++##
++## Allow boinc_domain execmem/execstack.
++##
++##
++gen_tunable(boinc_execmem, true)
++
+attribute boinc_domain;
+
+type boinc_t, boinc_domain;
type boinc_exec_t;
init_daemon_domain(boinc_t, boinc_exec_t)
-@@ -21,31 +23,66 @@ files_tmpfs_file(boinc_tmpfs_t)
+@@ -21,31 +30,69 @@ files_tmpfs_file(boinc_tmpfs_t)
type boinc_var_lib_t;
files_type(boinc_var_lib_t)
@@ -9255,7 +9266,6 @@ index 7c92aa1..6b6cd51 100644
+allow boinc_domain self:fifo_file rw_fifo_file_perms;
+allow boinc_domain self:process signal;
+allow boinc_domain self:sem create_sem_perms;
-+allow boinc_domain self:process execmem;
+
+manage_dirs_pattern(boinc_domain, boinc_var_lib_t, boinc_var_lib_t)
+manage_files_pattern(boinc_domain, boinc_var_lib_t, boinc_var_lib_t)
@@ -9277,6 +9287,10 @@ index 7c92aa1..6b6cd51 100644
+
+miscfiles_read_fonts(boinc_domain)
+
++tunable_policy(`boinc_execmem',`
++ allow boinc_domain self:process { execstack execmem };
++')
++
+optional_policy(`
+ sysnet_dns_name_resolve(boinc_domain)
+')
@@ -9299,7 +9313,7 @@ index 7c92aa1..6b6cd51 100644
manage_dirs_pattern(boinc_t, boinc_tmp_t, boinc_tmp_t)
manage_files_pattern(boinc_t, boinc_tmp_t, boinc_tmp_t)
-@@ -54,74 +91,48 @@ files_tmp_filetrans(boinc_t, boinc_tmp_t, { dir file })
+@@ -54,74 +101,48 @@ files_tmp_filetrans(boinc_t, boinc_tmp_t, { dir file })
manage_files_pattern(boinc_t, boinc_tmpfs_t, boinc_tmpfs_t)
fs_tmpfs_filetrans(boinc_t, boinc_tmpfs_t, file)
@@ -9396,7 +9410,7 @@ index 7c92aa1..6b6cd51 100644
term_getattr_all_ptys(boinc_t)
term_getattr_unallocated_ttys(boinc_t)
-@@ -130,55 +141,67 @@ init_read_utmp(boinc_t)
+@@ -130,55 +151,67 @@ init_read_utmp(boinc_t)
logging_send_syslog_msg(boinc_t)
@@ -11811,10 +11825,10 @@ index 0000000..8ac848b
+')
diff --git a/cloudform.te b/cloudform.te
new file mode 100644
-index 0000000..a56e579
+index 0000000..0f133be
--- /dev/null
+++ b/cloudform.te
-@@ -0,0 +1,296 @@
+@@ -0,0 +1,297 @@
+policy_module(cloudform, 1.0)
+########################################
+#
@@ -11919,6 +11933,8 @@ index 0000000..a56e579
+corecmd_exec_bin(cloud_init_t)
+corecmd_exec_shell(cloud_init_t)
+
++domain_read_all_domains_state(cloud_init_t)
++
+fs_getattr_all_fs(cloud_init_t)
+
+storage_raw_read_fixed_disk(cloud_init_t)
@@ -11978,7 +11994,6 @@ index 0000000..a56e579
+ unconfined_domain(cloud_init_t)
+')
+
-+
+########################################
+#
+# deltacloudd local policy
@@ -13908,7 +13923,7 @@ index c086302..4f33119 100644
/etc/rc\.d/init\.d/couchdb -- gen_context(system_u:object_r:couchdb_initrc_exec_t,s0)
diff --git a/couchdb.if b/couchdb.if
-index 83d6744..b934cb7 100644
+index 83d6744..afa2f78 100644
--- a/couchdb.if
+++ b/couchdb.if
@@ -2,6 +2,44 @@
@@ -13956,7 +13971,7 @@ index 83d6744..b934cb7 100644
## All of the rules required to
## administrate an couchdb environment.
##
-@@ -10,6 +48,108 @@
+@@ -10,6 +48,127 @@
## Domain allowed access.
##
##
@@ -14027,6 +14042,25 @@ index 83d6744..b934cb7 100644
+ allow $1 couchdb_var_run_t:file read_file_perms;
+')
+
++#######################################
++##