[selinux-policy/f18] - Fix label on /etc/group.lock - Allow gnomeclock to create lnk_file in /etc - label /root/.pki as a

Miroslav Grepl mgrepl at fedoraproject.org
Tue Oct 30 21:20:16 UTC 2012


commit 3cc95261d858e322f96dd1dd1ee981ff5df4b983
Author: Miroslav Grepl <mgrepl at redhat.com>
Date:   Tue Oct 30 22:18:44 2012 +0100

    - Fix label on /etc/group.lock
    - Allow gnomeclock to create lnk_file in /etc
    - label /root/.pki as a home_cert_t
    - Add interface to make sure rpcbind.sock is created with the corre
    - Add definition for new directory /var/lib/os-probe and bootloader
    - opendkim should be a part of milter
    - Allow libvirt to set the kernel sched algorythm
    - Allow mongod to read sysfs_t
    - Add authconfig policy
    - Remove calls to miscfiles_read_localization all domains get this
    - Allow virsh_t to read /root/.pki/ content
    - Add label for log directory under /var/www/stickshift

 modules-targeted-contrib.conf |    7 -
 policy-rawhide.patch          |  237 ++++++++++++++++++-------------
 policy_contrib-rawhide.patch  |  316 ++++++++++++++++++++++++++++++++++-------
 selinux-policy.spec           |   16 ++-
 4 files changed, 419 insertions(+), 157 deletions(-)
---
diff --git a/modules-targeted-contrib.conf b/modules-targeted-contrib.conf
index 8e49feb..03eea28 100644
--- a/modules-targeted-contrib.conf
+++ b/modules-targeted-contrib.conf
@@ -579,13 +579,6 @@ dirsrv = module
 # 
 distcc = off
 
-# Layer: services
-# Module: dkim
-#
-# DKIM signing and verifying filter for MTAs
-# 
-dkim = module
-
 # Layer: admin
 # Module: dmidecode
 #
diff --git a/policy-rawhide.patch b/policy-rawhide.patch
index b8161ff..aa40274 100644
--- a/policy-rawhide.patch
+++ b/policy-rawhide.patch
@@ -108998,10 +108998,10 @@ index d218387..c406594 100644
  # used by netlabel to restrict normal domains to same level connections
  mlsconstrain { tcp_socket udp_socket rawip_socket } recvfrom
 diff --git a/policy/modules/admin/bootloader.fc b/policy/modules/admin/bootloader.fc
-index 7a6f06f..530d2df 100644
+index 7a6f06f..bf04b0a 100644
 --- a/policy/modules/admin/bootloader.fc
 +++ b/policy/modules/admin/bootloader.fc
-@@ -1,9 +1,14 @@
+@@ -1,9 +1,16 @@
 -
 +/etc/default/grub	--	gen_context(system_u:object_r:bootloader_etc_t,s0)
  /etc/lilo\.conf.*	--	gen_context(system_u:object_r:bootloader_etc_t,s0)
@@ -109013,12 +109013,14 @@ index 7a6f06f..530d2df 100644
  /sbin/lilo.*		--	gen_context(system_u:object_r:bootloader_exec_t,s0)
  /sbin/ybin.*		--	gen_context(system_u:object_r:bootloader_exec_t,s0)
 +/sbin/zipl			--	gen_context(system_u:object_r:bootloader_exec_t,s0)
- 
--/usr/sbin/grub		--	gen_context(system_u:object_r:bootloader_exec_t,s0)
++
 +/usr/sbin/grub.*	--	gen_context(system_u:object_r:bootloader_exec_t,s0)
 +/usr/sbin/lilo.*	--	gen_context(system_u:object_r:bootloader_exec_t,s0)
 +/usr/sbin/ybin.*	--	gen_context(system_u:object_r:bootloader_exec_t,s0)
 +/usr/sbin/zipl		--	gen_context(system_u:object_r:bootloader_exec_t,s0)
+ 
+-/usr/sbin/grub		--	gen_context(system_u:object_r:bootloader_exec_t,s0)
++/var/lib/os-prober(/.*)?	gen_context(system_u:object_r:bootloader_var_lib_t,s0)
 diff --git a/policy/modules/admin/bootloader.if b/policy/modules/admin/bootloader.if
 index a778bb1..5e914db 100644
 --- a/policy/modules/admin/bootloader.if
@@ -109105,7 +109107,7 @@ index a778bb1..5e914db 100644
 +	files_etc_filetrans($1,bootloader_etc_t,file, "yaboot.conf")
 +')
 diff --git a/policy/modules/admin/bootloader.te b/policy/modules/admin/bootloader.te
-index ab0439a..3ee2ca5 100644
+index ab0439a..803bd27 100644
 --- a/policy/modules/admin/bootloader.te
 +++ b/policy/modules/admin/bootloader.te
 @@ -5,8 +5,8 @@ policy_module(bootloader, 1.13.0)
@@ -109119,7 +109121,7 @@ index ab0439a..3ee2ca5 100644
  
  #
  # boot_runtime_t is the type for /boot/kernel.h,
-@@ -19,14 +19,18 @@ files_type(boot_runtime_t)
+@@ -19,14 +19,21 @@ files_type(boot_runtime_t)
  type bootloader_t;
  type bootloader_exec_t;
  application_domain(bootloader_t, bootloader_exec_t)
@@ -109129,6 +109131,9 @@ index ab0439a..3ee2ca5 100644
 +
 +type bootloader_var_run_t;
 +files_pid_file(bootloader_var_run_t)
++
++type bootloader_var_lib_t;
++files_type(bootloader_var_lib_t)
  
  #
  # bootloader_etc_t is the configuration file,
@@ -109140,7 +109145,7 @@ index ab0439a..3ee2ca5 100644
  
  #
  # The temp file is used for initrd creation;
-@@ -41,7 +45,7 @@ dev_node(bootloader_tmp_t)
+@@ -41,7 +48,7 @@ dev_node(bootloader_tmp_t)
  # bootloader local policy
  #
  
@@ -109149,7 +109154,7 @@ index ab0439a..3ee2ca5 100644
  allow bootloader_t self:process { signal_perms execmem };
  allow bootloader_t self:fifo_file rw_fifo_file_perms;
  
-@@ -59,6 +63,10 @@ files_tmp_filetrans(bootloader_t, bootloader_tmp_t, { dir file lnk_file chr_file
+@@ -59,6 +66,15 @@ files_tmp_filetrans(bootloader_t, bootloader_tmp_t, { dir file lnk_file chr_file
  # for tune2fs (cjp: ?)
  files_root_filetrans(bootloader_t, bootloader_tmp_t, file)
  
@@ -109157,10 +109162,15 @@ index ab0439a..3ee2ca5 100644
 +manage_files_pattern(bootloader_t, bootloader_var_run_t, bootloader_var_run_t)
 +files_pid_filetrans(bootloader_t, bootloader_var_run_t, {dir file })
 +
++manage_dirs_pattern(bootloader_t, bootloader_var_lib_t, bootloader_var_lib_t)
++manage_files_pattern(bootloader_t, bootloader_var_lib_t, bootloader_var_lib_t)
++manage_lnk_files_pattern(bootloader_t, bootloader_var_lib_t, bootloader_var_lib_t)
++files_var_lib_filetrans(bootloader_t, bootloader_var_lib_t, {dir file })
++
  kernel_getattr_core_if(bootloader_t)
  kernel_read_network_state(bootloader_t)
  kernel_read_system_state(bootloader_t)
-@@ -81,6 +89,8 @@ dev_rw_nvram(bootloader_t)
+@@ -81,6 +97,8 @@ dev_rw_nvram(bootloader_t)
  
  fs_getattr_xattr_fs(bootloader_t)
  fs_getattr_tmpfs(bootloader_t)
@@ -109169,7 +109179,7 @@ index ab0439a..3ee2ca5 100644
  fs_read_tmpfs_symlinks(bootloader_t)
  #Needed for ia64
  fs_manage_dos_files(bootloader_t)
-@@ -89,7 +99,9 @@ mls_file_read_all_levels(bootloader_t)
+@@ -89,7 +107,9 @@ mls_file_read_all_levels(bootloader_t)
  mls_file_write_all_levels(bootloader_t)
  
  term_getattr_all_ttys(bootloader_t)
@@ -109179,7 +109189,7 @@ index ab0439a..3ee2ca5 100644
  
  corecmd_exec_all_executables(bootloader_t)
  
-@@ -98,12 +110,14 @@ domain_use_interactive_fds(bootloader_t)
+@@ -98,12 +118,14 @@ domain_use_interactive_fds(bootloader_t)
  files_create_boot_dirs(bootloader_t)
  files_manage_boot_files(bootloader_t)
  files_manage_boot_symlinks(bootloader_t)
@@ -109194,7 +109204,7 @@ index ab0439a..3ee2ca5 100644
  # for nscd
  files_dontaudit_search_pids(bootloader_t)
  # for blkid.tab
-@@ -111,6 +125,7 @@ files_manage_etc_runtime_files(bootloader_t)
+@@ -111,6 +133,7 @@ files_manage_etc_runtime_files(bootloader_t)
  files_etc_filetrans_etc_runtime(bootloader_t, file)
  files_dontaudit_search_home(bootloader_t)
  
@@ -109202,7 +109212,7 @@ index ab0439a..3ee2ca5 100644
  init_getattr_initctl(bootloader_t)
  init_use_script_ptys(bootloader_t)
  init_use_script_fds(bootloader_t)
-@@ -118,19 +133,21 @@ init_rw_script_pipes(bootloader_t)
+@@ -118,19 +141,21 @@ init_rw_script_pipes(bootloader_t)
  
  libs_read_lib_files(bootloader_t)
  libs_exec_lib_files(bootloader_t)
@@ -109227,7 +109237,7 @@ index ab0439a..3ee2ca5 100644
  userdom_dontaudit_search_user_home_dirs(bootloader_t)
  
  ifdef(`distro_debian',`
-@@ -166,7 +183,8 @@ ifdef(`distro_redhat',`
+@@ -166,7 +191,8 @@ ifdef(`distro_redhat',`
  	files_manage_isid_type_chr_files(bootloader_t)
  
  	# for mke2fs
@@ -109237,7 +109247,7 @@ index ab0439a..3ee2ca5 100644
  
  	optional_policy(`
  		unconfined_domain(bootloader_t)
-@@ -174,6 +192,10 @@ ifdef(`distro_redhat',`
+@@ -174,6 +200,10 @@ ifdef(`distro_redhat',`
  ')
  
  optional_policy(`
@@ -109248,7 +109258,7 @@ index ab0439a..3ee2ca5 100644
  	fstools_exec(bootloader_t)
  ')
  
-@@ -183,6 +205,14 @@ optional_policy(`
+@@ -183,6 +213,14 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -109263,7 +109273,7 @@ index ab0439a..3ee2ca5 100644
  	kudzu_domtrans(bootloader_t)
  ')
  
-@@ -195,15 +225,13 @@ optional_policy(`
+@@ -195,17 +233,19 @@ optional_policy(`
  
  optional_policy(`
  	modutils_exec_insmod(bootloader_t)
@@ -109273,14 +109283,18 @@ index ab0439a..3ee2ca5 100644
  	modutils_exec_insmod(bootloader_t)
  	modutils_exec_depmod(bootloader_t)
  	modutils_exec_update_mods(bootloader_t)
--')
--
--optional_policy(`
--	nscd_socket_use(bootloader_t)
 +	modutils_domtrans_insmod_uncond(bootloader_t)
  ')
  
  optional_policy(`
+-	nscd_socket_use(bootloader_t)
++	rpm_rw_pipes(bootloader_t)
+ ')
+ 
+ optional_policy(`
+-	rpm_rw_pipes(bootloader_t)
++	udev_read_pid_files(bootloader_t)
+ ')
 diff --git a/policy/modules/admin/consoletype.fc b/policy/modules/admin/consoletype.fc
 index b7f053b..5d4fc31 100644
 --- a/policy/modules/admin/consoletype.fc
@@ -115320,7 +115334,7 @@ index 6a1e4d1..eee8419 100644
 +	dontaudit $1 domain:socket_class_set { read write };
  ')
 diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
-index cf04cb5..a8f9817 100644
+index cf04cb5..4a81c65 100644
 --- a/policy/modules/kernel/domain.te
 +++ b/policy/modules/kernel/domain.te
 @@ -4,6 +4,21 @@ policy_module(domain, 1.11.0)
@@ -115437,7 +115451,7 @@ index cf04cb5..a8f9817 100644
  
  # Create/access any System V IPC objects.
  allow unconfined_domain_type domain:{ sem msgq shm } *;
-@@ -166,5 +218,258 @@ allow unconfined_domain_type domain:lnk_file { read_lnk_file_perms ioctl lock };
+@@ -166,5 +218,262 @@ allow unconfined_domain_type domain:lnk_file { read_lnk_file_perms ioctl lock };
  # act on all domains keys
  allow unconfined_domain_type domain:key *;
  
@@ -115560,6 +115574,10 @@ index cf04cb5..a8f9817 100644
 +')
 +
 +optional_policy(`
++	rpcbind_filetrans_named_content(unconfined_domain_type)
++')
++
++optional_policy(`
 +	sysnet_filetrans_named_content(unconfined_domain_type)
 +')
 +
@@ -128379,7 +128397,7 @@ index c6fdab7..32f45fa 100644
  	cron_sigchld(application_domain_type)
  ')
 diff --git a/policy/modules/system/authlogin.fc b/policy/modules/system/authlogin.fc
-index 28ad538..38016b7 100644
+index 28ad538..dac7844 100644
 --- a/policy/modules/system/authlogin.fc
 +++ b/policy/modules/system/authlogin.fc
 @@ -1,14 +1,25 @@
@@ -128391,7 +128409,8 @@ index 28ad538..38016b7 100644
  /bin/login		--	gen_context(system_u:object_r:login_exec_t,s0)
  
 -/etc/\.pwd\.lock	--	gen_context(system_u:object_r:shadow_t,s0)
- /etc/group\.lock	--	gen_context(system_u:object_r:shadow_t,s0)
+-/etc/group\.lock	--	gen_context(system_u:object_r:shadow_t,s0)
++/etc/group\.lock	--	gen_context(system_u:object_r:passwd_file_t,s0)
  /etc/gshadow.*		--	gen_context(system_u:object_r:shadow_t,s0)
 -/etc/passwd\.lock	--	gen_context(system_u:object_r:shadow_t,s0)
  /etc/shadow.*		--	gen_context(system_u:object_r:shadow_t,s0)
@@ -131309,7 +131328,7 @@ index d26fe81..98fad18 100644
 +	allow $1 init_t:system undefined;
 +')
 diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
-index 4a88fa1..52b1afc 100644
+index 4a88fa1..533881b 100644
 --- a/policy/modules/system/init.te
 +++ b/policy/modules/system/init.te
 @@ -11,10 +11,24 @@ gen_require(`
@@ -131537,10 +131556,10 @@ index 4a88fa1..52b1afc 100644
 +
 +miscfiles_manage_localization(init_t)
 +miscfiles_filetrans_named_content(init_t)
++
++userdom_use_user_ttys(init_t)
  
 -miscfiles_read_localization(init_t)
-+userdom_use_user_ttys(init_t)
-+
 +allow init_t self:process setsched;
  
  ifdef(`distro_gentoo',`
@@ -131573,14 +131592,15 @@ index 4a88fa1..52b1afc 100644
 +
 +optional_policy(`
 +	gnome_filetrans_home_content(init_t)
-+')
-+
-+optional_policy(`
+ ')
+ 
+ optional_policy(`
+-	auth_rw_login_records(init_t)
 +	modutils_domtrans_insmod(init_t)
 +	modutils_list_module_config(init_t)
-+')
-+
-+optional_policy(`
+ ')
+ 
+ optional_policy(`
 +	postfix_exec(init_t)
 +	postfix_list_spool(init_t)
 +	mta_read_aliases(init_t)
@@ -131702,14 +131722,13 @@ index 4a88fa1..52b1afc 100644
 +
 +optional_policy(`
 +	lvm_rw_pipes(init_t)
- ')
- 
- optional_policy(`
--	auth_rw_login_records(init_t)
++')
++
++optional_policy(`
 +	consolekit_manage_log(init_t)
- ')
- 
- optional_policy(`
++')
++
++optional_policy(`
 +	dbus_connect_system_bus(init_t)
  	dbus_system_bus_client(init_t)
 +	dbus_delete_pid_files(init_t)
@@ -131730,10 +131749,14 @@ index 4a88fa1..52b1afc 100644
  ')
  
  optional_policy(`
-@@ -213,6 +446,22 @@ optional_policy(`
+@@ -213,6 +446,26 @@ optional_policy(`
  ')
  
  optional_policy(`
++	rpcbind_filetrans_named_content(init_t)
++')
++
++optional_policy(`
 +	systemd_filetrans_named_content(init_t)
 +')
 +
@@ -131753,7 +131776,7 @@ index 4a88fa1..52b1afc 100644
  	unconfined_domain(init_t)
  ')
  
-@@ -222,8 +471,9 @@ optional_policy(`
+@@ -222,8 +475,9 @@ optional_policy(`
  #
  
  allow initrc_t self:process { getpgid setsched setpgid setrlimit getsched };
@@ -131765,7 +131788,7 @@ index 4a88fa1..52b1afc 100644
  allow initrc_t self:passwd rootok;
  allow initrc_t self:key manage_key_perms;
  
-@@ -251,12 +501,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
+@@ -251,12 +505,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
  
  allow initrc_t initrc_var_run_t:file manage_file_perms;
  files_pid_filetrans(initrc_t, initrc_var_run_t, file)
@@ -131782,7 +131805,7 @@ index 4a88fa1..52b1afc 100644
  
  manage_dirs_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
  manage_files_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
-@@ -272,23 +526,36 @@ kernel_change_ring_buffer_level(initrc_t)
+@@ -272,23 +530,36 @@ kernel_change_ring_buffer_level(initrc_t)
  kernel_clear_ring_buffer(initrc_t)
  kernel_get_sysvipc_info(initrc_t)
  kernel_read_all_sysctls(initrc_t)
@@ -131825,7 +131848,7 @@ index 4a88fa1..52b1afc 100644
  corenet_tcp_sendrecv_all_ports(initrc_t)
  corenet_udp_sendrecv_all_ports(initrc_t)
  corenet_tcp_connect_all_ports(initrc_t)
-@@ -296,6 +563,7 @@ corenet_sendrecv_all_client_packets(initrc_t)
+@@ -296,6 +567,7 @@ corenet_sendrecv_all_client_packets(initrc_t)
  
  dev_read_rand(initrc_t)
  dev_read_urand(initrc_t)
@@ -131833,7 +131856,7 @@ index 4a88fa1..52b1afc 100644
  dev_write_kmsg(initrc_t)
  dev_write_rand(initrc_t)
  dev_write_urand(initrc_t)
-@@ -306,8 +574,10 @@ dev_write_framebuffer(initrc_t)
+@@ -306,8 +578,10 @@ dev_write_framebuffer(initrc_t)
  dev_read_realtime_clock(initrc_t)
  dev_read_sound_mixer(initrc_t)
  dev_write_sound_mixer(initrc_t)
@@ -131844,7 +131867,7 @@ index 4a88fa1..52b1afc 100644
  dev_delete_lvm_control_dev(initrc_t)
  dev_manage_generic_symlinks(initrc_t)
  dev_manage_generic_files(initrc_t)
-@@ -315,17 +585,16 @@ dev_manage_generic_files(initrc_t)
+@@ -315,17 +589,16 @@ dev_manage_generic_files(initrc_t)
  dev_delete_generic_symlinks(initrc_t)
  dev_getattr_all_blk_files(initrc_t)
  dev_getattr_all_chr_files(initrc_t)
@@ -131864,7 +131887,7 @@ index 4a88fa1..52b1afc 100644
  domain_getsession_all_domains(initrc_t)
  domain_use_interactive_fds(initrc_t)
  # for lsof which is used by alsa shutdown:
-@@ -333,6 +602,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t)
+@@ -333,6 +606,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t)
  domain_dontaudit_getattr_all_tcp_sockets(initrc_t)
  domain_dontaudit_getattr_all_dgram_sockets(initrc_t)
  domain_dontaudit_getattr_all_pipes(initrc_t)
@@ -131872,7 +131895,7 @@ index 4a88fa1..52b1afc 100644
  
  files_getattr_all_dirs(initrc_t)
  files_getattr_all_files(initrc_t)
-@@ -340,8 +610,10 @@ files_getattr_all_symlinks(initrc_t)
+@@ -340,8 +614,10 @@ files_getattr_all_symlinks(initrc_t)
  files_getattr_all_pipes(initrc_t)
  files_getattr_all_sockets(initrc_t)
  files_purge_tmp(initrc_t)
@@ -131884,7 +131907,7 @@ index 4a88fa1..52b1afc 100644
  files_delete_all_pids(initrc_t)
  files_delete_all_pid_dirs(initrc_t)
  files_read_etc_files(initrc_t)
-@@ -357,8 +629,12 @@ files_list_isid_type_dirs(initrc_t)
+@@ -357,8 +633,12 @@ files_list_isid_type_dirs(initrc_t)
  files_mounton_isid_type_dirs(initrc_t)
  files_list_default(initrc_t)
  files_mounton_default(initrc_t)
@@ -131898,7 +131921,7 @@ index 4a88fa1..52b1afc 100644
  fs_list_inotifyfs(initrc_t)
  fs_register_binary_executable_type(initrc_t)
  # rhgb-console writes to ramfs
-@@ -368,9 +644,12 @@ fs_mount_all_fs(initrc_t)
+@@ -368,9 +648,12 @@ fs_mount_all_fs(initrc_t)
  fs_unmount_all_fs(initrc_t)
  fs_remount_all_fs(initrc_t)
  fs_getattr_all_fs(initrc_t)
@@ -131912,7 +131935,7 @@ index 4a88fa1..52b1afc 100644
  mcs_killall(initrc_t)
  mcs_process_set_categories(initrc_t)
  
-@@ -380,6 +659,7 @@ mls_process_read_up(initrc_t)
+@@ -380,6 +663,7 @@ mls_process_read_up(initrc_t)
  mls_process_write_down(initrc_t)
  mls_rangetrans_source(initrc_t)
  mls_fd_share_all_levels(initrc_t)
@@ -131920,7 +131943,7 @@ index 4a88fa1..52b1afc 100644
  
  selinux_get_enforce_mode(initrc_t)
  
-@@ -391,6 +671,7 @@ term_use_all_terms(initrc_t)
+@@ -391,6 +675,7 @@ term_use_all_terms(initrc_t)
  term_reset_tty_labels(initrc_t)
  
  auth_rw_login_records(initrc_t)
@@ -131928,7 +131951,7 @@ index 4a88fa1..52b1afc 100644
  auth_setattr_login_records(initrc_t)
  auth_rw_lastlog(initrc_t)
  auth_read_pam_pid(initrc_t)
-@@ -409,20 +690,18 @@ logging_read_all_logs(initrc_t)
+@@ -409,20 +694,18 @@ logging_read_all_logs(initrc_t)
  logging_append_all_logs(initrc_t)
  logging_read_audit_config(initrc_t)
  
@@ -131952,7 +131975,7 @@ index 4a88fa1..52b1afc 100644
  
  ifdef(`distro_debian',`
  	dev_setattr_generic_dirs(initrc_t)
-@@ -476,6 +755,10 @@ ifdef(`distro_gentoo',`
+@@ -476,6 +759,10 @@ ifdef(`distro_gentoo',`
  	sysnet_setattr_config(initrc_t)
  
  	optional_policy(`
@@ -131963,7 +131986,7 @@ index 4a88fa1..52b1afc 100644
  		alsa_read_lib(initrc_t)
  	')
  
-@@ -496,7 +779,7 @@ ifdef(`distro_redhat',`
+@@ -496,7 +783,7 @@ ifdef(`distro_redhat',`
  
  	# Red Hat systems seem to have a stray
  	# fd open from the initrd
@@ -131972,7 +131995,7 @@ index 4a88fa1..52b1afc 100644
  	files_dontaudit_read_root_files(initrc_t)
  
  	# These seem to be from the initrd
-@@ -511,6 +794,7 @@ ifdef(`distro_redhat',`
+@@ -511,6 +798,7 @@ ifdef(`distro_redhat',`
  	files_create_boot_dirs(initrc_t)
  	files_create_boot_flag(initrc_t)
  	files_rw_boot_symlinks(initrc_t)
@@ -131980,7 +132003,7 @@ index 4a88fa1..52b1afc 100644
  	# wants to read /.fonts directory
  	files_read_default_files(initrc_t)
  	files_mountpoint(initrc_tmp_t)
-@@ -531,6 +815,7 @@ ifdef(`distro_redhat',`
+@@ -531,6 +819,7 @@ ifdef(`distro_redhat',`
  	miscfiles_rw_localization(initrc_t)
  	miscfiles_setattr_localization(initrc_t)
  	miscfiles_relabel_localization(initrc_t)
@@ -131988,7 +132011,7 @@ index 4a88fa1..52b1afc 100644
  
  	miscfiles_read_fonts(initrc_t)
  	miscfiles_read_hwdata(initrc_t)
-@@ -540,8 +825,40 @@ ifdef(`distro_redhat',`
+@@ -540,8 +829,40 @@ ifdef(`distro_redhat',`
  	')
  
  	optional_policy(`
@@ -132029,7 +132052,7 @@ index 4a88fa1..52b1afc 100644
  	')
  
  	optional_policy(`
-@@ -549,14 +866,31 @@ ifdef(`distro_redhat',`
+@@ -549,14 +870,31 @@ ifdef(`distro_redhat',`
  		rpc_write_exports(initrc_t)
  		rpc_manage_nfs_state_data(initrc_t)
  	')
@@ -132061,7 +132084,7 @@ index 4a88fa1..52b1afc 100644
  	')
  ')
  
-@@ -567,6 +901,39 @@ ifdef(`distro_suse',`
+@@ -567,6 +905,39 @@ ifdef(`distro_suse',`
  	')
  ')
  
@@ -132101,7 +132124,7 @@ index 4a88fa1..52b1afc 100644
  optional_policy(`
  	amavis_search_lib(initrc_t)
  	amavis_setattr_pid_files(initrc_t)
-@@ -579,6 +946,8 @@ optional_policy(`
+@@ -579,6 +950,8 @@ optional_policy(`
  optional_policy(`
  	apache_read_config(initrc_t)
  	apache_list_modules(initrc_t)
@@ -132110,7 +132133,7 @@ index 4a88fa1..52b1afc 100644
  ')
  
  optional_policy(`
-@@ -600,6 +969,7 @@ optional_policy(`
+@@ -600,6 +973,7 @@ optional_policy(`
  
  optional_policy(`
  	cgroup_stream_connect_cgred(initrc_t)
@@ -132118,7 +132141,7 @@ index 4a88fa1..52b1afc 100644
  ')
  
  optional_policy(`
-@@ -612,6 +982,17 @@ optional_policy(`
+@@ -612,6 +986,17 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132136,7 +132159,7 @@ index 4a88fa1..52b1afc 100644
  	dev_getattr_printer_dev(initrc_t)
  
  	cups_read_log(initrc_t)
-@@ -628,9 +1009,13 @@ optional_policy(`
+@@ -628,9 +1013,13 @@ optional_policy(`
  	dbus_connect_system_bus(initrc_t)
  	dbus_system_bus_client(initrc_t)
  	dbus_read_config(initrc_t)
@@ -132150,7 +132173,7 @@ index 4a88fa1..52b1afc 100644
  	')
  
  	optional_policy(`
-@@ -655,6 +1040,10 @@ optional_policy(`
+@@ -655,6 +1044,10 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132161,7 +132184,7 @@ index 4a88fa1..52b1afc 100644
  	gpm_setattr_gpmctl(initrc_t)
  ')
  
-@@ -672,6 +1061,15 @@ optional_policy(`
+@@ -672,6 +1065,15 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132177,7 +132200,7 @@ index 4a88fa1..52b1afc 100644
  	inn_exec_config(initrc_t)
  ')
  
-@@ -712,6 +1110,7 @@ optional_policy(`
+@@ -712,6 +1114,7 @@ optional_policy(`
  	lpd_list_spool(initrc_t)
  
  	lpd_read_config(initrc_t)
@@ -132185,7 +132208,7 @@ index 4a88fa1..52b1afc 100644
  ')
  
  optional_policy(`
-@@ -729,7 +1128,14 @@ optional_policy(`
+@@ -729,7 +1132,14 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132200,7 +132223,7 @@ index 4a88fa1..52b1afc 100644
  	mta_dontaudit_read_spool_symlinks(initrc_t)
  ')
  
-@@ -752,6 +1158,10 @@ optional_policy(`
+@@ -752,6 +1162,10 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132211,7 +132234,7 @@ index 4a88fa1..52b1afc 100644
  	postgresql_manage_db(initrc_t)
  	postgresql_read_config(initrc_t)
  ')
-@@ -761,10 +1171,20 @@ optional_policy(`
+@@ -761,10 +1175,20 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132232,7 +132255,7 @@ index 4a88fa1..52b1afc 100644
  	quota_manage_flags(initrc_t)
  ')
  
-@@ -773,6 +1193,10 @@ optional_policy(`
+@@ -773,6 +1197,10 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132243,7 +132266,7 @@ index 4a88fa1..52b1afc 100644
  	fs_write_ramfs_sockets(initrc_t)
  	fs_search_ramfs(initrc_t)
  
-@@ -794,8 +1218,6 @@ optional_policy(`
+@@ -794,8 +1222,6 @@ optional_policy(`
  	# bash tries ioctl for some reason
  	files_dontaudit_ioctl_all_pids(initrc_t)
  
@@ -132252,7 +132275,7 @@ index 4a88fa1..52b1afc 100644
  ')
  
  optional_policy(`
-@@ -804,6 +1226,10 @@ optional_policy(`
+@@ -804,6 +1230,10 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132263,7 +132286,7 @@ index 4a88fa1..52b1afc 100644
  	# shorewall-init script run /var/lib/shorewall/firewall
  	shorewall_lib_domtrans(initrc_t)
  ')
-@@ -813,10 +1239,12 @@ optional_policy(`
+@@ -813,10 +1243,12 @@ optional_policy(`
  	squid_manage_logs(initrc_t)
  ')
  
@@ -132276,7 +132299,7 @@ index 4a88fa1..52b1afc 100644
  
  optional_policy(`
  	ssh_dontaudit_read_server_keys(initrc_t)
-@@ -828,8 +1256,6 @@ optional_policy(`
+@@ -828,8 +1260,6 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132285,7 +132308,7 @@ index 4a88fa1..52b1afc 100644
  	udev_manage_pid_files(initrc_t)
  	udev_manage_pid_dirs(initrc_t)
  	udev_manage_rules_files(initrc_t)
-@@ -840,12 +1266,30 @@ optional_policy(`
+@@ -840,12 +1270,30 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132318,7 +132341,7 @@ index 4a88fa1..52b1afc 100644
  
  	ifdef(`distro_redhat',`
  		# system-config-services causes avc messages that should be dontaudited
-@@ -855,6 +1299,18 @@ optional_policy(`
+@@ -855,6 +1303,18 @@ optional_policy(`
  	optional_policy(`
  		mono_domtrans(initrc_t)
  	')
@@ -132337,7 +132360,7 @@ index 4a88fa1..52b1afc 100644
  ')
  
  optional_policy(`
-@@ -870,6 +1326,10 @@ optional_policy(`
+@@ -870,6 +1330,10 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -132348,7 +132371,7 @@ index 4a88fa1..52b1afc 100644
  	# Set device ownerships/modes.
  	xserver_setattr_console_pipes(initrc_t)
  
-@@ -880,3 +1340,178 @@ optional_policy(`
+@@ -880,3 +1344,178 @@ optional_policy(`
  optional_policy(`
  	zebra_read_config(initrc_t)
  ')
@@ -133020,10 +133043,15 @@ index 0646ee7..f0e41a1 100644
  ')
  
 diff --git a/policy/modules/system/libraries.fc b/policy/modules/system/libraries.fc
-index ef8bbaf..0fbc39e 100644
+index ef8bbaf..a21d5fe 100644
 --- a/policy/modules/system/libraries.fc
 +++ b/policy/modules/system/libraries.fc
-@@ -28,14 +28,17 @@ ifdef(`distro_redhat',`
+@@ -1,3 +1,4 @@
++
+ #
+ # /emul
+ #
+@@ -28,14 +29,17 @@ ifdef(`distro_redhat',`
  # /etc
  #
  /etc/ld\.so\.cache			--	gen_context(system_u:object_r:ld_so_cache_t,s0)
@@ -133042,7 +133070,7 @@ index ef8bbaf..0fbc39e 100644
  /lib/.*						gen_context(system_u:object_r:lib_t,s0)
  /lib/ld-[^/]*\.so(\.[^/]*)*		--	gen_context(system_u:object_r:ld_so_t,s0)
  
-@@ -52,9 +55,8 @@ ifdef(`distro_gentoo',`
+@@ -52,9 +56,8 @@ ifdef(`distro_gentoo',`
  #
  # /opt
  #
@@ -133053,7 +133081,7 @@ index ef8bbaf..0fbc39e 100644
  /opt/(.*/)?java/.+\.jar			--	gen_context(system_u:object_r:lib_t,s0)
  /opt/(.*/)?jre.*/.+\.so(\.[^/]*)*	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /opt/(.*/)?jre/.+\.jar			--	gen_context(system_u:object_r:lib_t,s0)
-@@ -103,6 +105,12 @@ ifdef(`distro_redhat',`
+@@ -103,6 +106,12 @@ ifdef(`distro_redhat',`
  #
  # /usr
  #
@@ -133066,7 +133094,7 @@ index ef8bbaf..0fbc39e 100644
  /usr/(.*/)?/HelixPlayer/.+\.so(\.[^/]*)* --	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/(.*/)?/RealPlayer/.+\.so(\.[^/]*)* --	gen_context(system_u:object_r:textrel_shlib_t,s0)
  
-@@ -111,12 +119,12 @@ ifdef(`distro_redhat',`
+@@ -111,12 +120,12 @@ ifdef(`distro_redhat',`
  /usr/(.*/)?java/.+\.jsa			--	gen_context(system_u:object_r:lib_t,s0)
  
  /usr/(.*/)?lib(/.*)?				gen_context(system_u:object_r:lib_t,s0)
@@ -133081,7 +133109,7 @@ index ef8bbaf..0fbc39e 100644
  /usr/lib/altivec/libavcodec\.so(\.[^/]*)* --	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib/cedega/.+\.so(\.[^/]*)*	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib/vlc/video_chroma/libi420_rgb_mmx_plugin\.so --	gen_context(system_u:object_r:textrel_shlib_t,s0)
-@@ -140,6 +148,8 @@ ifdef(`distro_redhat',`
+@@ -140,6 +149,8 @@ ifdef(`distro_redhat',`
  /usr/lib/ati-fglrx/.+\.so(\..*)?	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib/fglrx/.*\.so(\.[^/]*)*		--	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib/libjs\.so.*			--	gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -133090,7 +133118,7 @@ index ef8bbaf..0fbc39e 100644
  /usr/lib/sse2/libx264\.so(\.[^/]*)* 	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib(/.*)?/libnvidia.+\.so(\.[^/]*)* --	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib(/.*)?/nvidia_drv.*\.so(\.[^/]*)* --	gen_context(system_u:object_r:textrel_shlib_t,s0)
-@@ -147,12 +157,11 @@ ifdef(`distro_redhat',`
+@@ -147,12 +158,11 @@ ifdef(`distro_redhat',`
  /usr/lib/nvidia-graphics(-[^/]*/)?libGL(core)?\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib/nvidia-graphics(-[^/]*/)?libnvidia.*\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib/nvidia-graphics(-[^/]*/)?libXvMCNVIDIA\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -133106,7 +133134,7 @@ index ef8bbaf..0fbc39e 100644
  /usr/NX/lib/libXcomp\.so.*		--	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/NX/lib/libjpeg\.so.* 		--	gen_context(system_u:object_r:textrel_shlib_t,s0)
  
-@@ -181,6 +190,7 @@ ifdef(`distro_redhat',`
+@@ -181,11 +191,13 @@ ifdef(`distro_redhat',`
  # Fedora Core packages: gstreamer-plugins, compat-libstdc++, Glide3, libdv
  # 	HelixPlayer, SDL, xorg-x11, xorg-x11-libs, Hermes, valgrind, openoffice.org-libs, httpd - php
  HOME_DIR/.*/plugins/nppdf\.so.* 	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -133114,7 +133142,13 @@ index ef8bbaf..0fbc39e 100644
  /usr/lib/allegro/(.*/)?alleg-vga\.so	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib/firefox-[^/]*/extensions(/.*)?/libqfaservices.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib/firefox-[^/]*/plugins/nppdf.so	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
-@@ -240,14 +250,10 @@ HOME_DIR/.*/plugins/nppdf\.so.* 	--	gen_context(system_u:object_r:textrel_shlib_
+ /usr/lib/firefox/plugins/libractrl\.so	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib/libFLAC\.so.*			--	gen_context(system_u:object_r:textrel_shlib_t,s0)
++/usr/lib/dri/fglrx_dri.so.* 		--	gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib/libfglrx_gamma\.so.* 		--	gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib/mozilla/plugins/nppdf\.so 	-- 	gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib/mozilla/plugins/libvlcplugin\.so --	gen_context(system_u:object_r:textrel_shlib_t,s0)
+@@ -240,14 +252,10 @@ HOME_DIR/.*/plugins/nppdf\.so.* 	--	gen_context(system_u:object_r:textrel_shlib_
  
  # Livna.org packages: xmms-mp3, ffmpeg, xvidcore, xine-lib, gsm, lame
  /usr/lib.*/libmpg123\.so(\.[^/]*)*	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -133130,7 +133164,7 @@ index ef8bbaf..0fbc39e 100644
  
  # Jai, Sun Microsystems (Jpackage SPRM)
  /usr/lib/libmlib_jai\.so		--	gen_context(system_u:object_r:textrel_shlib_t,s0)
-@@ -269,20 +275,19 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* --	gen_context(system_u:object_r:te
+@@ -269,20 +277,19 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* --	gen_context(system_u:object_r:te
  
  # Java, Sun Microsystems (JPackage SRPM)
  /usr/(.*/)?jre.*/.*\.so(\.[^/]*)*	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -133161,7 +133195,7 @@ index ef8bbaf..0fbc39e 100644
  
  /usr/(.*/)?intellinux/SPPlugins/ADMPlugin\.apl -- gen_context(system_u:object_r:textrel_shlib_t,s0)
  
-@@ -299,17 +304,150 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* --	gen_context(system_u:object_r:te
+@@ -299,17 +306,151 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* --	gen_context(system_u:object_r:te
  #
  /var/cache/ldconfig(/.*)?			gen_context(system_u:object_r:ldconfig_cache_t,s0)
  
@@ -133256,6 +133290,10 @@ index ef8bbaf..0fbc39e 100644
 +
 +/usr/lib/.*/libflashplayer\.so.*	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
 +
++/usr/lib/xorg/modules/dri/.+\.so	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
++/usr/X11R6/lib/modules/dri/.+\.so	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
++/usr/lib/dri/.+\.so		--	gen_context(system_u:object_r:textrel_shlib_t,s0)
++
 +ifdef(`fixed',`
 +/usr/lib/libavfilter\.so(\..*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0)
 +/usr/lib/libavdevice\.so.*	 --	gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -133274,9 +133312,6 @@ index ef8bbaf..0fbc39e 100644
 +/usr/lib/xulrunner-[^/]*/libxul\.so --	gen_context(system_u:object_r:textrel_shlib_t,s0)
 +# Flash plugin, Macromedia
 +/usr/lib/php/modules/.+\.so	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
-+/usr/lib/xorg/modules/dri/.+\.so	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
-+/usr/X11R6/lib/modules/dri/.+\.so	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
-+/usr/lib/dri/.+\.so		--	gen_context(system_u:object_r:textrel_shlib_t,s0)
 +/usr/lib/httpd/modules/libphp5\.so	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
 +')
 +/opt/VBoxGuestAdditions.*/lib/VBox.*\.so	--	gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -135159,7 +135194,7 @@ index fe3427d..2a501db 100644
  /var/named/chroot/etc/pki(/.*)? gen_context(system_u:object_r:cert_t,s0)
  
 diff --git a/policy/modules/system/miscfiles.if b/policy/modules/system/miscfiles.if
-index 926ba65..1c044d6 100644
+index 926ba65..9cac7b3 100644
 --- a/policy/modules/system/miscfiles.if
 +++ b/policy/modules/system/miscfiles.if
 @@ -106,6 +106,24 @@ interface(`miscfiles_manage_generic_cert_dirs',`
@@ -135265,19 +135300,20 @@ index 926ba65..1c044d6 100644
  ##	Read public files used for file
  ##	transfer services.
  ## </summary>
-@@ -744,8 +796,9 @@ interface(`miscfiles_etc_filetrans_localization',`
+@@ -744,8 +796,10 @@ interface(`miscfiles_etc_filetrans_localization',`
  		type locale_t;
  	')
  
 -	files_etc_filetrans($1, locale_t, file)
 -
++	files_etc_filetrans($1, locale_t, lnk_file)
 +	files_etc_filetrans($1, locale_t, {lnk_file file}, "localtime" )
 +	files_etc_filetrans($1, locale_t, file, "locale.conf" )
 +	files_etc_filetrans($1, locale_t, file, "timezone" )
  ')
  
  ########################################
-@@ -769,3 +822,43 @@ interface(`miscfiles_manage_localization',`
+@@ -769,3 +823,43 @@ interface(`miscfiles_manage_localization',`
  	manage_lnk_files_pattern($1, locale_t, locale_t)
  ')
  
@@ -141363,10 +141399,10 @@ index 0280b32..61f19e9 100644
 -')
 +attribute unconfined_services;
 diff --git a/policy/modules/system/userdomain.fc b/policy/modules/system/userdomain.fc
-index db75976..ce61aed 100644
+index db75976..65191bd 100644
 --- a/policy/modules/system/userdomain.fc
 +++ b/policy/modules/system/userdomain.fc
-@@ -1,4 +1,20 @@
+@@ -1,4 +1,21 @@
  HOME_DIR	-d	gen_context(system_u:object_r:user_home_dir_t,s0-mls_systemhigh)
 +HOME_DIR	-l	gen_context(system_u:object_r:user_home_dir_t,s0-mls_systemhigh)
  HOME_DIR/.+		gen_context(system_u:object_r:user_home_t,s0)
@@ -141374,6 +141410,7 @@ index db75976..ce61aed 100644
  /tmp/gconfd-USER -d	gen_context(system_u:object_r:user_tmp_t,s0)
 +/root(/.*)?	 	gen_context(system_u:object_r:admin_home_t,s0)
 +/root/\.cert(/.*)?	gen_context(system_u:object_r:home_cert_t,s0)
++/root/\.pki(/.*)?	gen_context(system_u:object_r:home_cert_t,s0)
 +/root/\.debug(/.*)?	<<none>>
 +/dev/shm/pulse-shm.*	gen_context(system_u:object_r:user_tmpfs_t,s0)
 +/dev/shm/mono.*		gen_context(system_u:object_r:user_tmpfs_t,s0)
diff --git a/policy_contrib-rawhide.patch b/policy_contrib-rawhide.patch
index 83f2d78..f495c39 100644
--- a/policy_contrib-rawhide.patch
+++ b/policy_contrib-rawhide.patch
@@ -2072,7 +2072,7 @@ index 0000000..feabdf3
 +        files_getattr_all_sockets(antivirus_domain)
 +')
 diff --git a/apache.fc b/apache.fc
-index fd9fa07..50e40f7 100644
+index fd9fa07..9ac41bc 100644
 --- a/apache.fc
 +++ b/apache.fc
 @@ -1,39 +1,57 @@
@@ -2217,7 +2217,7 @@ index fd9fa07..50e40f7 100644
  
  /var/spool/gosa(/.*)?			gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
  /var/spool/squirrelmail(/.*)?		gen_context(system_u:object_r:squirrelmail_spool_t,s0)
-@@ -109,3 +146,25 @@ ifdef(`distro_debian', `
+@@ -109,3 +146,26 @@ ifdef(`distro_debian', `
  /var/www/cgi-bin(/.*)?			gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
  /var/www/icons(/.*)?			gen_context(system_u:object_r:httpd_sys_content_t,s0)
  /var/www/perl(/.*)?			gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
@@ -2235,6 +2235,7 @@ index fd9fa07..50e40f7 100644
 +
 +/var/www/moodledata(/.*)?		gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
 +
++/var/www/stickshift/[^/]*/log(/.*)?		gen_context(system_u:object_r:httpd_log_t,s0)
 +/var/www/svn(/.*)?			gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
 +/var/www/svn/hooks(/.*)?		gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
 +/var/www/svn/conf(/.*)?			gen_context(system_u:object_r:httpd_sys_content_t,s0)
@@ -4880,6 +4881,192 @@ index 159610b..164b672 100644
  	mysql_stream_connect(asterisk_t)
  ')
  
+diff --git a/authconfig.fc b/authconfig.fc
+new file mode 100644
+index 0000000..86bbf21
+--- /dev/null
++++ b/authconfig.fc
+@@ -0,0 +1,3 @@
++/usr/share/authconfig/authconfig.py		--	gen_context(system_u:object_r:authconfig_exec_t,s0)
++
++/var/lib/authconfig(/.*)?		gen_context(system_u:object_r:authconfig_var_lib_t,s0)
+diff --git a/authconfig.if b/authconfig.if
+new file mode 100644
+index 0000000..98ab9ed
+--- /dev/null
++++ b/authconfig.if
+@@ -0,0 +1,132 @@
++
++## <summary>policy for authconfig</summary>
++
++########################################
++## <summary>
++##	Execute TEMPLATE in the authconfig domin.
++## </summary>
++## <param name="domain">
++## <summary>
++##	Domain allowed to transition.
++## </summary>
++## </param>
++#
++interface(`authconfig_domtrans',`
++	gen_require(`
++		type authconfig_t, authconfig_exec_t;
++	')
++
++	corecmd_search_bin($1)
++	domtrans_pattern($1, authconfig_exec_t, authconfig_t)
++')
++
++########################################
++## <summary>
++##	Search authconfig lib directories.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`authconfig_search_lib',`
++	gen_require(`
++		type authconfig_var_lib_t;
++	')
++
++	allow $1 authconfig_var_lib_t:dir search_dir_perms;
++	files_search_var_lib($1)
++')
++
++########################################
++## <summary>
++##	Read authconfig lib files.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`authconfig_read_lib_files',`
++	gen_require(`
++		type authconfig_var_lib_t;
++	')
++
++	files_search_var_lib($1)
++	read_files_pattern($1, authconfig_var_lib_t, authconfig_var_lib_t)
++')
++
++########################################
++## <summary>
++##	Manage authconfig lib files.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`authconfig_manage_lib_files',`
++	gen_require(`
++		type authconfig_var_lib_t;
++	')
++
++	files_search_var_lib($1)
++	manage_files_pattern($1, authconfig_var_lib_t, authconfig_var_lib_t)
++')
++
++########################################
++## <summary>
++##	Manage authconfig lib directories.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`authconfig_manage_lib_dirs',`
++	gen_require(`
++		type authconfig_var_lib_t;
++	')
++
++	files_search_var_lib($1)
++	manage_dirs_pattern($1, authconfig_var_lib_t, authconfig_var_lib_t)
++')
++
++
++########################################
++## <summary>
++##	All of the rules required to administrate
++##	an authconfig environment
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++## <param name="role">
++##	<summary>
++##	Role allowed access.
++##	</summary>
++## </param>
++## <rolecap/>
++#
++interface(`authconfig_admin',`
++	gen_require(`
++		type authconfig_t;
++		type authconfig_var_lib_t;
++	')
++
++	allow $1 authconfig_t:process { ptrace signal_perms };
++	ps_process_pattern($1, authconfig_t)
++
++	files_search_var_lib($1)
++	admin_pattern($1, authconfig_var_lib_t)
++	optional_policy(`
++		systemd_passwd_agent_exec($1)
++		systemd_read_fifo_file_passwd_run($1)
++	')
++')
+diff --git a/authconfig.te b/authconfig.te
+new file mode 100644
+index 0000000..aeea7cf
+--- /dev/null
++++ b/authconfig.te
+@@ -0,0 +1,33 @@
++policy_module(authconfig, 1.0.0)
++
++########################################
++#
++# Declarations
++#
++
++type authconfig_t;
++type authconfig_exec_t;
++application_domain(authconfig_t, authconfig_exec_t)
++
++type authconfig_var_lib_t;
++files_type(authconfig_var_lib_t)
++
++########################################
++#
++# authconfig local policy
++#
++allow authconfig_t self:fifo_file rw_fifo_file_perms;
++allow authconfig_t self:unix_stream_socket create_stream_socket_perms;
++
++manage_dirs_pattern(authconfig_t, authconfig_var_lib_t, authconfig_var_lib_t)
++manage_files_pattern(authconfig_t, authconfig_var_lib_t, authconfig_var_lib_t)
++manage_lnk_files_pattern(authconfig_t, authconfig_var_lib_t, authconfig_var_lib_t)
++files_var_lib_filetrans(authconfig_t, authconfig_var_lib_t, { dir file lnk_file })
++
++domain_use_interactive_fds(authconfig_t)
++
++files_read_etc_files(authconfig_t)
++
++init_domtrans_script(authconfig_t)
++
++unconfined_domain_noaudit(authconfig_t)
 diff --git a/automount.fc b/automount.fc
 index f16ab68..e4178a4 100644
 --- a/automount.fc
@@ -9437,10 +9624,10 @@ index 0000000..8ac848b
 +')
 diff --git a/cloudform.te b/cloudform.te
 new file mode 100644
-index 0000000..7a7220c
+index 0000000..1e73280
 --- /dev/null
 +++ b/cloudform.te
-@@ -0,0 +1,198 @@
+@@ -0,0 +1,199 @@
 +policy_module(cloudform, 1.0)
 +########################################
 +#
@@ -9499,6 +9686,7 @@ index 0000000..7a7220c
 +
 +dev_read_rand(cloudform_domain)
 +dev_read_urand(cloudform_domain)
++dev_read_sysfs(cloudform_domain)
 +
 +files_read_etc_files(cloudform_domain)
 +
@@ -16513,7 +16701,7 @@ index f706b99..aa049fc 100644
 +	#logging_log_filetrans($1, devicekit_var_log_t, file, "pm-suspend.log")
  ')
 diff --git a/devicekit.te b/devicekit.te
-index 1819518..4848cfe 100644
+index 1819518..1363f96 100644
 --- a/devicekit.te
 +++ b/devicekit.te
 @@ -7,15 +7,15 @@ policy_module(devicekit, 1.2.0)
@@ -16642,7 +16830,7 @@ index 1819518..4848cfe 100644
  	udev_domtrans(devicekit_disk_t)
  	udev_read_db(devicekit_disk_t)
  ')
-@@ -178,55 +194,83 @@ optional_policy(`
+@@ -178,55 +194,84 @@ optional_policy(`
  	virt_manage_images(devicekit_disk_t)
  ')
  
@@ -16660,6 +16848,7 @@ index 1819518..4848cfe 100644
 -allow devicekit_power_t self:capability { dac_override net_admin sys_admin sys_tty_config sys_nice sys_ptrace };
 -allow devicekit_power_t self:process getsched;
 +allow devicekit_power_t self:capability { dac_override net_admin sys_admin sys_tty_config sys_nice };
++allow devicekit_power_t self:capability2 compromise_kernel;
 +allow devicekit_power_t self:process { getsched signal_perms };
  allow devicekit_power_t self:fifo_file rw_fifo_file_perms;
  allow devicekit_power_t self:unix_dgram_socket create_socket_perms;
@@ -16733,7 +16922,7 @@ index 1819518..4848cfe 100644
  
  userdom_read_all_users_state(devicekit_power_t)
  
-@@ -235,10 +279,16 @@ optional_policy(`
+@@ -235,10 +280,16 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -16750,7 +16939,7 @@ index 1819518..4848cfe 100644
  	dbus_system_bus_client(devicekit_power_t)
  
  	allow devicekit_power_t devicekit_t:dbus send_msg;
-@@ -261,14 +311,21 @@ optional_policy(`
+@@ -261,14 +312,21 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -16773,7 +16962,7 @@ index 1819518..4848cfe 100644
  	policykit_dbus_chat(devicekit_power_t)
  	policykit_domtrans_auth(devicekit_power_t)
  	policykit_read_lib(devicekit_power_t)
-@@ -276,9 +333,31 @@ optional_policy(`
+@@ -276,9 +334,31 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -26889,10 +27078,10 @@ index 0000000..1b3514a
 +
 diff --git a/isnsd.te b/isnsd.te
 new file mode 100644
-index 0000000..fa4b4d7
+index 0000000..951fbae
 --- /dev/null
 +++ b/isnsd.te
-@@ -0,0 +1,51 @@
+@@ -0,0 +1,52 @@
 +policy_module(isnsd, 1.0.0)
 +
 +########################################
@@ -26922,6 +27111,7 @@ index 0000000..fa4b4d7
 +allow isnsd_t self:process { signal };
 +
 +allow isnsd_t self:fifo_file rw_fifo_file_perms;
++allow isnsd_t self:tcp_socket { listen };
 +allow isnsd_t self:udp_socket { listen };
 +allow isnsd_t self:unix_stream_socket create_stream_socket_perms;
 +
@@ -28148,7 +28338,7 @@ index 4198ff5..d1ab262 100644
 +	allow $1 kdump_unit_file_t:service all_service_perms;
  ')
 diff --git a/kdump.te b/kdump.te
-index b29d8e2..7bc0ab1 100644
+index b29d8e2..6a6dcf0 100644
 --- a/kdump.te
 +++ b/kdump.te
 @@ -15,15 +15,28 @@ files_config_file(kdump_etc_t)
@@ -28180,7 +28370,7 @@ index b29d8e2..7bc0ab1 100644
  files_read_etc_runtime_files(kdump_t)
  files_read_kernel_img(kdump_t)
  
-@@ -36,3 +49,85 @@ dev_read_framebuffer(kdump_t)
+@@ -36,3 +49,87 @@ dev_read_framebuffer(kdump_t)
  dev_read_sysfs(kdump_t)
  
  term_use_console(kdump_t)
@@ -28201,9 +28391,11 @@ index b29d8e2..7bc0ab1 100644
 +allow kdumpctl_t self:unix_stream_socket create_stream_socket_perms;
 +
 +manage_dirs_pattern(kdumpctl_t, kdumpctl_tmp_t, kdumpctl_tmp_t)
++manage_chr_files_pattern(kdumpctl_t, kdumpctl_tmp_t, kdumpctl_tmp_t)
 +manage_files_pattern(kdumpctl_t, kdumpctl_tmp_t, kdumpctl_tmp_t)
 +manage_lnk_files_pattern(kdumpctl_t, kdumpctl_tmp_t, kdumpctl_tmp_t)
 +files_tmp_filetrans(kdumpctl_t, kdumpctl_tmp_t, { file dir lnk_file })
++can_exec(kdumpctl_t, kdumpctl_tmp_t)
 +
 +read_files_pattern(kdumpctl_t, kdump_etc_t, kdump_etc_t)
 +
@@ -32334,13 +32526,14 @@ index b681608..9c4fc55 100644
  
 -miscfiles_read_localization(memcached_t)
 diff --git a/milter.fc b/milter.fc
-index 1ec5a6c..9485753 100644
+index 1ec5a6c..64ac6f0 100644
 --- a/milter.fc
 +++ b/milter.fc
-@@ -1,13 +1,21 @@
+@@ -1,15 +1,26 @@
 +/etc/mail/dkim-milter/keys(/.*)?        gen_context(system_u:object_r:dkim_milter_private_key_t,s0)
 +
 +/usr/sbin/dkim-filter           --      gen_context(system_u:object_r:dkim_milter_exec_t,s0)
++/usr/sbin/opendkim      --  gen_context(system_u:object_r:dkim_milter_exec_t,s0)
  /usr/sbin/milter-greylist	--	gen_context(system_u:object_r:greylist_milter_exec_t,s0)
 -/usr/sbin/milter-regex		--	gen_context(system_u:object_r:regex_milter_exec_t,s0)
 +/usr/sbin/sqlgrey       --      gen_context(system_u:object_r:greylist_milter_exec_t,s0)
@@ -32359,7 +32552,11 @@ index 1ec5a6c..9485753 100644
 +/var/run/sqlgrey\.pid    	--      gen_context(system_u:object_r:greylist_milter_data_t,s0)
  /var/run/spamass-milter(/.*)?		gen_context(system_u:object_r:spamass_milter_data_t,s0)
  /var/run/spamass-milter\.pid	--	gen_context(system_u:object_r:spamass_milter_data_t,s0)
++/var/run/opendkim(/.*)?         gen_context(system_u:object_r:dkim_milter_data_t,s0)
  
+ /var/spool/milter-regex(/.*)?		gen_context(system_u:object_r:regex_milter_data_t,s0)
+ /var/spool/postfix/spamass(/.*)?	gen_context(system_u:object_r:spamass_milter_data_t,s0)
++/var/spool/opendkim(/.*)?       gen_context(system_u:object_r:dkim_milter_data_t,s0)
 diff --git a/milter.if b/milter.if
 index ee72cbe..bdf319a 100644
 --- a/milter.if
@@ -33657,7 +33854,7 @@ index b397fde..c7c031d 100644
 +')
 +
 diff --git a/mozilla.te b/mozilla.te
-index d4fcb75..1c81b41 100644
+index d4fcb75..a54e4ec 100644
 --- a/mozilla.te
 +++ b/mozilla.te
 @@ -7,19 +7,34 @@ policy_module(mozilla, 2.6.0)
@@ -33857,7 +34054,7 @@ index d4fcb75..1c81b41 100644
 -files_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file })
 -userdom_user_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file })
 +manage_sock_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
-+files_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file sock_file })
++files_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file sock_file lnk_file })
 +userdom_user_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file sock_file })
 +xserver_xdm_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file sock_file lnk_file })
 +can_exec(mozilla_plugin_t, mozilla_plugin_tmp_t)
@@ -44460,10 +44657,10 @@ index 0000000..83c13cf
 +
 diff --git a/pki.te b/pki.te
 new file mode 100644
-index 0000000..5e5f291
+index 0000000..733a153
 --- /dev/null
 +++ b/pki.te
-@@ -0,0 +1,289 @@
+@@ -0,0 +1,287 @@
 +policy_module(pki,10.0.11)
 +
 +########################################
@@ -44725,8 +44922,6 @@ index 0000000..5e5f291
 +domain_dontaudit_read_all_domains_state(pki_apache_domain)
 +ps_process_pattern(pki_apache_domain, pki_apache_domain)
 +
-+miscfiles_read_localization(pki_apache_domain)
-+
 +sysnet_read_config(pki_apache_domain)
 +
 +ifdef(`targeted_policy',`
@@ -52453,10 +52648,10 @@ index 0000000..e38693b
 +')
 diff --git a/realmd.te b/realmd.te
 new file mode 100644
-index 0000000..b1347a4
+index 0000000..8ef2a1b
 --- /dev/null
 +++ b/realmd.te
-@@ -0,0 +1,93 @@
+@@ -0,0 +1,97 @@
 +policy_module(realmd, 1.0.0)
 +
 +########################################
@@ -52503,6 +52698,10 @@ index 0000000..b1347a4
 +#userdom_user_home_dir_filetrans(realmd_t, cache_home_t, dir, ".cache")
 +
 +optional_policy(`
++	authconfig_domtrans(realmd_t)
++')
++
++optional_policy(`
 +	dbus_system_domain(realmd_t, realmd_exec_t)
 +
 +	optional_policy(`
@@ -54846,10 +55045,10 @@ index 0000000..8b505d5
 +')
 diff --git a/rngd.te b/rngd.te
 new file mode 100644
-index 0000000..243ecf9
+index 0000000..868faed
 --- /dev/null
 +++ b/rngd.te
-@@ -0,0 +1,39 @@
+@@ -0,0 +1,37 @@
 +policy_module(rngd, 1.0.0)
 +
 +########################################
@@ -54887,8 +55086,6 @@ index 0000000..243ecf9
 +files_read_etc_files(rngd_t)
 +
 +logging_send_syslog_msg(rngd_t)
-+
-+miscfiles_read_localization(rngd_t)
 diff --git a/roundup.if b/roundup.if
 index 30c4b75..e07c2ff 100644
 --- a/roundup.if
@@ -55463,7 +55660,7 @@ index f5c47d6..164ce1f 100644
 -/var/run/rpcbind\.sock	-s	gen_context(system_u:object_r:rpcbind_var_run_t,s0)
 +/var/run/rpcbind.*		gen_context(system_u:object_r:rpcbind_var_run_t,s0)
 diff --git a/rpcbind.if b/rpcbind.if
-index a96249c..5f38427 100644
+index a96249c..54e6f2d 100644
 --- a/rpcbind.if
 +++ b/rpcbind.if
 @@ -34,8 +34,7 @@ interface(`rpcbind_stream_connect',`
@@ -55476,7 +55673,7 @@ index a96249c..5f38427 100644
  ')
  
  ########################################
-@@ -117,6 +116,24 @@ interface(`rpcbind_manage_lib_files',`
+@@ -117,6 +116,42 @@ interface(`rpcbind_manage_lib_files',`
  
  ########################################
  ## <summary>
@@ -55498,10 +55695,28 @@ index a96249c..5f38427 100644
 +
 +########################################
 +## <summary>
++##	Transition to rpcbind named content
++## </summary>
++## <param name="domain">
++##	<summary>
++##      Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`rpcbind_filetrans_named_content',`
++	gen_require(`
++		type rpcbind_var_run_t;
++	')
++
++	files_pid_filetrans($1, rpcbind_var_run_t, sock_file, "rpcbind.sock")
++')
++
++########################################
++## <summary>
  ##	All of the rules required to administrate
  ##	an rpcbind environment
  ## </summary>
-@@ -138,11 +155,20 @@ interface(`rpcbind_admin',`
+@@ -138,11 +173,20 @@ interface(`rpcbind_admin',`
  		type rpcbind_initrc_exec_t;
  	')
  
@@ -68387,7 +68602,7 @@ index 6f0736b..cebdb3e 100644
 +	allow svirt_lxc_domain $1:process sigchld;
  ')
 diff --git a/virt.te b/virt.te
-index 947bbc6..ad97e84 100644
+index 947bbc6..2ab5066 100644
 --- a/virt.te
 +++ b/virt.te
 @@ -5,56 +5,87 @@ policy_module(virt, 1.5.0)
@@ -68685,13 +68900,14 @@ index 947bbc6..ad97e84 100644
  	xen_rw_image_files(svirt_t)
  ')
  
-@@ -176,22 +297,41 @@ optional_policy(`
+@@ -176,22 +297,42 @@ optional_policy(`
  # virtd local policy
  #
  
 -allow virtd_t self:capability { chown dac_override fowner ipc_lock kill mknod net_admin net_raw setpcap setuid setgid sys_admin sys_nice sys_ptrace };
 -allow virtd_t self:process { getcap getsched setcap sigkill signal signull execmem setexec setfscreate setsched };
 +allow virtd_t self:capability { chown dac_override fowner ipc_lock kill mknod net_admin net_raw setpcap setuid setgid sys_admin sys_nice };
++allow virtd_t self:capability2 compromise_kernel;
 +allow virtd_t self:process { getcap getsched setcap sigkill signal signull execmem setexec setfscreate setsockcreate setsched };
 +ifdef(`hide_broken_symptoms',`
 +	# caused by some bogus kernel code
@@ -68734,7 +68950,7 @@ index 947bbc6..ad97e84 100644
  
  read_files_pattern(virtd_t, virt_etc_t, virt_etc_t)
  read_lnk_files_pattern(virtd_t, virt_etc_t, virt_etc_t)
-@@ -202,19 +342,28 @@ manage_lnk_files_pattern(virtd_t, virt_etc_rw_t, virt_etc_rw_t)
+@@ -202,19 +343,28 @@ manage_lnk_files_pattern(virtd_t, virt_etc_rw_t, virt_etc_rw_t)
  filetrans_pattern(virtd_t, virt_etc_t, virt_etc_rw_t, dir)
  
  manage_files_pattern(virtd_t, virt_image_type, virt_image_type)
@@ -68769,7 +68985,7 @@ index 947bbc6..ad97e84 100644
  manage_dirs_pattern(virtd_t, virt_var_lib_t, virt_var_lib_t)
  manage_files_pattern(virtd_t, virt_var_lib_t, virt_var_lib_t)
  manage_sock_files_pattern(virtd_t, virt_var_lib_t, virt_var_lib_t)
-@@ -225,16 +374,21 @@ manage_files_pattern(virtd_t, virt_var_run_t, virt_var_run_t)
+@@ -225,16 +375,22 @@ manage_files_pattern(virtd_t, virt_var_run_t, virt_var_run_t)
  manage_sock_files_pattern(virtd_t, virt_var_run_t, virt_var_run_t)
  files_pid_filetrans(virtd_t, virt_var_run_t, { file dir })
  
@@ -68784,6 +69000,7 @@ index 947bbc6..ad97e84 100644
 +kernel_read_kernel_sysctls(virtd_t)
  kernel_request_load_module(virtd_t)
  kernel_search_debugfs(virtd_t)
++kernel_setsched(virtd_t)
  
  corecmd_exec_bin(virtd_t)
  corecmd_exec_shell(virtd_t)
@@ -68792,7 +69009,7 @@ index 947bbc6..ad97e84 100644
  corenet_all_recvfrom_netlabel(virtd_t)
  corenet_tcp_sendrecv_generic_if(virtd_t)
  corenet_tcp_sendrecv_generic_node(virtd_t)
-@@ -247,22 +401,31 @@ corenet_tcp_connect_soundd_port(virtd_t)
+@@ -247,22 +403,31 @@ corenet_tcp_connect_soundd_port(virtd_t)
  corenet_rw_tun_tap_dev(virtd_t)
  
  dev_rw_sysfs(virtd_t)
@@ -68826,7 +69043,7 @@ index 947bbc6..ad97e84 100644
  
  fs_list_auto_mountpoints(virtd_t)
  fs_getattr_xattr_fs(virtd_t)
-@@ -270,6 +433,18 @@ fs_rw_anon_inodefs_files(virtd_t)
+@@ -270,6 +435,18 @@ fs_rw_anon_inodefs_files(virtd_t)
  fs_list_inotifyfs(virtd_t)
  fs_manage_cgroup_dirs(virtd_t)
  fs_rw_cgroup_files(virtd_t)
@@ -68845,7 +69062,7 @@ index 947bbc6..ad97e84 100644
  
  mcs_process_set_categories(virtd_t)
  
-@@ -284,7 +459,8 @@ term_use_ptmx(virtd_t)
+@@ -284,7 +461,8 @@ term_use_ptmx(virtd_t)
  
  auth_use_nsswitch(virtd_t)
  
@@ -68855,7 +69072,7 @@ index 947bbc6..ad97e84 100644
  miscfiles_read_generic_certs(virtd_t)
  miscfiles_read_hwdata(virtd_t)
  
-@@ -293,17 +469,32 @@ modutils_read_module_config(virtd_t)
+@@ -293,17 +471,32 @@ modutils_read_module_config(virtd_t)
  modutils_manage_module_config(virtd_t)
  
  logging_send_syslog_msg(virtd_t)
@@ -68888,7 +69105,7 @@ index 947bbc6..ad97e84 100644
  
  tunable_policy(`virt_use_nfs',`
  	fs_manage_nfs_dirs(virtd_t)
-@@ -322,6 +513,10 @@ optional_policy(`
+@@ -322,6 +515,10 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -68899,7 +69116,7 @@ index 947bbc6..ad97e84 100644
  	dbus_system_bus_client(virtd_t)
  
  	optional_policy(`
-@@ -335,19 +530,34 @@ optional_policy(`
+@@ -335,19 +532,34 @@ optional_policy(`
  	optional_policy(`
  		hal_dbus_chat(virtd_t)
  	')
@@ -68935,7 +69152,7 @@ index 947bbc6..ad97e84 100644
  
  	# Manages /etc/sysconfig/system-config-firewall
  	iptables_manage_config(virtd_t)
-@@ -362,6 +572,12 @@ optional_policy(`
+@@ -362,6 +574,12 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -68948,7 +69165,7 @@ index 947bbc6..ad97e84 100644
  	policykit_dbus_chat(virtd_t)
  	policykit_domtrans_auth(virtd_t)
  	policykit_domtrans_resolve(virtd_t)
-@@ -369,11 +585,11 @@ optional_policy(`
+@@ -369,11 +587,11 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -68965,7 +69182,7 @@ index 947bbc6..ad97e84 100644
  ')
  
  optional_policy(`
-@@ -384,6 +600,7 @@ optional_policy(`
+@@ -384,6 +602,7 @@ optional_policy(`
  	kernel_read_xen_state(virtd_t)
  	kernel_write_xen_state(virtd_t)
  
@@ -68973,7 +69190,7 @@ index 947bbc6..ad97e84 100644
  	xen_stream_connect(virtd_t)
  	xen_stream_connect_xenstore(virtd_t)
  	xen_read_image_files(virtd_t)
-@@ -403,34 +620,48 @@ optional_policy(`
+@@ -403,34 +622,48 @@ optional_policy(`
  # virtual domains common policy
  #
  
@@ -69029,7 +69246,7 @@ index 947bbc6..ad97e84 100644
  dev_read_rand(virt_domain)
  dev_read_sound(virt_domain)
  dev_read_urand(virt_domain)
-@@ -438,10 +669,11 @@ dev_write_sound(virt_domain)
+@@ -438,10 +671,11 @@ dev_write_sound(virt_domain)
  dev_rw_ksm(virt_domain)
  dev_rw_kvm(virt_domain)
  dev_rw_qemu(virt_domain)
@@ -69042,7 +69259,7 @@ index 947bbc6..ad97e84 100644
  files_read_usr_files(virt_domain)
  files_read_var_files(virt_domain)
  files_search_all(virt_domain)
-@@ -449,23 +681,512 @@ files_search_all(virt_domain)
+@@ -449,23 +683,513 @@ files_search_all(virt_domain)
  fs_getattr_tmpfs(virt_domain)
  fs_rw_anon_inodefs_files(virt_domain)
  fs_rw_tmpfs_files(virt_domain)
@@ -69160,6 +69377,9 @@ index 947bbc6..ad97e84 100644
 +
 +term_use_all_inherited_terms(virsh_t)
 +
++userdom_search_admin_dir(virsh_t)
++userdom_read_home_certs(virsh_t)
++
 +init_stream_connect_script(virsh_t)
 +init_rw_script_stream_sockets(virsh_t)
 +init_use_fds(virsh_t)
@@ -69429,7 +69649,7 @@ index 947bbc6..ad97e84 100644
 +virt_lxc_domain_template(svirt_lxc_net)
 +
 +allow svirt_lxc_net_t self:capability { chown dac_read_search dac_override fowner fsetid net_raw net_admin net_bind_service sys_admin sys_nice sys_ptrace sys_resource setpcap };
-+dontaudit svirt_lxc_net_t self:capability2 { block_suspend };
++dontaudit svirt_lxc_net_t self:capability2 block_suspend;
 +
 +allow svirt_lxc_net_t self:process setrlimit;
 +
@@ -69554,8 +69774,6 @@ index 947bbc6..ad97e84 100644
 +
 +logging_send_syslog_msg(virt_qemu_ga_t)
 +
-+miscfiles_read_localization(virt_qemu_ga_t)
-+
 +sysnet_dns_name_resolve(virt_qemu_ga_t)
 +
 diff --git a/vlock.te b/vlock.te
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 7197392..ba92855 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.11.1
-Release: 47%{?dist}
+Release: 48%{?dist}
 License: GPLv2+
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -522,6 +522,20 @@ SELinux Reference policy mls base module.
 %endif
 
 %changelog
+* Tue Oct 30 2012 Miroslav Grepl <mgrepl at redhat.com> 3.11.1-48
+- Fix label on /etc/group.lock
+- Allow gnomeclock to create lnk_file in /etc
+- label /root/.pki as a home_cert_t
+- Add interface to make sure rpcbind.sock is created with the correct label
+- Add definition for new directory /var/lib/os-probe and bootloader wants to read udev rules
+- opendkim should be a part of milter
+- Allow libvirt to set the kernel sched algorythm
+- Allow mongod to read sysfs_t
+- Add authconfig policy
+- Remove calls to miscfiles_read_localization all domains get this
+- Allow virsh_t to read /root/.pki/ content
+- Add label for log directory under /var/www/stickshift
+
 * Mon Oct 29 2012 Miroslav Grepl <mgrepl at redhat.com> 3.11.1-47
 - Allow getty to setattr on usb ttys
 - Allow sshd to search all directories for sshd_home_t content


More information about the scm-commits mailing list