diff --git a/policy/modules/apps/sandbox.te b/policy/modules/apps/sandbox.te
index 2419a2a..89fcce3 100644
--- a/policy/modules/apps/sandbox.te
+++ b/policy/modules/apps/sandbox.te
@@ -152,6 +152,8 @@ allow sandbox_x_domain self:unix_dgram_socket { sendto create_socket_perms };
allow sandbox_x_domain self:unix_stream_socket create_stream_socket_perms;
allow sandbox_x_domain self:process { signal_perms getsched setpgid execstack execmem };
+dontaudit sandbox_x_domain self:process signal;
+
allow sandbox_x_domain self:shm create_shm_perms;
allow sandbox_x_domain self:unix_stream_socket { connectto create_stream_socket_perms };
allow sandbox_x_domain self:unix_dgram_socket { sendto create_socket_perms };
diff --git a/policy/modules/apps/telepathy.if b/policy/modules/apps/telepathy.if
index 3d12484..21b65bc 100644
--- a/policy/modules/apps/telepathy.if
+++ b/policy/modules/apps/telepathy.if
@@ -29,7 +29,9 @@ template(`telepathy_domain_template',`
files_tmp_file(telepathy_$1_tmp_t)
ubac_constrained(telepathy_$1_tmp_t)
- dbus_session_domain(telepathy_$1_t, telepathy_$1_exec_t)
+ ifdef(`TODO',`
+ dbus_session_domain(telepathy_$1_t, telepathy_$1_exec_t)
+ ')
')
#######################################
diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if
index ba64143..6918ff2 100644
--- a/policy/modules/services/apache.if
+++ b/policy/modules/services/apache.if
@@ -580,6 +580,27 @@ interface(`apache_delete_cache_files',`
########################################
##
+## Allow the specified domain to search
+## apache configuration dirs.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+interface(`apache_search_config',`
+ gen_require(`
+ type httpd_config_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 httpd_config_t:dir search_dir_perms;
+')
+
+########################################
+##
## Allow the specified domain to read
## apache configuration files.
##
diff --git a/policy/modules/services/boinc.te b/policy/modules/services/boinc.te
index c9622ef..4bc3f06 100644
--- a/policy/modules/services/boinc.te
+++ b/policy/modules/services/boinc.te
@@ -122,6 +122,7 @@ allow boinc_project_t self:process { ptrace setsched signal signull sigkill sigs
allow boinc_project_t self:process { execmem execstack };
allow boinc_project_t self:fifo_file rw_fifo_file_perms;
+allow boinc_project_t self:sem create_sem_perms;
manage_dirs_pattern(boinc_project_t, boinc_project_tmp_t, boinc_project_tmp_t)
manage_files_pattern(boinc_project_t, boinc_project_tmp_t, boinc_project_tmp_t)
diff --git a/policy/modules/services/certmonger.te b/policy/modules/services/certmonger.te
index 1c87fb3..5595c96 100644
--- a/policy/modules/services/certmonger.te
+++ b/policy/modules/services/certmonger.te
@@ -58,6 +58,16 @@ miscfiles_manage_generic_cert_files(certmonger_t)
sysnet_dns_name_resolve(certmonger_t)
+userdom_search_user_home_content(certmonger_t)
+
+optional_policy(`
+ apache_search_config(certmonger_t)
+')
+
+optional_policy(`
+ bind_search_cache(certmonger_t)
+')
+
optional_policy(`
dbus_system_bus_client(certmonger_t)
dbus_connect_system_bus(certmonger_t)
@@ -70,3 +80,4 @@ optional_policy(`
optional_policy(`
pcscd_stream_connect(certmonger_t)
')
+
diff --git a/policy/modules/services/fail2ban.te b/policy/modules/services/fail2ban.te
index 7c5bf19..0a4216c 100644
--- a/policy/modules/services/fail2ban.te
+++ b/policy/modules/services/fail2ban.te
@@ -28,7 +28,7 @@ files_pid_file(fail2ban_var_run_t)
# fail2ban local policy
#
-allow fail2ban_t self:capability { sys_tty_config };
+allow fail2ban_t self:capability { dac_read_search dac_override sys_tty_config };
allow fail2ban_t self:process signal;
allow fail2ban_t self:fifo_file rw_fifo_file_perms;
allow fail2ban_t self:unix_stream_socket { connectto create_stream_socket_perms };