commit:     f9bd7fa24d2ccec2ddc1855dda6cf424fa1feb62
Author:     Marc Schiffbauer <mschiff <AT> gentoo <DOT> org>
AuthorDate: Tue Jun 24 16:44:36 2025 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Tue Jul 15 08:04:55 2025 +0000
URL:        
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=f9bd7fa2

modules: only whitespace fixes spotted while editing modules

Signed-off-by: Marc Schiffbauer <mschiff <AT> gentoo.org>
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>

 policy/modules/kernel/devices.if    | 10 +++----
 policy/modules/kernel/files.if      | 16 +++++------
 policy/modules/kernel/filesystem.if | 54 ++++++++++++++++++-------------------
 policy/modules/roles/sysadm.te      |  2 +-
 policy/modules/system/iptables.if   |  2 +-
 5 files changed, 42 insertions(+), 42 deletions(-)

diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
index 61a7d6f60..5191ba496 100644
--- a/policy/modules/kernel/devices.if
+++ b/policy/modules/kernel/devices.if
@@ -4988,7 +4988,7 @@ interface(`dev_relabel_all_sysfs',`
 #
 interface(`dev_setattr_all_sysfs',`
     gen_require(`
-        attribute sysfs_types;
+       attribute sysfs_types;
     ')
 
     allow $1 sysfs_types:dir { search_dir_perms setattr };
@@ -5026,11 +5026,11 @@ interface(`dev_rw_tpm',`
 ## </param>
 #
 interface(`dev_rw_uhid',`
-        gen_require(`
-                type device_t, uhid_device_t;
-        ')
+       gen_require(`
+               type device_t, uhid_device_t;
+       ')
 
-        rw_chr_files_pattern($1, device_t, uhid_device_t)
+       rw_chr_files_pattern($1, device_t, uhid_device_t)
 ')
 
 ########################################

diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
index a37365e9d..8428afdbe 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -7759,11 +7759,11 @@ interface(`files_runtime_filetrans_lock_dir',`
 ## </param>
 #
 interface(`files_create_all_spool_sockets',`
-        gen_require(`
-                attribute spoolfile;
-        ')
+       gen_require(`
+               attribute spoolfile;
+       ')
 
-        allow $1 spoolfile:sock_file create_sock_file_perms;
+       allow $1 spoolfile:sock_file create_sock_file_perms;
 ')
 
 ########################################
@@ -7777,11 +7777,11 @@ interface(`files_create_all_spool_sockets',`
 ## </param>
 #
 interface(`files_delete_all_spool_sockets',`
-        gen_require(`
-                attribute spoolfile;
-        ')
+       gen_require(`
+               attribute spoolfile;
+       ')
 
-        allow $1 spoolfile:sock_file delete_sock_file_perms;
+       allow $1 spoolfile:sock_file delete_sock_file_perms;
 ')
 
 ########################################

diff --git a/policy/modules/kernel/filesystem.if 
b/policy/modules/kernel/filesystem.if
index 1ac35c855..424a6af40 100644
--- a/policy/modules/kernel/filesystem.if
+++ b/policy/modules/kernel/filesystem.if
@@ -2582,9 +2582,9 @@ interface(`fs_read_dos_files',`
 ## </param>
 #
 interface(`fs_mmap_read_dos_files',`
-        gen_require(`
-                type dosfs_t;
-        ')
+       gen_require(`
+               type dosfs_t;
+       ')
 
        read_files_pattern($1, dosfs_t, dosfs_t)
        allow $1 dosfs_t:file map;
@@ -2620,12 +2620,12 @@ interface(`fs_manage_dos_files',`
 ## </param>
 #
 interface(`fs_list_ecryptfs',`
-        gen_require(`
-                type ecryptfs_t;
-        ')
+       gen_require(`
+               type ecryptfs_t;
+       ')
 
-        allow $1 ecryptfs_t:dir list_dir_perms;
-        read_lnk_files_pattern($1, ecryptfs_t, ecryptfs_t)
+       allow $1 ecryptfs_t:dir list_dir_perms;
+       read_lnk_files_pattern($1, ecryptfs_t, ecryptfs_t)
 ')
 
 ########################################
@@ -2641,11 +2641,11 @@ interface(`fs_list_ecryptfs',`
 ## <rolecap/>
 #
 interface(`fs_manage_ecryptfs_dirs',`
-        gen_require(`
-                type ecryptfs_t;
-        ')
+       gen_require(`
+               type ecryptfs_t;
+       ')
 
-        allow $1 ecryptfs_t:dir manage_dir_perms;
+       allow $1 ecryptfs_t:dir manage_dir_perms;
 ')
 
 ########################################
@@ -2661,11 +2661,11 @@ interface(`fs_manage_ecryptfs_dirs',`
 ## <rolecap/>
 #
 interface(`fs_manage_ecryptfs_files',`
-        gen_require(`
-                type ecryptfs_t;
-        ')
+       gen_require(`
+               type ecryptfs_t;
+       ')
 
-        manage_files_pattern($1, ecryptfs_t, ecryptfs_t)
+       manage_files_pattern($1, ecryptfs_t, ecryptfs_t)
 ')
 
 ########################################
@@ -2680,11 +2680,11 @@ interface(`fs_manage_ecryptfs_files',`
 ## </param>
 #
 interface(`fs_manage_ecryptfs_named_sockets',`
-        gen_require(`
-                type ecryptfs_t;
-        ')
+       gen_require(`
+               type ecryptfs_t;
+       ')
 
-        manage_sock_files_pattern($1, ecryptfs_t, ecryptfs_t)
+       manage_sock_files_pattern($1, ecryptfs_t, ecryptfs_t)
 ')
 
 ########################################
@@ -3763,11 +3763,11 @@ interface(`fs_rw_hugetlbfs_files',`
 ## </param>
 #
 interface(`fs_mmap_rw_hugetlbfs_files',`
-        gen_require(`
-                type hugetlbfs_t;
-        ')
+       gen_require(`
+               type hugetlbfs_t;
+       ')
 
-        fs_rw_hugetlbfs_files($1)
+       fs_rw_hugetlbfs_files($1)
        allow $1 hugetlbfs_t:file map;
 ')
 
@@ -6668,7 +6668,7 @@ interface(`fs_getattr_tracefs',`
                type tracefs_t;
        ')
 
-        allow $1 tracefs_t:filesystem getattr;
+       allow $1 tracefs_t:filesystem getattr;
 ')
 
 ########################################
@@ -6742,7 +6742,7 @@ interface(`fs_search_tracefs',`
                type tracefs_t;
        ')
 
-        allow $1 tracefs_t:dir search_dir_perms;
+       allow $1 tracefs_t:dir search_dir_perms;
 ')
 
 ########################################
@@ -6761,7 +6761,7 @@ interface(`fs_getattr_tracefs_files',`
                type tracefs_t;
        ')
 
-        allow $1 tracefs_t:file getattr;
+       allow $1 tracefs_t:file getattr;
 ')
 
 ########################################

diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
index 6e3873e5c..03561721c 100644
--- a/policy/modules/roles/sysadm.te
+++ b/policy/modules/roles/sysadm.te
@@ -749,7 +749,7 @@ optional_policy(`
 ')
 
 optional_policy(`
-        nsd_admin(sysadm_t, sysadm_r)
+       nsd_admin(sysadm_t, sysadm_r)
 ')
 
 optional_policy(`

diff --git a/policy/modules/system/iptables.if 
b/policy/modules/system/iptables.if
index 746a8dc02..ef26a0a6e 100644
--- a/policy/modules/system/iptables.if
+++ b/policy/modules/system/iptables.if
@@ -18,7 +18,7 @@ interface(`iptables_domtrans',`
        corecmd_search_bin($1)
        domtrans_pattern($1, iptables_exec_t, iptables_t)
 
-        dontaudit iptables_t $1:socket_class_set { read write };
+       dontaudit iptables_t $1:socket_class_set { read write };
 ')
 
 ########################################

Reply via email to