-@@ -13,7 +14,15 @@ policy_module(gpg, 2.3.1) +@@ -13,7 +14,15 @@ policy_module(gpg, 2.4.0) ##
@@ -4496,7 +4496,7 @@ index d8ea41d..8bdc526 100644
+ domtrans_pattern($1, mplayer_exec_t, $2)
+')
diff --git a/policy/modules/apps/mplayer.te b/policy/modules/apps/mplayer.te
-index 815a467..192d54e 100644
+index 931304b..e8c6795 100644
--- a/policy/modules/apps/mplayer.te
+++ b/policy/modules/apps/mplayer.te
@@ -32,6 +32,7 @@ files_config_file(mplayer_etc_t)
@@ -5524,7 +5524,7 @@ index 0000000..a842371
+#
+
diff --git a/policy/modules/apps/podsleuth.te b/policy/modules/apps/podsleuth.te
-index 690589e..815d35d 100644
+index a2f6124..9d62060 100644
--- a/policy/modules/apps/podsleuth.te
+++ b/policy/modules/apps/podsleuth.te
@@ -27,7 +27,7 @@ ubac_constrained(podsleuth_tmpfs_t)
@@ -5585,7 +5585,7 @@ index 2ba7787..9f12b51 100644
')
diff --git a/policy/modules/apps/pulseaudio.te b/policy/modules/apps/pulseaudio.te
-index 5c2680c..db96581 100644
+index c2d20a2..1773e24 100644
--- a/policy/modules/apps/pulseaudio.te
+++ b/policy/modules/apps/pulseaudio.te
@@ -44,6 +44,7 @@ allow pulseaudio_t self:netlink_kobject_uevent_socket create_socket_perms;
@@ -5780,7 +5780,7 @@ index c1d5f50..989f88c 100644
+
+
diff --git a/policy/modules/apps/qemu.te b/policy/modules/apps/qemu.te
-index a3225d4..bc10481 100644
+index 5ef2f7d..5a13201 100644
--- a/policy/modules/apps/qemu.te
+++ b/policy/modules/apps/qemu.te
@@ -21,7 +21,7 @@ gen_tunable(qemu_use_cifs, true)
@@ -6856,7 +6856,7 @@ index 7590165..e5ef7b3 100644
')
+
diff --git a/policy/modules/apps/slocate.te b/policy/modules/apps/slocate.te
-index e9134f0..3d2ef30 100644
+index e43c380..410027f 100644
--- a/policy/modules/apps/slocate.te
+++ b/policy/modules/apps/slocate.te
@@ -38,6 +38,7 @@ dev_getattr_all_blk_files(locate_t)
@@ -7484,10 +7484,10 @@ index ced285a..2e50976 100644
+ ')
+')
diff --git a/policy/modules/apps/userhelper.te b/policy/modules/apps/userhelper.te
-index d584dff..b46a20e 100644
+index 13b2cea..45731eb 100644
--- a/policy/modules/apps/userhelper.te
+++ b/policy/modules/apps/userhelper.te
-@@ -6,9 +6,61 @@ policy_module(userhelper, 1.5.1)
+@@ -6,9 +6,61 @@ policy_module(userhelper, 1.6.0)
#
attribute userhelper_type;
@@ -7561,7 +7561,7 @@ index 5872ea2..028c994 100644
/var/run/vmnat.* -s gen_context(system_u:object_r:vmware_var_run_t,s0)
/var/run/vmware.* gen_context(system_u:object_r:vmware_var_run_t,s0)
diff --git a/policy/modules/apps/vmware.te b/policy/modules/apps/vmware.te
-index 1f803bb..4bdcbe3 100644
+index c76ceb2..d7df452 100644
--- a/policy/modules/apps/vmware.te
+++ b/policy/modules/apps/vmware.te
@@ -126,6 +126,7 @@ dev_getattr_all_blk_files(vmware_host_t)
@@ -7708,7 +7708,7 @@ index 0440b4c..4b055c1 100644
+ allow $1 wine_t:shm rw_shm_perms;
+')
diff --git a/policy/modules/apps/wine.te b/policy/modules/apps/wine.te
-index f9a123a..277543a 100644
+index 953cb28..646620a 100644
--- a/policy/modules/apps/wine.te
+++ b/policy/modules/apps/wine.te
@@ -51,7 +51,11 @@ optional_policy(`
@@ -7725,7 +7725,7 @@ index f9a123a..277543a 100644
optional_policy(`
diff --git a/policy/modules/apps/wireshark.te b/policy/modules/apps/wireshark.te
-index d4e9877..ebb6ca4 100644
+index 8bfe97d..6bba1a8 100644
--- a/policy/modules/apps/wireshark.te
+++ b/policy/modules/apps/wireshark.te
@@ -15,6 +15,7 @@ ubac_constrained(wireshark_t)
@@ -7915,7 +7915,7 @@ index b06df19..c0763c2 100644
##
##
diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
-index 36ba519..e2d8b49 100644
+index edefaf3..e00278f 100644
--- a/policy/modules/kernel/corenetwork.te.in
+++ b/policy/modules/kernel/corenetwork.te.in
@@ -15,6 +15,7 @@ attribute rpc_port_type;
@@ -8501,7 +8501,7 @@ index 15a7bef..ee7727f 100644
########################################
diff --git a/policy/modules/kernel/devices.te b/policy/modules/kernel/devices.te
-index ae138bb..95f6137 100644
+index 41f892f..cab1bfc 100644
--- a/policy/modules/kernel/devices.te
+++ b/policy/modules/kernel/devices.te
@@ -102,6 +102,7 @@ dev_node(ksm_device_t)
@@ -8591,10 +8591,10 @@ index aad8c52..0d8458a 100644
+ dontaudit $1 domain:socket_class_set { read write };
+')
diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
-index 099f57f..5843cad 100644
+index bc534c1..778d512 100644
--- a/policy/modules/kernel/domain.te
+++ b/policy/modules/kernel/domain.te
-@@ -4,6 +4,21 @@ policy_module(domain, 1.8.1)
+@@ -4,6 +4,21 @@ policy_module(domain, 1.9.0)
#
# Declarations
#
@@ -9892,7 +9892,7 @@ index ed203b2..bfb7926 100644
+ allow $1 file_type:kernel_service create_files_as;
+')
diff --git a/policy/modules/kernel/files.te b/policy/modules/kernel/files.te
-index ba9529a..cd45491 100644
+index e8a6b1d..fd53860 100644
--- a/policy/modules/kernel/files.te
+++ b/policy/modules/kernel/files.te
@@ -11,6 +11,7 @@ attribute lockfile;
@@ -10468,7 +10468,7 @@ index dfe361a..496954e 100644
+')
+
diff --git a/policy/modules/kernel/filesystem.te b/policy/modules/kernel/filesystem.te
-index 6d21b3d..255b47a 100644
+index e49c148..995fade 100644
--- a/policy/modules/kernel/filesystem.te
+++ b/policy/modules/kernel/filesystem.te
@@ -52,6 +52,7 @@ type anon_inodefs_t;
@@ -10669,7 +10669,7 @@ index b4ad6d7..67e89f0 100644
+')
+
diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
-index 25a817f..7426f2a 100644
+index 9e2e6d7..08e82d9 100644
--- a/policy/modules/kernel/kernel.te
+++ b/policy/modules/kernel/kernel.te
@@ -50,6 +50,8 @@ sid kernel gen_context(system_u:system_r:kernel_t,mls_systemhigh)
@@ -11048,7 +11048,7 @@ index 492bf76..525563a 100644
+ allow $1 virtio_device_t:chr_file rw_chr_file_perms;
+')
diff --git a/policy/modules/kernel/terminal.te b/policy/modules/kernel/terminal.te
-index 646bbcf..49d77df 100644
+index e004757..b5be387 100644
--- a/policy/modules/kernel/terminal.te
+++ b/policy/modules/kernel/terminal.te
@@ -29,6 +29,7 @@ files_mountpoint(devpts_t)
@@ -11093,7 +11093,7 @@ index 0000000..e1ebd1a
+
+corenet_enable_unlabeled_packets()
diff --git a/policy/modules/roles/auditadm.te b/policy/modules/roles/auditadm.te
-index b0d5b27..a96f2e6 100644
+index 0faef68..46c58bd 100644
--- a/policy/modules/roles/auditadm.te
+++ b/policy/modules/roles/auditadm.te
@@ -28,10 +28,13 @@ logging_manage_audit_log(auditadm_t)
@@ -11131,7 +11131,7 @@ index 1875064..e9c9277 100644
+ sudo_role_template(dbadm, dbadm_r, dbadm_t)
+')
diff --git a/policy/modules/roles/guest.te b/policy/modules/roles/guest.te
-index 531c616..f332441 100644
+index 1cb7311..1de82b2 100644
--- a/policy/modules/roles/guest.te
+++ b/policy/modules/roles/guest.te
@@ -9,9 +9,15 @@ role guest_r;
@@ -11152,7 +11152,7 @@ index 531c616..f332441 100644
+
+gen_user(guest_u, user, guest_r, s0, s0)
diff --git a/policy/modules/roles/secadm.te b/policy/modules/roles/secadm.te
-index 5a3d720..924baee 100644
+index be4de58..cce681a 100644
--- a/policy/modules/roles/secadm.te
+++ b/policy/modules/roles/secadm.te
@@ -9,6 +9,8 @@ role secadm_r;
@@ -11165,10 +11165,10 @@ index 5a3d720..924baee 100644
########################################
#
diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
-index d62886d..2e8ae26 100644
+index 2be17d2..96d3fbf 100644
--- a/policy/modules/roles/staff.te
+++ b/policy/modules/roles/staff.te
-@@ -8,12 +8,48 @@ policy_module(staff, 2.1.4)
+@@ -8,12 +8,48 @@ policy_module(staff, 2.2.0)
role staff_r;
userdom_unpriv_user_template(staff)
@@ -11336,7 +11336,7 @@ index d62886d..2e8ae26 100644
')
diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
-index d5e88be..fd670dd 100644
+index 1ae9a94..27404e7 100644
--- a/policy/modules/roles/sysadm.te
+++ b/policy/modules/roles/sysadm.te
@@ -24,20 +24,41 @@ ifndef(`enable_mls',`
@@ -12857,7 +12857,7 @@ index 0000000..7d5de28
+
+gen_user(unconfined_u, user, unconfined_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
diff --git a/policy/modules/roles/unprivuser.te b/policy/modules/roles/unprivuser.te
-index 606a257..aa3da20 100644
+index 1e0753e..4ae4116 100644
--- a/policy/modules/roles/unprivuser.te
+++ b/policy/modules/roles/unprivuser.te
@@ -12,15 +12,51 @@ role user_r;
@@ -13222,10 +13222,10 @@ index 0b827c5..8961dba 100644
admin_pattern($1, abrt_tmp_t)
')
diff --git a/policy/modules/services/abrt.te b/policy/modules/services/abrt.te
-index 98646c4..5fdea83 100644
+index 30861ec..7065b02 100644
--- a/policy/modules/services/abrt.te
+++ b/policy/modules/services/abrt.te
-@@ -5,6 +5,14 @@ policy_module(abrt, 1.1.1)
+@@ -5,6 +5,14 @@ policy_module(abrt, 1.2.0)
# Declarations
#
@@ -13459,7 +13459,7 @@ index 8559cdc..49c0cc8 100644
# Allow afs_admin to restart the afs service
afs_initrc_domtrans($1)
diff --git a/policy/modules/services/afs.te b/policy/modules/services/afs.te
-index de8b791..7e2cdf2 100644
+index a496fde..847609a 100644
--- a/policy/modules/services/afs.te
+++ b/policy/modules/services/afs.te
@@ -107,6 +107,10 @@ miscfiles_read_localization(afs_t)
@@ -15463,7 +15463,7 @@ index 08dfa0c..b02e348 100644
+ userdom_read_user_home_content_files(httpd_user_script_t)
')
diff --git a/policy/modules/services/apcupsd.te b/policy/modules/services/apcupsd.te
-index 3b7d9eb..6a7073b 100644
+index d052bf0..8478eca 100644
--- a/policy/modules/services/apcupsd.te
+++ b/policy/modules/services/apcupsd.te
@@ -94,6 +94,10 @@ optional_policy(`
@@ -15653,7 +15653,7 @@ index 61c74bc..c6b0498 100644
allow avahi_t $1:dbus send_msg;
')
diff --git a/policy/modules/services/avahi.te b/policy/modules/services/avahi.te
-index fd64068..647fff8 100644
+index a7a0e71..15686e9 100644
--- a/policy/modules/services/avahi.te
+++ b/policy/modules/services/avahi.te
@@ -46,6 +46,7 @@ files_pid_filetrans(avahi_t, avahi_var_run_t, { dir file })
@@ -15823,7 +15823,7 @@ index 4deca04..42aa033 100644
optional_policy(`
diff --git a/policy/modules/services/bitlbee.te b/policy/modules/services/bitlbee.te
-index 5f239ca..29de096 100644
+index f4e7ad3..6591639 100644
--- a/policy/modules/services/bitlbee.te
+++ b/policy/modules/services/bitlbee.te
@@ -28,7 +28,7 @@ files_type(bitlbee_var_t)
@@ -16704,7 +16704,7 @@ index 0000000..575c16e
+
+init_sigchld_script(cachefiles_kernel_t)
diff --git a/policy/modules/services/canna.te b/policy/modules/services/canna.te
-index a0dfd2f..d60e2bf 100644
+index 1d25efe..1b16191 100644
--- a/policy/modules/services/canna.te
+++ b/policy/modules/services/canna.te
@@ -34,7 +34,7 @@ allow canna_t self:unix_dgram_socket create_stream_socket_perms;
@@ -16821,7 +16821,7 @@ index fa62787..ffd0da5 100644
admin_pattern($1, certmaster_etc_rw_t)
diff --git a/policy/modules/services/certmaster.te b/policy/modules/services/certmaster.te
-index 73f03ff..d5c4c94 100644
+index 3384132..daef4e1 100644
--- a/policy/modules/services/certmaster.te
+++ b/policy/modules/services/certmaster.te
@@ -43,23 +43,23 @@ files_var_lib_filetrans(certmaster_t, certmaster_var_lib_t, { file dir })
@@ -16881,7 +16881,7 @@ index 7a6e5ba..d664be8 100644
admin_pattern($1, certmonger_var_run_t)
')
diff --git a/policy/modules/services/certmonger.te b/policy/modules/services/certmonger.te
-index 1a65b5e..ec0594e 100644
+index c3e3f79..23c4087 100644
--- a/policy/modules/services/certmonger.te
+++ b/policy/modules/services/certmonger.te
@@ -23,7 +23,8 @@ files_type(certmonger_var_lib_t)
@@ -17285,11 +17285,11 @@ index 1f11572..7f6a7ab 100644
')
diff --git a/policy/modules/services/clamav.te b/policy/modules/services/clamav.te
-index 8c36027..28863a5 100644
+index f758323..f1571f1 100644
--- a/policy/modules/services/clamav.te
+++ b/policy/modules/services/clamav.te
@@ -1,9 +1,9 @@
- policy_module(clamav, 1.8.1)
+ policy_module(clamav, 1.9.0)
##
@@ -18417,7 +18417,7 @@ index 9971337..f081899 100644
')
diff --git a/policy/modules/services/courier.te b/policy/modules/services/courier.te
-index 37f4810..cc93958 100644
+index 2802dbb..5d323df 100644
--- a/policy/modules/services/courier.te
+++ b/policy/modules/services/courier.te
@@ -93,7 +93,7 @@ allow courier_pop_t courier_authdaemon_t:process sigchld;
@@ -19650,7 +19650,7 @@ index 0d5711c..3874025 100644
+ delete_files_pattern($1, system_dbusd_var_run_t, system_dbusd_var_run_t)
+')
diff --git a/policy/modules/services/dbus.te b/policy/modules/services/dbus.te
-index 9ce6713..ea78dc1 100644
+index 98e5af6..61bb74a 100644
--- a/policy/modules/services/dbus.te
+++ b/policy/modules/services/dbus.te
@@ -74,9 +74,10 @@ files_tmp_filetrans(system_dbusd_t, system_dbusd_tmp_t, { file dir })
@@ -19717,7 +19717,7 @@ index 784753e..bf65e7d 100644
stream_connect_pattern($1, dcc_var_t, dccifd_var_run_t, dccifd_t)
')
diff --git a/policy/modules/services/dcc.te b/policy/modules/services/dcc.te
-index 8bab059..284a888 100644
+index ec19ff4..d110456 100644
--- a/policy/modules/services/dcc.te
+++ b/policy/modules/services/dcc.te
@@ -36,7 +36,7 @@ type dcc_var_t;
@@ -20919,7 +20919,7 @@ index 0000000..01c3755
+ snmp_stream_connect(dirsrv_snmp_t)
+')
diff --git a/policy/modules/services/djbdns.te b/policy/modules/services/djbdns.te
-index 0c6a473..51e2ce8 100644
+index 03b5286..fcafa0b 100644
--- a/policy/modules/services/djbdns.te
+++ b/policy/modules/services/djbdns.te
@@ -23,9 +23,6 @@ djbdns_daemontools_domain_template(tinydns)
@@ -23199,7 +23199,7 @@ index 87b4531..db2d189 100644
+ files_list_etc($1)
')
diff --git a/policy/modules/services/hddtemp.te b/policy/modules/services/hddtemp.te
-index 267bb4c..1647fc4 100644
+index c234b32..a7b6bf7 100644
--- a/policy/modules/services/hddtemp.te
+++ b/policy/modules/services/hddtemp.te
@@ -46,4 +46,3 @@ storage_raw_read_fixed_disk(hddtemp_t)
@@ -23252,10 +23252,10 @@ index ecab47a..40affd8 100644
-
')
diff --git a/policy/modules/services/icecast.te b/policy/modules/services/icecast.te
-index f368bf3..d43b779 100644
+index fdb7e9a..1c02a45 100644
--- a/policy/modules/services/icecast.te
+++ b/policy/modules/services/icecast.te
-@@ -5,6 +5,14 @@ policy_module(icecast, 1.0.1)
+@@ -5,6 +5,14 @@ policy_module(icecast, 1.1.0)
# Declarations
#
@@ -24275,7 +24275,7 @@ index 771e04b..81d98b3 100644
manage_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
files_pid_filetrans($1_t, $1_var_run_t, file)
diff --git a/policy/modules/services/likewise.te b/policy/modules/services/likewise.te
-index ae9d49f..931d2f5 100644
+index 3acbf1d..ef07a0e 100644
--- a/policy/modules/services/likewise.te
+++ b/policy/modules/services/likewise.te
@@ -17,7 +17,7 @@ type likewise_var_lib_t;
@@ -24657,10 +24657,10 @@ index ed1af3c..40b5f0e 100644
+ delete_files_pattern($1, dkim_milter_data_t, dkim_milter_data_t)
+')
diff --git a/policy/modules/services/milter.te b/policy/modules/services/milter.te
-index 1b6dea0..b90c727 100644
+index 47e3612..98801a7 100644
--- a/policy/modules/services/milter.te
+++ b/policy/modules/services/milter.te
-@@ -9,6 +9,13 @@ policy_module(milter, 1.2.1)
+@@ -9,6 +9,13 @@ policy_module(milter, 1.3.0)
attribute milter_domains;
attribute milter_data_type;
@@ -26616,7 +26616,7 @@ index 8581040..cfcdf10 100644
allow $1 nagios_t:process { ptrace signal_perms };
diff --git a/policy/modules/services/nagios.te b/policy/modules/services/nagios.te
-index da5b33d..8b56967 100644
+index bf64a4c..55b3ce7 100644
--- a/policy/modules/services/nagios.te
+++ b/policy/modules/services/nagios.te
@@ -107,13 +107,11 @@ files_read_etc_files(nagios_t)
@@ -27309,7 +27309,7 @@ index 23c769c..be5a5b4 100644
+ admin_pattern($1, nslcd_var_run_t, nslcd_var_run_t)
')
diff --git a/policy/modules/services/nslcd.te b/policy/modules/services/nslcd.te
-index 34eee5f..a9f19d8 100644
+index 4e28d58..01faaef 100644
--- a/policy/modules/services/nslcd.te
+++ b/policy/modules/services/nslcd.te
@@ -16,7 +16,7 @@ type nslcd_var_run_t;
@@ -27633,7 +27633,7 @@ index bb4fae5..b1b5e51 100644
+ admin_pattern($1, oidentd_config_t)
+')
diff --git a/policy/modules/services/oident.te b/policy/modules/services/oident.te
-index f0da874..18f8a8c 100644
+index 8845174..98f541f 100644
--- a/policy/modules/services/oident.te
+++ b/policy/modules/services/oident.te
@@ -26,10 +26,10 @@ files_config_file(oidentd_config_t)
@@ -28022,10 +28022,10 @@ index 1c2a091..ea5ae69 100644
#
interface(`pcscd_domtrans',`
diff --git a/policy/modules/services/pcscd.te b/policy/modules/services/pcscd.te
-index 3116191..df751a6 100644
+index ceafba6..eca6852 100644
--- a/policy/modules/services/pcscd.te
+++ b/policy/modules/services/pcscd.te
-@@ -7,7 +7,6 @@ policy_module(pcscd, 1.6.1)
+@@ -7,7 +7,6 @@ policy_module(pcscd, 1.7.0)
type pcscd_t;
type pcscd_exec_t;
@@ -29228,7 +29228,7 @@ index 4313a6f..1d9fa76 100644
/sbin/portreserve -- gen_context(system_u:object_r:portreserve_exec_t,s0)
diff --git a/policy/modules/services/portreserve.te b/policy/modules/services/portreserve.te
-index 0b1f471..075a550 100644
+index 152af92..1594066 100644
--- a/policy/modules/services/portreserve.te
+++ b/policy/modules/services/portreserve.te
@@ -13,7 +13,7 @@ type portreserve_initrc_exec_t;
@@ -30011,7 +30011,7 @@ index 539a7c9..4782bdb 100644
postgresql_tcp_connect($1)
diff --git a/policy/modules/services/postgresql.te b/policy/modules/services/postgresql.te
-index 39abf57..b4101fa 100644
+index 4b18978..1ab2e1d 100644
--- a/policy/modules/services/postgresql.te
+++ b/policy/modules/services/postgresql.te
@@ -15,16 +15,16 @@ gen_require(`
@@ -30354,7 +30354,7 @@ index 2316653..77ef768 100644
+ admin_pattern($1, prelude_lml_tmp_t)
')
diff --git a/policy/modules/services/prelude.te b/policy/modules/services/prelude.te
-index 7e84587..febda2f 100644
+index b1bc02c..8f0b07e 100644
--- a/policy/modules/services/prelude.te
+++ b/policy/modules/services/prelude.te
@@ -35,7 +35,6 @@ files_pid_file(prelude_audisp_var_run_t)
@@ -30391,10 +30391,10 @@ index 7e84587..febda2f 100644
dev_read_rand(prelude_lml_t)
diff --git a/policy/modules/services/privoxy.te b/policy/modules/services/privoxy.te
-index 6f1b2c3..3f1a3fe 100644
+index 2dbf4d4..abb4475 100644
--- a/policy/modules/services/privoxy.te
+++ b/policy/modules/services/privoxy.te
-@@ -6,10 +6,10 @@ policy_module(privoxy, 1.10.1)
+@@ -6,10 +6,10 @@ policy_module(privoxy, 1.11.0)
#
##
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 4b59bb1..786cb35 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -20,8 +20,8 @@
%define CHECKPOLICYVER 2.0.21-1
Summary: SELinux policy configuration
Name: selinux-policy
-Version: 3.9.10
-Release: 13%{?dist}
+Version: 3.9.11
+Release: 1%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -471,17 +471,21 @@ exit 0
%endif
%changelog
-* Tue Dec 14 2010 Miroslav Grepl