Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes.
This commit is contained in:
parent
8b858f2652
commit
aaf8a677ba
@ -4,6 +4,7 @@ policy_module(virt, 1.4.0)
|
||||
#
|
||||
# Declarations
|
||||
#
|
||||
|
||||
attribute virsh_transition_domain;
|
||||
|
||||
## <desc>
|
||||
@ -205,7 +206,6 @@ optional_policy(`
|
||||
|
||||
allow virtd_t self:capability { chown dac_override fowner ipc_lock kill mknod net_admin net_raw setpcap setuid setgid sys_admin sys_nice sys_ptrace };
|
||||
allow virtd_t self:process { getcap getsched setcap sigkill signal signull execmem setexec setfscreate setsockcreate setsched };
|
||||
|
||||
allow virtd_t self:fifo_file rw_fifo_file_perms;
|
||||
allow virtd_t self:unix_stream_socket create_stream_socket_perms;
|
||||
allow virtd_t self:tcp_socket create_stream_socket_perms;
|
||||
@ -577,8 +577,6 @@ typealias virsh_exec_t alias xm_exec_t;
|
||||
|
||||
allow virsh_t self:capability { dac_override ipc_lock sys_tty_config };
|
||||
allow virsh_t self:process { getcap getsched setcap signal };
|
||||
|
||||
# internal communication is often done using fifo and unix sockets.
|
||||
allow virsh_t self:fifo_file rw_fifo_file_perms;
|
||||
allow virsh_t self:unix_stream_socket { create_stream_socket_perms connectto };
|
||||
allow virsh_t self:tcp_socket create_stream_socket_perms;
|
||||
@ -671,4 +669,3 @@ optional_policy(`
|
||||
|
||||
userdom_search_admin_dir(virsh_ssh_t)
|
||||
')
|
||||
|
||||
|
@ -24,7 +24,6 @@ cron_system_entry(vnstat_t, vnstat_exec_t)
|
||||
# vnstatd local policy
|
||||
#
|
||||
allow vnstatd_t self:process { fork signal };
|
||||
|
||||
allow vnstatd_t self:fifo_file rw_fifo_file_perms;
|
||||
allow vnstatd_t self:unix_stream_socket create_stream_socket_perms;
|
||||
|
||||
@ -45,7 +44,6 @@ miscfiles_read_localization(vnstatd_t)
|
||||
# vnstat local policy
|
||||
#
|
||||
allow vnstat_t self:process { signal };
|
||||
|
||||
allow vnstat_t self:fifo_file rw_fifo_file_perms;
|
||||
allow vnstat_t self:unix_stream_socket create_stream_socket_perms;
|
||||
|
||||
@ -65,5 +63,3 @@ fs_getattr_xattr_fs(vnstat_t)
|
||||
logging_send_syslog_msg(vnstat_t)
|
||||
|
||||
miscfiles_read_localization(vnstat_t)
|
||||
|
||||
|
||||
|
@ -63,7 +63,6 @@ gen_tunable(user_direct_dri, false)
|
||||
|
||||
attribute xdmhomewriter;
|
||||
attribute x_userdomain;
|
||||
|
||||
attribute x_domain;
|
||||
|
||||
# X Events
|
||||
@ -728,10 +727,8 @@ optional_policy(`
|
||||
optional_policy(`
|
||||
networkmanager_dbus_chat(xdm_t)
|
||||
')
|
||||
|
||||
')
|
||||
|
||||
|
||||
optional_policy(`
|
||||
# Talk to the console mouse server.
|
||||
gpm_stream_connect(xdm_t)
|
||||
|
@ -110,7 +110,6 @@ allow zarafa_monitor_t self:capability chown;
|
||||
|
||||
# bad permission on /etc/zarafa
|
||||
allow zarafa_domain self:capability { dac_override setgid setuid };
|
||||
|
||||
allow zarafa_domain self:fifo_file rw_fifo_file_perms;
|
||||
allow zarafa_domain self:tcp_socket create_stream_socket_perms;
|
||||
allow zarafa_domain self:unix_stream_socket create_stream_socket_perms;
|
||||
|
Loading…
Reference in New Issue
Block a user