diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if
index 89bccaa..4ff1bdf 100644
--- a/policy/modules/services/automount.if
+++ b/policy/modules/services/automount.if
@@ -21,6 +21,25 @@ interface(`automount_domtrans',`
########################################
##
+## Send automount a signal
+##
+##
+##
+## The type of the process performing this action.
+##
+##
+#
+#
+interface(`automount_signal',`
+ gen_require(`
+ type automount_t;
+ ')
+
+ allow $1 automount_t:process signal;
+')
+
+########################################
+##
## Execute automount in the caller domain.
##
##
diff --git a/policy/modules/services/automount.te b/policy/modules/services/automount.te
index c17c4db..c76382b 100644
--- a/policy/modules/services/automount.te
+++ b/policy/modules/services/automount.te
@@ -1,5 +1,5 @@
-policy_module(automount, 1.11.1)
+policy_module(automount, 1.11.2)
########################################
#
@@ -71,6 +71,7 @@ files_search_all(automount_t)
files_mounton_all_mountpoints(automount_t)
files_mount_all_file_type_fs(automount_t)
files_unmount_all_file_type_fs(automount_t)
+files_manage_non_security_dirs(automount_t)
fs_mount_all_fs(automount_t)
fs_unmount_all_fs(automount_t)
@@ -100,6 +101,7 @@ corenet_udp_bind_reserved_port(automount_t)
corenet_udp_bind_all_rpc_ports(automount_t)
dev_read_sysfs(automount_t)
+dev_rw_autofs(automount_t)
# for SSP
dev_read_rand(automount_t)
dev_read_urand(automount_t)
@@ -142,6 +144,7 @@ miscfiles_read_certs(automount_t)
# Run mount in the mount_t domain.
mount_domtrans(automount_t)
+mount_signal(automount_t)
userdom_dontaudit_use_unpriv_user_fds(automount_t)
userdom_dontaudit_search_user_home_dirs(automount_t)
@@ -155,7 +158,7 @@ optional_policy(`
')
optional_policy(`
- kerberos_read_keytab(automount_t)
+ kerberos_keytab_template(automount, automount_t)
kerberos_read_config(automount_t)
kerberos_dontaudit_write_config(automount_t)
')
diff --git a/policy/modules/system/mount.if b/policy/modules/system/mount.if
index bb547ea..d7e78ad 100644
--- a/policy/modules/system/mount.if
+++ b/policy/modules/system/mount.if
@@ -73,6 +73,24 @@ interface(`mount_exec',`
########################################
##
+## Send a generic signal to mount.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`mount_signal',`
+ gen_require(`
+ type mount_t;
+ ')
+
+ allow $1 mount_t:process signal;
+')
+
+########################################
+##
## Use file descriptors for mount.
##
##
diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
index 8d7d9fc..db30a48 100644
--- a/policy/modules/system/mount.te
+++ b/policy/modules/system/mount.te
@@ -1,5 +1,5 @@
-policy_module(mount, 1.10.0)
+policy_module(mount, 1.10.1)
########################################
#