diff --git a/refpolicy/policy/modules/kernel/devices.if b/refpolicy/policy/modules/kernel/devices.if
index 0ae1165..83e5dc2 100644
--- a/refpolicy/policy/modules/kernel/devices.if
+++ b/refpolicy/policy/modules/kernel/devices.if
@@ -253,24 +253,6 @@ interface(`dev_dontaudit_setattr_generic_blk_file',`
########################################
##
-## Allow read, write, create, and delete for generic
-## block files.
-##
-##
-## Domain allowed access.
-##
-#
-interface(`dev_manage_generic_blk_file',`
- gen_require(`
- type device_t;
- ')
-
- allow $1 device_t:dir rw_dir_perms;
- allow $1 device_t:blk_file create_file_perms;
-')
-
-########################################
-##
## Allow read, write, and create for generic character device files.
##
##
diff --git a/refpolicy/policy/modules/kernel/files.if b/refpolicy/policy/modules/kernel/files.if
index b78d961..b178766 100644
--- a/refpolicy/policy/modules/kernel/files.if
+++ b/refpolicy/policy/modules/kernel/files.if
@@ -300,10 +300,9 @@ interface(`files_search_all',`
## Domain allowed access.
##
#
-interface(`files_list_all_dirs',`
+interface(`files_list_all',`
gen_require(`
attribute file_type;
- class dir r_dir_perms;
')
allow $1 file_type:dir r_dir_perms;
@@ -2046,23 +2045,6 @@ interface(`files_dontaudit_getattr_tmp_dir',`
########################################
##
-## Allow domain to getattr on /tmp directory.
-##
-##
-## The type of the process performing this action.
-##
-#
-interface(`files_getattr_tmp_dir',`
- gen_require(`
- type tmp_t;
- class dir getattr;
- ')
-
- allow $1 tmp_t:dir getattr;
-')
-
-########################################
-##
## Search the tmp directory (/tmp).
##
##
diff --git a/refpolicy/policy/modules/kernel/filesystem.if b/refpolicy/policy/modules/kernel/filesystem.if
index f089669..f0f7255 100644
--- a/refpolicy/policy/modules/kernel/filesystem.if
+++ b/refpolicy/policy/modules/kernel/filesystem.if
@@ -653,24 +653,6 @@ interface(`fs_execute_cifs_files',`
########################################
##
-## Do not audit attempts to read or
-## write files on a CIFS or SMB filesystems.
-##
-##
-## The type of the domain to not audit.
-##
-#
-interface(`fs_dontaudit_read_cifs_files',`
- gen_require(`
- type cifs_t;
- class file { read write };
- ')
-
- dontaudit $1 cifs_t:file { read write };
-')
-
-########################################
-##
## Create, read, write, and delete directories
## on a CIFS or SMB network filesystem.
##
diff --git a/refpolicy/policy/modules/kernel/kernel.if b/refpolicy/policy/modules/kernel/kernel.if
index 5510188..9f25444 100644
--- a/refpolicy/policy/modules/kernel/kernel.if
+++ b/refpolicy/policy/modules/kernel/kernel.if
@@ -1819,24 +1819,6 @@ interface(`kernel_read_file_from',`
########################################
##
-## Allow the kernel to search the
-## specified directory.
-##
-##
-## Directory type to search.
-##
-#
-interface(`kernel_search_from',`
- gen_require(`
- type kernel_t;
- class dir search;
- ')
-
- allow kernel_t $1:dir search;
-')
-
-########################################
-##
## Use the specified types for /lib directory
## and use the dynamic link/loader for automatic loading
## of shared libraries, and the link/loader
diff --git a/refpolicy/policy/modules/kernel/storage.if b/refpolicy/policy/modules/kernel/storage.if
index a437aee..c6c34fb 100644
--- a/refpolicy/policy/modules/kernel/storage.if
+++ b/refpolicy/policy/modules/kernel/storage.if
@@ -363,24 +363,6 @@ interface(`storage_write_scsi_generic',`
########################################
##
-## Get attributes of the device nodes
-## for the SCSI generic inerface.
-##
-##
-## The type of the process performing this action.
-##
-#
-interface(`storage_getattr_scsi_generic',`
- gen_require(`
- type scsi_generic_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 scsi_generic_device_t:chr_file getattr;
-')
-
-########################################
-##
## Set attributes of the device nodes
## for the SCSI generic inerface.
##
diff --git a/refpolicy/policy/modules/kernel/terminal.if b/refpolicy/policy/modules/kernel/terminal.if
index f4c7fc6..3dcd01c 100644
--- a/refpolicy/policy/modules/kernel/terminal.if
+++ b/refpolicy/policy/modules/kernel/terminal.if
@@ -642,23 +642,6 @@ interface(`term_reset_tty_labels',`
########################################
##
-## Do not audit attempts to get the attributes
-## of unallocated ttys.
-##
-##
-## Domain allowed access.
-##
-#
-interface(`term_dontaudit_getattr_unallocated_ttys',`
- gen_require(`
- type tty_device_t;
- ')
-
- dontaudit $1 tty_device_t:chr_file getattr;
-')
-
-########################################
-##
## Write to unallocated ttys.
##
##
diff --git a/refpolicy/policy/modules/services/ppp.if b/refpolicy/policy/modules/services/ppp.if
index aa5e4d9..b73fe4e 100644
--- a/refpolicy/policy/modules/services/ppp.if
+++ b/refpolicy/policy/modules/services/ppp.if
@@ -35,7 +35,7 @@ interface(`ppp_dontaudit_use_fd',`
########################################
##
-## Allow domain to send sigchld to parent of PPP domain type.
+## Send a SIGCHLD signal to PPP.
##
##
## Domain allowed access.
@@ -68,22 +68,6 @@ interface(`ppp_signal',`
########################################
##
-## Send a SIGCHLD signal to PPP.
-##
-##
-## Domain allowed access.
-##
-#
-interface(`ppp_sigchld',`
- gen_require(`
- type pppd_t;
- ')
-
- allow $1 pppd_t:process sigchld;
-')
-
-########################################
-##
## Execute domain in the ppp domain.
##
##
diff --git a/refpolicy/policy/modules/services/samba.if b/refpolicy/policy/modules/services/samba.if
index 34b6d48..fd422c8 100644
--- a/refpolicy/policy/modules/services/samba.if
+++ b/refpolicy/policy/modules/services/samba.if
@@ -329,23 +329,6 @@ interface(`samba_read_winbind_pid',`
########################################
##
-## Allow the specified domain to read the winbind pid files.
-##
-##
-## Domain allowed access.
-##
-#
-interface(`samba_read_winbind_pid',`
- gen_require(`
- type winbind_var_run_t;
- ')
-
- files_search_pids($1)
- allow $1 winbind_var_run_t:file r_file_perms;
-')
-
-########################################
-##
## Connect to winbind.
##
##
diff --git a/refpolicy/policy/modules/services/squid.if b/refpolicy/policy/modules/services/squid.if
index 397a3a6..10497bf 100644
--- a/refpolicy/policy/modules/services/squid.if
+++ b/refpolicy/policy/modules/services/squid.if
@@ -11,9 +11,6 @@
interface(`squid_domtrans',`
gen_require(`
type squid_t, squid_exec_t;
- class process sigchld;
- class fd use;
- class fifo_file rw_file_perms;
')
corecmd_search_sbin($1)
@@ -36,7 +33,6 @@ interface(`squid_domtrans',`
interface(`squid_read_config',`
gen_require(`
type squid_conf_t;
- class file r_file_perms;
')
files_search_etc($1)
@@ -45,27 +41,6 @@ interface(`squid_read_config',`
########################################
##
-## Create, read, write, and delete
-## squid logs.
-##
-##
-## Domain allowed access.
-##
-#
-interface(`squid_manage_logs',`
- gen_require(`
- type squid_log_t;
- class dir rw_dir_perms;
- class file create_file_perms;
- ')
-
- logging_search_logs($1)
- allow $1 squid_log_t:dir rw_dir_perms;
- allow $1 squid_log_t:file create_file_perms;
-')
-
-########################################
-##
## Append squid logs.
##
##
@@ -112,8 +87,6 @@ interface(`squid_append_log',`
interface(`squid_manage_logs',`
gen_require(`
type squid_log_t;
- class dir rw_dir_perms;
- class file create_file_perms;
')
logging_search_logs($1)
@@ -132,7 +105,6 @@ interface(`squid_manage_logs',`
interface(`squid_use',`
gen_require(`
type squid_t;
- class tcp_socket { connectto acceptfrom recvfrom };
')
allow $1 squid_t:tcp_socket { connectto recvfrom };
diff --git a/refpolicy/policy/modules/system/init.if b/refpolicy/policy/modules/system/init.if
index 73bfa56..7c08d2c 100644
--- a/refpolicy/policy/modules/system/init.if
+++ b/refpolicy/policy/modules/system/init.if
@@ -442,40 +442,6 @@ interface(`init_write_script_pipe',`
########################################
##
-## Allow the specified domain to connect to
-## init scripts with a unix domain stream socket.
-##
-##
-## Domain allowed access.
-##
-#
-interface(`init_unix_connect_script',`
- gen_require(`
- type initrc_t;
- ')
-
- allow $1 initrc_t:unix_stream_socket connectto;
-')
-
-########################################
-##
-## Dont audit the specified domain connecting to
-## init scripts with a unix domain stream socket.
-##
-##
-## Domain allowed access.
-##
-#
-interface(`init_dontaudit_unix_connect_script',`
- gen_require(`
- type initrc_t;
- ')
-
- dontaudit $1 initrc_t:unix_stream_socket connectto;
-')
-
-########################################
-##
## Get the attribute of init script entrypoint files.
##
##
@@ -692,6 +658,23 @@ interface(`init_unix_connect_script',`
########################################
##
+## Dont audit the specified domain connecting to
+## init scripts with a unix domain stream socket.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`init_dontaudit_unix_connect_script',`
+ gen_require(`
+ type initrc_t;
+ ')
+
+ dontaudit $1 initrc_t:unix_stream_socket connectto;
+')
+
+########################################
+##
## Send and receive messages from
## init scripts over dbus.
##