Re: [PATCH] s/mozilla/webbrowser/g

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, Jan 12, 2019 at 04:19:09PM +1100, Russell Coker wrote:
> This patch as requested renames mozilla to webbrowser and adds appropriate
> typealias rules.

Hm. the mozilla and chrome policies are pretty different tho. I dont
like this merging thing, I think we should keep mozilla_t and chromium_t
separate. I'm fixing up the gentoo chromium policy and i'll send it in a
couple hrs.

-- Jason

> 
> Index: refpolicy-2.20180701/policy/modules/apps/mozilla.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/apps/mozilla.te
> +++ refpolicy-2.20180701/policy/modules/apps/mozilla.te
> @@ -7,335 +7,346 @@ policy_module(mozilla, 2.14.1)
>  
>  ## <desc>
>  ##	<p>
> -##	Determine whether mozilla can
> +##	Determine whether web browser can
>  ##	make its stack executable.
>  ##	</p>
>  ## </desc>
> -gen_tunable(mozilla_execstack, false)
> +gen_tunable(webbrowser_execstack, false)
>  
> -attribute_role mozilla_roles;
> -attribute_role mozilla_plugin_roles;
> -attribute_role mozilla_plugin_config_roles;
> +attribute_role webbrowser_roles;
> +attribute_role webbrowser_plugin_roles;
> +attribute_role webbrowser_plugin_config_roles;
>  
> -type mozilla_t;
> -type mozilla_exec_t;
> -typealias mozilla_t alias { user_mozilla_t staff_mozilla_t sysadm_mozilla_t };
> -typealias mozilla_t alias { auditadm_mozilla_t secadm_mozilla_t };
> -userdom_user_application_domain(mozilla_t, mozilla_exec_t)
> -role mozilla_roles types mozilla_t;
> +type webbrowser_t;
> +type webbrowser_exec_t;
> +typealias webbrowser_t alias { user_mozilla_t staff_mozilla_t sysadm_mozilla_t };
> +typealias webbrowser_t alias { auditadm_mozilla_t secadm_mozilla_t mozilla_t };
> +typealias webbrowser_exec_t alias { mozilla_exec_t };
> +userdom_user_application_domain(webbrowser_t, webbrowser_exec_t)
> +role webbrowser_roles types webbrowser_t;
>  
>  optional_policy(`
> -	wm_application_domain(mozilla_t, mozilla_exec_t)
> +	wm_application_domain(webbrowser_t, webbrowser_exec_t)
>  ')
>  
> -type mozilla_home_t;
> -typealias mozilla_home_t alias { user_mozilla_home_t staff_mozilla_home_t sysadm_mozilla_home_t };
> -typealias mozilla_home_t alias { auditadm_mozilla_home_t secadm_mozilla_home_t };
> -userdom_user_home_content(mozilla_home_t)
> +type webbrowser_home_t;
> +typealias webbrowser_home_t alias { user_mozilla_home_t staff_mozilla_home_t sysadm_mozilla_home_t };
> +typealias webbrowser_home_t alias { auditadm_mozilla_home_t secadm_mozilla_home_t mozilla_home_t };
> +userdom_user_home_content(webbrowser_home_t)
>  
> -type mozilla_plugin_t;
> -type mozilla_plugin_exec_t;
> -userdom_user_application_domain(mozilla_plugin_t, mozilla_plugin_exec_t)
> -role mozilla_plugin_roles types mozilla_plugin_t;
> +type webbrowser_plugin_t;
> +type webbrowser_plugin_exec_t;
> +typealias webbrowser_plugin_t alias { mozilla_plugin_t };
> +typealias webbrowser_plugin_exec_t alias { mozilla_plugin_exec_t };
> +userdom_user_application_domain(webbrowser_plugin_t, webbrowser_plugin_exec_t)
> +role webbrowser_plugin_roles types webbrowser_plugin_t;
>  
> -type mozilla_plugin_home_t;
> -userdom_user_home_content(mozilla_plugin_home_t)
> +type webbrowser_plugin_home_t;
> +typealias webbrowser_plugin_home_t alias { mozilla_plugin_home_t };
> +userdom_user_home_content(webbrowser_plugin_home_t)
>  
> -type mozilla_plugin_tmp_t;
> -userdom_user_tmp_file(mozilla_plugin_tmp_t)
> +type webbrowser_plugin_tmp_t;
> +typealias webbrowser_plugin_tmp_t alias { mozilla_plugin_tmp_t };
> +userdom_user_tmp_file(webbrowser_plugin_tmp_t)
>  
> -type mozilla_plugin_tmpfs_t;
> -userdom_user_tmpfs_file(mozilla_plugin_tmpfs_t)
> +type webbrowser_plugin_tmpfs_t;
> +typealias webbrowser_plugin_tmpfs_t alias { mozilla_plugin_tmpfs_t };
> +userdom_user_tmpfs_file(webbrowser_plugin_tmpfs_t)
>  
>  optional_policy(`
> -	pulseaudio_tmpfs_content(mozilla_plugin_tmpfs_t)
> +	pulseaudio_tmpfs_content(webbrowser_plugin_tmpfs_t)
>  ')
>  
> -type mozilla_plugin_rw_t;
> -files_type(mozilla_plugin_rw_t)
> +type webbrowser_plugin_rw_t;
> +typealias webbrowser_plugin_rw_t alias { mozilla_plugin_rw_t };
> +files_type(webbrowser_plugin_rw_t)
>  
> -type mozilla_plugin_config_t;
> -type mozilla_plugin_config_exec_t;
> -userdom_user_application_domain(mozilla_plugin_config_t, mozilla_plugin_config_exec_t)
> -role mozilla_plugin_config_roles types mozilla_plugin_config_t;
> +type webbrowser_plugin_config_t;
> +typealias webbrowser_plugin_config_t alias { mozilla_plugin_config_t };
> +type webbrowser_plugin_config_exec_t;
> +typealias webbrowser_plugin_config_exec_t alias { mozilla_plugin_config_exec_t };
> +userdom_user_application_domain(webbrowser_plugin_config_t, webbrowser_plugin_config_exec_t)
> +role webbrowser_plugin_config_roles types webbrowser_plugin_config_t;
>  
> -type mozilla_tmp_t;
> -userdom_user_tmp_file(mozilla_tmp_t)
> +type webbrowser_tmp_t;
> +typealias webbrowser_tmp_t alias { mozilla_tmp_t };
> +userdom_user_tmp_file(webbrowser_tmp_t)
>  
> -type mozilla_tmpfs_t;
> -typealias mozilla_tmpfs_t alias { user_mozilla_tmpfs_t staff_mozilla_tmpfs_t sysadm_mozilla_tmpfs_t };
> -typealias mozilla_tmpfs_t alias { auditadm_mozilla_tmpfs_t secadm_mozilla_tmpfs_t };
> -userdom_user_tmpfs_file(mozilla_tmpfs_t)
> +type webbrowser_tmpfs_t;
> +typealias webbrowser_tmpfs_t alias { mozilla_tmpfs_t };
> +typealias webbrowser_tmpfs_t alias { user_mozilla_tmpfs_t staff_mozilla_tmpfs_t sysadm_mozilla_tmpfs_t };
> +typealias webbrowser_tmpfs_t alias { auditadm_mozilla_tmpfs_t secadm_mozilla_tmpfs_t };
> +userdom_user_tmpfs_file(webbrowser_tmpfs_t)
>  
>  optional_policy(`
> -	pulseaudio_tmpfs_content(mozilla_tmpfs_t)
> +	pulseaudio_tmpfs_content(webbrowser_tmpfs_t)
>  ')
>  
> -type mozilla_xdg_cache_t;
> -xdg_cache_content(mozilla_xdg_cache_t)
> +type webbrowser_xdg_cache_t;
> +xdg_cache_content(webbrowser_xdg_cache_t)
>  
>  ########################################
>  #
>  # Local policy
>  #
>  
> -allow mozilla_t self:capability { setgid setuid sys_nice };
> -allow mozilla_t self:process { sigkill signal setsched getsched setrlimit };
> -allow mozilla_t self:fifo_file rw_fifo_file_perms;
> -allow mozilla_t self:shm create_shm_perms;
> -allow mozilla_t self:sem create_sem_perms;
> -allow mozilla_t self:socket create_socket_perms;
> -allow mozilla_t self:unix_stream_socket { accept listen };
> -
> -allow mozilla_t mozilla_plugin_t:unix_stream_socket rw_socket_perms;
> -allow mozilla_t mozilla_plugin_t:fd use;
> -
> -allow mozilla_t { mozilla_home_t mozilla_plugin_home_t }:dir manage_dir_perms;
> -allow mozilla_t { mozilla_home_t mozilla_plugin_home_t }:file { manage_file_perms map };
> -allow mozilla_t mozilla_home_t:lnk_file manage_lnk_file_perms;
> -userdom_user_home_dir_filetrans(mozilla_t, mozilla_home_t, dir, ".galeon")
> -userdom_user_home_dir_filetrans(mozilla_t, mozilla_home_t, dir, ".mozilla")
> -userdom_user_home_dir_filetrans(mozilla_t, mozilla_home_t, dir, ".netscape")
> -userdom_user_home_dir_filetrans(mozilla_t, mozilla_home_t, dir, ".phoenix")
> -
> -filetrans_pattern(mozilla_t, mozilla_home_t, mozilla_plugin_home_t, dir, "plugins")
> -
> -manage_files_pattern(mozilla_t, mozilla_tmp_t, mozilla_tmp_t)
> -manage_lnk_files_pattern(mozilla_t, mozilla_tmp_t, mozilla_tmp_t)
> -manage_dirs_pattern(mozilla_t, mozilla_tmp_t, mozilla_tmp_t)
> -allow mozilla_t mozilla_tmp_t:file map;
> -files_tmp_filetrans(mozilla_t, mozilla_tmp_t, { file dir })
> -
> -manage_files_pattern(mozilla_t, mozilla_tmpfs_t, mozilla_tmpfs_t)
> -manage_lnk_files_pattern(mozilla_t, mozilla_tmpfs_t, mozilla_tmpfs_t)
> -manage_fifo_files_pattern(mozilla_t, mozilla_tmpfs_t, mozilla_tmpfs_t)
> -manage_sock_files_pattern(mozilla_t, mozilla_tmpfs_t, mozilla_tmpfs_t)
> -fs_tmpfs_filetrans(mozilla_t, mozilla_tmpfs_t, { file lnk_file sock_file fifo_file })
> -allow mozilla_t mozilla_plugin_tmpfs_t:file map;
> -
> -allow mozilla_t mozilla_plugin_rw_t:dir list_dir_perms;
> -allow mozilla_t mozilla_plugin_rw_t:file read_file_perms;
> -allow mozilla_t mozilla_plugin_rw_t:lnk_file read_lnk_file_perms;
> -
> -stream_connect_pattern(mozilla_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t)
> -
> -manage_files_pattern(mozilla_t, mozilla_xdg_cache_t, mozilla_xdg_cache_t)
> -manage_dirs_pattern(mozilla_t, mozilla_xdg_cache_t, mozilla_xdg_cache_t)
> -xdg_cache_filetrans(mozilla_t, mozilla_xdg_cache_t, dir, "mozilla")
> -
> -can_exec(mozilla_t, { mozilla_exec_t mozilla_plugin_rw_t mozilla_plugin_home_t })
> -
> -kernel_read_kernel_sysctls(mozilla_t)
> -kernel_read_network_state(mozilla_t)
> -kernel_read_system_state(mozilla_t)
> -kernel_read_net_sysctls(mozilla_t)
> -
> -corecmd_list_bin(mozilla_t)
> -corecmd_exec_shell(mozilla_t)
> -corecmd_exec_bin(mozilla_t)
> -
> -corenet_all_recvfrom_unlabeled(mozilla_t)
> -corenet_all_recvfrom_netlabel(mozilla_t)
> -corenet_tcp_sendrecv_generic_if(mozilla_t)
> -corenet_tcp_sendrecv_generic_node(mozilla_t)
> -
> -corenet_sendrecv_http_client_packets(mozilla_t)
> -corenet_tcp_connect_http_port(mozilla_t)
> -corenet_tcp_sendrecv_http_port(mozilla_t)
> -
> -corenet_sendrecv_http_cache_client_packets(mozilla_t)
> -corenet_tcp_connect_http_cache_port(mozilla_t)
> -corenet_tcp_sendrecv_http_cache_port(mozilla_t)
> -
> -corenet_sendrecv_squid_client_packets(mozilla_t)
> -corenet_tcp_connect_squid_port(mozilla_t)
> -corenet_tcp_sendrecv_squid_port(mozilla_t)
> -
> -corenet_sendrecv_ftp_client_packets(mozilla_t)
> -corenet_tcp_connect_ftp_port(mozilla_t)
> -corenet_tcp_sendrecv_ftp_port(mozilla_t)
> -
> -corenet_sendrecv_ipp_client_packets(mozilla_t)
> -corenet_tcp_connect_ipp_port(mozilla_t)
> -corenet_tcp_sendrecv_ipp_port(mozilla_t)
> -
> -corenet_sendrecv_soundd_client_packets(mozilla_t)
> -corenet_tcp_connect_soundd_port(mozilla_t)
> -corenet_tcp_sendrecv_soundd_port(mozilla_t)
> -
> -corenet_sendrecv_speech_client_packets(mozilla_t)
> -corenet_tcp_connect_speech_port(mozilla_t)
> -corenet_tcp_sendrecv_speech_port(mozilla_t)
> -
> -dev_getattr_sysfs_dirs(mozilla_t)
> -dev_read_sysfs(mozilla_t)
> -dev_read_sound(mozilla_t)
> -dev_read_rand(mozilla_t)
> -dev_read_urand(mozilla_t)
> -dev_rw_dri(mozilla_t)
> -dev_write_sound(mozilla_t)
> -
> -domain_dontaudit_read_all_domains_state(mozilla_t)
> -
> -files_read_etc_runtime_files(mozilla_t)
> -files_map_usr_files(mozilla_t)
> -files_read_usr_files(mozilla_t)
> -files_read_var_files(mozilla_t)
> -files_read_var_lib_files(mozilla_t)
> -files_read_var_symlinks(mozilla_t)
> -files_dontaudit_getattr_boot_dirs(mozilla_t)
> -
> -fs_getattr_all_fs(mozilla_t)
> -fs_search_auto_mountpoints(mozilla_t)
> -fs_list_inotifyfs(mozilla_t)
> -fs_rw_tmpfs_files(mozilla_t)
> -
> -term_dontaudit_getattr_pty_dirs(mozilla_t)
> -
> -auth_use_nsswitch(mozilla_t)
> -
> -logging_send_syslog_msg(mozilla_t)
> -
> -miscfiles_read_fonts(mozilla_t)
> -miscfiles_read_generic_certs(mozilla_t)
> -miscfiles_read_localization(mozilla_t)
> -miscfiles_dontaudit_setattr_fonts_dirs(mozilla_t)
> -miscfiles_dontaudit_setattr_fonts_cache_dirs(mozilla_t)
> -
> -userdom_use_user_ptys(mozilla_t)
> -
> -userdom_manage_user_tmp_dirs(mozilla_t)
> -userdom_manage_user_tmp_files(mozilla_t)
> -userdom_map_user_tmp_files(mozilla_t)
> -
> -userdom_user_content_access_template(mozilla, { mozilla_t mozilla_plugin_t })
> -userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file })
> -
> -userdom_write_user_tmp_sockets(mozilla_t)
> -
> -mozilla_run_plugin(mozilla_t, mozilla_roles)
> -mozilla_run_plugin_config(mozilla_t, mozilla_roles)
> -
> -xdg_read_config_files(mozilla_t)
> -xdg_read_data_files(mozilla_t)
> -xdg_manage_downloads(mozilla_t)
> -
> -xserver_rw_mesa_shader_cache(mozilla_t)
> -xserver_user_x_domain_template(mozilla, mozilla_t, mozilla_tmpfs_t)
> -xserver_dontaudit_read_xdm_tmp_files(mozilla_t)
> -xserver_dontaudit_getattr_xdm_tmp_sockets(mozilla_t)
> +allow webbrowser_t self:capability { setgid setuid sys_nice };
> +allow webbrowser_t self:process { sigkill signal setsched getsched setrlimit };
> +allow webbrowser_t self:fifo_file rw_fifo_file_perms;
> +allow webbrowser_t self:shm create_shm_perms;
> +allow webbrowser_t self:sem create_sem_perms;
> +allow webbrowser_t self:socket create_socket_perms;
> +allow webbrowser_t self:unix_stream_socket { accept listen };
> +
> +allow webbrowser_t webbrowser_plugin_t:unix_stream_socket rw_socket_perms;
> +allow webbrowser_t webbrowser_plugin_t:fd use;
> +
> +allow webbrowser_t { webbrowser_home_t webbrowser_plugin_home_t }:dir manage_dir_perms;
> +allow webbrowser_t { webbrowser_home_t webbrowser_plugin_home_t }:file { manage_file_perms map };
> +allow webbrowser_t webbrowser_home_t:lnk_file manage_lnk_file_perms;
> +userdom_user_home_dir_filetrans(webbrowser_t, webbrowser_home_t, dir, ".galeon")
> +userdom_user_home_dir_filetrans(webbrowser_t, webbrowser_home_t, dir, ".mozilla")
> +userdom_user_home_dir_filetrans(webbrowser_t, webbrowser_home_t, dir, ".netscape")
> +userdom_user_home_dir_filetrans(webbrowser_t, webbrowser_home_t, dir, ".phoenix")
> +
> +filetrans_pattern(webbrowser_t, webbrowser_home_t, webbrowser_plugin_home_t, dir, "plugins")
> +
> +manage_files_pattern(webbrowser_t, webbrowser_tmp_t, webbrowser_tmp_t)
> +manage_lnk_files_pattern(webbrowser_t, webbrowser_tmp_t, webbrowser_tmp_t)
> +manage_dirs_pattern(webbrowser_t, webbrowser_tmp_t, webbrowser_tmp_t)
> +allow webbrowser_t webbrowser_tmp_t:file map;
> +files_tmp_filetrans(webbrowser_t, webbrowser_tmp_t, { file dir })
> +
> +manage_files_pattern(webbrowser_t, webbrowser_tmpfs_t, webbrowser_tmpfs_t)
> +manage_lnk_files_pattern(webbrowser_t, webbrowser_tmpfs_t, webbrowser_tmpfs_t)
> +manage_fifo_files_pattern(webbrowser_t, webbrowser_tmpfs_t, webbrowser_tmpfs_t)
> +manage_sock_files_pattern(webbrowser_t, webbrowser_tmpfs_t, webbrowser_tmpfs_t)
> +fs_tmpfs_filetrans(webbrowser_t, webbrowser_tmpfs_t, { file lnk_file sock_file fifo_file })
> +allow webbrowser_t webbrowser_plugin_tmpfs_t:file map;
> +
> +allow webbrowser_t webbrowser_plugin_rw_t:dir list_dir_perms;
> +allow webbrowser_t webbrowser_plugin_rw_t:file read_file_perms;
> +allow webbrowser_t webbrowser_plugin_rw_t:lnk_file read_lnk_file_perms;
> +
> +stream_connect_pattern(webbrowser_t, webbrowser_plugin_tmpfs_t, webbrowser_plugin_tmpfs_t, webbrowser_plugin_t)
> +
> +manage_files_pattern(webbrowser_t, webbrowser_xdg_cache_t, webbrowser_xdg_cache_t)
> +manage_dirs_pattern(webbrowser_t, webbrowser_xdg_cache_t, webbrowser_xdg_cache_t)
> +xdg_cache_filetrans(webbrowser_t, webbrowser_xdg_cache_t, dir, "mozilla")
> +
> +can_exec(webbrowser_t, { webbrowser_exec_t webbrowser_plugin_rw_t webbrowser_plugin_home_t })
> +
> +kernel_read_kernel_sysctls(webbrowser_t)
> +kernel_read_network_state(webbrowser_t)
> +kernel_read_system_state(webbrowser_t)
> +kernel_read_net_sysctls(webbrowser_t)
> +
> +corecmd_list_bin(webbrowser_t)
> +corecmd_exec_shell(webbrowser_t)
> +corecmd_exec_bin(webbrowser_t)
> +
> +corenet_all_recvfrom_unlabeled(webbrowser_t)
> +corenet_all_recvfrom_netlabel(webbrowser_t)
> +corenet_tcp_sendrecv_generic_if(webbrowser_t)
> +corenet_tcp_sendrecv_generic_node(webbrowser_t)
> +
> +corenet_sendrecv_http_client_packets(webbrowser_t)
> +corenet_tcp_connect_http_port(webbrowser_t)
> +corenet_tcp_sendrecv_http_port(webbrowser_t)
> +
> +corenet_sendrecv_http_cache_client_packets(webbrowser_t)
> +corenet_tcp_connect_http_cache_port(webbrowser_t)
> +corenet_tcp_sendrecv_http_cache_port(webbrowser_t)
> +
> +corenet_sendrecv_squid_client_packets(webbrowser_t)
> +corenet_tcp_connect_squid_port(webbrowser_t)
> +corenet_tcp_sendrecv_squid_port(webbrowser_t)
> +
> +corenet_sendrecv_ftp_client_packets(webbrowser_t)
> +corenet_tcp_connect_ftp_port(webbrowser_t)
> +corenet_tcp_sendrecv_ftp_port(webbrowser_t)
> +
> +corenet_sendrecv_ipp_client_packets(webbrowser_t)
> +corenet_tcp_connect_ipp_port(webbrowser_t)
> +corenet_tcp_sendrecv_ipp_port(webbrowser_t)
> +
> +corenet_sendrecv_soundd_client_packets(webbrowser_t)
> +corenet_tcp_connect_soundd_port(webbrowser_t)
> +corenet_tcp_sendrecv_soundd_port(webbrowser_t)
> +
> +corenet_sendrecv_speech_client_packets(webbrowser_t)
> +corenet_tcp_connect_speech_port(webbrowser_t)
> +corenet_tcp_sendrecv_speech_port(webbrowser_t)
> +
> +dev_getattr_sysfs_dirs(webbrowser_t)
> +dev_read_sysfs(webbrowser_t)
> +dev_read_sound(webbrowser_t)
> +dev_read_rand(webbrowser_t)
> +dev_read_urand(webbrowser_t)
> +dev_rw_dri(webbrowser_t)
> +dev_write_sound(webbrowser_t)
> +
> +domain_dontaudit_read_all_domains_state(webbrowser_t)
> +
> +files_read_etc_runtime_files(webbrowser_t)
> +files_map_usr_files(webbrowser_t)
> +files_read_usr_files(webbrowser_t)
> +files_read_var_files(webbrowser_t)
> +files_read_var_lib_files(webbrowser_t)
> +files_read_var_symlinks(webbrowser_t)
> +files_dontaudit_getattr_boot_dirs(webbrowser_t)
> +
> +fs_getattr_all_fs(webbrowser_t)
> +fs_search_auto_mountpoints(webbrowser_t)
> +fs_list_inotifyfs(webbrowser_t)
> +fs_rw_tmpfs_files(webbrowser_t)
> +
> +term_dontaudit_getattr_pty_dirs(webbrowser_t)
> +
> +auth_use_nsswitch(webbrowser_t)
> +
> +logging_send_syslog_msg(webbrowser_t)
> +
> +miscfiles_read_fonts(webbrowser_t)
> +miscfiles_read_generic_certs(webbrowser_t)
> +miscfiles_read_localization(webbrowser_t)
> +miscfiles_dontaudit_setattr_fonts_dirs(webbrowser_t)
> +miscfiles_dontaudit_setattr_fonts_cache_dirs(webbrowser_t)
> +
> +userdom_use_user_ptys(webbrowser_t)
> +
> +userdom_manage_user_tmp_dirs(webbrowser_t)
> +userdom_manage_user_tmp_files(webbrowser_t)
> +userdom_map_user_tmp_files(webbrowser_t)
> +
> +userdom_user_content_access_template(webbrowser, { webbrowser_t webbrowser_plugin_t })
> +userdom_user_home_dir_filetrans_user_home_content(webbrowser_t, { dir file })
> +
> +userdom_write_user_tmp_sockets(webbrowser_t)
> +
> +webbrowser_run_plugin(webbrowser_t, webbrowser_roles)
> +webbrowser_run_plugin_config(webbrowser_t, webbrowser_roles)
> +
> +xdg_read_config_files(webbrowser_t)
> +xdg_read_data_files(webbrowser_t)
> +xdg_manage_downloads(webbrowser_t)
> +
> +xserver_rw_mesa_shader_cache(webbrowser_t)
> +xserver_user_x_domain_template(webbrowser, webbrowser_t, webbrowser_tmpfs_t)
> +xserver_dontaudit_read_xdm_tmp_files(webbrowser_t)
> +xserver_dontaudit_getattr_xdm_tmp_sockets(webbrowser_t)
>  
>  ifndef(`enable_mls',`
> -	fs_list_dos(mozilla_t)
> -	fs_read_dos_files(mozilla_t)
> +	fs_list_dos(webbrowser_t)
> +	fs_read_dos_files(webbrowser_t)
>  
> -	fs_search_removable(mozilla_t)
> -	fs_read_removable_files(mozilla_t)
> -	fs_read_removable_symlinks(mozilla_t)
> +	fs_search_removable(webbrowser_t)
> +	fs_read_removable_files(webbrowser_t)
> +	fs_read_removable_symlinks(webbrowser_t)
>  
> -	fs_read_iso9660_files(mozilla_t)
> +	fs_read_iso9660_files(webbrowser_t)
>  ')
>  
>  tunable_policy(`allow_execmem',`
> -	allow mozilla_t self:process execmem;
> +	allow webbrowser_t self:process execmem;
>  ')
>  
> -tunable_policy(`mozilla_execstack',`
> -	allow mozilla_t self:process { execmem execstack };
> +tunable_policy(`webbrowser_execstack',`
> +	allow webbrowser_t self:process { execmem execstack };
>  ')
>  
>  tunable_policy(`use_nfs_home_dirs',`
> -	fs_manage_nfs_dirs(mozilla_t)
> -	fs_manage_nfs_files(mozilla_t)
> -	fs_manage_nfs_symlinks(mozilla_t)
> +	fs_manage_nfs_dirs(webbrowser_t)
> +	fs_manage_nfs_files(webbrowser_t)
> +	fs_manage_nfs_symlinks(webbrowser_t)
>  ')
>  
>  tunable_policy(`use_samba_home_dirs',`
> -	fs_manage_cifs_dirs(mozilla_t)
> -	fs_manage_cifs_files(mozilla_t)
> -	fs_manage_cifs_symlinks(mozilla_t)
> +	fs_manage_cifs_dirs(webbrowser_t)
> +	fs_manage_cifs_files(webbrowser_t)
> +	fs_manage_cifs_symlinks(webbrowser_t)
>  ')
>  
>  optional_policy(`
> -	alsa_read_config(mozilla_t)
> -	alsa_read_home_files(mozilla_t)
> +	alsa_read_config(webbrowser_t)
> +	alsa_read_home_files(webbrowser_t)
>  ')
>  
>  optional_policy(`
> -	apache_read_user_scripts(mozilla_t)
> -	apache_read_user_content(mozilla_t)
> +	apache_read_user_scripts(webbrowser_t)
> +	apache_read_user_content(webbrowser_t)
>  ')
>  
>  optional_policy(`
> -	automount_dontaudit_getattr_tmp_dirs(mozilla_t)
> +	automount_dontaudit_getattr_tmp_dirs(webbrowser_t)
>  ')
>  
>  optional_policy(`
> -	cups_read_rw_config(mozilla_t)
> -	cups_stream_connect(mozilla_t)
> +	cups_read_rw_config(webbrowser_t)
> +	cups_stream_connect(webbrowser_t)
>  ')
>  
>  optional_policy(`
> -	dbus_all_session_bus_client(mozilla_t)
> -	dbus_connect_all_session_bus(mozilla_t)
> -	dbus_system_bus_client(mozilla_t)
> +	dbus_all_session_bus_client(webbrowser_t)
> +	dbus_connect_all_session_bus(webbrowser_t)
> +	dbus_system_bus_client(webbrowser_t)
>  
>  	optional_policy(`
> -		cups_dbus_chat(mozilla_t)
> +		cups_dbus_chat(webbrowser_t)
>  	')
>  
>  	optional_policy(`
> -		mozilla_dbus_chat_plugin(mozilla_t)
> +		webbrowser_dbus_chat_plugin(webbrowser_t)
>  	')
>  
>  	optional_policy(`
> -		networkmanager_dbus_chat(mozilla_t)
> +		networkmanager_dbus_chat(webbrowser_t)
>  	')
>  ')
>  
>  optional_policy(`
> -	evolution_domtrans(mozilla_t)
> +	evolution_domtrans(webbrowser_t)
>  ')
>  
>  optional_policy(`
> -	gnome_stream_connect_gconf(mozilla_t)
> -	gnome_manage_generic_gconf_home_content(mozilla_t)
> -	gnome_home_filetrans_gconf_home(mozilla_t, dir, ".gconf")
> -	gnome_home_filetrans_gconf_home(mozilla_t, dir, ".gconfd")
> -	gnome_manage_generic_home_content(mozilla_t)
> -	gnome_home_filetrans_gnome_home(mozilla_t, dir, ".gnome")
> -	gnome_home_filetrans_gnome_home(mozilla_t, dir, ".gnome2")
> -	gnome_home_filetrans_gnome_home(mozilla_t, dir, ".gnome2_private")
> +	gnome_stream_connect_gconf(webbrowser_t)
> +	gnome_manage_generic_gconf_home_content(webbrowser_t)
> +	gnome_home_filetrans_gconf_home(webbrowser_t, dir, ".gconf")
> +	gnome_home_filetrans_gconf_home(webbrowser_t, dir, ".gconfd")
> +	gnome_manage_generic_home_content(webbrowser_t)
> +	gnome_home_filetrans_gnome_home(webbrowser_t, dir, ".gnome")
> +	gnome_home_filetrans_gnome_home(webbrowser_t, dir, ".gnome2")
> +	gnome_home_filetrans_gnome_home(webbrowser_t, dir, ".gnome2_private")
>  ')
>  
>  optional_policy(`
> -	java_exec(mozilla_t)
> -	java_manage_generic_home_content(mozilla_t)
> -	java_manage_java_tmp(mozilla_t)
> -	java_home_filetrans_java_home(mozilla_t, dir, ".java")
> +	java_exec(webbrowser_t)
> +	java_manage_generic_home_content(webbrowser_t)
> +	java_manage_java_tmp(webbrowser_t)
> +	java_home_filetrans_java_home(webbrowser_t, dir, ".java")
>  ')
>  
>  optional_policy(`
> -	lpd_run_lpr(mozilla_t, mozilla_roles)
> +	lpd_run_lpr(webbrowser_t, webbrowser_roles)
>  ')
>  
>  optional_policy(`
> -	mplayer_exec(mozilla_t)
> -	mplayer_manage_generic_home_content(mozilla_t)
> -	mplayer_home_filetrans_mplayer_home(mozilla_t, dir, ".mplayer")
> +	mplayer_exec(webbrowser_t)
> +	mplayer_manage_generic_home_content(webbrowser_t)
> +	mplayer_home_filetrans_mplayer_home(webbrowser_t, dir, ".mplayer")
>  ')
>  
>  optional_policy(`
> -	ooffice_domtrans(mozilla_t)
> -	ooffice_rw_tmp_files(mozilla_t)
> +	ooffice_domtrans(webbrowser_t)
> +	ooffice_rw_tmp_files(webbrowser_t)
>  ')
>  
>  optional_policy(`
> -	pulseaudio_run(mozilla_t, mozilla_roles)
> +	pulseaudio_run(webbrowser_t, webbrowser_roles)
>  ')
>  
>  optional_policy(`
> -	thunderbird_domtrans(mozilla_t)
> +	thunderbird_domtrans(webbrowser_t)
>  ')
>  
>  ########################################
> @@ -343,282 +354,282 @@ optional_policy(`
>  # Plugin local policy
>  #
>  
> -dontaudit mozilla_plugin_t self:capability { ipc_lock sys_nice sys_ptrace sys_tty_config };
> -allow mozilla_plugin_t self:process { setpgid getsched setsched signal_perms setrlimit };
> -allow mozilla_plugin_t self:fifo_file manage_fifo_file_perms;
> -allow mozilla_plugin_t self:netlink_kobject_uevent_socket create_socket_perms;
> -allow mozilla_plugin_t self:sem create_sem_perms;
> -allow mozilla_plugin_t self:shm create_shm_perms;
> -allow mozilla_plugin_t self:tcp_socket { accept listen };
> -allow mozilla_plugin_t self:unix_stream_socket { accept connectto listen };
> -
> -allow mozilla_plugin_t mozilla_t:unix_stream_socket rw_socket_perms;
> -allow mozilla_plugin_t mozilla_t:unix_dgram_socket rw_socket_perms;
> -allow mozilla_plugin_t mozilla_t:shm { rw_shm_perms destroy };
> -allow mozilla_plugin_t mozilla_t:sem create_sem_perms;
> -
> -manage_dirs_pattern(mozilla_plugin_t, { mozilla_home_t mozilla_plugin_home_t }, { mozilla_home_t mozilla_plugin_home_t })
> -manage_files_pattern(mozilla_plugin_t, { mozilla_home_t mozilla_plugin_home_t }, mozilla_plugin_home_t)
> -manage_lnk_files_pattern(mozilla_plugin_t, { mozilla_home_t mozilla_plugin_home_t }, mozilla_plugin_home_t)
> -allow mozilla_plugin_t mozilla_home_t:file map;
> -
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_home_t, dir, ".galeon")
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_home_t, dir, ".mozilla")
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_home_t, dir, ".netscape")
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_home_t, dir, ".phoenix")
> -
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_plugin_home_t, dir, ".adobe")
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_plugin_home_t, dir, ".macromedia")
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_plugin_home_t, dir, ".gnash")
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_plugin_home_t, dir, ".gcjwebplugin")
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_plugin_home_t, dir, ".icedteaplugin")
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_plugin_home_t, dir, ".spicec")
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_plugin_home_t, dir, ".ICAClient")
> -userdom_user_home_dir_filetrans(mozilla_plugin_t, mozilla_plugin_home_t, dir, "zimbrauserdata")
> -
> -filetrans_pattern(mozilla_plugin_t, mozilla_home_t, mozilla_plugin_home_t, dir, "plugins")
> -
> -manage_dirs_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
> -manage_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
> -manage_fifo_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
> -files_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file })
> -userdom_user_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file })
> -
> -allow mozilla_plugin_t mozilla_tmp_t:file rw_file_perms;
> -
> -manage_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
> -manage_lnk_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
> -manage_fifo_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
> -manage_sock_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
> -fs_tmpfs_filetrans(mozilla_plugin_t, mozilla_plugin_tmpfs_t, { file lnk_file sock_file fifo_file })
> -
> -allow mozilla_plugin_t mozilla_plugin_rw_t:dir list_dir_perms;
> -allow mozilla_plugin_t mozilla_plugin_rw_t:file read_file_perms;
> -allow mozilla_plugin_t mozilla_plugin_rw_t:lnk_file read_lnk_file_perms;
> -
> -dgram_send_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t)
> -stream_connect_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t)
> -
> -can_exec(mozilla_plugin_t, { mozilla_exec_t mozilla_plugin_home_t mozilla_plugin_tmp_t })
> -
> -kernel_read_all_sysctls(mozilla_plugin_t)
> -kernel_read_system_state(mozilla_plugin_t)
> -kernel_read_network_state(mozilla_plugin_t)
> -kernel_request_load_module(mozilla_plugin_t)
> -kernel_dontaudit_getattr_core_if(mozilla_plugin_t)
> -
> -corecmd_exec_bin(mozilla_plugin_t)
> -corecmd_exec_shell(mozilla_plugin_t)
> -
> -corenet_all_recvfrom_netlabel(mozilla_plugin_t)
> -corenet_all_recvfrom_unlabeled(mozilla_plugin_t)
> -corenet_tcp_sendrecv_generic_if(mozilla_plugin_t)
> -corenet_tcp_sendrecv_generic_node(mozilla_plugin_t)
> -
> -corenet_sendrecv_asterisk_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_asterisk_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_asterisk_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_ftp_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_ftp_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_ftp_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_gatekeeper_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_gatekeeper_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_gatekeeper_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_http_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_http_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_http_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_http_cache_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_http_cache_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_http_cache_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_ipp_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_ipp_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_ipp_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_ircd_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_ircd_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_ircd_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_jabber_client_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_jabber_client_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_jabber_client_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_mmcc_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_mmcc_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_mmcc_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_monopd_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_monopd_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_monopd_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_soundd_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_soundd_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_soundd_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_speech_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_speech_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_speech_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_squid_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_squid_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_squid_port(mozilla_plugin_t)
> -
> -corenet_sendrecv_vnc_client_packets(mozilla_plugin_t)
> -corenet_tcp_connect_vnc_port(mozilla_plugin_t)
> -corenet_tcp_sendrecv_vnc_port(mozilla_plugin_t)
> -
> -dev_read_generic_usb_dev(mozilla_plugin_t)
> -dev_read_rand(mozilla_plugin_t)
> -dev_read_realtime_clock(mozilla_plugin_t)
> -dev_read_sound(mozilla_plugin_t)
> -dev_read_sysfs(mozilla_plugin_t)
> -dev_read_urand(mozilla_plugin_t)
> -dev_read_video_dev(mozilla_plugin_t)
> -dev_write_sound(mozilla_plugin_t)
> -dev_write_video_dev(mozilla_plugin_t)
> -dev_rw_dri(mozilla_plugin_t)
> -dev_rw_xserver_misc(mozilla_plugin_t)
> -
> -dev_dontaudit_getattr_generic_files(mozilla_plugin_t)
> -dev_dontaudit_getattr_generic_pipes(mozilla_plugin_t)
> -dev_dontaudit_getattr_all_blk_files(mozilla_plugin_t)
> -dev_dontaudit_getattr_all_chr_files(mozilla_plugin_t)
> -
> -domain_use_interactive_fds(mozilla_plugin_t)
> -domain_dontaudit_read_all_domains_state(mozilla_plugin_t)
> -
> -files_exec_usr_files(mozilla_plugin_t)
> -files_list_mnt(mozilla_plugin_t)
> -files_read_config_files(mozilla_plugin_t)
> -files_read_usr_files(mozilla_plugin_t)
> -files_map_usr_files(mozilla_plugin_t)
> -
> -fs_getattr_all_fs(mozilla_plugin_t)
> -# fs_read_hugetlbfs_files(mozilla_plugin_t)
> -fs_search_auto_mountpoints(mozilla_plugin_t)
> -
> -term_getattr_all_ttys(mozilla_plugin_t)
> -term_getattr_all_ptys(mozilla_plugin_t)
> -
> -application_exec(mozilla_plugin_t)
> -
> -auth_use_nsswitch(mozilla_plugin_t)
> -
> -libs_exec_ld_so(mozilla_plugin_t)
> -libs_exec_lib_files(mozilla_plugin_t)
> -
> -logging_send_syslog_msg(mozilla_plugin_t)
> -
> -miscfiles_read_localization(mozilla_plugin_t)
> -miscfiles_read_fonts(mozilla_plugin_t)
> -miscfiles_read_generic_certs(mozilla_plugin_t)
> -miscfiles_dontaudit_setattr_fonts_dirs(mozilla_plugin_t)
> -miscfiles_dontaudit_setattr_fonts_cache_dirs(mozilla_plugin_t)
> -
> -userdom_manage_user_tmp_dirs(mozilla_plugin_t)
> -userdom_manage_user_tmp_files(mozilla_plugin_t)
> -userdom_map_user_tmp_files(mozilla_plugin_t)
> +dontaudit webbrowser_plugin_t self:capability { ipc_lock sys_nice sys_ptrace sys_tty_config };
> +allow webbrowser_plugin_t self:process { setpgid getsched setsched signal_perms setrlimit };
> +allow webbrowser_plugin_t self:fifo_file manage_fifo_file_perms;
> +allow webbrowser_plugin_t self:netlink_kobject_uevent_socket create_socket_perms;
> +allow webbrowser_plugin_t self:sem create_sem_perms;
> +allow webbrowser_plugin_t self:shm create_shm_perms;
> +allow webbrowser_plugin_t self:tcp_socket { accept listen };
> +allow webbrowser_plugin_t self:unix_stream_socket { accept connectto listen };
> +
> +allow webbrowser_plugin_t webbrowser_t:unix_stream_socket rw_socket_perms;
> +allow webbrowser_plugin_t webbrowser_t:unix_dgram_socket rw_socket_perms;
> +allow webbrowser_plugin_t webbrowser_t:shm { rw_shm_perms destroy };
> +allow webbrowser_plugin_t webbrowser_t:sem create_sem_perms;
> +
> +manage_dirs_pattern(webbrowser_plugin_t, { webbrowser_home_t webbrowser_plugin_home_t }, { webbrowser_home_t webbrowser_plugin_home_t })
> +manage_files_pattern(webbrowser_plugin_t, { webbrowser_home_t webbrowser_plugin_home_t }, webbrowser_plugin_home_t)
> +manage_lnk_files_pattern(webbrowser_plugin_t, { webbrowser_home_t webbrowser_plugin_home_t }, webbrowser_plugin_home_t)
> +allow webbrowser_plugin_t webbrowser_home_t:file map;
> +
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_home_t, dir, ".galeon")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_home_t, dir, ".mozilla")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_home_t, dir, ".netscape")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_home_t, dir, ".phoenix")
> +
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_plugin_home_t, dir, ".adobe")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_plugin_home_t, dir, ".macromedia")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_plugin_home_t, dir, ".gnash")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_plugin_home_t, dir, ".gcjwebplugin")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_plugin_home_t, dir, ".icedteaplugin")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_plugin_home_t, dir, ".spicec")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_plugin_home_t, dir, ".ICAClient")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_t, webbrowser_plugin_home_t, dir, "zimbrauserdata")
> +
> +filetrans_pattern(webbrowser_plugin_t, webbrowser_home_t, webbrowser_plugin_home_t, dir, "plugins")
> +
> +manage_dirs_pattern(webbrowser_plugin_t, webbrowser_plugin_tmp_t, webbrowser_plugin_tmp_t)
> +manage_files_pattern(webbrowser_plugin_t, webbrowser_plugin_tmp_t, webbrowser_plugin_tmp_t)
> +manage_fifo_files_pattern(webbrowser_plugin_t, webbrowser_plugin_tmp_t, webbrowser_plugin_tmp_t)
> +files_tmp_filetrans(webbrowser_plugin_t, webbrowser_plugin_tmp_t, { dir file fifo_file })
> +userdom_user_tmp_filetrans(webbrowser_plugin_t, webbrowser_plugin_tmp_t, { dir file fifo_file })
> +
> +allow webbrowser_plugin_t webbrowser_tmp_t:file rw_file_perms;
> +
> +manage_files_pattern(webbrowser_plugin_t, webbrowser_plugin_tmpfs_t, webbrowser_plugin_tmpfs_t)
> +manage_lnk_files_pattern(webbrowser_plugin_t, webbrowser_plugin_tmpfs_t, webbrowser_plugin_tmpfs_t)
> +manage_fifo_files_pattern(webbrowser_plugin_t, webbrowser_plugin_tmpfs_t, webbrowser_plugin_tmpfs_t)
> +manage_sock_files_pattern(webbrowser_plugin_t, webbrowser_plugin_tmpfs_t, webbrowser_plugin_tmpfs_t)
> +fs_tmpfs_filetrans(webbrowser_plugin_t, webbrowser_plugin_tmpfs_t, { file lnk_file sock_file fifo_file })
> +
> +allow webbrowser_plugin_t webbrowser_plugin_rw_t:dir list_dir_perms;
> +allow webbrowser_plugin_t webbrowser_plugin_rw_t:file read_file_perms;
> +allow webbrowser_plugin_t webbrowser_plugin_rw_t:lnk_file read_lnk_file_perms;
> +
> +dgram_send_pattern(webbrowser_plugin_t, webbrowser_plugin_tmpfs_t, webbrowser_plugin_tmpfs_t, webbrowser_t)
> +stream_connect_pattern(webbrowser_plugin_t, webbrowser_plugin_tmpfs_t, webbrowser_plugin_tmpfs_t, webbrowser_t)
> +
> +can_exec(webbrowser_plugin_t, { webbrowser_exec_t webbrowser_plugin_home_t webbrowser_plugin_tmp_t })
> +
> +kernel_read_all_sysctls(webbrowser_plugin_t)
> +kernel_read_system_state(webbrowser_plugin_t)
> +kernel_read_network_state(webbrowser_plugin_t)
> +kernel_request_load_module(webbrowser_plugin_t)
> +kernel_dontaudit_getattr_core_if(webbrowser_plugin_t)
> +
> +corecmd_exec_bin(webbrowser_plugin_t)
> +corecmd_exec_shell(webbrowser_plugin_t)
> +
> +corenet_all_recvfrom_netlabel(webbrowser_plugin_t)
> +corenet_all_recvfrom_unlabeled(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_generic_if(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_generic_node(webbrowser_plugin_t)
> +
> +corenet_sendrecv_asterisk_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_asterisk_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_asterisk_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_ftp_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_ftp_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_ftp_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_gatekeeper_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_gatekeeper_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_gatekeeper_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_http_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_http_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_http_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_http_cache_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_http_cache_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_http_cache_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_ipp_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_ipp_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_ipp_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_ircd_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_ircd_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_ircd_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_jabber_client_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_jabber_client_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_jabber_client_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_mmcc_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_mmcc_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_mmcc_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_monopd_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_monopd_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_monopd_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_soundd_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_soundd_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_soundd_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_speech_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_speech_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_speech_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_squid_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_squid_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_squid_port(webbrowser_plugin_t)
> +
> +corenet_sendrecv_vnc_client_packets(webbrowser_plugin_t)
> +corenet_tcp_connect_vnc_port(webbrowser_plugin_t)
> +corenet_tcp_sendrecv_vnc_port(webbrowser_plugin_t)
> +
> +dev_read_generic_usb_dev(webbrowser_plugin_t)
> +dev_read_rand(webbrowser_plugin_t)
> +dev_read_realtime_clock(webbrowser_plugin_t)
> +dev_read_sound(webbrowser_plugin_t)
> +dev_read_sysfs(webbrowser_plugin_t)
> +dev_read_urand(webbrowser_plugin_t)
> +dev_read_video_dev(webbrowser_plugin_t)
> +dev_write_sound(webbrowser_plugin_t)
> +dev_write_video_dev(webbrowser_plugin_t)
> +dev_rw_dri(webbrowser_plugin_t)
> +dev_rw_xserver_misc(webbrowser_plugin_t)
> +
> +dev_dontaudit_getattr_generic_files(webbrowser_plugin_t)
> +dev_dontaudit_getattr_generic_pipes(webbrowser_plugin_t)
> +dev_dontaudit_getattr_all_blk_files(webbrowser_plugin_t)
> +dev_dontaudit_getattr_all_chr_files(webbrowser_plugin_t)
> +
> +domain_use_interactive_fds(webbrowser_plugin_t)
> +domain_dontaudit_read_all_domains_state(webbrowser_plugin_t)
> +
> +files_exec_usr_files(webbrowser_plugin_t)
> +files_list_mnt(webbrowser_plugin_t)
> +files_read_config_files(webbrowser_plugin_t)
> +files_read_usr_files(webbrowser_plugin_t)
> +files_map_usr_files(webbrowser_plugin_t)
> +
> +fs_getattr_all_fs(webbrowser_plugin_t)
> +# fs_read_hugetlbfs_files(webbrowser_plugin_t)
> +fs_search_auto_mountpoints(webbrowser_plugin_t)
> +
> +term_getattr_all_ttys(webbrowser_plugin_t)
> +term_getattr_all_ptys(webbrowser_plugin_t)
> +
> +application_exec(webbrowser_plugin_t)
> +
> +auth_use_nsswitch(webbrowser_plugin_t)
> +
> +libs_exec_ld_so(webbrowser_plugin_t)
> +libs_exec_lib_files(webbrowser_plugin_t)
> +
> +logging_send_syslog_msg(webbrowser_plugin_t)
> +
> +miscfiles_read_localization(webbrowser_plugin_t)
> +miscfiles_read_fonts(webbrowser_plugin_t)
> +miscfiles_read_generic_certs(webbrowser_plugin_t)
> +miscfiles_dontaudit_setattr_fonts_dirs(webbrowser_plugin_t)
> +miscfiles_dontaudit_setattr_fonts_cache_dirs(webbrowser_plugin_t)
> +
> +userdom_manage_user_tmp_dirs(webbrowser_plugin_t)
> +userdom_manage_user_tmp_files(webbrowser_plugin_t)
> +userdom_map_user_tmp_files(webbrowser_plugin_t)
>  
> -userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })
> +userdom_user_home_dir_filetrans_user_home_content(webbrowser_plugin_t, { dir file })
>  
> -userdom_write_user_tmp_sockets(mozilla_plugin_t)
> +userdom_write_user_tmp_sockets(webbrowser_plugin_t)
>  
> -userdom_dontaudit_use_user_terminals(mozilla_plugin_t)
> +userdom_dontaudit_use_user_terminals(webbrowser_plugin_t)
>  
> -xdg_read_config_files(mozilla_plugin_t)
> +xdg_read_config_files(webbrowser_plugin_t)
>  
>  ifndef(`enable_mls',`
> -	fs_list_dos(mozilla_plugin_t)
> -	fs_read_dos_files(mozilla_plugin_t)
> +	fs_list_dos(webbrowser_plugin_t)
> +	fs_read_dos_files(webbrowser_plugin_t)
>  
> -	fs_search_removable(mozilla_plugin_t)
> -	fs_read_removable_files(mozilla_plugin_t)
> -	fs_read_removable_symlinks(mozilla_plugin_t)
> +	fs_search_removable(webbrowser_plugin_t)
> +	fs_read_removable_files(webbrowser_plugin_t)
> +	fs_read_removable_symlinks(webbrowser_plugin_t)
>  
> -	fs_read_iso9660_files(mozilla_plugin_t)
> +	fs_read_iso9660_files(webbrowser_plugin_t)
>  ')
>  
>  tunable_policy(`allow_execmem',`
> -	allow mozilla_plugin_t self:process execmem;
> +	allow webbrowser_plugin_t self:process execmem;
>  ')
>  
> -tunable_policy(`mozilla_execstack',`
> -	allow mozilla_plugin_t self:process { execmem execstack };
> +tunable_policy(`webbrowser_execstack',`
> +	allow webbrowser_plugin_t self:process { execmem execstack };
>  ')
>  
>  tunable_policy(`use_nfs_home_dirs',`
> -	fs_manage_nfs_dirs(mozilla_plugin_t)
> -	fs_manage_nfs_files(mozilla_plugin_t)
> -	fs_manage_nfs_symlinks(mozilla_plugin_t)
> +	fs_manage_nfs_dirs(webbrowser_plugin_t)
> +	fs_manage_nfs_files(webbrowser_plugin_t)
> +	fs_manage_nfs_symlinks(webbrowser_plugin_t)
>  ')
>  
>  tunable_policy(`use_samba_home_dirs',`
> -	fs_manage_cifs_dirs(mozilla_plugin_t)
> -	fs_manage_cifs_files(mozilla_plugin_t)
> -	fs_manage_cifs_symlinks(mozilla_plugin_t)
> +	fs_manage_cifs_dirs(webbrowser_plugin_t)
> +	fs_manage_cifs_files(webbrowser_plugin_t)
> +	fs_manage_cifs_symlinks(webbrowser_plugin_t)
>  ')
>  
>  optional_policy(`
> -	alsa_read_config(mozilla_plugin_t)
> -	alsa_read_home_files(mozilla_plugin_t)
> +	alsa_read_config(webbrowser_plugin_t)
> +	alsa_read_home_files(webbrowser_plugin_t)
>  ')
>  
>  optional_policy(`
> -	automount_dontaudit_getattr_tmp_dirs(mozilla_plugin_t)
> +	automount_dontaudit_getattr_tmp_dirs(webbrowser_plugin_t)
>  ')
>  
>  optional_policy(`
> -	dbus_all_session_bus_client(mozilla_plugin_t)
> -	dbus_connect_all_session_bus(mozilla_plugin_t)
> -	dbus_system_bus_client(mozilla_plugin_t)
> +	dbus_all_session_bus_client(webbrowser_plugin_t)
> +	dbus_connect_all_session_bus(webbrowser_plugin_t)
> +	dbus_system_bus_client(webbrowser_plugin_t)
>  ')
>  
>  optional_policy(`
> -	gnome_manage_generic_home_content(mozilla_plugin_t)
> -	gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome")
> -	gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome2")
> -	gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome2_private")
> +	gnome_manage_generic_home_content(webbrowser_plugin_t)
> +	gnome_home_filetrans_gnome_home(webbrowser_plugin_t, dir, ".gnome")
> +	gnome_home_filetrans_gnome_home(webbrowser_plugin_t, dir, ".gnome2")
> +	gnome_home_filetrans_gnome_home(webbrowser_plugin_t, dir, ".gnome2_private")
>  ')
>  
>  optional_policy(`
> -	java_exec(mozilla_plugin_t)
> -	java_manage_generic_home_content(mozilla_plugin_t)
> -	java_manage_java_tmp(mozilla_plugin_t)
> -	java_home_filetrans_java_home(mozilla_plugin_t, dir, ".java")
> +	java_exec(webbrowser_plugin_t)
> +	java_manage_generic_home_content(webbrowser_plugin_t)
> +	java_manage_java_tmp(webbrowser_plugin_t)
> +	java_home_filetrans_java_home(webbrowser_plugin_t, dir, ".java")
>  ')
>  
>  optional_policy(`
> -	lpd_run_lpr(mozilla_plugin_t, mozilla_plugin_roles)
> +	lpd_run_lpr(webbrowser_plugin_t, webbrowser_plugin_roles)
>  ')
>  
>  optional_policy(`
> -	mplayer_exec(mozilla_plugin_t)
> -	mplayer_manage_generic_home_content(mozilla_plugin_t)
> -	mplayer_home_filetrans_mplayer_home(mozilla_plugin_t, dir, ".mplayer")
> +	mplayer_exec(webbrowser_plugin_t)
> +	mplayer_manage_generic_home_content(webbrowser_plugin_t)
> +	mplayer_home_filetrans_mplayer_home(webbrowser_plugin_t, dir, ".mplayer")
>  ')
>  
>  optional_policy(`
> -	pcscd_stream_connect(mozilla_plugin_t)
> +	pcscd_stream_connect(webbrowser_plugin_t)
>  ')
>  
>  optional_policy(`
> -	pulseaudio_run(mozilla_plugin_t, mozilla_plugin_roles)
> +	pulseaudio_run(webbrowser_plugin_t, webbrowser_plugin_roles)
>  ')
>  
>  optional_policy(`
> -	udev_read_db(mozilla_plugin_t)
> +	udev_read_db(webbrowser_plugin_t)
>  ')
>  
>  optional_policy(`
> -	xserver_read_user_xauth(mozilla_plugin_t)
> -	xserver_read_xdm_pid(mozilla_plugin_t)
> -	xserver_stream_connect(mozilla_plugin_t)
> -	xserver_use_user_fonts(mozilla_plugin_t)
> -	xserver_dontaudit_read_xdm_tmp_files(mozilla_plugin_t)
> +	xserver_read_user_xauth(webbrowser_plugin_t)
> +	xserver_read_xdm_pid(webbrowser_plugin_t)
> +	xserver_stream_connect(webbrowser_plugin_t)
> +	xserver_use_user_fonts(webbrowser_plugin_t)
> +	xserver_dontaudit_read_xdm_tmp_files(webbrowser_plugin_t)
>  ')
>  
>  ########################################
> @@ -626,96 +637,96 @@ optional_policy(`
>  # Plugin config local policy
>  #
>  
> -allow mozilla_plugin_config_t self:capability { dac_override dac_read_search setgid setuid sys_nice };
> -allow mozilla_plugin_config_t self:process { setsched signal_perms getsched };
> -allow mozilla_plugin_config_t self:fifo_file rw_fifo_file_perms;
> -allow mozilla_plugin_config_t self:unix_stream_socket create_stream_socket_perms;
> +allow webbrowser_plugin_config_t self:capability { dac_override dac_read_search setgid setuid sys_nice };
> +allow webbrowser_plugin_config_t self:process { setsched signal_perms getsched };
> +allow webbrowser_plugin_config_t self:fifo_file rw_fifo_file_perms;
> +allow webbrowser_plugin_config_t self:unix_stream_socket create_stream_socket_perms;
>  
> -allow mozilla_plugin_config_t mozilla_plugin_rw_t:dir manage_dir_perms;
> -allow mozilla_plugin_config_t mozilla_plugin_rw_t:file manage_file_perms;
> -allow mozilla_plugin_config_t mozilla_plugin_rw_t:lnk_file manage_lnk_file_perms;
> +allow webbrowser_plugin_config_t webbrowser_plugin_rw_t:dir manage_dir_perms;
> +allow webbrowser_plugin_config_t webbrowser_plugin_rw_t:file manage_file_perms;
> +allow webbrowser_plugin_config_t webbrowser_plugin_rw_t:lnk_file manage_lnk_file_perms;
>  
> -manage_dirs_pattern(mozilla_plugin_config_t, { mozilla_home_t mozilla_plugin_home_t }, { mozilla_home_t mozilla_plugin_home_t })
> -manage_files_pattern(mozilla_plugin_config_t, { mozilla_home_t mozilla_plugin_home_t }, mozilla_plugin_home_t)
> -manage_lnk_files_pattern(mozilla_plugin_config_t, { mozilla_home_t mozilla_plugin_home_t }, mozilla_plugin_home_t)
> +manage_dirs_pattern(webbrowser_plugin_config_t, { webbrowser_home_t webbrowser_plugin_home_t }, { webbrowser_home_t webbrowser_plugin_home_t })
> +manage_files_pattern(webbrowser_plugin_config_t, { webbrowser_home_t webbrowser_plugin_home_t }, webbrowser_plugin_home_t)
> +manage_lnk_files_pattern(webbrowser_plugin_config_t, { webbrowser_home_t webbrowser_plugin_home_t }, webbrowser_plugin_home_t)
>  
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_home_t, dir, ".galeon")
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_home_t, dir, ".mozilla")
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_home_t, dir, ".netscape")
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_home_t, dir, ".phoenix")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_home_t, dir, ".galeon")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_home_t, dir, ".mozilla")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_home_t, dir, ".netscape")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_home_t, dir, ".phoenix")
>  
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_plugin_home_t, dir, ".adobe")
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_plugin_home_t, dir, ".macromedia")
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_plugin_home_t, dir, ".gnash")
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_plugin_home_t, dir, ".gcjwebplugin")
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_plugin_home_t, dir, ".icedteaplugin")
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_plugin_home_t, dir, ".spicec")
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_plugin_home_t, dir, ".ICAClient")
> -userdom_user_home_dir_filetrans(mozilla_plugin_config_t, mozilla_plugin_home_t, dir, "zimbrauserdata")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_plugin_home_t, dir, ".adobe")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_plugin_home_t, dir, ".macromedia")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_plugin_home_t, dir, ".gnash")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_plugin_home_t, dir, ".gcjwebplugin")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_plugin_home_t, dir, ".icedteaplugin")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_plugin_home_t, dir, ".spicec")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_plugin_home_t, dir, ".ICAClient")
> +userdom_user_home_dir_filetrans(webbrowser_plugin_config_t, webbrowser_plugin_home_t, dir, "zimbrauserdata")
>  
> -filetrans_pattern(mozilla_plugin_config_t, mozilla_home_t, mozilla_plugin_home_t, dir, "plugins")
> +filetrans_pattern(webbrowser_plugin_config_t, webbrowser_home_t, webbrowser_plugin_home_t, dir, "plugins")
>  
> -can_exec(mozilla_plugin_config_t, { mozilla_plugin_rw_t mozilla_plugin_home_t })
> +can_exec(webbrowser_plugin_config_t, { webbrowser_plugin_rw_t webbrowser_plugin_home_t })
>  
> -ps_process_pattern(mozilla_plugin_config_t, mozilla_plugin_t)
> +ps_process_pattern(webbrowser_plugin_config_t, webbrowser_plugin_t)
>  
> -kernel_read_system_state(mozilla_plugin_config_t)
> -kernel_request_load_module(mozilla_plugin_config_t)
> +kernel_read_system_state(webbrowser_plugin_config_t)
> +kernel_request_load_module(webbrowser_plugin_config_t)
>  
> -corecmd_exec_bin(mozilla_plugin_config_t)
> -corecmd_exec_shell(mozilla_plugin_config_t)
> +corecmd_exec_bin(webbrowser_plugin_config_t)
> +corecmd_exec_shell(webbrowser_plugin_config_t)
>  
> -dev_read_urand(mozilla_plugin_config_t)
> -dev_rw_dri(mozilla_plugin_config_t)
> -dev_search_sysfs(mozilla_plugin_config_t)
> -dev_dontaudit_read_rand(mozilla_plugin_config_t)
> +dev_read_urand(webbrowser_plugin_config_t)
> +dev_rw_dri(webbrowser_plugin_config_t)
> +dev_search_sysfs(webbrowser_plugin_config_t)
> +dev_dontaudit_read_rand(webbrowser_plugin_config_t)
>  
> -domain_use_interactive_fds(mozilla_plugin_config_t)
> +domain_use_interactive_fds(webbrowser_plugin_config_t)
>  
> -files_list_tmp(mozilla_plugin_config_t)
> -files_read_usr_files(mozilla_plugin_config_t)
> -files_dontaudit_search_home(mozilla_plugin_config_t)
> +files_list_tmp(webbrowser_plugin_config_t)
> +files_read_usr_files(webbrowser_plugin_config_t)
> +files_dontaudit_search_home(webbrowser_plugin_config_t)
>  
> -fs_getattr_all_fs(mozilla_plugin_config_t)
> -fs_search_auto_mountpoints(mozilla_plugin_config_t)
> -fs_list_inotifyfs(mozilla_plugin_config_t)
> +fs_getattr_all_fs(webbrowser_plugin_config_t)
> +fs_search_auto_mountpoints(webbrowser_plugin_config_t)
> +fs_list_inotifyfs(webbrowser_plugin_config_t)
>  
> -auth_use_nsswitch(mozilla_plugin_config_t)
> +auth_use_nsswitch(webbrowser_plugin_config_t)
>  
> -miscfiles_read_localization(mozilla_plugin_config_t)
> -miscfiles_read_fonts(mozilla_plugin_config_t)
> +miscfiles_read_localization(webbrowser_plugin_config_t)
> +miscfiles_read_fonts(webbrowser_plugin_config_t)
>  
> -userdom_read_user_home_content_symlinks(mozilla_plugin_config_t)
> -userdom_read_user_home_content_files(mozilla_plugin_config_t)
> +userdom_read_user_home_content_symlinks(webbrowser_plugin_config_t)
> +userdom_read_user_home_content_files(webbrowser_plugin_config_t)
>  
> -userdom_use_user_ptys(mozilla_plugin_config_t)
> +userdom_use_user_ptys(webbrowser_plugin_config_t)
>  
> -mozilla_run_plugin(mozilla_plugin_config_t, mozilla_plugin_config_roles)
> +webbrowser_run_plugin(webbrowser_plugin_config_t, webbrowser_plugin_config_roles)
>  
>  tunable_policy(`allow_execmem',`
> -	allow mozilla_plugin_config_t self:process execmem;
> +	allow webbrowser_plugin_config_t self:process execmem;
>  ')
>  
> -tunable_policy(`mozilla_execstack',`
> -	allow mozilla_plugin_config_t self:process { execmem execstack };
> +tunable_policy(`webbrowser_execstack',`
> +	allow webbrowser_plugin_config_t self:process { execmem execstack };
>  ')
>  
>  tunable_policy(`use_nfs_home_dirs',`
> -	fs_manage_nfs_dirs(mozilla_plugin_config_t)
> -	fs_manage_nfs_files(mozilla_plugin_config_t)
> -	fs_manage_nfs_symlinks(mozilla_plugin_config_t)
> +	fs_manage_nfs_dirs(webbrowser_plugin_config_t)
> +	fs_manage_nfs_files(webbrowser_plugin_config_t)
> +	fs_manage_nfs_symlinks(webbrowser_plugin_config_t)
>  ')
>  
>  tunable_policy(`use_samba_home_dirs',`
> -	fs_manage_cifs_dirs(mozilla_plugin_config_t)
> -	fs_manage_cifs_files(mozilla_plugin_config_t)
> -	fs_manage_cifs_symlinks(mozilla_plugin_config_t)
> +	fs_manage_cifs_dirs(webbrowser_plugin_config_t)
> +	fs_manage_cifs_files(webbrowser_plugin_config_t)
> +	fs_manage_cifs_symlinks(webbrowser_plugin_config_t)
>  ')
>  
>  optional_policy(`
> -	automount_dontaudit_getattr_tmp_dirs(mozilla_plugin_config_t)
> +	automount_dontaudit_getattr_tmp_dirs(webbrowser_plugin_config_t)
>  ')
>  
>  optional_policy(`
> -	xserver_use_user_fonts(mozilla_plugin_config_t)
> +	xserver_use_user_fonts(webbrowser_plugin_config_t)
>  ')
> Index: refpolicy-2.20180701/policy/modules/apps/mozilla.fc
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/apps/mozilla.fc
> +++ refpolicy-2.20180701/policy/modules/apps/mozilla.fc
> @@ -1,42 +1,42 @@
> -HOME_DIR/\.cache/mozilla(/.*)?	gen_context(system_u:object_r:mozilla_xdg_cache_t,s0)
> -HOME_DIR/\.galeon(/.*)?	gen_context(system_u:object_r:mozilla_home_t,s0)
> -HOME_DIR/\.mozilla(/.*)?	gen_context(system_u:object_r:mozilla_home_t,s0)
> -HOME_DIR/\.mozilla/plugins(/.*)?	gen_context(system_u:object_r:mozilla_plugin_home_t,s0)
> -HOME_DIR/\.netscape(/.*)?	gen_context(system_u:object_r:mozilla_home_t,s0)
> -HOME_DIR/\.phoenix(/.*)?	gen_context(system_u:object_r:mozilla_home_t,s0)
> -HOME_DIR/\.vimperator.*		gen_context(system_u:object_r:mozilla_home_t,s0)
> +HOME_DIR/\.cache/mozilla(/.*)?	gen_context(system_u:object_r:webbrowser_xdg_cache_t,s0)
> +HOME_DIR/\.galeon(/.*)?	gen_context(system_u:object_r:webbrowser_home_t,s0)
> +HOME_DIR/\.mozilla(/.*)?	gen_context(system_u:object_r:webbrowser_home_t,s0)
> +HOME_DIR/\.mozilla/plugins(/.*)?	gen_context(system_u:object_r:webbrowser_plugin_home_t,s0)
> +HOME_DIR/\.netscape(/.*)?	gen_context(system_u:object_r:webbrowser_home_t,s0)
> +HOME_DIR/\.phoenix(/.*)?	gen_context(system_u:object_r:webbrowser_home_t,s0)
> +HOME_DIR/\.vimperator.*		gen_context(system_u:object_r:webbrowser_home_t,s0)
>  
> -HOME_DIR/\.adobe(/.*)?	gen_context(system_u:object_r:mozilla_plugin_home_t,s0)
> -HOME_DIR/\.macromedia(/.*)?	gen_context(system_u:object_r:mozilla_plugin_home_t,s0)
> -HOME_DIR/\.gnash(/.*)?	gen_context(system_u:object_r:mozilla_plugin_home_t,s0)
> -HOME_DIR/\.gcjwebplugin(/.*)?	gen_context(system_u:object_r:mozilla_plugin_home_t,s0)
> -HOME_DIR/\.icedteaplugin(/.*)?	gen_context(system_u:object_r:mozilla_plugin_home_t,s0)
> -HOME_DIR/\.spicec(/.*)?	gen_context(system_u:object_r:mozilla_plugin_home_t,s0)
> -HOME_DIR/\.ICAClient(/.*)?	gen_context(system_u:object_r:mozilla_plugin_home_t,s0)
> -HOME_DIR/zimbrauserdata(/.*)?	gen_context(system_u:object_r:mozilla_plugin_home_t,s0)
> +HOME_DIR/\.adobe(/.*)?	gen_context(system_u:object_r:webbrowser_plugin_home_t,s0)
> +HOME_DIR/\.macromedia(/.*)?	gen_context(system_u:object_r:webbrowser_plugin_home_t,s0)
> +HOME_DIR/\.gnash(/.*)?	gen_context(system_u:object_r:webbrowser_plugin_home_t,s0)
> +HOME_DIR/\.gcjwebplugin(/.*)?	gen_context(system_u:object_r:webbrowser_plugin_home_t,s0)
> +HOME_DIR/\.icedteaplugin(/.*)?	gen_context(system_u:object_r:webbrowser_plugin_home_t,s0)
> +HOME_DIR/\.spicec(/.*)?	gen_context(system_u:object_r:webbrowser_plugin_home_t,s0)
> +HOME_DIR/\.ICAClient(/.*)?	gen_context(system_u:object_r:webbrowser_plugin_home_t,s0)
> +HOME_DIR/zimbrauserdata(/.*)?	gen_context(system_u:object_r:webbrowser_plugin_home_t,s0)
>  
> -/usr/bin/epiphany	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/bin/epiphany-bin	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/bin/mozilla	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/bin/mozilla-snapshot	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/bin/mozilla-[0-9].*	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/bin/mozilla-bin-[0-9].*	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/bin/netscape	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/bin/nspluginscan	--	gen_context(system_u:object_r:mozilla_plugin_exec_t,s0)
> -/usr/bin/nspluginviewer	--	gen_context(system_u:object_r:mozilla_plugin_exec_t,s0)
> +/usr/bin/epiphany	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/bin/epiphany-bin	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/bin/mozilla	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/bin/mozilla-snapshot	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/bin/mozilla-[0-9].*	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/bin/mozilla-bin-[0-9].*	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/bin/netscape	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/bin/nspluginscan	--	gen_context(system_u:object_r:webbrowser_plugin_exec_t,s0)
> +/usr/bin/nspluginviewer	--	gen_context(system_u:object_r:webbrowser_plugin_exec_t,s0)
>  
> -/usr/lib/[^/]*firefox[^/]*/firefox	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/lib/[^/]*firefox[^/]*/firefox-bin	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/lib/firefox[^/]*/firefox-.*	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/lib/firefox[^/]*/mozilla-.*	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/lib/galeon/galeon	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/lib/iceweasel/iceweasel	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/lib/iceweasel/plugin-container	--	gen_context(system_u:object_r:mozilla_plugin_exec_t,s0)
> -/usr/lib/mozilla[^/]*/reg.+	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/lib/mozilla[^/]*/mozilla-.*	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/lib/mozilla/plugins-wrapped(/.*)?	gen_context(system_u:object_r:mozilla_plugin_rw_t,s0)
> -/usr/lib/netscape/base-4/wrapper	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/lib/netscape/.+/communicator/communicator-smotif\.real	--	gen_context(system_u:object_r:mozilla_exec_t,s0)
> -/usr/lib/nspluginwrapper/npviewer.bin	--	gen_context(system_u:object_r:mozilla_plugin_exec_t,s0)
> -/usr/lib/nspluginwrapper/plugin-config	--	gen_context(system_u:object_r:mozilla_plugin_config_exec_t,s0)
> -/usr/lib/xulrunner[^/]*/plugin-container	--	gen_context(system_u:object_r:mozilla_plugin_exec_t,s0)
> +/usr/lib/[^/]*firefox[^/]*/firefox	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/lib/[^/]*firefox[^/]*/firefox-bin	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/lib/firefox[^/]*/firefox-.*	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/lib/firefox[^/]*/mozilla-.*	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/lib/galeon/galeon	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/lib/iceweasel/iceweasel	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/lib/iceweasel/plugin-container	--	gen_context(system_u:object_r:webbrowser_plugin_exec_t,s0)
> +/usr/lib/mozilla[^/]*/reg.+	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/lib/mozilla[^/]*/mozilla-.*	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/lib/mozilla/plugins-wrapped(/.*)?	gen_context(system_u:object_r:webbrowser_plugin_rw_t,s0)
> +/usr/lib/netscape/base-4/wrapper	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/lib/netscape/.+/communicator/communicator-smotif\.real	--	gen_context(system_u:object_r:webbrowser_exec_t,s0)
> +/usr/lib/nspluginwrapper/npviewer.bin	--	gen_context(system_u:object_r:webbrowser_plugin_exec_t,s0)
> +/usr/lib/nspluginwrapper/plugin-config	--	gen_context(system_u:object_r:webbrowser_plugin_config_exec_t,s0)
> +/usr/lib/xulrunner[^/]*/plugin-container	--	gen_context(system_u:object_r:webbrowser_plugin_exec_t,s0)
> Index: refpolicy-2.20180701/policy/modules/apps/mozilla.if
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/apps/mozilla.if
> +++ refpolicy-2.20180701/policy/modules/apps/mozilla.if
> @@ -2,7 +2,7 @@
>  
>  ########################################
>  ## <summary>
> -##	Role access for mozilla.
> +##	Role access for graphical web browser.
>  ## </summary>
>  ## <param name="role">
>  ##	<summary>
> @@ -15,12 +15,12 @@
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_role',`
> +interface(`webbrowser_role',`
>  	gen_require(`
> -		type mozilla_t, mozilla_exec_t, mozilla_home_t;
> -		type mozilla_tmp_t, mozilla_tmpfs_t, mozilla_plugin_tmp_t;
> -		type mozilla_plugin_tmpfs_t, mozilla_plugin_home_t;
> -		attribute_role mozilla_roles;
> +		type webbrowser_t, webbrowser_exec_t, webbrowser_home_t;
> +		type webbrowser_tmp_t, webbrowser_tmpfs_t, webbrowser_plugin_tmp_t;
> +		type webbrowser_plugin_tmpfs_t, webbrowser_plugin_home_t;
> +		attribute_role webbrowser_roles;
>  	')
>  
>  	########################################
> @@ -28,53 +28,53 @@ interface(`mozilla_role',`
>  	# Declarations
>  	#
>  
> -	roleattribute $1 mozilla_roles;
> +	roleattribute $1 webbrowser_roles;
>  
>  	########################################
>  	#
>  	# Policy
>  	#
>  
> -	domtrans_pattern($2, mozilla_exec_t, mozilla_t)
> +	domtrans_pattern($2, webbrowser_exec_t, webbrowser_t)
>  
> -	allow $2 mozilla_t:process { noatsecure siginh rlimitinh ptrace signal_perms };
> -	ps_process_pattern($2, mozilla_t)
> +	allow $2 webbrowser_t:process { noatsecure siginh rlimitinh ptrace signal_perms };
> +	ps_process_pattern($2, webbrowser_t)
>  
> -	allow mozilla_t $2:process signull;
> -	allow mozilla_t $2:unix_stream_socket connectto;
> +	allow webbrowser_t $2:process signull;
> +	allow webbrowser_t $2:unix_stream_socket connectto;
>  
> -	allow $2 mozilla_t:fd use;
> -	allow $2 mozilla_t:shm rw_shm_perms;
> +	allow $2 webbrowser_t:fd use;
> +	allow $2 webbrowser_t:shm rw_shm_perms;
>  
> -	stream_connect_pattern($2, mozilla_tmpfs_t, mozilla_tmpfs_t, mozilla_t)
> +	stream_connect_pattern($2, webbrowser_tmpfs_t, webbrowser_tmpfs_t, webbrowser_t)
>  
> -	allow $2 { mozilla_home_t mozilla_plugin_home_t }:dir { manage_dir_perms relabel_dir_perms };
> -	allow $2 { mozilla_home_t mozilla_plugin_home_t }:file { manage_file_perms relabel_file_perms };
> -	allow $2 mozilla_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
> -	userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".galeon")
> -	userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".mozilla")
> -	userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".netscape")
> -	userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".phoenix")
> +	allow $2 { webbrowser_home_t webbrowser_plugin_home_t }:dir { manage_dir_perms relabel_dir_perms };
> +	allow $2 { webbrowser_home_t webbrowser_plugin_home_t }:file { manage_file_perms relabel_file_perms };
> +	allow $2 webbrowser_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
> +	userdom_user_home_dir_filetrans($2, webbrowser_home_t, dir, ".galeon")
> +	userdom_user_home_dir_filetrans($2, webbrowser_home_t, dir, ".mozilla")
> +	userdom_user_home_dir_filetrans($2, webbrowser_home_t, dir, ".netscape")
> +	userdom_user_home_dir_filetrans($2, webbrowser_home_t, dir, ".phoenix")
>  
> -	filetrans_pattern($2, mozilla_home_t, mozilla_plugin_home_t, dir, "plugins")
> +	filetrans_pattern($2, webbrowser_home_t, webbrowser_plugin_home_t, dir, "plugins")
>  
> -	allow $2 { mozilla_tmp_t mozilla_plugin_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
> -	allow $2 { mozilla_tmp_t mozilla_plugin_tmp_t }:file { manage_file_perms relabel_file_perms };
> -	allow $2 mozilla_plugin_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
> +	allow $2 { webbrowser_tmp_t webbrowser_plugin_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
> +	allow $2 { webbrowser_tmp_t webbrowser_plugin_tmp_t }:file { manage_file_perms relabel_file_perms };
> +	allow $2 webbrowser_plugin_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
>  
> -	allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:dir { manage_dir_perms relabel_dir_perms };
> -	allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:file { manage_file_perms relabel_file_perms };
> -	allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
> -	allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
> +	allow $2 { webbrowser_tmpfs_t webbrowser_plugin_tmpfs_t }:dir { manage_dir_perms relabel_dir_perms };
> +	allow $2 { webbrowser_tmpfs_t webbrowser_plugin_tmpfs_t }:file { manage_file_perms relabel_file_perms };
> +	allow $2 { webbrowser_tmpfs_t webbrowser_plugin_tmpfs_t }:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
> +	allow $2 { webbrowser_tmpfs_t webbrowser_plugin_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
>  
>  	optional_policy(`
> -		mozilla_dbus_chat($2)
> +		webbrowser_dbus_chat($2)
>  	')
>  ')
>  
>  ########################################
>  ## <summary>
> -##	Role access for mozilla plugin.
> +##	Role access for web browser plugin.
>  ## </summary>
>  ## <param name="role">
>  ##	<summary>
> @@ -87,60 +87,60 @@ interface(`mozilla_role',`
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_role_plugin',`
> +interface(`webbrowser_role_plugin',`
>  	gen_require(`
> -		type mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_plugin_rw_t;
> -		type mozilla_home_t;
> +		type webbrowser_plugin_tmp_t, webbrowser_plugin_tmpfs_t, webbrowser_plugin_rw_t;
> +		type webbrowser_home_t;
>  	')
>  
> -	mozilla_run_plugin($2, $1)
> -	mozilla_run_plugin_config($2, $1)
> +	webbrowser_run_plugin($2, $1)
> +	webbrowser_run_plugin_config($2, $1)
>  
> -	allow $2 { mozilla_plugin_t mozilla_plugin_config_t }:process { ptrace signal_perms };
> -	ps_process_pattern($2, { mozilla_plugin_t mozilla_plugin_config_t })
> +	allow $2 { webbrowser_plugin_t webbrowser_plugin_config_t }:process { ptrace signal_perms };
> +	ps_process_pattern($2, { webbrowser_plugin_t webbrowser_plugin_config_t })
>  
> -	allow $2 mozilla_plugin_t:unix_stream_socket rw_socket_perms;
> -	allow $2 mozilla_plugin_t:fd use;
> +	allow $2 webbrowser_plugin_t:unix_stream_socket rw_socket_perms;
> +	allow $2 webbrowser_plugin_t:fd use;
>  
> -	stream_connect_pattern($2, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t)
> +	stream_connect_pattern($2, webbrowser_plugin_tmpfs_t, webbrowser_plugin_tmpfs_t, webbrowser_plugin_t)
>  
> -	allow mozilla_plugin_t $2:process signull;
> -	allow mozilla_plugin_t $2:unix_stream_socket { connectto rw_socket_perms };
> -	allow mozilla_plugin_t $2:unix_dgram_socket { sendto rw_socket_perms };
> -	allow mozilla_plugin_t $2:shm { rw_shm_perms destroy };
> -	allow mozilla_plugin_t $2:sem create_sem_perms;
> +	allow webbrowser_plugin_t $2:process signull;
> +	allow webbrowser_plugin_t $2:unix_stream_socket { connectto rw_socket_perms };
> +	allow webbrowser_plugin_t $2:unix_dgram_socket { sendto rw_socket_perms };
> +	allow webbrowser_plugin_t $2:shm { rw_shm_perms destroy };
> +	allow webbrowser_plugin_t $2:sem create_sem_perms;
>  
> -	allow $2 mozilla_home_t:dir { manage_dir_perms relabel_dir_perms };
> -	allow $2 mozilla_home_t:file { manage_file_perms relabel_file_perms };
> -	allow $2 mozilla_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
> -	userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".galeon")
> -	userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".mozilla")
> -	userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".netscape")
> -	userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".phoenix")
> +	allow $2 webbrowser_home_t:dir { manage_dir_perms relabel_dir_perms };
> +	allow $2 webbrowser_home_t:file { manage_file_perms relabel_file_perms };
> +	allow $2 webbrowser_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
> +	userdom_user_home_dir_filetrans($2, webbrowser_home_t, dir, ".galeon")
> +	userdom_user_home_dir_filetrans($2, webbrowser_home_t, dir, ".mozilla")
> +	userdom_user_home_dir_filetrans($2, webbrowser_home_t, dir, ".netscape")
> +	userdom_user_home_dir_filetrans($2, webbrowser_home_t, dir, ".phoenix")
>  
> -	allow $2 mozilla_plugin_tmp_t:dir { manage_dir_perms relabel_dir_perms };
> -	allow $2 mozilla_plugin_tmp_t:file { manage_file_perms relabel_file_perms };
> -	allow $2 mozilla_plugin_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
> +	allow $2 webbrowser_plugin_tmp_t:dir { manage_dir_perms relabel_dir_perms };
> +	allow $2 webbrowser_plugin_tmp_t:file { manage_file_perms relabel_file_perms };
> +	allow $2 webbrowser_plugin_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
>  
> -	allow $2 mozilla_plugin_tmpfs_t:dir { manage_dir_perms relabel_dir_perms };
> -	allow $2 mozilla_plugin_tmpfs_t:file { manage_file_perms relabel_file_perms };
> -	allow $2 mozilla_plugin_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
> -	allow $2 mozilla_plugin_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
> +	allow $2 webbrowser_plugin_tmpfs_t:dir { manage_dir_perms relabel_dir_perms };
> +	allow $2 webbrowser_plugin_tmpfs_t:file { manage_file_perms relabel_file_perms };
> +	allow $2 webbrowser_plugin_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
> +	allow $2 webbrowser_plugin_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
>  
> -	allow $2 mozilla_plugin_rw_t:dir list_dir_perms;
> -	allow $2 mozilla_plugin_rw_t:file read_file_perms;
> -	allow $2 mozilla_plugin_rw_t:lnk_file read_lnk_file_perms;
> +	allow $2 webbrowser_plugin_rw_t:dir list_dir_perms;
> +	allow $2 webbrowser_plugin_rw_t:file read_file_perms;
> +	allow $2 webbrowser_plugin_rw_t:lnk_file read_lnk_file_perms;
>  
> -	can_exec($2, mozilla_plugin_rw_t)
> +	can_exec($2, webbrowser_plugin_rw_t)
>  
>  	optional_policy(`
> -		mozilla_dbus_chat_plugin($2)
> +		webbrowser_dbus_chat_plugin($2)
>  	')
>  ')
>  
>  ########################################
>  ## <summary>
> -##	Read mozilla home directory content.
> +##	Read web browser home directory content.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -148,20 +148,20 @@ interface(`mozilla_role_plugin',`
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_read_user_home_files',`
> +interface(`webbrowser_read_user_home_files',`
>  	gen_require(`
> -		type mozilla_home_t;
> +		type webbrowser_home_t;
>  	')
>  
>  	userdom_search_user_home_dirs($1)
> -	allow $1 mozilla_home_t:dir list_dir_perms;
> -	allow $1 mozilla_home_t:file read_file_perms;
> -	allow $1 mozilla_home_t:lnk_file read_lnk_file_perms;
> +	allow $1 webbrowser_home_t:dir list_dir_perms;
> +	allow $1 webbrowser_home_t:file read_file_perms;
> +	allow $1 webbrowser_home_t:lnk_file read_lnk_file_perms;
>  ')
>  
>  ########################################
>  ## <summary>
> -##	Write mozilla home directory files.
> +##	Write web browser home directory files.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -169,19 +169,19 @@ interface(`mozilla_read_user_home_files'
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_write_user_home_files',`
> +interface(`webbrowser_write_user_home_files',`
>  	gen_require(`
> -		type mozilla_home_t;
> +		type webbrowser_home_t;
>  	')
>  
>  	userdom_search_user_home_dirs($1)
> -	write_files_pattern($1, mozilla_home_t, mozilla_home_t)
> +	write_files_pattern($1, webbrowser_home_t, webbrowser_home_t)
>  ')
>  
>  ########################################
>  ## <summary>
>  ##	Do not audit attempts to read and
> -##	write mozilla home directory files.
> +##	write web browser home directory files.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -189,18 +189,18 @@ interface(`mozilla_write_user_home_files
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_dontaudit_rw_user_home_files',`
> +interface(`webbrowser_dontaudit_rw_user_home_files',`
>  	gen_require(`
> -		type mozilla_home_t;
> +		type webbrowser_home_t;
>  	')
>  
> -	dontaudit $1 mozilla_home_t:file rw_file_perms;
> +	dontaudit $1 webbrowser_home_t:file rw_file_perms;
>  ')
>  
>  ########################################
>  ## <summary>
>  ##	Do not audit attempt to Create,
> -##	read, write, and delete mozilla
> +##	read, write, and delete web browser
>  ##	home directory content.
>  ## </summary>
>  ## <param name="domain">
> @@ -209,19 +209,19 @@ interface(`mozilla_dontaudit_rw_user_hom
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_dontaudit_manage_user_home_files',`
> +interface(`webbrowser_dontaudit_manage_user_home_files',`
>  	gen_require(`
> -		type mozilla_home_t;
> +		type webbrowser_home_t;
>  	')
>  
> -	dontaudit $1 mozilla_home_t:dir manage_dir_perms;
> -	dontaudit $1 mozilla_home_t:file manage_file_perms;
> -	dontaudit $1 mozilla_home_t:lnk_file manage_lnk_file_perms;
> +	dontaudit $1 webbrowser_home_t:dir manage_dir_perms;
> +	dontaudit $1 webbrowser_home_t:file manage_file_perms;
> +	dontaudit $1 webbrowser_home_t:lnk_file manage_lnk_file_perms;
>  ')
>  
>  ########################################
>  ## <summary>
> -##	Execute mozilla plugin home directory files.
> +##	Execute web browser plugin home directory files.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -229,13 +229,13 @@ interface(`mozilla_dontaudit_manage_user
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_exec_user_plugin_home_files',`
> +interface(`webbrowser_exec_user_plugin_home_files',`
>  	gen_require(`
> -		type mozilla_home_t, mozilla_plugin_home_t;
> +		type webbrowser_home_t, webbrowser_plugin_home_t;
>  	')
>  
>  	userdom_search_user_home_dirs($1)
> -	exec_files_pattern($1, { mozilla_home_t mozilla_plugin_home_t }, mozilla_plugin_home_t)
> +	exec_files_pattern($1, { webbrowser_home_t webbrowser_plugin_home_t }, webbrowser_plugin_home_t)
>  ')
>  
>  ########################################
> @@ -249,17 +249,17 @@ interface(`mozilla_exec_user_plugin_home
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_execmod_user_plugin_home_files',`
> +interface(`webbrowser_execmod_user_plugin_home_files',`
>  	gen_require(`
> -		type mozilla_plugin_home_t;
> +		type webbrowser_plugin_home_t;
>  	')
>  
> -	allow $1 mozilla_plugin_home_t:file execmod;
> +	allow $1 webbrowser_plugin_home_t:file execmod;
>  ')
>  
>  #######################################
>  ## <summary>
> -##	Read temporary mozilla files.
> +##	Read temporary web browser files.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -267,17 +267,17 @@ interface(`mozilla_execmod_user_plugin_h
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_read_tmp_files',`
> +interface(`webbrowser_read_tmp_files',`
>  	gen_require(`
> -		type mozilla_tmp_t;
> +		type webbrowser_tmp_t;
>  	')
>  
> -	read_files_pattern($1, mozilla_tmp_t, mozilla_tmp_t)
> +	read_files_pattern($1, webbrowser_tmp_t, webbrowser_tmp_t)
>  ')
>  
>  ########################################
>  ## <summary>
> -##	Run mozilla in the mozilla domain.
> +##	Run web browser in the web browser domain.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -285,19 +285,19 @@ interface(`mozilla_read_tmp_files',`
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_domtrans',`
> +interface(`webbrowser_domtrans',`
>  	gen_require(`
> -		type mozilla_t, mozilla_exec_t;
> +		type webbrowser_t, webbrowser_exec_t;
>  	')
>  
>  	corecmd_search_bin($1)
> -	domtrans_pattern($1, mozilla_exec_t, mozilla_t)
> +	domtrans_pattern($1, webbrowser_exec_t, webbrowser_t)
>  ')
>  
>  ########################################
>  ## <summary>
>  ##	Execute a domain transition to
> -##	run mozilla plugin.
> +##	run web browser plugin.
>  ## </summary>
>  ## <param name="domain">
>  ## <summary>
> @@ -305,20 +305,20 @@ interface(`mozilla_domtrans',`
>  ## </summary>
>  ## </param>
>  #
> -interface(`mozilla_domtrans_plugin',`
> +interface(`webbrowser_domtrans_plugin',`
>  	gen_require(`
> -		type mozilla_plugin_t, mozilla_plugin_exec_t;
> +		type webbrowser_plugin_t, webbrowser_plugin_exec_t;
>  	')
>  
>  	corecmd_search_bin($1)
> -	domtrans_pattern($1, mozilla_plugin_exec_t, mozilla_plugin_t)
> +	domtrans_pattern($1, webbrowser_plugin_exec_t, webbrowser_plugin_t)
>  ')
>  
>  ########################################
>  ## <summary>
> -##	Execute mozilla plugin in the
> -##	mozilla plugin domain, and allow
> -##	the specified role the mozilla
> +##	Execute web browser plugin in the
> +##	web browser plugin domain, and allow
> +##	the specified role the web browser
>  ##	plugin domain.
>  ## </summary>
>  ## <param name="domain">
> @@ -332,19 +332,19 @@ interface(`mozilla_domtrans_plugin',`
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_run_plugin',`
> +interface(`webbrowser_run_plugin',`
>  	gen_require(`
> -		attribute_role mozilla_plugin_roles;
> +		attribute_role webbrowser_plugin_roles;
>  	')
>  
> -	mozilla_domtrans_plugin($1)
> -	roleattribute $2 mozilla_plugin_roles;
> +	webbrowser_domtrans_plugin($1)
> +	roleattribute $2 webbrowser_plugin_roles;
>  ')
>  
>  ########################################
>  ## <summary>
>  ##	Execute a domain transition to
> -##	run mozilla plugin config.
> +##	run web browser plugin config.
>  ## </summary>
>  ## <param name="domain">
>  ## <summary>
> @@ -352,21 +352,21 @@ interface(`mozilla_run_plugin',`
>  ## </summary>
>  ## </param>
>  #
> -interface(`mozilla_domtrans_plugin_config',`
> +interface(`webbrowser_domtrans_plugin_config',`
>  	gen_require(`
> -		type mozilla_plugin_config_t, mozilla_plugin_config_exec_t;
> +		type webbrowser_plugin_config_t, webbrowser_plugin_config_exec_t;
>  	')
>  
>  	corecmd_search_bin($1)
> -	domtrans_pattern($1, mozilla_plugin_config_exec_t, mozilla_plugin_config_t)
> +	domtrans_pattern($1, webbrowser_plugin_config_exec_t, webbrowser_plugin_config_t)
>  ')
>  
>  ########################################
>  ## <summary>
> -##	Execute mozilla plugin config in
> -##	the mozilla plugin config domain,
> +##	Execute web browser plugin config in
> +##	the web browser plugin config domain,
>  ##	and allow the specified role the
> -##	mozilla plugin config domain.
> +##	web browser plugin config domain.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -379,19 +379,19 @@ interface(`mozilla_domtrans_plugin_confi
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_run_plugin_config',`
> +interface(`webbrowser_run_plugin_config',`
>  	gen_require(`
> -		attribute_role mozilla_plugin_config_roles;
> +		attribute_role webbrowser_plugin_config_roles;
>  	')
>  
> -	mozilla_domtrans_plugin_config($1)
> -	roleattribute $2 mozilla_plugin_config_roles;
> +	webbrowser_domtrans_plugin_config($1)
> +	roleattribute $2 webbrowser_plugin_config_roles;
>  ')
>  
>  ########################################
>  ## <summary>
>  ##	Send and receive messages from
> -##	mozilla over dbus.
> +##	web browser over dbus.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -399,20 +399,20 @@ interface(`mozilla_run_plugin_config',`
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_dbus_chat',`
> +interface(`webbrowser_dbus_chat',`
>  	gen_require(`
> -		type mozilla_t;
> +		type webbrowser_t;
>  		class dbus send_msg;
>  	')
>  
> -	allow $1 mozilla_t:dbus send_msg;
> -	allow mozilla_t $1:dbus send_msg;
> +	allow $1 webbrowser_t:dbus send_msg;
> +	allow webbrowser_t $1:dbus send_msg;
>  ')
>  
>  ########################################
>  ## <summary>
>  ##	Send and receive messages from
> -##	mozilla plugin over dbus.
> +##	web browser plugin over dbus.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -420,19 +420,19 @@ interface(`mozilla_dbus_chat',`
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_dbus_chat_plugin',`
> +interface(`webbrowser_dbus_chat_plugin',`
>  	gen_require(`
> -		type mozilla_plugin_t;
> +		type webbrowser_plugin_t;
>  		class dbus send_msg;
>  	')
>  
> -	allow $1 mozilla_plugin_t:dbus send_msg;
> -	allow mozilla_plugin_t $1:dbus send_msg;
> +	allow $1 webbrowser_plugin_t:dbus send_msg;
> +	allow webbrowser_plugin_t $1:dbus send_msg;
>  ')
>  
>  ########################################
>  ## <summary>
> -##	Read and write mozilla TCP sockets.
> +##	Read and write web browser TCP sockets.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -440,18 +440,18 @@ interface(`mozilla_dbus_chat_plugin',`
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_rw_tcp_sockets',`
> +interface(`webbrowser_rw_tcp_sockets',`
>  	gen_require(`
> -		type mozilla_t;
> +		type webbrowser_t;
>  	')
>  
> -	allow $1 mozilla_t:tcp_socket rw_socket_perms;
> +	allow $1 webbrowser_t:tcp_socket rw_socket_perms;
>  ')
>  
>  ########################################
>  ## <summary>
>  ##	Create, read, write, and delete
> -##	mozilla plugin rw files.
> +##	web browser plugin rw files.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -459,18 +459,18 @@ interface(`mozilla_rw_tcp_sockets',`
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_manage_plugin_rw_files',`
> +interface(`webbrowser_manage_plugin_rw_files',`
>  	gen_require(`
> -		type mozilla_plugin_rw_t;
> +		type webbrowser_plugin_rw_t;
>  	')
>  
>  	libs_search_lib($1)
> -	manage_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
> +	manage_files_pattern($1, webbrowser_plugin_rw_t, webbrowser_plugin_rw_t)
>  ')
>  
>  ########################################
>  ## <summary>
> -##	Read mozilla_plugin tmpfs files.
> +##	Read webbrowser_plugin tmpfs files.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -478,18 +478,18 @@ interface(`mozilla_manage_plugin_rw_file
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_plugin_read_tmpfs_files',`
> +interface(`webbrowser_plugin_read_tmpfs_files',`
>  	gen_require(`
> -		type mozilla_plugin_tmpfs_t;
> +		type webbrowser_plugin_tmpfs_t;
>  	')
>  
>  	fs_search_tmpfs($1)
> -	allow $1 mozilla_plugin_tmpfs_t:file read_file_perms;
> +	allow $1 webbrowser_plugin_tmpfs_t:file read_file_perms;
>  ')
>  
>  ########################################
>  ## <summary>
> -##	Delete mozilla_plugin tmpfs files.
> +##	Delete webbrowser_plugin tmpfs files.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -497,19 +497,19 @@ interface(`mozilla_plugin_read_tmpfs_fil
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_plugin_delete_tmpfs_files',`
> +interface(`webbrowser_plugin_delete_tmpfs_files',`
>  	gen_require(`
> -		type mozilla_plugin_tmpfs_t;
> +		type webbrowser_plugin_tmpfs_t;
>  	')
>  
>  	fs_search_tmpfs($1)
> -	allow $1 mozilla_plugin_tmpfs_t:file delete_file_perms;
> +	allow $1 webbrowser_plugin_tmpfs_t:file delete_file_perms;
>  ')
>  
>  ########################################
>  ## <summary>
>  ##	Create, read, write, and delete
> -##	generic mozilla plugin home content.
> +##	generic web browser plugin home content.
>  ## </summary>
>  ## <param name="domain">
>  ##	<summary>
> @@ -517,23 +517,23 @@ interface(`mozilla_plugin_delete_tmpfs_f
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_manage_generic_plugin_home_content',`
> +interface(`webbrowser_manage_generic_plugin_home_content',`
>  	gen_require(`
> -		type mozilla_plugin_home_t;
> +		type webbrowser_plugin_home_t;
>  	')
>  
>  	userdom_search_user_home_dirs($1)
> -	allow $1 mozilla_plugin_home_t:dir manage_dir_perms;
> -	allow $1 mozilla_plugin_home_t:file manage_file_perms;
> -	allow $1 mozilla_plugin_home_t:fifo_file manage_fifo_file_perms;
> -	allow $1 mozilla_plugin_home_t:lnk_file manage_lnk_file_perms;
> -	allow $1 mozilla_plugin_home_t:sock_file manage_sock_file_perms;
> +	allow $1 webbrowser_plugin_home_t:dir manage_dir_perms;
> +	allow $1 webbrowser_plugin_home_t:file manage_file_perms;
> +	allow $1 webbrowser_plugin_home_t:fifo_file manage_fifo_file_perms;
> +	allow $1 webbrowser_plugin_home_t:lnk_file manage_lnk_file_perms;
> +	allow $1 webbrowser_plugin_home_t:sock_file manage_sock_file_perms;
>  ')
>  
>  ########################################
>  ## <summary>
>  ##	Create objects in user home
> -##	directories with the generic mozilla
> +##	directories with the generic web browser
>  ##	plugin home type.
>  ## </summary>
>  ## <param name="domain">
> @@ -552,10 +552,10 @@ interface(`mozilla_manage_generic_plugin
>  ##	</summary>
>  ## </param>
>  #
> -interface(`mozilla_home_filetrans_plugin_home',`
> +interface(`webbrowser_home_filetrans_plugin_home',`
>  	gen_require(`
> -		type mozilla_plugin_home_t;
> +		type webbrowser_plugin_home_t;
>  	')
>  
> -	userdom_user_home_dir_filetrans($1, mozilla_plugin_home_t, $2, $3)
> +	userdom_user_home_dir_filetrans($1, webbrowser_plugin_home_t, $2, $3)
>  ')
> Index: refpolicy-2.20180701/policy/modules/roles/staff.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/roles/staff.te
> +++ refpolicy-2.20180701/policy/modules/roles/staff.te
> @@ -142,7 +142,7 @@ ifndef(`distro_redhat',`
>  	')
>  
>  	optional_policy(`
> -		mozilla_role(staff_r, staff_t)
> +		webbrowser_role(staff_r, staff_t)
>  	')
>  
>  	optional_policy(`
> Index: refpolicy-2.20180701/policy/modules/roles/sysadm.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/roles/sysadm.te
> +++ refpolicy-2.20180701/policy/modules/roles/sysadm.te
> @@ -652,7 +652,7 @@ optional_policy(`
>  ')
>  
>  optional_policy(`
> -	mozilla_role(sysadm_r, sysadm_t)
> +	webbrowser_role(sysadm_r, sysadm_t)
>  ')
>  
>  optional_policy(`
> Index: refpolicy-2.20180701/policy/modules/roles/unprivuser.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/roles/unprivuser.te
> +++ refpolicy-2.20180701/policy/modules/roles/unprivuser.te
> @@ -114,7 +114,7 @@ ifndef(`distro_redhat',`
>  	')
>  
>  	optional_policy(`
> -		mozilla_role(user_r, user_t)
> +		webbrowser_role(user_r, user_t)
>  	')
>  
>  	optional_policy(`
> Index: refpolicy-2.20180701/policy/modules/roles/xguest.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/roles/xguest.te
> +++ refpolicy-2.20180701/policy/modules/roles/xguest.te
> @@ -103,7 +103,7 @@ optional_policy(`
>  ')
>  
>  optional_policy(`
> -	mozilla_role(xguest_r, xguest_t)
> +	webbrowser_role(xguest_r, xguest_t)
>  ')
>  
>  optional_policy(`
> Index: refpolicy-2.20180701/policy/modules/admin/prelink.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/admin/prelink.te
> +++ refpolicy-2.20180701/policy/modules/admin/prelink.te
> @@ -141,7 +141,7 @@ optional_policy(`
>  ')
>  
>  optional_policy(`
> -	mozilla_manage_plugin_rw_files(prelink_t)
> +	webbrowser_manage_plugin_rw_files(prelink_t)
>  ')
>  
>  optional_policy(`
> Index: refpolicy-2.20180701/policy/modules/apps/evolution.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/apps/evolution.te
> +++ refpolicy-2.20180701/policy/modules/apps/evolution.te
> @@ -291,8 +291,8 @@ optional_policy(`
>  ')
>  
>  optional_policy(`
> -	mozilla_read_user_home_files(evolution_t)
> -	mozilla_domtrans(evolution_t)
> +	webbrowser_read_user_home_files(evolution_t)
> +	webbrowser_domtrans(evolution_t)
>  ')
>  
>  optional_policy(`
> Index: refpolicy-2.20180701/policy/modules/apps/gpg.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/apps/gpg.te
> +++ refpolicy-2.20180701/policy/modules/apps/gpg.te
> @@ -171,7 +171,7 @@ optional_policy(`
>  ')
>  
>  optional_policy(`
> -	mozilla_dontaudit_rw_user_home_files(gpg_t)
> +	webbrowser_dontaudit_rw_user_home_files(gpg_t)
>  ')
>  
>  optional_policy(`
> @@ -306,7 +306,7 @@ optional_policy(`
>  ')
>  
>  optional_policy(`
> -	mozilla_dontaudit_rw_user_home_files(gpg_agent_t)
> +	webbrowser_dontaudit_rw_user_home_files(gpg_agent_t)
>  ')
>  
>  optional_policy(`
> Index: refpolicy-2.20180701/policy/modules/apps/openoffice.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/apps/openoffice.te
> +++ refpolicy-2.20180701/policy/modules/apps/openoffice.te
> @@ -140,8 +140,8 @@ optional_policy(`
>  ')
>  
>  optional_policy(`
> -	mozilla_domtrans(ooffice_t)
> -	mozilla_read_tmp_files(ooffice_t)
> +	webbrowser_domtrans(ooffice_t)
> +	webbrowser_read_tmp_files(ooffice_t)
>  ')
>  
>  optional_policy(`
> Index: refpolicy-2.20180701/policy/modules/apps/seunshare.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/apps/seunshare.te
> +++ refpolicy-2.20180701/policy/modules/apps/seunshare.te
> @@ -39,6 +39,6 @@ ifdef(`hide_broken_symptoms', `
>  	fs_dontaudit_rw_anon_inodefs_files(seunshare_t)
>  
>  	optional_policy(`
> -		mozilla_dontaudit_manage_user_home_files(seunshare_t)
> +		webbrowser_dontaudit_manage_user_home_files(seunshare_t)
>  	')
>  ')
> Index: refpolicy-2.20180701/policy/modules/apps/thunderbird.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/apps/thunderbird.te
> +++ refpolicy-2.20180701/policy/modules/apps/thunderbird.te
> @@ -151,7 +151,7 @@ optional_policy(`
>  	')
>  
>  	optional_policy(`
> -		mozilla_dbus_chat(thunderbird_t)
> +		webbrowser_dbus_chat(thunderbird_t)
>  	')
>  ')
>  
> @@ -175,8 +175,8 @@ optional_policy(`
>  ')
>  
>  optional_policy(`
> -	mozilla_read_user_home_files(thunderbird_t)
> -	mozilla_domtrans(thunderbird_t)
> +	webbrowser_read_user_home_files(thunderbird_t)
> +	webbrowser_domtrans(thunderbird_t)
>  ')
>  
>  optional_policy(`
> Index: refpolicy-2.20180701/policy/modules/apps/wm.te
> ===================================================================
> --- refpolicy-2.20180701.orig/policy/modules/apps/wm.te
> +++ refpolicy-2.20180701/policy/modules/apps/wm.te
> @@ -126,7 +126,7 @@ optional_policy(`
>  ')
>  
>  optional_policy(`
> -	mozilla_dbus_chat(wm_domain)
> +	webbrowser_dbus_chat(wm_domain)
>  ')
>  
>  optional_policy(`




[Index of Archives]     [AMD Graphics]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux