auditd_log_t,auditd_log_t) -manage_lnk_files_pattern(auditd_t,auditd_log_t,auditd_log_t) +manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t) +manage_lnk_files_pattern(auditd_t, auditd_log_t, auditd_log_t) allow auditd_t var_log_t:dir search_dir_perms; -manage_files_pattern(auditd_t,auditd_var_run_t,auditd_var_run_t) -manage_sock_files_pattern(auditd_t,auditd_var_run_t,auditd_var_run_t) -files_pid_filetrans(auditd_t,auditd_var_run_t,{ file sock_file }) +manage_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t) +manage_sock_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t) +files_pid_filetrans(auditd_t, auditd_var_run_t, { file sock_file }) kernel_read_kernel_sysctls(auditd_t) # Needs to be able to run dispatcher. see /etc/audit/auditd.conf @@ -271,12 +271,12 @@ allow klogd_t self:capability sys_admin; dontaudit klogd_t self:capability { sys_resource sys_tty_config }; allow klogd_t self:process signal_perms; -manage_dirs_pattern(klogd_t,klogd_tmp_t,klogd_tmp_t) -manage_files_pattern(klogd_t,klogd_tmp_t,klogd_tmp_t) -files_tmp_filetrans(klogd_t,klogd_tmp_t,{ file dir }) +manage_dirs_pattern(klogd_t, klogd_tmp_t, klogd_tmp_t) +manage_files_pattern(klogd_t, klogd_tmp_t, klogd_tmp_t) +files_tmp_filetrans(klogd_t, klogd_tmp_t,{ file dir }) -manage_files_pattern(klogd_t,klogd_var_run_t,klogd_var_run_t) -files_pid_filetrans(klogd_t,klogd_var_run_t,file) +manage_files_pattern(klogd_t, klogd_var_run_t, klogd_var_run_t) +files_pid_filetrans(klogd_t, klogd_var_run_t, file) kernel_read_system_state(klogd_t) kernel_read_messages(klogd_t) @@ -345,29 +345,29 @@ allow syslogd_t syslog_conf_t:file read_file_perms; # Create and bind to /dev/log or /var/run/log. allow syslogd_t devlog_t:sock_file manage_sock_file_perms; -files_pid_filetrans(syslogd_t,devlog_t,sock_file) +files_pid_filetrans(syslogd_t, devlog_t, sock_file) # create/append log files. -manage_files_pattern(syslogd_t,var_log_t,var_log_t) -rw_fifo_files_pattern(syslogd_t,var_log_t,var_log_t) +manage_files_pattern(syslogd_t, var_log_t, var_log_t) +rw_fifo_files_pattern(syslogd_t, var_log_t, var_log_t) # Allow access for syslog-ng allow syslogd_t var_log_t:dir { create setattr }; # manage temporary files -manage_dirs_pattern(syslogd_t,syslogd_tmp_t,syslogd_tmp_t) -manage_files_pattern(syslogd_t,syslogd_tmp_t,syslogd_tmp_t) -files_tmp_filetrans(syslogd_t,syslogd_tmp_t,{ dir file }) +manage_dirs_pattern(syslogd_t, syslogd_tmp_t, syslogd_tmp_t) +manage_files_pattern(syslogd_t, syslogd_tmp_t, syslogd_tmp_t) +files_tmp_filetrans(syslogd_t, syslogd_tmp_t, { dir file }) manage_files_pattern(syslogd_t, syslogd_var_lib_t, syslogd_var_lib_t) files_search_var_lib(syslogd_t) allow syslogd_t syslogd_var_run_t:file manage_file_perms; -files_pid_filetrans(syslogd_t,syslogd_var_run_t,file) +files_pid_filetrans(syslogd_t, syslogd_var_run_t, file) # manage pid file -manage_files_pattern(syslogd_t,syslogd_var_run_t,syslogd_var_run_t) -files_pid_filetrans(syslogd_t,syslogd_var_run_t,file) +manage_files_pattern(syslogd_t, syslogd_var_run_t, syslogd_var_run_t) +files_pid_filetrans(syslogd_t, syslogd_var_run_t, file) kernel_read_system_state(syslogd_t) kernel_read_kernel_sysctls(syslogd_t) @@ -403,7 +403,7 @@ corenet_sendrecv_syslogd_server_packets(syslogd_t) corenet_sendrecv_postgresql_client_packets(syslogd_t) corenet_sendrecv_mysqld_client_packets(syslogd_t) -dev_filetrans(syslogd_t,devlog_t,sock_file) +dev_filetrans(syslogd_t, devlog_t, sock_file) dev_read_sysfs(syslogd_t) domain_use_interactive_fds(syslogd_t) @@ -451,7 +451,7 @@ ifdef(`distro_gentoo',` ifdef(`distro_suse',` # suse creates a /dev/log under /var/lib/stunnel for chrooted stunnel - files_var_lib_filetrans(syslogd_t,devlog_t,sock_file) + files_var_lib_filetrans(syslogd_t, devlog_t, sock_file) ') ifdef(`distro_ubuntu',` diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te index 224131e8..5e6ef6d7 100644 --- a/policy/modules/system/lvm.te +++ b/policy/modules/system/lvm.te @@ -46,7 +46,7 @@ files_tmp_file(lvm_tmp_t) allow clvmd_t self:capability { sys_nice chown ipc_lock sys_admin mknod }; dontaudit clvmd_t self:capability sys_tty_config; -allow clvmd_t self:process { signal_perms setsched }; +allow clvmd_t self:process { signal_perms setsched }; dontaudit clvmd_t self:process ptrace; allow clvmd_t self:socket create_socket_perms; allow clvmd_t self:fifo_file rw_fifo_file_perms; diff --git a/policy/modules/system/miscfiles.if b/policy/modules/system/miscfiles.if index 5ef7e510..428ce71e 100644 --- a/policy/modules/system/miscfiles.if +++ b/policy/modules/system/miscfiles.if @@ -17,8 +17,8 @@ interface(`miscfiles_read_certs',` ') allow $1 cert_t:dir list_dir_perms; - read_files_pattern($1,cert_t,cert_t) - read_lnk_files_pattern($1,cert_t,cert_t) + read_files_pattern($1, cert_t, cert_t) + read_lnk_files_pattern($1, cert_t, cert_t) ') ######################################## @@ -81,8 +81,8 @@ interface(`miscfiles_read_fonts',` libs_search_lib($1) allow $1 fonts_t:dir list_dir_perms; - read_files_pattern($1,fonts_t,fonts_t) - read_lnk_files_pattern($1,fonts_t,fonts_t) + read_files_pattern($1, fonts_t, fonts_t) + read_lnk_files_pattern($1, fonts_t, fonts_t) ') ######################################## @@ -125,9 +125,9 @@ interface(`miscfiles_manage_fonts',` files_search_usr($1) libs_search_lib($1) - manage_dirs_pattern($1,fonts_t,fonts_t) - manage_files_pattern($1,fonts_t,fonts_t) - manage_lnk_files_pattern($1,fonts_t,fonts_t) + manage_dirs_pattern($1, fonts_t, fonts_t) + manage_files_pattern($1, fonts_t, fonts_t) + manage_lnk_files_pattern($1, fonts_t, fonts_t) ') ######################################## @@ -146,8 +146,8 @@ interface(`miscfiles_read_hwdata',` ') allow $1 hwdata_t:dir list_dir_perms; - read_files_pattern($1,hwdata_t,hwdata_t) - read_lnk_files_pattern($1,hwdata_t,hwdata_t) + read_files_pattern($1, hwdata_t, hwdata_t) + read_lnk_files_pattern($1, hwdata_t, hwdata_t) ') ######################################## @@ -188,8 +188,8 @@ interface(`miscfiles_read_localization',` files_read_etc_symlinks($1) files_search_usr($1) allow $1 locale_t:dir list_dir_perms; - read_files_pattern($1,locale_t,locale_t) - read_lnk_files_pattern($1,locale_t,locale_t) + read_files_pattern($1, locale_t, locale_t) + read_lnk_files_pattern($1, locale_t, locale_t) # why? libs_read_lib_files($1) @@ -212,7 +212,7 @@ interface(`miscfiles_rw_localization',` files_search_usr($1) allow $1 locale_t:dir list_dir_perms; - rw_files_pattern($1,locale_t,locale_t) + rw_files_pattern($1, locale_t, locale_t) ') ######################################## @@ -231,7 +231,7 @@ interface(`miscfiles_relabel_localization',` ') files_search_usr($1) - relabel_files_pattern($1,locale_t,locale_t) + relabel_files_pattern($1, locale_t, locale_t) ') ######################################## @@ -289,8 +289,8 @@ interface(`miscfiles_read_man_pages',` files_search_usr($1) allow $1 man_t:dir list_dir_perms; - read_files_pattern($1,man_t,man_t) - read_lnk_files_pattern($1,man_t,man_t) + read_files_pattern($1, man_t, man_t) + read_lnk_files_pattern($1, man_t, man_t) ') ######################################## @@ -314,9 +314,9 @@ interface(`miscfiles_delete_man_pages',` allow $1 man_t:dir setattr; # RH bug #309351 allow $1 man_t:dir list_dir_perms; - delete_dirs_pattern($1,man_t,man_t) - delete_files_pattern($1,man_t,man_t) - delete_lnk_files_pattern($1,man_t,man_t) + delete_dirs_pattern($1, man_t, man_t) + delete_files_pattern($1, man_t, man_t) + delete_lnk_files_pattern($1, man_t, man_t) ') ######################################## @@ -335,9 +335,9 @@ interface(`miscfiles_manage_man_pages',` ') files_search_usr($1) - manage_dirs_pattern($1,man_t,man_t) - manage_files_pattern($1,man_t,man_t) - read_lnk_files_pattern($1,man_t,man_t) + manage_dirs_pattern($1, man_t, man_t) + manage_files_pattern($1, man_t, man_t) + read_lnk_files_pattern($1, man_t, man_t) ') ######################################## @@ -379,9 +379,9 @@ interface(`miscfiles_manage_public_files',` type public_content_rw_t; ') - manage_dirs_pattern($1,public_content_rw_t,public_content_rw_t) - manage_files_pattern($1,public_content_rw_t,public_content_rw_t) - manage_lnk_files_pattern($1,public_content_rw_t,public_content_rw_t) + manage_dirs_pattern($1, public_content_rw_t, public_content_rw_t) + manage_files_pattern($1, public_content_rw_t, public_content_rw_t) + manage_lnk_files_pattern($1, public_content_rw_t, public_content_rw_t) ') ######################################## @@ -404,8 +404,8 @@ interface(`miscfiles_read_tetex_data',` # cjp: TeX data can be in either of the above dirs allow $1 tetex_data_t:dir list_dir_perms; - read_files_pattern($1,tetex_data_t,tetex_data_t) - read_lnk_files_pattern($1,tetex_data_t,tetex_data_t) + read_files_pattern($1, tetex_data_t, tetex_data_t) + read_lnk_files_pattern($1, tetex_data_t, tetex_data_t) ') ######################################## @@ -429,7 +429,7 @@ interface(`miscfiles_exec_tetex_data',` # cjp: TeX data can be in either of the above dirs allow $1 tetex_data_t:dir list_dir_perms; - exec_files_pattern($1,tetex_data_t,tetex_data_t) + exec_files_pattern($1, tetex_data_t, tetex_data_t) ') ######################################## @@ -466,8 +466,8 @@ interface(`miscfiles_read_test_files',` type test_file_t; ') - read_files_pattern($1,test_file_t,test_file_t) - read_lnk_files_pattern($1,test_file_t,test_file_t) + read_files_pattern($1, test_file_t, test_file_t) + read_lnk_files_pattern($1, test_file_t, test_file_t) ') ######################################## @@ -485,8 +485,8 @@ interface(`miscfiles_exec_test_files',` type test_file_t; ') - exec_files_pattern($1,test_file_t,test_file_t) - read_lnk_files_pattern($1,test_file_t,test_file_t) + exec_files_pattern($1, test_file_t, test_file_t) + read_lnk_files_pattern($1, test_file_t, test_file_t) ') ######################################## @@ -524,8 +524,8 @@ interface(`miscfiles_manage_localization',` type locale_t; ') - manage_dirs_pattern($1,locale_t,locale_t) - manage_files_pattern($1,locale_t,locale_t) - manage_lnk_files_pattern($1,locale_t,locale_t) + manage_dirs_pattern($1, locale_t, locale_t) + manage_files_pattern($1, locale_t, locale_t) + manage_lnk_files_pattern($1, locale_t, locale_t) ') diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te index 72508090..7a60d3c7 100644 --- a/policy/modules/system/modutils.te +++ b/policy/modules/system/modutils.te @@ -20,18 +20,18 @@ files_type(modules_dep_t) type insmod_t; type insmod_exec_t; -application_domain(insmod_t,insmod_exec_t) +application_domain(insmod_t, insmod_exec_t) mls_file_write_all_levels(insmod_t) role system_r types insmod_t; type depmod_t; type depmod_exec_t; -init_system_domain(depmod_t,depmod_exec_t) +init_system_domain(depmod_t, depmod_exec_t) role system_r types depmod_t; type update_modules_t; type update_modules_exec_t; -init_system_domain(update_modules_t,update_modules_exec_t) +init_system_domain(update_modules_t, update_modules_exec_t) role system_r types update_modules_t; type update_modules_tmp_t; @@ -118,7 +118,7 @@ ifdef(`distro_ubuntu',` ') if( ! secure_mode_insmod ) { - kernel_domtrans_to(insmod_t,insmod_exec_t) + kernel_domtrans_to(insmod_t, insmod_exec_t) } optional_policy(` @@ -178,7 +178,7 @@ can_exec(depmod_t, depmod_exec_t) allow depmod_t modules_conf_t:file read_file_perms; allow depmod_t modules_dep_t:file manage_file_perms; -files_kernel_modules_filetrans(depmod_t,modules_dep_t,file) +files_kernel_modules_filetrans(depmod_t, modules_dep_t, file) kernel_read_system_state(depmod_t) @@ -231,8 +231,8 @@ can_exec(update_modules_t, update_modules_exec_t) # manage module loading configuration allow update_modules_t modules_conf_t:file manage_file_perms; -files_kernel_modules_filetrans(update_modules_t,modules_conf_t,file) -files_etc_filetrans(update_modules_t,modules_conf_t,file) +files_kernel_modules_filetrans(update_modules_t, modules_conf_t, file) +files_etc_filetrans(update_modules_t, modules_conf_t, file) # transition to depmod domain_auto_trans(update_modules_t, depmod_exec_t, depmod_t) @@ -241,8 +241,8 @@ allow depmod_t update_modules_t:fd use; allow depmod_t update_modules_t:fifo_file rw_file_perms; allow depmod_t update_modules_t:process sigchld; -manage_dirs_pattern(update_modules_t,update_modules_tmp_t,update_modules_tmp_t) -manage_files_pattern(update_modules_t,update_modules_tmp_t,update_modules_tmp_t) +manage_dirs_pattern(update_modules_t, update_modules_tmp_t, update_modules_tmp_t) +manage_files_pattern(update_modules_t, update_modules_tmp_t, update_modules_tmp_t) files_tmp_filetrans(update_modules_t, update_modules_tmp_t, { file dir }) kernel_read_kernel_sysctls(update_modules_t) diff --git a/policy/modules/system/mount.if b/policy/modules/system/mount.if index 805bef09..bb547ea9 100644 --- a/policy/modules/system/mount.if +++ b/policy/modules/system/mount.if @@ -15,7 +15,7 @@ interface(`mount_domtrans',` type mount_t, mount_exec_t; ') - domtrans_pattern($1,mount_exec_t,mount_t) + domtrans_pattern($1, mount_exec_t, mount_t) ') ######################################## @@ -68,7 +68,7 @@ interface(`mount_exec',` allow $1 mount_exec_t:dir list_dir_perms; allow $1 mount_exec_t:lnk_file read_lnk_file_perms; - can_exec($1,mount_exec_t) + can_exec($1, mount_exec_t) ') ######################################## diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te index 5cf7a769..8d7d9fc0 100644 --- a/policy/modules/system/mount.te +++ b/policy/modules/system/mount.te @@ -11,11 +11,11 @@ policy_module(mount, 1.10.0) ## Allow the mount command to mount any directory or file. ##

## -gen_tunable(allow_mount_anyfile,false) +gen_tunable(allow_mount_anyfile, false) type mount_t; type mount_exec_t; -init_system_domain(mount_t,mount_exec_t) +init_system_domain(mount_t, mount_exec_t) role system_r types mount_t; type mount_loopback_t; # customizable @@ -28,7 +28,7 @@ files_tmp_file(mount_tmp_t) # this is optionally declared in monolithic # policy--duplicate type declaration type unconfined_mount_t; -application_domain(unconfined_mount_t,mount_exec_t) +application_domain(unconfined_mount_t, mount_exec_t) ######################################## # @@ -45,7 +45,7 @@ allow mount_t mount_tmp_t:dir manage_dir_perms; can_exec(mount_t, mount_exec_t) -files_tmp_filetrans(mount_t,mount_tmp_t,{ file dir }) +files_tmp_filetrans(mount_t, mount_tmp_t, { file dir }) kernel_read_system_state(mount_t) kernel_read_kernel_sysctls(mount_t) @@ -83,7 +83,7 @@ domain_use_interactive_fds(mount_t) files_search_all(mount_t) files_read_etc_files(mount_t) files_manage_etc_runtime_files(mount_t) -files_etc_filetrans_etc_runtime(mount_t,file) +files_etc_filetrans_etc_runtime(mount_t, file) files_mounton_all_mountpoints(mount_t) files_unmount_rootfs(mount_t) # These rules need to be generalized. Only admin, initrc should have it: @@ -193,6 +193,6 @@ optional_policy(` # optional_policy(` - files_etc_filetrans_etc_runtime(unconfined_mount_t,file) + files_etc_filetrans_etc_runtime(unconfined_mount_t, file) unconfined_domain(unconfined_mount_t) ') diff --git a/policy/modules/system/netlabel.if b/policy/modules/system/netlabel.if index 55b158bb..b37cd5bc 100644 --- a/policy/modules/system/netlabel.if +++ b/policy/modules/system/netlabel.if @@ -16,7 +16,7 @@ interface(`netlabel_domtrans_mgmt',` ') corecmd_search_bin($1) - domtrans_pattern($1,netlabel_mgmt_exec_t,netlabel_mgmt_t) + domtrans_pattern($1, netlabel_mgmt_exec_t, netlabel_mgmt_t) ') ######################################## diff --git a/policy/modules/system/netlabel.te b/policy/modules/system/netlabel.te index 44470b36..e98925f0 100644 --- a/policy/modules/system/netlabel.te +++ b/policy/modules/system/netlabel.te @@ -8,7 +8,7 @@ policy_module(netlabel, 1.3.0) type netlabel_mgmt_t; type netlabel_mgmt_exec_t; -application_domain(netlabel_mgmt_t,netlabel_mgmt_exec_t) +application_domain(netlabel_mgmt_t, netlabel_mgmt_exec_t) role system_r types netlabel_mgmt_t; ######################################## diff --git a/policy/modules/system/pcmcia.if b/policy/modules/system/pcmcia.if index 5f63c3ad..ac2b18b8 100644 --- a/policy/modules/system/pcmcia.if +++ b/policy/modules/system/pcmcia.if @@ -31,7 +31,7 @@ interface(`pcmcia_domtrans_cardmgr',` type cardmgr_t, cardmgr_exec_t; ') - domtrans_pattern($1,cardmgr_exec_t,cardmgr_t) + domtrans_pattern($1, cardmgr_exec_t, cardmgr_t) ') ######################################## @@ -67,7 +67,7 @@ interface(`pcmcia_domtrans_cardctl',` type cardmgr_t, cardctl_exec_t; ') - domtrans_pattern($1,cardctl_exec_t,cardmgr_t) + domtrans_pattern($1, cardctl_exec_t, cardmgr_t) ') ######################################## @@ -112,7 +112,7 @@ interface(`pcmcia_read_pid',` ') files_search_pids($1) - read_files_pattern($1,cardmgr_var_run_t,cardmgr_var_run_t) + read_files_pattern($1, cardmgr_var_run_t, cardmgr_var_run_t) ') ######################################## @@ -132,7 +132,7 @@ interface(`pcmcia_manage_pid',` ') files_search_pids($1) - manage_files_pattern($1,cardmgr_var_run_t,cardmgr_var_run_t) + manage_files_pattern($1, cardmgr_var_run_t, cardmgr_var_run_t) ') ######################################## @@ -152,5 +152,5 @@ interface(`pcmcia_manage_pid_chr_files',` ') files_search_pids($1) - manage_chr_files_pattern($1,cardmgr_var_run_t,cardmgr_var_run_t) + manage_chr_files_pattern($1, cardmgr_var_run_t, cardmgr_var_run_t) ') diff --git a/policy/modules/system/pcmcia.te b/policy/modules/system/pcmcia.te index 5afa0940..4f2324dd 100644 --- a/policy/modules/system/pcmcia.te +++ b/policy/modules/system/pcmcia.te @@ -8,7 +8,7 @@ policy_module(pcmcia, 1.6.0) type cardmgr_t; type cardmgr_exec_t; -init_daemon_domain(cardmgr_t,cardmgr_exec_t) +init_daemon_domain(cardmgr_t, cardmgr_exec_t) # Create symbolic links in /dev. # cjp: this should probably be eliminated @@ -22,7 +22,7 @@ type cardmgr_var_run_t; files_pid_file(cardmgr_var_run_t) type cardctl_exec_t; -application_domain(cardmgr_t,cardctl_exec_t) +application_domain(cardmgr_t, cardctl_exec_t) ######################################## # @@ -38,14 +38,14 @@ allow cardmgr_t self:unix_dgram_socket create_socket_perms; allow cardmgr_t self:unix_stream_socket create_socket_perms; allow cardmgr_t cardmgr_lnk_t:lnk_file manage_lnk_file_perms; -dev_filetrans(cardmgr_t,cardmgr_lnk_t,lnk_file) +dev_filetrans(cardmgr_t, cardmgr_lnk_t, lnk_file) # Create stab file -manage_files_pattern(cardmgr_t,cardmgr_var_lib_t,cardmgr_var_lib_t) -files_var_lib_filetrans(cardmgr_t,cardmgr_var_lib_t,file) +manage_files_pattern(cardmgr_t, cardmgr_var_lib_t, cardmgr_var_lib_t) +files_var_lib_filetrans(cardmgr_t, cardmgr_var_lib_t, file) allow cardmgr_t cardmgr_var_run_t:file manage_file_perms; -files_pid_filetrans(cardmgr_t,cardmgr_var_run_t,file) +files_pid_filetrans(cardmgr_t, cardmgr_var_run_t, file) kernel_read_system_state(cardmgr_t) kernel_read_kernel_sysctls(cardmgr_t) diff --git a/policy/modules/system/raid.if b/policy/modules/system/raid.if index 849f921b..b3c7bfbc 100644 --- a/policy/modules/system/raid.if +++ b/policy/modules/system/raid.if @@ -16,7 +16,7 @@ interface(`raid_domtrans_mdadm',` ') corecmd_search_bin($1) - domtrans_pattern($1,mdadm_exec_t,mdadm_t) + domtrans_pattern($1, mdadm_exec_t, mdadm_t) ') ######################################## diff --git a/policy/modules/system/raid.te b/policy/modules/system/raid.te index ea5b7be9..91f12595 100644 --- a/policy/modules/system/raid.te +++ b/policy/modules/system/raid.te @@ -8,7 +8,7 @@ policy_module(raid, 1.8.1) type mdadm_t; type mdadm_exec_t; -init_daemon_domain(mdadm_t,mdadm_exec_t) +init_daemon_domain(mdadm_t, mdadm_exec_t) role system_r types mdadm_t; type mdadm_var_run_t; @@ -24,8 +24,8 @@ dontaudit mdadm_t self:capability sys_tty_config; allow mdadm_t self:process { sigchld sigkill sigstop signull signal }; allow mdadm_t self:fifo_file rw_fifo_file_perms; -manage_files_pattern(mdadm_t,mdadm_var_run_t,mdadm_var_run_t) -files_pid_filetrans(mdadm_t,mdadm_var_run_t,file) +manage_files_pattern(mdadm_t, mdadm_var_run_t, mdadm_var_run_t) +files_pid_filetrans(mdadm_t, mdadm_var_run_t, file) kernel_read_system_state(mdadm_t) kernel_read_kernel_sysctls(mdadm_t) diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if index f8b5d9c5..d01cffc6 100644 --- a/policy/modules/system/selinuxutil.if +++ b/policy/modules/system/selinuxutil.if @@ -17,7 +17,7 @@ interface(`seutil_domtrans_checkpolicy',` files_search_usr($1) corecmd_search_bin($1) - domtrans_pattern($1,checkpolicy_exec_t,checkpolicy_t) + domtrans_pattern($1, checkpolicy_exec_t, checkpolicy_t) ') ######################################## @@ -65,7 +65,7 @@ interface(`seutil_exec_checkpolicy',` files_search_usr($1) corecmd_search_bin($1) - can_exec($1,checkpolicy_exec_t) + can_exec($1, checkpolicy_exec_t) ') ####################################### @@ -84,7 +84,7 @@ interface(`seutil_domtrans_loadpolicy',` ') corecmd_search_bin($1) - domtrans_pattern($1,load_policy_exec_t,load_policy_t) + domtrans_pattern($1, load_policy_exec_t, load_policy_t) ') ######################################## @@ -130,7 +130,7 @@ interface(`seutil_exec_loadpolicy',` ') corecmd_search_bin($1) - can_exec($1,load_policy_exec_t) + can_exec($1, load_policy_exec_t) ') ######################################## @@ -169,7 +169,7 @@ interface(`seutil_domtrans_newrole',` files_search_usr($1) corecmd_search_bin($1) - domtrans_pattern($1,newrole_exec_t,newrole_t) + domtrans_pattern($1, newrole_exec_t, newrole_t) ') ######################################## @@ -218,7 +218,7 @@ interface(`seutil_exec_newrole',` files_search_usr($1) corecmd_search_bin($1) - can_exec($1,newrole_exec_t) + can_exec($1, newrole_exec_t) ') ######################################## @@ -366,7 +366,7 @@ interface(`seutil_domtrans_runinit',` files_search_usr($1) corecmd_search_bin($1) - domtrans_pattern($1,run_init_exec_t,run_init_t) + domtrans_pattern($1, run_init_exec_t, run_init_t) ') ######################################## @@ -390,7 +390,7 @@ interface(`seutil_init_script_domtrans_runinit',` type run_init_t; ') - init_script_file_domtrans($1,run_init_t) + init_script_file_domtrans($1, run_init_t) allow run_init_t $1:fd use; allow run_init_t $1:fifo_file rw_file_perms; @@ -503,7 +503,7 @@ interface(`seutil_domtrans_setfiles',` files_search_usr($1) corecmd_search_bin($1) - domtrans_pattern($1,setfiles_exec_t,setfiles_t) + domtrans_pattern($1, setfiles_exec_t, setfiles_t) ') ######################################## @@ -550,7 +550,7 @@ interface(`seutil_exec_setfiles',` files_search_usr($1) corecmd_search_bin($1) - can_exec($1,setfiles_exec_t) + can_exec($1, setfiles_exec_t) ') ######################################## @@ -610,8 +610,8 @@ interface(`seutil_read_config',` files_search_etc($1) allow $1 selinux_config_t:dir list_dir_perms; - read_files_pattern($1,selinux_config_t,selinux_config_t) - read_lnk_files_pattern($1,selinux_config_t,selinux_config_t) + read_files_pattern($1, selinux_config_t, selinux_config_t) + read_lnk_files_pattern($1, selinux_config_t, selinux_config_t) ') ######################################## @@ -632,7 +632,7 @@ interface(`seutil_rw_config',` files_search_etc($1) allow $1 selinux_config_t:dir list_dir_perms; - rw_files_pattern($1,selinux_config_t,selinux_config_t) + rw_files_pattern($1, selinux_config_t, selinux_config_t) ') ####################################### @@ -680,8 +680,8 @@ interface(`seutil_manage_config',` ') files_search_etc($1) - manage_files_pattern($1,selinux_config_t,selinux_config_t) - read_lnk_files_pattern($1,selinux_config_t,selinux_config_t) + manage_files_pattern($1, selinux_config_t, selinux_config_t) + read_lnk_files_pattern($1, selinux_config_t, selinux_config_t) ') ####################################### @@ -721,7 +721,7 @@ interface(`seutil_search_default_contexts',` ') files_search_etc($1) - search_dirs_pattern($1,selinux_config_t,default_context_t) + search_dirs_pattern($1, selinux_config_t, default_context_t) ') ######################################## @@ -743,7 +743,7 @@ interface(`seutil_read_default_contexts',` files_search_etc($1) allow $1 selinux_config_t:dir search_dir_perms; allow $1 default_context_t:dir list_dir_perms; - read_files_pattern($1,default_context_t,default_context_t) + read_files_pattern($1, default_context_t, default_context_t) ') ######################################## @@ -763,7 +763,7 @@ interface(`seutil_manage_default_contexts',` files_search_etc($1) allow $1 selinux_config_t:dir search_dir_perms; - manage_files_pattern($1,default_context_t,default_context_t) + manage_files_pattern($1, default_context_t, default_context_t) ') ######################################## @@ -784,7 +784,7 @@ interface(`seutil_read_file_contexts',` files_search_etc($1) allow $1 { selinux_config_t default_context_t }:dir search_dir_perms; - read_files_pattern($1,file_context_t,file_context_t) + read_files_pattern($1, file_context_t, file_context_t) ') ######################################## @@ -824,7 +824,7 @@ interface(`seutil_rw_file_contexts',` files_search_etc($1) allow $1 { selinux_config_t default_context_t }:dir search_dir_perms; - rw_files_pattern($1,file_context_t,file_context_t) + rw_files_pattern($1, file_context_t, file_context_t) ') ######################################## @@ -845,7 +845,7 @@ interface(`seutil_manage_file_contexts',` files_search_etc($1) allow $1 { selinux_config_t default_context_t }:dir search_dir_perms; - manage_files_pattern($1,file_context_t,file_context_t) + manage_files_pattern($1, file_context_t, file_context_t) ') ######################################## @@ -865,7 +865,7 @@ interface(`seutil_read_bin_policy',` files_search_etc($1) allow $1 selinux_config_t:dir search_dir_perms; - read_files_pattern($1,policy_config_t,policy_config_t) + read_files_pattern($1, policy_config_t, policy_config_t) ') ######################################## @@ -886,8 +886,8 @@ interface(`seutil_create_bin_policy',` files_search_etc($1) allow $1 selinux_config_t:dir search_dir_perms; - create_files_pattern($1,policy_config_t,policy_config_t) - write_files_pattern($1,policy_config_t,policy_config_t) + create_files_pattern($1, policy_config_t, policy_config_t) + write_files_pattern($1, policy_config_t, policy_config_t) # typeattribute $1 can_write_binary_policy; ') @@ -930,7 +930,7 @@ interface(`seutil_manage_bin_policy',` files_search_etc($1) allow $1 selinux_config_t:dir search_dir_perms; - manage_files_pattern($1,policy_config_t,policy_config_t) + manage_files_pattern($1, policy_config_t, policy_config_t) typeattribute $1 can_write_binary_policy; ') @@ -950,8 +950,8 @@ interface(`seutil_read_src_policy',` ') files_search_etc($1) - list_dirs_pattern($1,selinux_config_t,policy_src_t) - read_files_pattern($1,policy_src_t,policy_src_t) + list_dirs_pattern($1, selinux_config_t, policy_src_t) + read_files_pattern($1, policy_src_t, policy_src_t) ') ######################################## @@ -973,8 +973,8 @@ interface(`seutil_manage_src_policy',` files_search_etc($1) allow $1 selinux_config_t:dir search_dir_perms; - manage_dirs_pattern($1,policy_src_t,policy_src_t) - manage_files_pattern($1,policy_src_t,policy_src_t) + manage_dirs_pattern($1, policy_src_t, policy_src_t) + manage_files_pattern($1, policy_src_t, policy_src_t) ') ######################################## @@ -994,7 +994,7 @@ interface(`seutil_domtrans_semanage',` files_search_usr($1) corecmd_search_bin($1) - domtrans_pattern($1,semanage_exec_t,semanage_t) + domtrans_pattern($1, semanage_exec_t, semanage_t) ') ######################################## @@ -1043,9 +1043,9 @@ interface(`seutil_manage_module_store',` ') files_search_etc($1) - manage_dirs_pattern($1,selinux_config_t,semanage_store_t) - manage_files_pattern($1,semanage_store_t,semanage_store_t) - filetrans_pattern($1,selinux_config_t,semanage_store_t,dir) + manage_dirs_pattern($1, selinux_config_t, semanage_store_t) + manage_files_pattern($1, semanage_store_t, semanage_store_t) + filetrans_pattern($1, selinux_config_t, semanage_store_t, dir) ') ####################################### @@ -1064,7 +1064,7 @@ interface(`seutil_get_semanage_read_lock',` ') files_search_etc($1) - rw_files_pattern($1,selinux_config_t,semanage_read_lock_t) + rw_files_pattern($1, selinux_config_t, semanage_read_lock_t) ') ####################################### @@ -1083,7 +1083,7 @@ interface(`seutil_get_semanage_trans_lock',` ') files_search_etc($1) - rw_files_pattern($1,selinux_config_t,semanage_trans_lock_t) + rw_files_pattern($1, selinux_config_t, semanage_trans_lock_t) ') ######################################## diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te index 7815d4b7..f706ef01 100644 --- a/policy/modules/system/selinuxutil.te +++ b/policy/modules/system/selinuxutil.te @@ -44,12 +44,12 @@ files_type(file_context_t) type load_policy_t; type load_policy_exec_t; -application_domain(load_policy_t,load_policy_exec_t) +application_domain(load_policy_t, load_policy_exec_t) role system_r types load_policy_t; type newrole_t; type newrole_exec_t; -application_domain(newrole_t,newrole_exec_t) +application_domain(newrole_t, newrole_exec_t) domain_role_change_exemption(newrole_t) domain_obj_id_change_exemption(newrole_t) domain_interactive_fd(newrole_t) @@ -73,7 +73,7 @@ files_type(policy_src_t) type restorecond_t; type restorecond_exec_t; -init_daemon_domain(restorecond_t,restorecond_exec_t) +init_daemon_domain(restorecond_t, restorecond_exec_t) domain_obj_id_change_exemption(restorecond_t) role system_r types restorecond_t; @@ -82,13 +82,13 @@ files_pid_file(restorecond_var_run_t) type run_init_t; type run_init_exec_t; -application_domain(run_init_t,run_init_exec_t) +application_domain(run_init_t, run_init_exec_t) domain_system_change_exemption(run_init_t) role system_r types run_init_t; type semanage_t; type semanage_exec_t; -application_domain(semanage_t,semanage_exec_t) +application_domain(semanage_t, semanage_exec_t) domain_interactive_fd(semanage_t) role system_r types semanage_t; @@ -106,7 +106,7 @@ files_type(semanage_trans_lock_t) type setfiles_t alias restorecon_t, can_relabelto_binary_policy; type setfiles_exec_t alias restorecon_exec_t; -init_system_domain(setfiles_t,setfiles_exec_t) +init_system_domain(setfiles_t, setfiles_exec_t) domain_obj_id_change_exemption(setfiles_t) ######################################## @@ -117,14 +117,14 @@ domain_obj_id_change_exemption(setfiles_t) allow checkpolicy_t self:capability dac_override; # able to create and modify binary policy files -manage_files_pattern(checkpolicy_t,policy_config_t,policy_config_t) +manage_files_pattern(checkpolicy_t, policy_config_t, policy_config_t) # allow test policies to be created in src directories -filetrans_add_pattern(checkpolicy_t,policy_src_t,policy_config_t,file) +filetrans_add_pattern(checkpolicy_t, policy_src_t, policy_config_t, file) # only allow read of policy source files -read_files_pattern(checkpolicy_t,policy_src_t,policy_src_t) -read_lnk_files_pattern(checkpolicy_t,policy_src_t,policy_src_t) +read_files_pattern(checkpolicy_t, policy_src_t, policy_src_t) +read_lnk_files_pattern(checkpolicy_t, policy_src_t, policy_src_t) allow checkpolicy_t selinux_config_t:dir search_dir_perms; domain_use_interactive_fds(checkpolicy_t) @@ -219,8 +219,8 @@ allow newrole_t self:unix_dgram_socket sendto; allow newrole_t self:unix_stream_socket { create_stream_socket_perms connectto }; allow newrole_t self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay }; -read_files_pattern(newrole_t,default_context_t,default_context_t) -read_lnk_files_pattern(newrole_t,default_context_t,default_context_t) +read_files_pattern(newrole_t, default_context_t, default_context_t) +read_lnk_files_pattern(newrole_t, default_context_t, default_context_t) kernel_read_system_state(newrole_t) kernel_read_kernel_sysctls(newrole_t) @@ -307,7 +307,7 @@ allow restorecond_t self:capability { dac_override dac_read_search fowner }; allow restorecond_t self:fifo_file rw_fifo_file_perms; allow restorecond_t restorecond_var_run_t:file manage_file_perms; -files_pid_filetrans(restorecond_t,restorecond_var_run_t, file) +files_pid_filetrans(restorecond_t, restorecond_var_run_t, file) kernel_use_fds(restorecond_t) kernel_rw_pipes(restorecond_t) diff --git a/policy/modules/system/setrans.if b/policy/modules/system/setrans.if index b204eb87..dea7f557 100644 --- a/policy/modules/system/setrans.if +++ b/policy/modules/system/setrans.if @@ -18,6 +18,6 @@ interface(`setrans_translate_context',` allow $1 self:unix_stream_socket create_stream_socket_perms; allow $1 setrans_t:context translate; - stream_connect_pattern($1,setrans_var_run_t,setrans_var_run_t,setrans_t) + stream_connect_pattern($1, setrans_var_run_t, setrans_var_run_t, setrans_t) files_list_pids($1) ') diff --git a/policy/modules/system/setrans.te b/policy/modules/system/setrans.te index 2ddabe1a..e73af1d9 100644 --- a/policy/modules/system/setrans.te +++ b/policy/modules/system/setrans.te @@ -22,11 +22,11 @@ files_pid_file(setrans_var_run_t) mls_trusted_object(setrans_var_run_t) ifdef(`enable_mcs',` - init_ranged_daemon_domain(setrans_t, setrans_exec_t,s0 - mcs_systemhigh) + init_ranged_daemon_domain(setrans_t, setrans_exec_t, s0 - mcs_systemhigh) ') ifdef(`enable_mls',` - init_ranged_daemon_domain(setrans_t, setrans_exec_t,mls_systemhigh) + init_ranged_daemon_domain(setrans_t, setrans_exec_t, mls_systemhigh) ') ######################################## @@ -45,9 +45,9 @@ can_exec(setrans_t, setrans_exec_t) corecmd_search_bin(setrans_t) # create unix domain socket in /var -manage_files_pattern(setrans_t,setrans_var_run_t,setrans_var_run_t) -manage_sock_files_pattern(setrans_t,setrans_var_run_t,setrans_var_run_t) -files_pid_filetrans(setrans_t,setrans_var_run_t,file) +manage_files_pattern(setrans_t, setrans_var_run_t, setrans_var_run_t) +manage_sock_files_pattern(setrans_t, setrans_var_run_t, setrans_var_run_t) +files_pid_filetrans(setrans_t, setrans_var_run_t, file) kernel_read_kernel_sysctls(setrans_t) kernel_read_proc_symlinks(setrans_t) diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if index e2eb2fec..a0cd508a 100644 --- a/policy/modules/system/sysnetwork.if +++ b/policy/modules/system/sysnetwork.if @@ -305,7 +305,7 @@ interface(`sysnet_etc_filetrans_config',` type net_conf_t; ') - files_etc_filetrans($1,net_conf_t,file) + files_etc_filetrans($1, net_conf_t, file) ') ####################################### @@ -426,7 +426,7 @@ interface(`sysnet_exec_ifconfig',` ') corecmd_search_bin($1) - can_exec($1,ifconfig_exec_t) + can_exec($1, ifconfig_exec_t) ') ######################################## @@ -464,7 +464,7 @@ interface(`sysnet_read_dhcp_config',` ') files_search_etc($1) - read_files_pattern($1,dhcp_etc_t,dhcp_etc_t) + read_files_pattern($1, dhcp_etc_t, dhcp_etc_t) ') ######################################## @@ -522,7 +522,7 @@ interface(`sysnet_dhcp_state_filetrans',` ') files_search_var_lib($1) - filetrans_pattern($1,dhcp_state_t,$2,$3) + filetrans_pattern($1, dhcp_state_t, $2, $3) ') ######################################## diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te index 1fcc8964..86a860f1 100644 --- a/policy/modules/system/sysnetwork.te +++ b/policy/modules/system/sysnetwork.te @@ -17,7 +17,7 @@ files_type(dhcp_state_t) type dhcpc_t; type dhcpc_exec_t; -init_daemon_domain(dhcpc_t,dhcpc_exec_t) +init_daemon_domain(dhcpc_t, dhcpc_exec_t) role system_r types dhcpc_t; type dhcpc_state_t; @@ -53,24 +53,24 @@ allow dhcpc_t self:packet_socket create_socket_perms; allow dhcpc_t self:netlink_route_socket { create_socket_perms nlmsg_read nlmsg_write }; allow dhcpc_t dhcp_etc_t:dir list_dir_perms; -read_lnk_files_pattern(dhcpc_t,dhcp_etc_t,dhcp_etc_t) -exec_files_pattern(dhcpc_t,dhcp_etc_t,dhcp_etc_t) +read_lnk_files_pattern(dhcpc_t, dhcp_etc_t, dhcp_etc_t) +exec_files_pattern(dhcpc_t, dhcp_etc_t, dhcp_etc_t) -manage_files_pattern(dhcpc_t,dhcpc_state_t,dhcpc_state_t) -filetrans_pattern(dhcpc_t,dhcp_state_t,dhcpc_state_t,file) +manage_files_pattern(dhcpc_t, dhcpc_state_t, dhcpc_state_t) +filetrans_pattern(dhcpc_t, dhcp_state_t, dhcpc_state_t, file) # create pid file -manage_files_pattern(dhcpc_t,dhcpc_var_run_t,dhcpc_var_run_t) -files_pid_filetrans(dhcpc_t,dhcpc_var_run_t,file) +manage_files_pattern(dhcpc_t, dhcpc_var_run_t, dhcpc_var_run_t) +files_pid_filetrans(dhcpc_t, dhcpc_var_run_t, file) # Allow read/write to /etc/resolv.conf and /etc/ntp.conf. Note that any files # in /etc created by dhcpcd will be labelled net_conf_t. allow dhcpc_t net_conf_t:file manage_file_perms; -files_etc_filetrans(dhcpc_t,net_conf_t,file) +files_etc_filetrans(dhcpc_t, net_conf_t, file) # create temp files -manage_dirs_pattern(dhcpc_t,dhcpc_tmp_t,dhcpc_tmp_t) -manage_files_pattern(dhcpc_t,dhcpc_tmp_t,dhcpc_tmp_t) +manage_dirs_pattern(dhcpc_t, dhcpc_tmp_t, dhcpc_tmp_t) +manage_files_pattern(dhcpc_t, dhcpc_tmp_t, dhcpc_tmp_t) files_tmp_filetrans(dhcpc_t, dhcpc_tmp_t, { file dir }) can_exec(dhcpc_t, dhcpc_exec_t) diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te index 324001a7..ba1536c8 100644 --- a/policy/modules/system/udev.te +++ b/policy/modules/system/udev.te @@ -9,11 +9,11 @@ policy_module(udev, 1.10.2) type udev_t; type udev_exec_t; type udev_helper_exec_t; -kernel_domtrans_to(udev_t,udev_exec_t) +kernel_domtrans_to(udev_t, udev_exec_t) domain_obj_id_change_exemption(udev_t) -domain_entry_file(udev_t,udev_helper_exec_t) +domain_entry_file(udev_t, udev_helper_exec_t) domain_interactive_fd(udev_t) -init_daemon_domain(udev_t,udev_exec_t) +init_daemon_domain(udev_t, udev_exec_t) type udev_etc_t alias etc_udev_t; files_config_file(udev_etc_t) @@ -25,8 +25,8 @@ type udev_var_run_t; files_pid_file(udev_var_run_t) ifdef(`enable_mcs',` - kernel_ranged_domtrans_to(udev_t,udev_exec_t,s0 - mcs_systemhigh) - init_ranged_daemon_domain(udev_t,udev_exec_t,s0 - mcs_systemhigh) + kernel_ranged_domtrans_to(udev_t, udev_exec_t, s0 - mcs_systemhigh) + init_ranged_daemon_domain(udev_t, udev_exec_t, s0 - mcs_systemhigh) ') ######################################## @@ -62,11 +62,11 @@ allow udev_t udev_etc_t:file read_file_perms; # create udev database in /dev/.udevdb allow udev_t udev_tbl_t:file manage_file_perms; -dev_filetrans(udev_t,udev_tbl_t,file) +dev_filetrans(udev_t, udev_tbl_t, file) -manage_dirs_pattern(udev_t,udev_var_run_t,udev_var_run_t) -manage_files_pattern(udev_t,udev_var_run_t,udev_var_run_t) -files_pid_filetrans(udev_t,udev_var_run_t,{ dir file }) +manage_dirs_pattern(udev_t, udev_var_run_t, udev_var_run_t) +manage_files_pattern(udev_t, udev_var_run_t, udev_var_run_t) +files_pid_filetrans(udev_t, udev_var_run_t, { dir file }) kernel_read_system_state(udev_t) kernel_getattr_core_if(udev_t) diff --git a/policy/modules/system/unconfined.if b/policy/modules/system/unconfined.if index 2d4c440d..5533ca1e 100644 --- a/policy/modules/system/unconfined.if +++ b/policy/modules/system/unconfined.if @@ -188,7 +188,7 @@ interface(`unconfined_domtrans',` type unconfined_t, unconfined_exec_t; ') - domtrans_pattern($1,unconfined_exec_t,unconfined_t) + domtrans_pattern($1, unconfined_exec_t, unconfined_t) ') ######################################## @@ -230,7 +230,7 @@ interface(`unconfined_shell_domtrans',` type unconfined_t; ') - corecmd_shell_domtrans($1,unconfined_t) + corecmd_shell_domtrans($1, unconfined_t) allow unconfined_t $1:fd use; allow unconfined_t $1:fifo_file rw_file_perms; allow unconfined_t $1:process sigchld; diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if index 877ecb73..8634334b 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -2512,7 +2512,7 @@ interface(`userdom_spec_domtrans_all_users',` attribute userdomain; ') - corecmd_shell_spec_domtrans($1,userdomain) + corecmd_shell_spec_domtrans($1, userdomain) allow userdomain $1:fd use; allow userdomain $1:fifo_file rw_file_perms; allow userdomain $1:process sigchld; @@ -2535,7 +2535,7 @@ interface(`userdom_xsession_spec_domtrans_all_users',` attribute userdomain; ') - xserver_xsession_spec_domtrans($1,userdomain) + xserver_xsession_spec_domtrans($1, userdomain) allow userdomain $1:fd use; allow userdomain $1:fifo_file rw_file_perms; allow userdomain $1:process sigchld; @@ -2558,7 +2558,7 @@ interface(`userdom_spec_domtrans_unpriv_users',` attribute unpriv_userdomain; ') - corecmd_shell_spec_domtrans($1,unpriv_userdomain) + corecmd_shell_spec_domtrans($1, unpriv_userdomain) allow unpriv_userdomain $1:fd use; allow unpriv_userdomain $1:fifo_file rw_file_perms; allow unpriv_userdomain $1:process sigchld; @@ -2581,7 +2581,7 @@ interface(`userdom_xsession_spec_domtrans_unpriv_users',` attribute unpriv_userdomain; ') - xserver_xsession_spec_domtrans($1,unpriv_userdomain) + xserver_xsession_spec_domtrans($1, unpriv_userdomain) allow unpriv_userdomain $1:fd use; allow unpriv_userdomain $1:fifo_file rw_file_perms; allow unpriv_userdomain $1:process sigchld; @@ -2641,7 +2641,7 @@ interface(`userdom_bin_spec_domtrans_unpriv_users',` attribute unpriv_userdomain; ') - corecmd_bin_spec_domtrans($1,unpriv_userdomain) + corecmd_bin_spec_domtrans($1, unpriv_userdomain) allow unpriv_userdomain $1:fd use; allow unpriv_userdomain $1:fifo_file rw_file_perms; allow unpriv_userdomain $1:process sigchld; @@ -2664,7 +2664,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',` attribute unpriv_userdomain; ') - domain_entry_file_spec_domtrans($1,unpriv_userdomain) + domain_entry_file_spec_domtrans($1, unpriv_userdomain) allow unpriv_userdomain $1:fd use; allow unpriv_userdomain $1:fifo_file rw_file_perms; allow unpriv_userdomain $1:process sigchld; @@ -2850,7 +2850,7 @@ interface(`userdom_read_all_users_state',` attribute userdomain; ') - read_files_pattern($1,userdomain,userdomain) + read_files_pattern($1, userdomain, userdomain) kernel_search_proc($1) ') diff --git a/policy/modules/system/userdomain.te b/policy/modules/system/userdomain.te index 504f26a9..cb0d5124 100644 --- a/policy/modules/system/userdomain.te +++ b/policy/modules/system/userdomain.te @@ -11,28 +11,28 @@ policy_module(userdomain, 4.1.3) ## Allow users to connect to mysql ##

## -gen_tunable(allow_user_mysql_connect,false) +gen_tunable(allow_user_mysql_connect, false) ## ##

## Allow users to connect to PostgreSQL ##

##
-gen_tunable(allow_user_postgresql_connect,false) +gen_tunable(allow_user_postgresql_connect, false) ## ##

## Allow regular users direct mouse access ##

##
-gen_tunable(user_direct_mouse,false) +gen_tunable(user_direct_mouse, false) ## ##

## Allow users to read system messages. ##

##
-gen_tunable(user_dmesg,false) +gen_tunable(user_dmesg, false) ## ##

@@ -40,14 +40,14 @@ gen_tunable(user_dmesg,false) ## that do not have extended attributes (FAT, CDROM, FLOPPY) ##

##
-gen_tunable(user_rw_noexattrfile,false) +gen_tunable(user_rw_noexattrfile, false) ## ##

## Allow w to display everyone ##

##
-gen_tunable(user_ttyfile_stat,false) +gen_tunable(user_ttyfile_stat, false) # all user domains attribute userdomain; diff --git a/policy/modules/system/xen.if b/policy/modules/system/xen.if index 6c8640e2..0b1878c3 100644 --- a/policy/modules/system/xen.if +++ b/policy/modules/system/xen.if @@ -15,7 +15,7 @@ interface(`xen_domtrans',` type xend_t, xend_exec_t; ') - domtrans_pattern($1,xend_exec_t,xend_t) + domtrans_pattern($1, xend_exec_t, xend_t) ') ######################################## @@ -91,7 +91,7 @@ interface(`xen_append_log',` ') logging_search_logs($1) - append_files_pattern($1,xend_var_log_t,xend_var_log_t) + append_files_pattern($1, xend_var_log_t, xend_var_log_t) dontaudit $1 xend_var_log_t:file write; ') @@ -112,8 +112,8 @@ interface(`xen_manage_log',` ') logging_search_logs($1) - manage_dirs_pattern($1,xend_var_log_t,xend_var_log_t) - manage_files_pattern($1,xend_var_log_t,xend_var_log_t) + manage_dirs_pattern($1, xend_var_log_t, xend_var_log_t) + manage_files_pattern($1, xend_var_log_t, xend_var_log_t) ') ######################################## @@ -133,7 +133,7 @@ interface(`xen_dontaudit_rw_unix_stream_sockets',` type xend_t; ') - dontaudit $1 xend_t:unix_stream_socket { read write }; + dontaudit $1 xend_t:unix_stream_socket { read write }; ') ######################################## @@ -152,7 +152,7 @@ interface(`xen_stream_connect_xenstore',` ') files_search_pids($1) - stream_connect_pattern($1,xenstored_var_run_t,xenstored_var_run_t,xenstored_t) + stream_connect_pattern($1, xenstored_var_run_t, xenstored_var_run_t, xenstored_t) ') ######################################## @@ -171,7 +171,7 @@ interface(`xen_stream_connect',` ') files_search_pids($1) - stream_connect_pattern($1,xend_var_run_t,xend_var_run_t,xend_t) + stream_connect_pattern($1, xend_var_run_t, xend_var_run_t, xend_t) ') ######################################## @@ -189,5 +189,5 @@ interface(`xen_domtrans_xm',` type xm_t, xm_exec_t; ') - domtrans_pattern($1,xm_exec_t,xm_t) + domtrans_pattern($1, xm_exec_t, xm_t) ') diff --git a/policy/modules/system/xen.te b/policy/modules/system/xen.te index 1de4131a..155ef1b3 100644 --- a/policy/modules/system/xen.te +++ b/policy/modules/system/xen.te @@ -46,7 +46,7 @@ files_pid_file(xend_var_run_t) type xenstored_t; type xenstored_exec_t; domain_type(xenstored_t) -domain_entry_file(xenstored_t,xenstored_exec_t) +domain_entry_file(xenstored_t, xenstored_exec_t) role system_r types xenstored_t; # var/lib files @@ -60,7 +60,7 @@ files_pid_file(xenstored_var_run_t) type xenconsoled_t; type xenconsoled_exec_t; domain_type(xenconsoled_t) -domain_entry_file(xenconsoled_t,xenconsoled_exec_t) +domain_entry_file(xenconsoled_t, xenconsoled_exec_t) role system_r types xenconsoled_t; # pid files @@ -90,37 +90,37 @@ allow xend_t self:tcp_socket create_stream_socket_perms; allow xend_t self:packet_socket create_socket_perms; allow xend_t xen_image_t:dir list_dir_perms; -manage_dirs_pattern(xend_t,xen_image_t,xen_image_t) -manage_files_pattern(xend_t,xen_image_t,xen_image_t) -read_lnk_files_pattern(xend_t,xen_image_t,xen_image_t) -rw_blk_files_pattern(xend_t,xen_image_t,xen_image_t) +manage_dirs_pattern(xend_t, xen_image_t, xen_image_t) +manage_files_pattern(xend_t, xen_image_t, xen_image_t) +read_lnk_files_pattern(xend_t, xen_image_t, xen_image_t) +rw_blk_files_pattern(xend_t, xen_image_t, xen_image_t) allow xend_t xenctl_t:fifo_file manage_file_perms; dev_filetrans(xend_t, xenctl_t, fifo_file) -manage_files_pattern(xend_t,xend_tmp_t,xend_tmp_t) -manage_dirs_pattern(xend_t,xend_tmp_t,xend_tmp_t) +manage_files_pattern(xend_t, xend_tmp_t, xend_tmp_t) +manage_dirs_pattern(xend_t, xend_tmp_t, xend_tmp_t) files_tmp_filetrans(xend_t, xend_tmp_t, { file dir }) # pid file allow xend_t xend_var_run_t:dir setattr; -manage_files_pattern(xend_t,xend_var_run_t,xend_var_run_t) -manage_sock_files_pattern(xend_t,xend_var_run_t,xend_var_run_t) -manage_fifo_files_pattern(xend_t,xend_var_run_t,xend_var_run_t) -files_pid_filetrans(xend_t,xend_var_run_t, { file sock_file fifo_file }) +manage_files_pattern(xend_t, xend_var_run_t, xend_var_run_t) +manage_sock_files_pattern(xend_t, xend_var_run_t, xend_var_run_t) +manage_fifo_files_pattern(xend_t, xend_var_run_t, xend_var_run_t) +files_pid_filetrans(xend_t, xend_var_run_t, { file sock_file fifo_file }) # log files allow xend_t xend_var_log_t:dir setattr; -manage_files_pattern(xend_t,xend_var_log_t,xend_var_log_t) -manage_sock_files_pattern(xend_t,xend_var_log_t,xend_var_log_t) -logging_log_filetrans(xend_t,xend_var_log_t,{ sock_file file dir }) +manage_files_pattern(xend_t, xend_var_log_t, xend_var_log_t) +manage_sock_files_pattern(xend_t, xend_var_log_t, xend_var_log_t) +logging_log_filetrans(xend_t, xend_var_log_t,{ sock_file file dir }) # var/lib files for xend -manage_dirs_pattern(xend_t,xend_var_lib_t,xend_var_lib_t) -manage_files_pattern(xend_t,xend_var_lib_t,xend_var_lib_t) -manage_sock_files_pattern(xend_t,xend_var_lib_t,xend_var_lib_t) -manage_fifo_files_pattern(xend_t,xend_var_lib_t,xend_var_lib_t) -files_var_lib_filetrans(xend_t,xend_var_lib_t,{ file dir }) +manage_dirs_pattern(xend_t, xend_var_lib_t, xend_var_lib_t) +manage_files_pattern(xend_t, xend_var_lib_t, xend_var_lib_t) +manage_sock_files_pattern(xend_t, xend_var_lib_t, xend_var_lib_t) +manage_fifo_files_pattern(xend_t, xend_var_lib_t, xend_var_lib_t) +files_var_lib_filetrans(xend_t, xend_var_lib_t,{ file dir }) # transition to store domtrans_pattern(xend_t, xenstored_exec_t, xenstored_t) @@ -171,7 +171,7 @@ files_read_etc_files(xend_t) files_read_kernel_symbol_table(xend_t) files_read_kernel_img(xend_t) files_manage_etc_runtime_files(xend_t) -files_etc_filetrans_etc_runtime(xend_t,file) +files_etc_filetrans_etc_runtime(xend_t, file) files_read_usr_files(xend_t) storage_raw_read_fixed_disk(xend_t) @@ -223,9 +223,9 @@ allow xenconsoled_t self:fifo_file rw_fifo_file_perms; allow xenconsoled_t xen_devpts_t:chr_file rw_term_perms; # pid file -manage_files_pattern(xenconsoled_t,xenconsoled_var_run_t,xenconsoled_var_run_t) -manage_sock_files_pattern(xenconsoled_t,xenconsoled_var_run_t,xenconsoled_var_run_t) -files_pid_filetrans(xenconsoled_t,xenconsoled_var_run_t, { file sock_file }) +manage_files_pattern(xenconsoled_t, xenconsoled_var_run_t, xenconsoled_var_run_t) +manage_sock_files_pattern(xenconsoled_t, xenconsoled_var_run_t, xenconsoled_var_run_t) +files_pid_filetrans(xenconsoled_t, xenconsoled_var_run_t, { file sock_file }) kernel_read_kernel_sysctls(xenconsoled_t) kernel_write_xen_state(xenconsoled_t) @@ -239,7 +239,7 @@ domain_dontaudit_ptrace_all_domains(xenconsoled_t) files_read_usr_files(xenconsoled_t) -term_create_pty(xenconsoled_t,xen_devpts_t) +term_create_pty(xenconsoled_t, xen_devpts_t) term_use_generic_ptys(xenconsoled_t) term_use_console(xenconsoled_t) @@ -261,15 +261,15 @@ allow xenstored_t self:unix_stream_socket create_stream_socket_perms; allow xenstored_t self:unix_dgram_socket create_socket_perms; # pid file -manage_files_pattern(xenstored_t,xenstored_var_run_t,xenstored_var_run_t) -manage_sock_files_pattern(xenstored_t,xenstored_var_run_t,xenstored_var_run_t) -files_pid_filetrans(xenstored_t,xenstored_var_run_t, { file sock_file }) +manage_files_pattern(xenstored_t, xenstored_var_run_t, xenstored_var_run_t) +manage_sock_files_pattern(xenstored_t, xenstored_var_run_t, xenstored_var_run_t) +files_pid_filetrans(xenstored_t, xenstored_var_run_t, { file sock_file }) # var/lib files for xenstored -manage_dirs_pattern(xenstored_t,xenstored_var_lib_t,xenstored_var_lib_t) -manage_files_pattern(xenstored_t,xenstored_var_lib_t,xenstored_var_lib_t) -manage_sock_files_pattern(xenstored_t,xenstored_var_lib_t,xenstored_var_lib_t) -files_var_lib_filetrans(xenstored_t,xenstored_var_lib_t,{ file dir sock_file }) +manage_dirs_pattern(xenstored_t, xenstored_var_lib_t, xenstored_var_lib_t) +manage_files_pattern(xenstored_t, xenstored_var_lib_t, xenstored_var_lib_t) +manage_sock_files_pattern(xenstored_t, xenstored_var_lib_t, xenstored_var_lib_t) +files_var_lib_filetrans(xenstored_t, xenstored_var_lib_t,{ file dir sock_file }) kernel_write_xen_state(xenstored_t) kernel_read_xen_state(xenstored_t) @@ -310,8 +310,8 @@ allow xm_t self:fifo_file rw_fifo_file_perms; allow xm_t self:unix_stream_socket { create_stream_socket_perms connectto }; allow xm_t self:tcp_socket create_stream_socket_perms; -manage_files_pattern(xm_t,xend_var_lib_t,xend_var_lib_t) -manage_fifo_files_pattern(xm_t,xend_var_lib_t,xend_var_lib_t) +manage_files_pattern(xm_t, xend_var_lib_t, xend_var_lib_t) +manage_fifo_files_pattern(xm_t, xend_var_lib_t, xend_var_lib_t) files_search_var_lib(xm_t) allow xm_t xen_image_t:dir rw_dir_perms;