1.test_capable_net.te: need to find a way to 
allow capabledomain ifconfig_exec_t:file entrypoint;
Currently, there isn't an api to specify ifconfig_exec_t to be
an entrypoint.
Breaks test01 in capable_net


2. test_dyntrace.te & test_dyntrans.te: base policy  has the rule
"neverallow domain self:process setcurrent;" thus the testdomains
cannot do a "testdomain self:process setcurrent;" and some testcases break.
Breaks test01 in test_dyntrace 
Breaks test01 in test_dyntrans

3. test_readlink.te, test_rxdir.te, test_stat.te: how to get
"allow test_readlink_t ls_exec_t:file entrypoint;"
in refpolicy??? Need this so we can do a domain_trans...
Breaks test01 in test_readlink
Breaks test01 and test03 in test_rxdir
Breaks test01 in test_stat

4. test_task_create.te 
In refpolicy, all types with "domain" attribute are allowed
to fork. The rule "allow test_create_no_t self:process ~fork;"
negates base policy and thus causes an assertion violation.
Breaks test02 in task_create

