Blame SOURCES/policy-rhel-7.5.z-contrib.patch

ffb2b6
diff --git a/certmonger.te b/certmonger.te
ffb2b6
index 0585431e14..26d4e132ce 100644
ffb2b6
--- a/certmonger.te
ffb2b6
+++ b/certmonger.te
ffb2b6
@@ -136,6 +136,10 @@ optional_policy(`
ffb2b6
     kerberos_filetrans_named_content(certmonger_t)
ffb2b6
 ')
ffb2b6
 
ffb2b6
+optional_policy(`
ffb2b6
+    mta_send_mail(certmonger_t)
ffb2b6
+')
ffb2b6
+
ffb2b6
 optional_policy(`
ffb2b6
 	pcscd_read_pid_files(certmonger_t)
ffb2b6
 	pcscd_stream_connect(certmonger_t)
931132
diff --git a/snapper.te b/snapper.te
931132
index faf4fc9fca..fda6e0b289 100644
931132
--- a/snapper.te
931132
+++ b/snapper.te
931132
@@ -22,6 +22,8 @@ files_type(snapperd_data_t)
931132
 #
931132
 # snapperd local policy
931132
 #
931132
+allow snapperd_t self:capability { dac_read_search fowner sys_admin };
931132
+allow snapperd_t self:process setsched;
931132
 
931132
 allow snapperd_t self:fifo_file rw_fifo_file_perms;
931132
 allow snapperd_t self:unix_stream_socket create_stream_socket_perms;
931132
@@ -36,8 +38,12 @@ manage_lnk_files_pattern(snapperd_t, snapperd_conf_t, snapperd_conf_t)
931132
 manage_files_pattern(snapperd_t, snapperd_data_t, snapperd_data_t)
931132
 manage_dirs_pattern(snapperd_t, snapperd_data_t, snapperd_data_t)
931132
 manage_lnk_files_pattern(snapperd_t, snapperd_data_t, snapperd_data_t)
931132
+allow snapperd_t snapperd_data_t:file relabelfrom;
931132
+allow snapperd_t snapperd_data_t:dir { relabelfrom relabelto mounton };
931132
 snapper_filetrans_named_content(snapperd_t)
931132
 
931132
+kernel_setsched(snapperd_t)
931132
+
931132
 domain_read_all_domains_state(snapperd_t)
931132
 
931132
 corecmd_exec_shell(snapperd_t)
931132
@@ -51,6 +57,8 @@ files_read_all_files(snapperd_t)
931132
 files_list_all(snapperd_t)
931132
 
931132
 fs_getattr_all_fs(snapperd_t)
931132
+fs_mount_xattr_fs(snapperd_t)
931132
+fs_unmount_xattr_fs(snapperd_t)
931132
 
931132
 storage_raw_read_fixed_disk(snapperd_t)
931132