diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch
index daa1d07..18e996e 100644
--- a/policy-rawhide-base.patch
+++ b/policy-rawhide-base.patch
@@ -14974,10 +14974,35 @@ index 7be4ddf..d5ef507 100644
+/sys/class/net/ib.* gen_context(system_u:object_r:sysctl_net_t,s0)
+/sys/kernel/uevent_helper -- gen_context(system_u:object_r:usermodehelper_t,s0)
diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
-index e100d88..1c1a61c 100644
+index e100d88..98dc4c1 100644
--- a/policy/modules/kernel/kernel.if
+++ b/policy/modules/kernel/kernel.if
-@@ -286,7 +286,7 @@ interface(`kernel_rw_unix_dgram_sockets',`
+@@ -126,6 +126,24 @@ interface(`kernel_setsched',`
+
+ ########################################
+ ##
++## Dontaudit attempts to set the priority of kernel threads.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`kernel_dontaudit_setsched',`
++ gen_require(`
++ type kernel_t;
++ ')
++
++ dontaudit $1 kernel_t:process setsched;
++')
++
++########################################
++##
+ ## Send a SIGCHLD signal to kernel threads.
+ ##
+ ##
+@@ -286,7 +304,7 @@ interface(`kernel_rw_unix_dgram_sockets',`
type kernel_t;
')
@@ -14986,7 +15011,7 @@ index e100d88..1c1a61c 100644
')
########################################
-@@ -762,8 +762,8 @@ interface(`kernel_manage_debugfs',`
+@@ -762,8 +780,8 @@ interface(`kernel_manage_debugfs',`
')
manage_files_pattern($1, debugfs_t, debugfs_t)
@@ -14996,7 +15021,7 @@ index e100d88..1c1a61c 100644
')
########################################
-@@ -786,6 +786,24 @@ interface(`kernel_mount_kvmfs',`
+@@ -786,6 +804,24 @@ interface(`kernel_mount_kvmfs',`
########################################
##
@@ -15021,7 +15046,7 @@ index e100d88..1c1a61c 100644
## Unmount the proc filesystem.
##
##
-@@ -804,6 +822,24 @@ interface(`kernel_unmount_proc',`
+@@ -804,6 +840,24 @@ interface(`kernel_unmount_proc',`
########################################
##
@@ -15046,7 +15071,7 @@ index e100d88..1c1a61c 100644
## Get the attributes of the proc filesystem.
##
##
-@@ -991,13 +1027,10 @@ interface(`kernel_read_proc_symlinks',`
+@@ -991,13 +1045,10 @@ interface(`kernel_read_proc_symlinks',`
#
interface(`kernel_read_system_state',`
gen_require(`
@@ -15062,7 +15087,7 @@ index e100d88..1c1a61c 100644
')
########################################
-@@ -1025,6 +1058,25 @@ interface(`kernel_write_proc_files',`
+@@ -1025,6 +1076,25 @@ interface(`kernel_write_proc_files',`
########################################
##
@@ -15088,7 +15113,7 @@ index e100d88..1c1a61c 100644
## Do not audit attempts by caller to
## read system state information in proc.
##
-@@ -1208,6 +1260,24 @@ interface(`kernel_read_messages',`
+@@ -1208,6 +1278,24 @@ interface(`kernel_read_messages',`
########################################
##
@@ -15113,7 +15138,7 @@ index e100d88..1c1a61c 100644
## Allow caller to get the attributes of kernel message
## interface (/proc/kmsg).
##
-@@ -1477,6 +1547,24 @@ interface(`kernel_dontaudit_list_all_proc',`
+@@ -1477,6 +1565,24 @@ interface(`kernel_dontaudit_list_all_proc',`
########################################
##
@@ -15138,7 +15163,7 @@ index e100d88..1c1a61c 100644
## Do not audit attempts by caller to search
## the base directory of sysctls.
##
-@@ -1750,16 +1838,9 @@ interface(`kernel_rw_unix_sysctls',`
+@@ -1750,16 +1856,9 @@ interface(`kernel_rw_unix_sysctls',`
## Domain allowed access.
##
##
@@ -15156,7 +15181,7 @@ index e100d88..1c1a61c 100644
')
########################################
-@@ -1771,16 +1852,9 @@ interface(`kernel_read_hotplug_sysctls',`
+@@ -1771,16 +1870,9 @@ interface(`kernel_read_hotplug_sysctls',`
## Domain allowed access.
##
##
@@ -15174,7 +15199,7 @@ index e100d88..1c1a61c 100644
')
########################################
-@@ -1792,16 +1866,9 @@ interface(`kernel_rw_hotplug_sysctls',`
+@@ -1792,16 +1884,9 @@ interface(`kernel_rw_hotplug_sysctls',`
## Domain allowed access.
##
##
@@ -15192,7 +15217,7 @@ index e100d88..1c1a61c 100644
')
########################################
-@@ -1813,16 +1880,9 @@ interface(`kernel_read_modprobe_sysctls',`
+@@ -1813,16 +1898,9 @@ interface(`kernel_read_modprobe_sysctls',`
## Domain allowed access.
##
##
@@ -15210,7 +15235,7 @@ index e100d88..1c1a61c 100644
')
########################################
-@@ -2085,7 +2145,7 @@ interface(`kernel_dontaudit_list_all_sysctls',`
+@@ -2085,7 +2163,7 @@ interface(`kernel_dontaudit_list_all_sysctls',`
')
dontaudit $1 sysctl_type:dir list_dir_perms;
@@ -15219,7 +15244,7 @@ index e100d88..1c1a61c 100644
')
########################################
-@@ -2282,6 +2342,25 @@ interface(`kernel_list_unlabeled',`
+@@ -2282,6 +2360,25 @@ interface(`kernel_list_unlabeled',`
########################################
##
@@ -15245,7 +15270,7 @@ index e100d88..1c1a61c 100644
## Read the process state (/proc/pid) of all unlabeled_t.
##
##
-@@ -2306,7 +2385,7 @@ interface(`kernel_read_unlabeled_state',`
+@@ -2306,7 +2403,7 @@ interface(`kernel_read_unlabeled_state',`
##
##
##
@@ -15254,7 +15279,7 @@ index e100d88..1c1a61c 100644
##
##
#
-@@ -2488,6 +2567,24 @@ interface(`kernel_rw_unlabeled_blk_files',`
+@@ -2488,6 +2585,24 @@ interface(`kernel_rw_unlabeled_blk_files',`
########################################
##
@@ -15279,7 +15304,7 @@ index e100d88..1c1a61c 100644
## Do not audit attempts by caller to get attributes for
## unlabeled character devices.
##
-@@ -2525,6 +2622,24 @@ interface(`kernel_relabelfrom_unlabeled_dirs',`
+@@ -2525,6 +2640,24 @@ interface(`kernel_relabelfrom_unlabeled_dirs',`
########################################
##
@@ -15304,7 +15329,7 @@ index e100d88..1c1a61c 100644
## Allow caller to relabel unlabeled files.
##
##
-@@ -2667,6 +2782,24 @@ interface(`kernel_dontaudit_sendrecv_unlabeled_association',`
+@@ -2667,6 +2800,24 @@ interface(`kernel_dontaudit_sendrecv_unlabeled_association',`
########################################
##
@@ -15329,7 +15354,7 @@ index e100d88..1c1a61c 100644
## Receive TCP packets from an unlabeled connection.
##
##
-@@ -2694,6 +2827,25 @@ interface(`kernel_tcp_recvfrom_unlabeled',`
+@@ -2694,6 +2845,25 @@ interface(`kernel_tcp_recvfrom_unlabeled',`
########################################
##
@@ -15355,7 +15380,7 @@ index e100d88..1c1a61c 100644
## Do not audit attempts to receive TCP packets from an unlabeled
## connection.
##
-@@ -2803,6 +2955,33 @@ interface(`kernel_raw_recvfrom_unlabeled',`
+@@ -2803,6 +2973,33 @@ interface(`kernel_raw_recvfrom_unlabeled',`
allow $1 unlabeled_t:rawip_socket recvfrom;
')
@@ -15389,7 +15414,7 @@ index e100d88..1c1a61c 100644
########################################
##
-@@ -2958,6 +3137,24 @@ interface(`kernel_relabelfrom_unlabeled_database',`
+@@ -2958,6 +3155,24 @@ interface(`kernel_relabelfrom_unlabeled_database',`
########################################
##
@@ -15414,7 +15439,7 @@ index e100d88..1c1a61c 100644
## Unconfined access to kernel module resources.
##
##
-@@ -2972,5 +3169,565 @@ interface(`kernel_unconfined',`
+@@ -2972,5 +3187,565 @@ interface(`kernel_unconfined',`
')
typeattribute $1 kern_unconfined;
@@ -39651,10 +39676,10 @@ index 0000000..8bca1d7
+')
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
new file mode 100644
-index 0000000..d0651a8
+index 0000000..188a153
--- /dev/null
+++ b/policy/modules/system/systemd.te
-@@ -0,0 +1,673 @@
+@@ -0,0 +1,677 @@
+policy_module(systemd, 1.0.0)
+
+#######################################
@@ -39796,6 +39821,8 @@ index 0000000..d0651a8
+fs_manage_cgroup_files(systemd_logind_t)
+fs_getattr_tmpfs(systemd_logind_t)
+fs_read_tmpfs_symlinks(systemd_logind_t)
++fs_mount_tmpfs(systemd_logind_t)
++userdom_mounton_tmp_dirs(systemd_logind_t)
+
+storage_setattr_removable_dev(systemd_logind_t)
+storage_setattr_scsi_generic_dev(systemd_logind_t)
@@ -39835,6 +39862,7 @@ index 0000000..d0651a8
+userdom_read_all_users_state(systemd_logind_t)
+userdom_use_user_ttys(systemd_logind_t)
+userdom_manage_all_user_tmp_content(systemd_logind_t)
++userdom_manage_all_user_tmpfs_content(systemd_logind_t)
+
+xserver_dbus_chat(systemd_logind_t)
+
@@ -39879,11 +39907,12 @@ index 0000000..d0651a8
+# systemd-networkd local policy
+#
+
-+allow systemd_networkd_t self:capability { net_admin };
++allow systemd_networkd_t self:capability { net_admin net_raw };
+
+allow systemd_networkd_t self:netlink_kobject_uevent_socket create_socket_perms;
+allow systemd_networkd_t self:netlink_route_socket { create_socket_perms nlmsg_read nlmsg_write };
+allow systemd_networkd_t self:unix_dgram_socket create_socket_perms;
++allow systemd_networkd_t self:packet_socket create_socket_perms;
+
+kernel_dgram_send(systemd_networkd_t)
+
@@ -41708,7 +41737,7 @@ index db75976..e4eb903 100644
+
+/var/run/user(/.*)? gen_context(system_u:object_r:user_tmp_t,s0)
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
-index 9dc60c6..3cc8679 100644
+index 9dc60c6..428fe58 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -30,9 +30,11 @@ template(`userdom_base_user_template',`
@@ -42022,7 +42051,7 @@ index 9dc60c6..3cc8679 100644
')
')
-@@ -273,6 +315,63 @@ interface(`userdom_manage_home_role',`
+@@ -273,6 +315,82 @@ interface(`userdom_manage_home_role',`
##
## Manage user temporary files
##
@@ -42081,12 +42110,31 @@ index 9dc60c6..3cc8679 100644
+
+#######################################
+##
++## Manage user temporary directories
++##
++##
++##
++## Domain allowed access.
++##
++##
++##
++#
++interface(`userdom_mounton_tmp_dirs',`
++ gen_require(`
++ type user_tmp_t;
++ ')
++
++ allow $1 user_tmp_t:dir mounton;
++')
++
++#######################################
++##
+## Manage user temporary files
+##
##
##
## Role allowed access.
-@@ -287,17 +386,64 @@ interface(`userdom_manage_home_role',`
+@@ -287,17 +405,66 @@ interface(`userdom_manage_home_role',`
#
interface(`userdom_manage_tmp_role',`
gen_require(`
@@ -42117,6 +42165,8 @@ index 9dc60c6..3cc8679 100644
+ relabel_fifo_files_pattern($2, user_tmp_type, user_tmp_type)
+')
+
++
++
+#######################################
+##
+## Dontaudit search of user bin dirs.
@@ -42156,7 +42206,7 @@ index 9dc60c6..3cc8679 100644
')
#######################################
-@@ -317,11 +463,31 @@ interface(`userdom_exec_user_tmp_files',`
+@@ -317,11 +484,31 @@ interface(`userdom_exec_user_tmp_files',`
')
exec_files_pattern($1, user_tmp_t, user_tmp_t)
@@ -42188,7 +42238,7 @@ index 9dc60c6..3cc8679 100644
## Role access for the user tmpfs type
## that the user has full access.
##
-@@ -348,59 +514,60 @@ interface(`userdom_exec_user_tmp_files',`
+@@ -348,59 +535,60 @@ interface(`userdom_exec_user_tmp_files',`
#
interface(`userdom_manage_tmpfs_role',`
gen_require(`
@@ -42240,9 +42290,7 @@ index 9dc60c6..3cc8679 100644
- allow $1_t self:tcp_socket create_stream_socket_perms;
- allow $1_t self:udp_socket create_socket_perms;
-+ allow $1 self:tcp_socket create_stream_socket_perms;
-+ allow $1 self:udp_socket create_socket_perms;
-
+-
- corenet_all_recvfrom_unlabeled($1_t)
- corenet_all_recvfrom_netlabel($1_t)
- corenet_tcp_sendrecv_generic_if($1_t)
@@ -42253,7 +42301,9 @@ index 9dc60c6..3cc8679 100644
- corenet_udp_sendrecv_all_ports($1_t)
- corenet_tcp_connect_all_ports($1_t)
- corenet_sendrecv_all_client_packets($1_t)
--
++ allow $1 self:tcp_socket create_stream_socket_perms;
++ allow $1 self:udp_socket create_socket_perms;
+
- corenet_all_recvfrom_labeled($1_t, $1_t)
+ corenet_tcp_sendrecv_generic_if($1)
+ corenet_udp_sendrecv_generic_if($1)
@@ -42279,7 +42329,7 @@ index 9dc60c6..3cc8679 100644
')
#######################################
-@@ -431,6 +598,7 @@ template(`userdom_xwindows_client_template',`
+@@ -431,6 +619,7 @@ template(`userdom_xwindows_client_template',`
dev_dontaudit_rw_dri($1_t)
# GNOME checks for usb and other devices:
dev_rw_usbfs($1_t)
@@ -42287,7 +42337,7 @@ index 9dc60c6..3cc8679 100644
xserver_user_x_domain_template($1, $1_t, user_tmpfs_t)
xserver_xsession_entry_type($1_t)
-@@ -463,8 +631,8 @@ template(`userdom_change_password_template',`
+@@ -463,8 +652,8 @@ template(`userdom_change_password_template',`
')
optional_policy(`
@@ -42298,7 +42348,7 @@ index 9dc60c6..3cc8679 100644
')
')
-@@ -491,51 +659,63 @@ template(`userdom_common_user_template',`
+@@ -491,51 +680,63 @@ template(`userdom_common_user_template',`
attribute unpriv_userdomain;
')
@@ -42376,17 +42426,17 @@ index 9dc60c6..3cc8679 100644
+ fs_read_noxattr_fs_files($1_usertype)
+ fs_read_noxattr_fs_symlinks($1_usertype)
+ fs_rw_cgroup_files($1_usertype)
-+
+
+- fs_rw_cgroup_files($1_t)
+ application_getattr_socket($1_usertype)
+
+ logging_send_syslog_msg($1_t)
-
-- fs_rw_cgroup_files($1_t)
++
+ selinux_get_enforce_mode($1_t)
# cjp: some of this probably can be removed
selinux_get_fs_mount($1_t)
-@@ -546,93 +726,128 @@ template(`userdom_common_user_template',`
+@@ -546,93 +747,128 @@ template(`userdom_common_user_template',`
selinux_compute_user_contexts($1_t)
# for eject
@@ -42488,50 +42538,50 @@ index 9dc60c6..3cc8679 100644
+ optional_policy(`
+ geoclue_dbus_chat($1_usertype)
+ ')
-+
-+ optional_policy(`
-+ gnome_dbus_chat_gconfdefault($1_usertype)
-+ ')
optional_policy(`
- bluetooth_dbus_chat($1_t)
-+ hal_dbus_chat($1_usertype)
++ gnome_dbus_chat_gconfdefault($1_usertype)
')
optional_policy(`
- consolekit_dbus_chat($1_t)
-+ kde_dbus_chat_backlighthelper($1_usertype)
++ hal_dbus_chat($1_usertype)
')
optional_policy(`
- cups_dbus_chat_config($1_t)
-+ modemmanager_dbus_chat($1_usertype)
++ kde_dbus_chat_backlighthelper($1_usertype)
')
optional_policy(`
- hal_dbus_chat($1_t)
-+ networkmanager_dbus_chat($1_usertype)
-+ networkmanager_read_lib_files($1_usertype)
++ modemmanager_dbus_chat($1_usertype)
')
optional_policy(`
- networkmanager_dbus_chat($1_t)
-+ policykit_dbus_chat($1_usertype)
++ networkmanager_dbus_chat($1_usertype)
++ networkmanager_read_lib_files($1_usertype)
')
optional_policy(`
- policykit_dbus_chat($1_t)
-+ vpn_dbus_chat($1_usertype)
++ policykit_dbus_chat($1_usertype)
')
++
++ optional_policy(`
++ vpn_dbus_chat($1_usertype)
++ ')
++ ')
++
++ optional_policy(`
++ git_role($1_r, $1_t)
')
optional_policy(`
- inetd_use_fds($1_t)
- inetd_rw_tcp_sockets($1_t)
-+ git_role($1_r, $1_t)
-+ ')
-+
-+ optional_policy(`
+ inetd_use_fds($1_usertype)
+ inetd_rw_tcp_sockets($1_usertype)
')
@@ -42553,7 +42603,7 @@ index 9dc60c6..3cc8679 100644
')
optional_policy(`
-@@ -642,23 +857,21 @@ template(`userdom_common_user_template',`
+@@ -642,23 +878,21 @@ template(`userdom_common_user_template',`
optional_policy(`
mpd_manage_user_data_content($1_t)
mpd_relabel_user_data_content($1_t)
@@ -42582,7 +42632,7 @@ index 9dc60c6..3cc8679 100644
mysql_stream_connect($1_t)
')
')
-@@ -671,7 +884,7 @@ template(`userdom_common_user_template',`
+@@ -671,7 +905,7 @@ template(`userdom_common_user_template',`
optional_policy(`
# to allow monitoring of pcmcia status
@@ -42591,7 +42641,7 @@ index 9dc60c6..3cc8679 100644
')
optional_policy(`
-@@ -680,9 +893,9 @@ template(`userdom_common_user_template',`
+@@ -680,9 +914,9 @@ template(`userdom_common_user_template',`
')
optional_policy(`
@@ -42604,7 +42654,7 @@ index 9dc60c6..3cc8679 100644
')
')
-@@ -693,32 +906,35 @@ template(`userdom_common_user_template',`
+@@ -693,32 +927,35 @@ template(`userdom_common_user_template',`
')
optional_policy(`
@@ -42614,27 +42664,31 @@ index 9dc60c6..3cc8679 100644
+
+ optional_policy(`
+ rpc_dontaudit_getattr_exports($1_usertype)
++ ')
++
++ optional_policy(`
++ rpcbind_stream_connect($1_usertype)
')
optional_policy(`
- rpc_dontaudit_getattr_exports($1_t)
- rpc_manage_nfs_rw_content($1_t)
-+ rpcbind_stream_connect($1_usertype)
++ samba_stream_connect_winbind($1_usertype)
')
optional_policy(`
- samba_stream_connect_winbind($1_t)
-+ samba_stream_connect_winbind($1_usertype)
++ sandbox_transition($1_usertype, $1_r)
')
optional_policy(`
- slrnpull_search_spool($1_t)
-+ sandbox_transition($1_usertype, $1_r)
++ seunshare_role_template($1, $1_r, $1_t)
')
optional_policy(`
- usernetctl_run($1_t, $1_r)
-+ seunshare_role_template($1, $1_r, $1_t)
++ slrnpull_search_spool($1_usertype)
')
optional_policy(`
@@ -42643,15 +42697,11 @@ index 9dc60c6..3cc8679 100644
- virt_home_filetrans_virt_content($1_t, dir, "isos")
- virt_home_filetrans_svirt_home($1_t, dir, "qemu")
- virt_home_filetrans_virt_home($1_t, dir, "VirtualMachines")
-+ slrnpull_search_spool($1_usertype)
-+ ')
-+
-+ optional_policy(`
+ thumb_role($1_r, $1_usertype)
')
')
-@@ -743,17 +959,33 @@ template(`userdom_common_user_template',`
+@@ -743,17 +980,33 @@ template(`userdom_common_user_template',`
template(`userdom_login_user_template', `
gen_require(`
class context contains;
@@ -42689,7 +42739,7 @@ index 9dc60c6..3cc8679 100644
userdom_change_password_template($1)
-@@ -761,83 +993,107 @@ template(`userdom_login_user_template', `
+@@ -761,83 +1014,107 @@ template(`userdom_login_user_template', `
#
# User domain Local policy
#
@@ -42833,7 +42883,7 @@ index 9dc60c6..3cc8679 100644
')
#######################################
-@@ -868,6 +1124,12 @@ template(`userdom_restricted_user_template',`
+@@ -868,6 +1145,12 @@ template(`userdom_restricted_user_template',`
typeattribute $1_t unpriv_userdomain;
domain_interactive_fd($1_t)
@@ -42846,7 +42896,7 @@ index 9dc60c6..3cc8679 100644
##############################
#
# Local policy
-@@ -907,57 +1169,141 @@ template(`userdom_restricted_xwindows_user_template',`
+@@ -907,53 +1190,137 @@ template(`userdom_restricted_xwindows_user_template',`
#
# Local policy
#
@@ -42900,8 +42950,11 @@ index 9dc60c6..3cc8679 100644
optional_policy(`
- alsa_read_rw_config($1_t)
+ alsa_read_rw_config($1_usertype)
-+ ')
-+
+ ')
+
+- optional_policy(`
+- dbus_role_template($1, $1_r, $1_t)
+- dbus_system_bus_client($1_t)
+ # cjp: needed by KDE apps
+ # bug: #682499
+ optional_policy(`
@@ -42912,72 +42965,59 @@ index 9dc60c6..3cc8679 100644
+
+ optional_policy(`
+ obex_role($1_r, $1_t, $1)
- ')
-
- optional_policy(`
-- dbus_role_template($1, $1_r, $1_t)
-- dbus_system_bus_client($1_t)
++ ')
++
++ optional_policy(`
+ dbus_role_template($1, $1_r, $1_usertype)
+ dbus_system_bus_client($1_usertype)
+ allow $1_usertype $1_usertype:dbus send_msg;
-
- optional_policy(`
-- consolekit_dbus_chat($1_t)
++
++ optional_policy(`
+ abrt_dbus_chat($1_usertype)
+ abrt_run_helper($1_usertype, $1_r)
- ')
-
- optional_policy(`
-- cups_dbus_chat($1_t)
++ ')
++
++ optional_policy(`
+ accountsd_dbus_chat($1_usertype)
- ')
-
- optional_policy(`
-- gnome_role_template($1, $1_r, $1_t)
-- wm_role_template($1, $1_r, $1_t)
++ ')
++
++ optional_policy(`
+ consolekit_dontaudit_read_log($1_usertype)
+ consolekit_dbus_chat($1_usertype)
- ')
-- ')
-
-- optional_policy(`
-- java_role($1_r, $1_t)
-- ')
++ ')
++
+ optional_policy(`
+ cups_dbus_chat($1_usertype)
+ cups_dbus_chat_config($1_usertype)
+ ')
-
-- optional_policy(`
-- setroubleshoot_dontaudit_stream_connect($1_t)
-- ')
--')
++
+ optional_policy(`
+ devicekit_dbus_chat($1_usertype)
+ devicekit_dbus_chat_disk($1_usertype)
+ devicekit_dbus_chat_power($1_usertype)
+ ')
--#######################################
--##
-+ optional_policy(`
+ optional_policy(`
+- consolekit_dbus_chat($1_t)
+ fprintd_dbus_chat($1_t)
-+ ')
-+
-+ optional_policy(`
+ ')
+
+ optional_policy(`
+- cups_dbus_chat($1_t)
+ realmd_dbus_chat($1_t)
-+ ')
-+
-+ optional_policy(`
-+ gnome_role_template($1, $1_r, $1_t)
+ ')
+
+ optional_policy(`
+ gnome_role_template($1, $1_r, $1_t)
+ ')
+
+ optional_policy(`
-+ wm_role_template($1, $1_r, $1_t)
-+ ')
-+ ')
-+
-+ optional_policy(`
+ wm_role_template($1, $1_r, $1_t)
+ ')
+ ')
+
+ optional_policy(`
+- java_role($1_r, $1_t)
+ policykit_role($1_r, $1_usertype)
+ ')
+
@@ -42992,11 +43032,11 @@ index 9dc60c6..3cc8679 100644
+
+ optional_policy(`
+ systemd_filetrans_home_content($1_usertype)
-+ ')
-+
-+ optional_policy(`
-+ setroubleshoot_dontaudit_stream_connect($1_t)
-+ ')
+ ')
+
+ optional_policy(`
+ setroubleshoot_dontaudit_stream_connect($1_t)
+ ')
+
+ optional_policy(`
+ udev_read_db($1_usertype)
@@ -43005,14 +43045,10 @@ index 9dc60c6..3cc8679 100644
+ optional_policy(`
+ xserver_xdm_ioctl_log($1_t)
+ ')
-+')
-+
-+#######################################
-+##
- ## The template for creating a unprivileged user roughly
- ## equivalent to a regular linux user.
- ##
-@@ -987,27 +1333,33 @@ template(`userdom_unpriv_user_template', `
+ ')
+
+ #######################################
+@@ -987,27 +1354,33 @@ template(`userdom_unpriv_user_template', `
#
# Inherit rules for ordinary users.
@@ -43050,7 +43086,7 @@ index 9dc60c6..3cc8679 100644
fs_manage_noxattr_fs_files($1_t)
fs_manage_noxattr_fs_dirs($1_t)
# Write floppies
-@@ -1018,23 +1370,60 @@ template(`userdom_unpriv_user_template', `
+@@ -1018,23 +1391,60 @@ template(`userdom_unpriv_user_template', `
')
')
@@ -43102,26 +43138,26 @@ index 9dc60c6..3cc8679 100644
+
+ optional_policy(`
+ gpm_stream_connect($1_usertype)
-+ ')
-+
-+ optional_policy(`
+ ')
+
+ optional_policy(`
+- netutils_run_ping_cond($1_t, $1_r)
+- netutils_run_traceroute_cond($1_t, $1_r)
+ mount_run_fusermount($1_t, $1_r)
+ mount_read_pid_files($1_t)
+ ')
+
+ optional_policy(`
+ wine_role_template($1, $1_r, $1_t)
- ')
-
- optional_policy(`
-- netutils_run_ping_cond($1_t, $1_r)
-- netutils_run_traceroute_cond($1_t, $1_r)
++ ')
++
++ optional_policy(`
+ postfix_run_postdrop($1_t, $1_r)
+ postfix_search_spool($1_t)
')
# Run pppd in pppd_t by default for user
-@@ -1043,7 +1432,9 @@ template(`userdom_unpriv_user_template', `
+@@ -1043,7 +1453,9 @@ template(`userdom_unpriv_user_template', `
')
optional_policy(`
@@ -43132,7 +43168,7 @@ index 9dc60c6..3cc8679 100644
')
')
-@@ -1079,7 +1470,9 @@ template(`userdom_unpriv_user_template', `
+@@ -1079,7 +1491,9 @@ template(`userdom_unpriv_user_template', `
template(`userdom_admin_user_template',`
gen_require(`
attribute admindomain;
@@ -43143,7 +43179,7 @@ index 9dc60c6..3cc8679 100644
')
##############################
-@@ -1095,6 +1488,7 @@ template(`userdom_admin_user_template',`
+@@ -1095,6 +1509,7 @@ template(`userdom_admin_user_template',`
role system_r types $1_t;
typeattribute $1_t admindomain;
@@ -43151,7 +43187,7 @@ index 9dc60c6..3cc8679 100644
ifdef(`direct_sysadm_daemon',`
domain_system_change_exemption($1_t)
-@@ -1105,14 +1499,8 @@ template(`userdom_admin_user_template',`
+@@ -1105,14 +1520,8 @@ template(`userdom_admin_user_template',`
# $1_t local policy
#
@@ -43168,7 +43204,7 @@ index 9dc60c6..3cc8679 100644
kernel_read_software_raid_state($1_t)
kernel_getattr_core_if($1_t)
-@@ -1128,6 +1516,7 @@ template(`userdom_admin_user_template',`
+@@ -1128,6 +1537,7 @@ template(`userdom_admin_user_template',`
kernel_sigstop_unlabeled($1_t)
kernel_signull_unlabeled($1_t)
kernel_sigchld_unlabeled($1_t)
@@ -43176,7 +43212,7 @@ index 9dc60c6..3cc8679 100644
corenet_tcp_bind_generic_port($1_t)
# allow setting up tunnels
-@@ -1145,10 +1534,14 @@ template(`userdom_admin_user_template',`
+@@ -1145,10 +1555,14 @@ template(`userdom_admin_user_template',`
dev_rename_all_blk_files($1_t)
dev_rename_all_chr_files($1_t)
dev_create_generic_symlinks($1_t)
@@ -43191,7 +43227,7 @@ index 9dc60c6..3cc8679 100644
domain_dontaudit_ptrace_all_domains($1_t)
# signal all domains:
domain_kill_all_domains($1_t)
-@@ -1159,29 +1552,38 @@ template(`userdom_admin_user_template',`
+@@ -1159,29 +1573,38 @@ template(`userdom_admin_user_template',`
domain_sigchld_all_domains($1_t)
# for lsof
domain_getattr_all_sockets($1_t)
@@ -43234,7 +43270,7 @@ index 9dc60c6..3cc8679 100644
# The following rule is temporary until such time that a complete
# policy management infrastructure is in place so that an administrator
-@@ -1191,6 +1593,8 @@ template(`userdom_admin_user_template',`
+@@ -1191,6 +1614,8 @@ template(`userdom_admin_user_template',`
# But presently necessary for installing the file_contexts file.
seutil_manage_bin_policy($1_t)
@@ -43243,7 +43279,7 @@ index 9dc60c6..3cc8679 100644
userdom_manage_user_home_content_dirs($1_t)
userdom_manage_user_home_content_files($1_t)
userdom_manage_user_home_content_symlinks($1_t)
-@@ -1198,13 +1602,17 @@ template(`userdom_admin_user_template',`
+@@ -1198,13 +1623,17 @@ template(`userdom_admin_user_template',`
userdom_manage_user_home_content_sockets($1_t)
userdom_user_home_dir_filetrans_user_home_content($1_t, { dir file lnk_file fifo_file sock_file })
@@ -43262,7 +43298,7 @@ index 9dc60c6..3cc8679 100644
optional_policy(`
postgresql_unconfined($1_t)
')
-@@ -1240,7 +1648,7 @@ template(`userdom_admin_user_template',`
+@@ -1240,7 +1669,7 @@ template(`userdom_admin_user_template',`
##
##
#
@@ -43271,7 +43307,7 @@ index 9dc60c6..3cc8679 100644
allow $1 self:capability { dac_read_search dac_override };
corecmd_exec_shell($1)
-@@ -1250,6 +1658,8 @@ template(`userdom_security_admin_template',`
+@@ -1250,6 +1679,8 @@ template(`userdom_security_admin_template',`
dev_relabel_all_dev_nodes($1)
files_create_boot_flag($1)
@@ -43280,7 +43316,7 @@ index 9dc60c6..3cc8679 100644
# Necessary for managing /boot/efi
fs_manage_dos_files($1)
-@@ -1262,8 +1672,10 @@ template(`userdom_security_admin_template',`
+@@ -1262,8 +1693,10 @@ template(`userdom_security_admin_template',`
selinux_set_enforce_mode($1)
selinux_set_all_booleans($1)
selinux_set_parameters($1)
@@ -43292,7 +43328,7 @@ index 9dc60c6..3cc8679 100644
auth_relabel_shadow($1)
init_exec($1)
-@@ -1274,29 +1686,31 @@ template(`userdom_security_admin_template',`
+@@ -1274,29 +1707,31 @@ template(`userdom_security_admin_template',`
logging_read_audit_config($1)
seutil_manage_bin_policy($1)
@@ -43335,7 +43371,7 @@ index 9dc60c6..3cc8679 100644
')
optional_policy(`
-@@ -1357,14 +1771,17 @@ interface(`userdom_user_home_content',`
+@@ -1357,14 +1792,17 @@ interface(`userdom_user_home_content',`
gen_require(`
attribute user_home_content_type;
type user_home_t;
@@ -43354,7 +43390,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -1405,6 +1822,51 @@ interface(`userdom_user_tmpfs_file',`
+@@ -1405,6 +1843,51 @@ interface(`userdom_user_tmpfs_file',`
##
## Allow domain to attach to TUN devices created by administrative users.
##
@@ -43406,7 +43442,7 @@ index 9dc60c6..3cc8679 100644
##
##
## Domain allowed access.
-@@ -1509,11 +1971,31 @@ interface(`userdom_search_user_home_dirs',`
+@@ -1509,11 +1992,31 @@ interface(`userdom_search_user_home_dirs',`
')
allow $1 user_home_dir_t:dir search_dir_perms;
@@ -43438,7 +43474,7 @@ index 9dc60c6..3cc8679 100644
## Do not audit attempts to search user home directories.
##
##
-@@ -1555,6 +2037,14 @@ interface(`userdom_list_user_home_dirs',`
+@@ -1555,6 +2058,14 @@ interface(`userdom_list_user_home_dirs',`
allow $1 user_home_dir_t:dir list_dir_perms;
files_search_home($1)
@@ -43453,7 +43489,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -1570,9 +2060,11 @@ interface(`userdom_list_user_home_dirs',`
+@@ -1570,9 +2081,11 @@ interface(`userdom_list_user_home_dirs',`
interface(`userdom_dontaudit_list_user_home_dirs',`
gen_require(`
type user_home_dir_t;
@@ -43465,7 +43501,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -1629,6 +2121,42 @@ interface(`userdom_relabelto_user_home_dirs',`
+@@ -1629,6 +2142,42 @@ interface(`userdom_relabelto_user_home_dirs',`
allow $1 user_home_dir_t:dir relabelto;
')
@@ -43508,7 +43544,7 @@ index 9dc60c6..3cc8679 100644
########################################
##
## Create directories in the home dir root with
-@@ -1708,6 +2236,8 @@ interface(`userdom_dontaudit_search_user_home_content',`
+@@ -1708,6 +2257,8 @@ interface(`userdom_dontaudit_search_user_home_content',`
')
dontaudit $1 user_home_t:dir search_dir_perms;
@@ -43517,7 +43553,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -1741,10 +2271,12 @@ interface(`userdom_list_all_user_home_content',`
+@@ -1741,10 +2292,12 @@ interface(`userdom_list_all_user_home_content',`
#
interface(`userdom_list_user_home_content',`
gen_require(`
@@ -43532,7 +43568,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -1769,7 +2301,25 @@ interface(`userdom_manage_user_home_content_dirs',`
+@@ -1769,7 +2322,25 @@ interface(`userdom_manage_user_home_content_dirs',`
########################################
##
@@ -43559,7 +43595,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -1779,53 +2329,70 @@ interface(`userdom_manage_user_home_content_dirs',`
+@@ -1779,53 +2350,70 @@ interface(`userdom_manage_user_home_content_dirs',`
#
interface(`userdom_delete_all_user_home_content_dirs',`
gen_require(`
@@ -43642,7 +43678,7 @@ index 9dc60c6..3cc8679 100644
## Do not audit attempts to set the
## attributes of user home files.
##
-@@ -1845,6 +2412,25 @@ interface(`userdom_dontaudit_setattr_user_home_content_files',`
+@@ -1845,6 +2433,25 @@ interface(`userdom_dontaudit_setattr_user_home_content_files',`
########################################
##
@@ -43668,7 +43704,7 @@ index 9dc60c6..3cc8679 100644
## Mmap user home files.
##
##
-@@ -1875,15 +2461,18 @@ interface(`userdom_mmap_user_home_content_files',`
+@@ -1875,15 +2482,18 @@ interface(`userdom_mmap_user_home_content_files',`
interface(`userdom_read_user_home_content_files',`
gen_require(`
type user_home_dir_t, user_home_t;
@@ -43689,7 +43725,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -1891,18 +2480,18 @@ interface(`userdom_read_user_home_content_files',`
+@@ -1891,18 +2501,18 @@ interface(`userdom_read_user_home_content_files',`
##
##
#
@@ -43713,7 +43749,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -1910,17 +2499,39 @@ interface(`userdom_dontaudit_read_user_home_content_files',`
+@@ -1910,17 +2520,21 @@ interface(`userdom_dontaudit_read_user_home_content_files',`
##
##
#
@@ -43736,13 +43772,14 @@ index 9dc60c6..3cc8679 100644
##
-## Do not audit attempts to write user home files.
+## Do not audit attempts to append user home files.
-+##
-+##
-+##
-+## Domain to not audit.
-+##
-+##
-+#
+ ##
+ ##
+ ##
+@@ -1928,7 +2542,25 @@ interface(`userdom_dontaudit_append_user_home_content_files',`
+ ##
+ ##
+ #
+-interface(`userdom_dontaudit_write_user_home_content_files',`
+interface(`userdom_dontaudit_append_user_home_content_files',`
+ gen_require(`
+ type user_home_t;
@@ -43754,10 +43791,18 @@ index 9dc60c6..3cc8679 100644
+########################################
+##
+## Do not audit attempts to write user home files.
- ##
- ##
- ##
-@@ -1938,7 +2549,7 @@ interface(`userdom_dontaudit_write_user_home_content_files',`
++##
++##
++##
++## Domain to not audit.
++##
++##
++#
++interface(`userdom_dontaudit_write_user_home_content_files',`
+ gen_require(`
+ type user_home_t;
+ ')
+@@ -1938,7 +2570,7 @@ interface(`userdom_dontaudit_write_user_home_content_files',`
########################################
##
@@ -43766,7 +43811,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -1946,10 +2557,9 @@ interface(`userdom_dontaudit_write_user_home_content_files',`
+@@ -1946,10 +2578,9 @@ interface(`userdom_dontaudit_write_user_home_content_files',`
##
##
#
@@ -43779,7 +43824,7 @@ index 9dc60c6..3cc8679 100644
')
userdom_search_user_home_content($1)
-@@ -1958,7 +2568,7 @@ interface(`userdom_delete_all_user_home_content_files',`
+@@ -1958,7 +2589,7 @@ interface(`userdom_delete_all_user_home_content_files',`
########################################
##
@@ -43788,7 +43833,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -1966,12 +2576,66 @@ interface(`userdom_delete_all_user_home_content_files',`
+@@ -1966,12 +2597,66 @@ interface(`userdom_delete_all_user_home_content_files',`
##
##
#
@@ -43857,7 +43902,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -2007,8 +2671,7 @@ interface(`userdom_read_user_home_content_symlinks',`
+@@ -2007,8 +2692,7 @@ interface(`userdom_read_user_home_content_symlinks',`
type user_home_dir_t, user_home_t;
')
@@ -43867,7 +43912,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -2024,20 +2687,14 @@ interface(`userdom_read_user_home_content_symlinks',`
+@@ -2024,20 +2708,14 @@ interface(`userdom_read_user_home_content_symlinks',`
#
interface(`userdom_exec_user_home_content_files',`
gen_require(`
@@ -43892,7 +43937,7 @@ index 9dc60c6..3cc8679 100644
########################################
##
-@@ -2120,7 +2777,7 @@ interface(`userdom_manage_user_home_content_symlinks',`
+@@ -2120,7 +2798,7 @@ interface(`userdom_manage_user_home_content_symlinks',`
########################################
##
@@ -43901,7 +43946,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -2128,19 +2785,17 @@ interface(`userdom_manage_user_home_content_symlinks',`
+@@ -2128,19 +2806,17 @@ interface(`userdom_manage_user_home_content_symlinks',`
##
##
#
@@ -43925,7 +43970,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -2148,12 +2803,12 @@ interface(`userdom_delete_all_user_home_content_symlinks',`
+@@ -2148,12 +2824,12 @@ interface(`userdom_delete_all_user_home_content_symlinks',`
##
##
#
@@ -43941,7 +43986,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -2390,11 +3045,11 @@ interface(`userdom_dontaudit_manage_user_tmp_dirs',`
+@@ -2390,11 +3066,11 @@ interface(`userdom_dontaudit_manage_user_tmp_dirs',`
#
interface(`userdom_read_user_tmp_files',`
gen_require(`
@@ -43956,7 +44001,7 @@ index 9dc60c6..3cc8679 100644
files_search_tmp($1)
')
-@@ -2414,7 +3069,7 @@ interface(`userdom_dontaudit_read_user_tmp_files',`
+@@ -2414,7 +3090,7 @@ interface(`userdom_dontaudit_read_user_tmp_files',`
type user_tmp_t;
')
@@ -43965,7 +44010,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -2661,6 +3316,25 @@ interface(`userdom_tmp_filetrans_user_tmp',`
+@@ -2661,6 +3337,25 @@ interface(`userdom_tmp_filetrans_user_tmp',`
files_tmp_filetrans($1, user_tmp_t, $2, $3)
')
@@ -43991,7 +44036,7 @@ index 9dc60c6..3cc8679 100644
########################################
##
## Read user tmpfs files.
-@@ -2677,13 +3351,14 @@ interface(`userdom_read_user_tmpfs_files',`
+@@ -2677,13 +3372,14 @@ interface(`userdom_read_user_tmpfs_files',`
')
read_files_pattern($1, user_tmpfs_t, user_tmpfs_t)
@@ -44007,7 +44052,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -2704,7 +3379,7 @@ interface(`userdom_rw_user_tmpfs_files',`
+@@ -2704,7 +3400,7 @@ interface(`userdom_rw_user_tmpfs_files',`
########################################
##
@@ -44016,7 +44061,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -2712,14 +3387,30 @@ interface(`userdom_rw_user_tmpfs_files',`
+@@ -2712,14 +3408,30 @@ interface(`userdom_rw_user_tmpfs_files',`
##
##
#
@@ -44051,7 +44096,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -2814,6 +3505,24 @@ interface(`userdom_use_user_ttys',`
+@@ -2814,6 +3526,24 @@ interface(`userdom_use_user_ttys',`
########################################
##
@@ -44076,7 +44121,7 @@ index 9dc60c6..3cc8679 100644
## Read and write a user domain pty.
##
##
-@@ -2832,22 +3541,34 @@ interface(`userdom_use_user_ptys',`
+@@ -2832,22 +3562,34 @@ interface(`userdom_use_user_ptys',`
########################################
##
@@ -44119,7 +44164,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -2856,14 +3577,33 @@ interface(`userdom_use_user_ptys',`
+@@ -2856,14 +3598,33 @@ interface(`userdom_use_user_ptys',`
##
##
#
@@ -44157,7 +44202,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -2882,8 +3622,27 @@ interface(`userdom_dontaudit_use_user_terminals',`
+@@ -2882,8 +3643,27 @@ interface(`userdom_dontaudit_use_user_terminals',`
type user_tty_device_t, user_devpts_t;
')
@@ -44187,7 +44232,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -2955,69 +3714,68 @@ interface(`userdom_spec_domtrans_unpriv_users',`
+@@ -2955,69 +3735,68 @@ interface(`userdom_spec_domtrans_unpriv_users',`
allow unpriv_userdomain $1:process sigchld;
')
@@ -44288,7 +44333,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -3025,12 +3783,12 @@ interface(`userdom_manage_unpriv_user_semaphores',`
+@@ -3025,12 +3804,12 @@ interface(`userdom_manage_unpriv_user_semaphores',`
##
##
#
@@ -44303,7 +44348,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -3094,7 +3852,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
+@@ -3094,7 +3873,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
domain_entry_file_spec_domtrans($1, unpriv_userdomain)
allow unpriv_userdomain $1:fd use;
@@ -44312,7 +44357,7 @@ index 9dc60c6..3cc8679 100644
allow unpriv_userdomain $1:process sigchld;
')
-@@ -3110,29 +3868,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
+@@ -3110,29 +3889,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
#
interface(`userdom_search_user_home_content',`
gen_require(`
@@ -44346,7 +44391,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -3214,31 +3956,49 @@ interface(`userdom_dontaudit_use_user_ptys',`
+@@ -3214,31 +3977,49 @@ interface(`userdom_dontaudit_use_user_ptys',`
type user_devpts_t;
')
@@ -44403,7 +44448,7 @@ index 9dc60c6..3cc8679 100644
##
##
##
-@@ -3269,7 +4029,83 @@ interface(`userdom_write_user_tmp_files',`
+@@ -3269,7 +4050,83 @@ interface(`userdom_write_user_tmp_files',`
type user_tmp_t;
')
@@ -44488,7 +44533,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -3287,7 +4123,7 @@ interface(`userdom_dontaudit_use_user_ttys',`
+@@ -3287,7 +4144,7 @@ interface(`userdom_dontaudit_use_user_ttys',`
type user_tty_device_t;
')
@@ -44497,7 +44542,7 @@ index 9dc60c6..3cc8679 100644
')
########################################
-@@ -3306,6 +4142,7 @@ interface(`userdom_read_all_users_state',`
+@@ -3306,6 +4163,7 @@ interface(`userdom_read_all_users_state',`
')
read_files_pattern($1, userdomain, userdomain)
@@ -44505,7 +44550,7 @@ index 9dc60c6..3cc8679 100644
kernel_search_proc($1)
')
-@@ -3382,6 +4219,42 @@ interface(`userdom_signal_all_users',`
+@@ -3382,6 +4240,42 @@ interface(`userdom_signal_all_users',`
allow $1 userdomain:process signal;
')
@@ -44548,7 +44593,7 @@ index 9dc60c6..3cc8679 100644
########################################
##
## Send a SIGCHLD signal to all user domains.
-@@ -3402,6 +4275,24 @@ interface(`userdom_sigchld_all_users',`
+@@ -3402,6 +4296,24 @@ interface(`userdom_sigchld_all_users',`
########################################
##
@@ -44573,7 +44618,7 @@ index 9dc60c6..3cc8679 100644
## Create keys for all user domains.
##
##
-@@ -3435,4 +4326,1680 @@ interface(`userdom_dbus_send_all_users',`
+@@ -3435,4 +4347,1680 @@ interface(`userdom_dbus_send_all_users',`
')
allow $1 userdomain:dbus send_msg;
diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch
index bfcea24..b5ed9ef 100644
--- a/policy-rawhide-contrib.patch
+++ b/policy-rawhide-contrib.patch
@@ -21386,7 +21386,7 @@ index 8ce99ff..0819898 100644
+ logging_log_filetrans($1, devicekit_var_log_t, file, "pm-suspend.log")
')
diff --git a/devicekit.te b/devicekit.te
-index 77a5003..73f2867 100644
+index 77a5003..b605240 100644
--- a/devicekit.te
+++ b/devicekit.te
@@ -7,15 +7,15 @@ policy_module(devicekit, 1.3.1)
@@ -21431,7 +21431,7 @@ index 77a5003..73f2867 100644
allow devicekit_disk_t self:process { getsched signal_perms };
allow devicekit_disk_t self:fifo_file rw_fifo_file_perms;
allow devicekit_disk_t self:netlink_kobject_uevent_socket create_socket_perms;
-@@ -81,10 +79,11 @@ allow devicekit_disk_t devicekit_var_run_t:dir mounton;
+@@ -81,17 +79,18 @@ allow devicekit_disk_t devicekit_var_run_t:dir mounton;
manage_dirs_pattern(devicekit_disk_t, devicekit_var_run_t, devicekit_var_run_t)
manage_files_pattern(devicekit_disk_t, devicekit_var_run_t, devicekit_var_run_t)
files_pid_filetrans(devicekit_disk_t, devicekit_var_run_t, { dir file })
@@ -21444,6 +21444,14 @@ index 77a5003..73f2867 100644
kernel_read_fs_sysctls(devicekit_disk_t)
kernel_read_network_state(devicekit_disk_t)
kernel_read_software_raid_state(devicekit_disk_t)
+ kernel_read_system_state(devicekit_disk_t)
+ kernel_read_vm_sysctls(devicekit_disk_t)
+ kernel_request_load_module(devicekit_disk_t)
+-kernel_setsched(devicekit_disk_t)
++kernel_dontaudit_setsched(devicekit_disk_t)
+
+ corecmd_exec_bin(devicekit_disk_t)
+ corecmd_exec_shell(devicekit_disk_t)
@@ -99,6 +98,8 @@ corecmd_getattr_all_executables(devicekit_disk_t)
dev_getattr_all_chr_files(devicekit_disk_t)
@@ -21537,7 +21545,7 @@ index 77a5003..73f2867 100644
logging_log_filetrans(devicekit_power_t, devicekit_var_log_t, file)
manage_dirs_pattern(devicekit_power_t, devicekit_var_run_t, devicekit_var_run_t)
-@@ -224,7 +236,7 @@ files_pid_filetrans(devicekit_power_t, devicekit_var_run_t, { dir file })
+@@ -224,12 +236,12 @@ files_pid_filetrans(devicekit_power_t, devicekit_var_run_t, { dir file })
kernel_read_fs_sysctls(devicekit_power_t)
kernel_read_network_state(devicekit_power_t)
kernel_read_system_state(devicekit_power_t)
@@ -21546,6 +21554,12 @@ index 77a5003..73f2867 100644
kernel_rw_kernel_sysctl(devicekit_power_t)
kernel_rw_vm_sysctls(devicekit_power_t)
kernel_search_debugfs(devicekit_power_t)
+ kernel_write_proc_files(devicekit_power_t)
+-kernel_setsched(devicekit_power_t)
++kernel_dontaudit_setsched(devicekit_power_t)
+
+ corecmd_exec_bin(devicekit_power_t)
+ corecmd_exec_shell(devicekit_power_t)
@@ -248,21 +260,18 @@ domain_read_all_domains_state(devicekit_power_t)
files_read_kernel_img(devicekit_power_t)
@@ -23578,7 +23592,7 @@ index 0000000..89401fe
+')
diff --git a/docker.te b/docker.te
new file mode 100644
-index 0000000..5e91008
+index 0000000..ea0f2d3
--- /dev/null
+++ b/docker.te
@@ -0,0 +1,260 @@
@@ -23763,7 +23777,7 @@ index 0000000..5e91008
+allow docker_t docker_var_lib_t:chr_file mounton;
+can_exec(docker_t, docker_var_lib_t)
+
-+kernel_setsched(docker_t)
++kernel_dontaudit_setsched(docker_t)
+kernel_get_sysvipc_info(docker_t)
+kernel_request_load_module(docker_t)
+kernel_mounton_messages(docker_t)
@@ -27743,7 +27757,7 @@ index 1e29af1..6c64f55 100644
+ userdom_user_home_dir_filetrans($1, git_user_content_t, dir, "public_git")
+')
diff --git a/git.te b/git.te
-index dc49c71..72aa729 100644
+index dc49c71..3ef1e93 100644
--- a/git.te
+++ b/git.te
@@ -49,14 +49,6 @@ gen_tunable(git_session_users, false)
@@ -27812,17 +27826,18 @@ index dc49c71..72aa729 100644
corenet_all_recvfrom_unlabeled(git_system_t)
corenet_all_recvfrom_netlabel(git_system_t)
corenet_tcp_sendrecv_generic_if(git_system_t)
-@@ -176,6 +172,9 @@ logging_send_syslog_msg(git_system_t)
+@@ -176,6 +172,10 @@ logging_send_syslog_msg(git_system_t)
tunable_policy(`git_system_enable_homedirs',`
userdom_search_user_home_dirs(git_system_t)
+ list_dirs_pattern(httpd_git_script_t, git_user_content_t, git_user_content_t)
++ list_dirs_pattern(git_system_t, git_user_content_t, git_user_content_t)
+ read_files_pattern(git_system_t, git_user_content_t, git_user_content_t)
+
')
tunable_policy(`git_system_enable_homedirs && use_nfs_home_dirs',`
-@@ -215,48 +214,48 @@ tunable_policy(`git_system_use_nfs',`
+@@ -215,48 +215,48 @@ tunable_policy(`git_system_use_nfs',`
# CGI policy
#
@@ -27893,7 +27908,7 @@ index dc49c71..72aa729 100644
')
########################################
-@@ -266,12 +265,9 @@ tunable_policy(`git_cgi_use_nfs',`
+@@ -266,12 +266,9 @@ tunable_policy(`git_cgi_use_nfs',`
allow git_daemon self:fifo_file rw_fifo_file_perms;
@@ -32464,7 +32479,7 @@ index e151378..04d173d 100644
fs_getattr_xattr_fs(zookeeper_server_t)
diff --git a/hal.te b/hal.te
-index bbccc79..6c6524a 100644
+index bbccc79..435ac42 100644
--- a/hal.te
+++ b/hal.te
@@ -61,7 +61,6 @@ files_type(hald_var_lib_t)
@@ -32475,6 +32490,15 @@ index bbccc79..6c6524a 100644
miscfiles_read_localization(hald_domain)
+@@ -116,7 +115,7 @@ kernel_rw_irq_sysctls(hald_t)
+ kernel_rw_vm_sysctls(hald_t)
+ kernel_write_proc_files(hald_t)
+ kernel_rw_net_sysctls(hald_t)
+-kernel_setsched(hald_t)
++kernel_dontaudit_setsched(hald_t)
+ kernel_request_load_module(hald_t)
+
+ corecmd_exec_all_executables(hald_t)
@@ -437,7 +436,6 @@ write_files_pattern(hald_keymap_t, hald_log_t, hald_log_t)
dev_rw_input_dev(hald_keymap_t)
@@ -33790,7 +33814,7 @@ index 1a35420..2ea1241 100644
logging_search_logs($1)
admin_pattern($1, iscsi_log_t)
diff --git a/iscsi.te b/iscsi.te
-index ca020fa..a25fc7f 100644
+index ca020fa..7f7047f 100644
--- a/iscsi.te
+++ b/iscsi.te
@@ -9,8 +9,8 @@ type iscsid_t;
@@ -33834,7 +33858,8 @@ index ca020fa..a25fc7f 100644
+kernel_request_load_module(iscsid_t)
kernel_read_network_state(iscsid_t)
kernel_read_system_state(iscsid_t)
- kernel_setsched(iscsid_t)
+-kernel_setsched(iscsid_t)
++kernel_dontaudit_setsched(iscsid_t)
+kernel_request_load_module(iscsid_t)
-corenet_all_recvfrom_unlabeled(iscsid_t)
@@ -44365,7 +44390,7 @@ index 6194b80..03c6414 100644
')
+
diff --git a/mozilla.te b/mozilla.te
-index 11ac8e4..dfd8d3a 100644
+index 11ac8e4..ad56dac 100644
--- a/mozilla.te
+++ b/mozilla.te
@@ -6,17 +6,41 @@ policy_module(mozilla, 2.8.0)
@@ -44768,34 +44793,34 @@ index 11ac8e4..dfd8d3a 100644
- gnome_home_filetrans_gnome_home(mozilla_t, dir, ".gnome2_private")
+ gnome_manage_config(mozilla_t)
+ gnome_manage_gconf_home_files(mozilla_t)
++')
++
++optional_policy(`
++ java_domtrans(mozilla_t)
')
optional_policy(`
- java_exec(mozilla_t)
- java_manage_generic_home_content(mozilla_t)
- java_home_filetrans_java_home(mozilla_t, dir, ".java")
-+ java_domtrans(mozilla_t)
++ lpd_domtrans_lpr(mozilla_t)
')
optional_policy(`
- lpd_run_lpr(mozilla_t, mozilla_roles)
-+ lpd_domtrans_lpr(mozilla_t)
++ mplayer_domtrans(mozilla_t)
++ mplayer_read_user_home_files(mozilla_t)
')
optional_policy(`
- mplayer_exec(mozilla_t)
- mplayer_manage_generic_home_content(mozilla_t)
- mplayer_home_filetrans_mplayer_home(mozilla_t, dir, ".mplayer")
-+ mplayer_domtrans(mozilla_t)
-+ mplayer_read_user_home_files(mozilla_t)
++ nscd_socket_use(mozilla_t)
')
optional_policy(`
- pulseaudio_run(mozilla_t, mozilla_roles)
-+ nscd_socket_use(mozilla_t)
-+')
-+
-+optional_policy(`
+ #pulseaudio_role(mozilla_roles, mozilla_t)
+ pulseaudio_exec(mozilla_t)
+ pulseaudio_stream_connect(mozilla_t)
@@ -44803,7 +44828,7 @@ index 11ac8e4..dfd8d3a 100644
')
optional_policy(`
-@@ -300,259 +324,243 @@ optional_policy(`
+@@ -300,259 +324,247 @@ optional_policy(`
########################################
#
@@ -45066,12 +45091,12 @@ index 11ac8e4..dfd8d3a 100644
-userdom_manage_user_tmp_dirs(mozilla_plugin_t)
-userdom_manage_user_tmp_files(mozilla_plugin_t)
-+systemd_read_logind_sessions_files(mozilla_plugin_t)
-
+-
-userdom_manage_user_home_content_dirs(mozilla_plugin_t)
-userdom_manage_user_home_content_files(mozilla_plugin_t)
-userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })
--
++systemd_read_logind_sessions_files(mozilla_plugin_t)
+
-userdom_write_user_tmp_sockets(mozilla_plugin_t)
+term_getattr_all_ttys(mozilla_plugin_t)
+term_getattr_all_ptys(mozilla_plugin_t)
@@ -45095,26 +45120,28 @@ index 11ac8e4..dfd8d3a 100644
-ifndef(`enable_mls',`
- fs_list_dos(mozilla_plugin_t)
- fs_read_dos_files(mozilla_plugin_t)
--
-- fs_search_removable(mozilla_plugin_t)
-- fs_read_removable_files(mozilla_plugin_t)
-- fs_read_removable_symlinks(mozilla_plugin_t)
+userdom_read_user_home_content_files(mozilla_plugin_t)
+userdom_read_user_home_content_symlinks(mozilla_plugin_t)
+userdom_read_home_certs(mozilla_plugin_t)
+userdom_read_home_audio_files(mozilla_plugin_t)
+userdom_exec_user_tmp_files(mozilla_plugin_t)
-- fs_read_iso9660_files(mozilla_plugin_t)
--')
+- fs_search_removable(mozilla_plugin_t)
+- fs_read_removable_files(mozilla_plugin_t)
+- fs_read_removable_symlinks(mozilla_plugin_t)
+userdom_home_manager(mozilla_plugin_t)
--tunable_policy(`allow_execmem',`
-- allow mozilla_plugin_t self:process execmem;
+- fs_read_iso9660_files(mozilla_plugin_t)
+tunable_policy(`mozilla_plugin_can_network_connect',`
+ corenet_tcp_connect_all_ports(mozilla_plugin_t)
')
+-tunable_policy(`allow_execmem',`
+- allow mozilla_plugin_t self:process execmem;
++optional_policy(`
++ abrt_stream_connect(mozilla_plugin_t)
+ ')
+
-tunable_policy(`mozilla_execstack',`
- allow mozilla_plugin_t self:process { execmem execstack };
+optional_policy(`
@@ -45196,7 +45223,7 @@ index 11ac8e4..dfd8d3a 100644
')
optional_policy(`
-@@ -560,7 +568,11 @@ optional_policy(`
+@@ -560,7 +572,11 @@ optional_policy(`
')
optional_policy(`
@@ -45209,7 +45236,7 @@ index 11ac8e4..dfd8d3a 100644
')
optional_policy(`
-@@ -568,108 +580,131 @@ optional_policy(`
+@@ -568,108 +584,131 @@ optional_policy(`
')
optional_policy(`
@@ -47689,7 +47716,7 @@ index b744fe3..900d083 100644
+ admin_pattern($1, munin_content_t)
')
diff --git a/munin.te b/munin.te
-index b708708..0deb9fa 100644
+index b708708..7bdfb65 100644
--- a/munin.te
+++ b/munin.te
@@ -44,41 +44,40 @@ files_tmpfs_file(services_munin_plugin_tmpfs_t)
@@ -47835,7 +47862,7 @@ index b708708..0deb9fa 100644
####################################
#
# Mail local policy
-@@ -279,27 +273,36 @@ optional_policy(`
+@@ -279,27 +273,38 @@ optional_policy(`
allow mail_munin_plugin_t self:capability dac_override;
@@ -47844,6 +47871,8 @@ index b708708..0deb9fa 100644
+
rw_files_pattern(mail_munin_plugin_t, munin_var_lib_t, munin_var_lib_t)
++kernel_read_net_sysctls(mail_munin_plugin_t)
++
dev_read_urand(mail_munin_plugin_t)
logging_read_generic_logs(mail_munin_plugin_t)
@@ -47876,7 +47905,7 @@ index b708708..0deb9fa 100644
')
optional_policy(`
-@@ -339,7 +342,7 @@ dev_read_rand(services_munin_plugin_t)
+@@ -339,7 +344,7 @@ dev_read_rand(services_munin_plugin_t)
sysnet_read_config(services_munin_plugin_t)
optional_policy(`
@@ -47885,7 +47914,7 @@ index b708708..0deb9fa 100644
')
optional_policy(`
-@@ -361,7 +364,11 @@ optional_policy(`
+@@ -361,7 +366,11 @@ optional_policy(`
')
optional_policy(`
@@ -47898,7 +47927,7 @@ index b708708..0deb9fa 100644
')
optional_policy(`
-@@ -393,6 +400,7 @@ read_files_pattern(system_munin_plugin_t, munin_log_t, munin_log_t)
+@@ -393,6 +402,7 @@ read_files_pattern(system_munin_plugin_t, munin_log_t, munin_log_t)
kernel_read_network_state(system_munin_plugin_t)
kernel_read_all_sysctls(system_munin_plugin_t)
@@ -47906,7 +47935,7 @@ index b708708..0deb9fa 100644
dev_read_sysfs(system_munin_plugin_t)
dev_read_urand(system_munin_plugin_t)
-@@ -421,3 +429,32 @@ optional_policy(`
+@@ -421,3 +431,32 @@ optional_policy(`
optional_policy(`
unconfined_domain(unconfined_munin_plugin_t)
')
@@ -50505,7 +50534,7 @@ index 86dc29d..1cd0d0e 100644
+ logging_log_filetrans($1, NetworkManager_var_lib_t, file, "wpa_supplicant.log")
')
diff --git a/networkmanager.te b/networkmanager.te
-index 55f2009..5e67bb6 100644
+index 55f2009..bb85ae6 100644
--- a/networkmanager.te
+++ b/networkmanager.te
@@ -9,15 +9,18 @@ type NetworkManager_t;
@@ -50611,7 +50640,7 @@ index 55f2009..5e67bb6 100644
kernel_request_load_module(NetworkManager_t)
kernel_read_debugfs(NetworkManager_t)
kernel_rw_net_sysctls(NetworkManager_t)
-+kernel_setsched(NetworkManager_t)
++kernel_dontaudit_setsched(NetworkManager_t)
-corenet_all_recvfrom_unlabeled(NetworkManager_t)
corenet_all_recvfrom_netlabel(NetworkManager_t)
@@ -59727,7 +59756,7 @@ index d2fc677..ded726f 100644
')
+
diff --git a/pegasus.te b/pegasus.te
-index 608f454..100a122 100644
+index 608f454..aa814c8 100644
--- a/pegasus.te
+++ b/pegasus.te
@@ -5,13 +5,12 @@ policy_module(pegasus, 1.9.0)
@@ -60221,6 +60250,14 @@ index 608f454..100a122 100644
')
optional_policy(`
+@@ -180,6 +493,7 @@ optional_policy(`
+ ')
+
+ optional_policy(`
++ virt_getattr_images(pegasus_t)
+ virt_domtrans(pegasus_t)
+ virt_stream_connect(pegasus_t)
+ virt_manage_config(pegasus_t)
diff --git a/pesign.fc b/pesign.fc
new file mode 100644
index 0000000..7b54c39
@@ -72534,7 +72571,7 @@ index da64218..3fb8575 100644
+ domtrans_pattern($1, quota_nld_exec_t, quota_nld_t)
')
diff --git a/quota.te b/quota.te
-index f47c8e8..a0251fe 100644
+index f47c8e8..3710974 100644
--- a/quota.te
+++ b/quota.te
@@ -5,12 +5,10 @@ policy_module(quota, 1.6.0)
@@ -72570,7 +72607,7 @@ index f47c8e8..a0251fe 100644
allow quota_t quota_db_t:file { manage_file_perms quotaon };
files_root_filetrans(quota_t, quota_db_t, file)
files_boot_filetrans(quota_t, quota_db_t, file)
-@@ -48,7 +44,6 @@ files_var_filetrans(quota_t, quota_db_t, file)
+@@ -48,24 +44,15 @@ files_var_filetrans(quota_t, quota_db_t, file)
files_spool_filetrans(quota_t, quota_db_t, file)
userdom_user_home_dir_filetrans(quota_t, quota_db_t, file)
@@ -72578,7 +72615,10 @@ index f47c8e8..a0251fe 100644
kernel_list_proc(quota_t)
kernel_read_proc_symlinks(quota_t)
kernel_read_kernel_sysctls(quota_t)
-@@ -58,14 +53,6 @@ dev_read_sysfs(quota_t)
+-kernel_setsched(quota_t)
++kernel_dontaudit_setsched(quota_t)
+
+ dev_read_sysfs(quota_t)
dev_getattr_all_blk_files(quota_t)
dev_getattr_all_chr_files(quota_t)
@@ -73265,7 +73305,7 @@ index 951db7f..c0cabe8 100644
+ files_etc_filetrans($1, mdadm_conf_t, file, "mdadm.conf")
')
diff --git a/raid.te b/raid.te
-index c99753f..c5d944b 100644
+index c99753f..2d260c2 100644
--- a/raid.te
+++ b/raid.te
@@ -15,6 +15,15 @@ role mdadm_roles types mdadm_t;
@@ -73319,7 +73359,7 @@ index c99753f..c5d944b 100644
kernel_read_kernel_sysctls(mdadm_t)
kernel_request_load_module(mdadm_t)
kernel_rw_software_raid_state(mdadm_t)
-+kernel_setsched(mdadm_t)
++kernel_dontaudit_setsched(mdadm_t)
corecmd_exec_bin(mdadm_t)
corecmd_exec_shell(mdadm_t)
@@ -76540,7 +76580,7 @@ index c8bdea2..1337d42 100644
+ allow $1 cluster_unit_file_t:service all_service_perms;
')
diff --git a/rhcs.te b/rhcs.te
-index 6cf79c4..e7fe8c7 100644
+index 6cf79c4..8980ac4 100644
--- a/rhcs.te
+++ b/rhcs.te
@@ -20,6 +20,35 @@ gen_tunable(fenced_can_network_connect, false)
@@ -76899,9 +76939,10 @@ index 6cf79c4..e7fe8c7 100644
# fenced local policy
#
- allow fenced_t self:capability { sys_rawio sys_resource };
+-allow fenced_t self:capability { sys_rawio sys_resource };
-allow fenced_t self:process { getsched signal_perms };
-allow fenced_t self:tcp_socket { accept listen };
++allow fenced_t self:capability { net_admin sys_rawio sys_resource };
+allow fenced_t self:process { getsched setpgid signal_perms };
+
+allow fenced_t self:tcp_socket create_stream_socket_perms;
@@ -79132,7 +79173,7 @@ index 0bf13c2..d59aef7 100644
type nfsd_initrc_exec_t, rpcd_initrc_exec_t, exports_t;
type var_lib_nfs_t, rpcd_var_run_t, gssd_tmp_t;
diff --git a/rpc.te b/rpc.te
-index 2da9fca..2497a03 100644
+index 2da9fca..09e0307 100644
--- a/rpc.te
+++ b/rpc.te
@@ -6,22 +6,20 @@ policy_module(rpc, 1.15.1)
@@ -79324,7 +79365,8 @@ index 2da9fca..2497a03 100644
+kernel_read_system_state(nfsd_t)
kernel_read_network_state(nfsd_t)
kernel_dontaudit_getattr_core_if(nfsd_t)
- kernel_setsched(nfsd_t)
+-kernel_setsched(nfsd_t)
++kernel_dontaudit_setsched(nfsd_t)
kernel_request_load_module(nfsd_t)
-# kernel_mounton_proc(nfsd_t)
+kernel_mounton_proc(nfsd_t)
@@ -85782,7 +85824,7 @@ index 98c9e0a..d4aa009 100644
files_search_pids($1)
admin_pattern($1, sblim_var_run_t)
diff --git a/sblim.te b/sblim.te
-index 299756b..0e798f1 100644
+index 299756b..453eb03 100644
--- a/sblim.te
+++ b/sblim.te
@@ -7,13 +7,11 @@ policy_module(sblim, 1.1.0)
@@ -85888,7 +85930,7 @@ index 299756b..0e798f1 100644
')
optional_policy(`
-@@ -117,6 +133,32 @@ optional_policy(`
+@@ -117,6 +133,33 @@ optional_policy(`
# Reposd local policy
#
@@ -85916,6 +85958,7 @@ index 299756b..0e798f1 100644
+auth_use_nsswitch(sblim_sfcbd_t)
+
+corenet_tcp_bind_pegasus_https_port(sblim_sfcbd_t)
++corenet_tcp_connect_pegasus_http_port(sblim_sfcbd_t)
+
+dev_read_rand(sblim_sfcbd_t)
+dev_read_urand(sblim_sfcbd_t)
@@ -97799,7 +97842,7 @@ index a4f20bc..6351bcb 100644
+/var/log/qemu-ga\.log.* -- gen_context(system_u:object_r:virt_qemu_ga_log_t,s0)
+/var/log/qemu-ga(/.*)? gen_context(system_u:object_r:virt_qemu_ga_log_t,s0)
diff --git a/virt.if b/virt.if
-index facdee8..fddb027 100644
+index facdee8..f2c0191 100644
--- a/virt.if
+++ b/virt.if
@@ -1,120 +1,51 @@
@@ -98250,17 +98293,35 @@ index facdee8..fddb027 100644
manage_files_pattern($1, virt_etc_t, virt_etc_t)
manage_files_pattern($1, virt_etc_rw_t, virt_etc_rw_t)
manage_lnk_files_pattern($1, virt_etc_rw_t, virt_etc_rw_t)
-@@ -414,8 +251,7 @@ interface(`virt_manage_config',`
+@@ -414,8 +251,25 @@ interface(`virt_manage_config',`
########################################
##
-## Create, read, write, and delete
-## virt image files.
+## Allow domain to manage virt image files
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`virt_getattr_content',`
++ gen_require(`
++ type virt_content_t;
++ ')
++
++ allow $1 virt_content_t:file getattr_file_perms;
++')
++
++########################################
++##
++## Allow domain to manage virt image files
##
##
##
-@@ -450,8 +286,7 @@ interface(`virt_read_content',`
+@@ -450,8 +304,7 @@ interface(`virt_read_content',`
########################################
##
@@ -98270,7 +98331,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -459,35 +294,17 @@ interface(`virt_read_content',`
+@@ -459,35 +312,17 @@ interface(`virt_read_content',`
##
##
#
@@ -98309,7 +98370,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -495,53 +312,37 @@ interface(`virt_manage_virt_content',`
+@@ -495,53 +330,37 @@ interface(`virt_manage_virt_content',`
##
##
#
@@ -98373,7 +98434,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -549,34 +350,21 @@ interface(`virt_home_filetrans_virt_content',`
+@@ -549,34 +368,21 @@ interface(`virt_home_filetrans_virt_content',`
##
##
#
@@ -98416,7 +98477,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -584,32 +372,36 @@ interface(`virt_manage_svirt_home_content',`
+@@ -584,32 +390,36 @@ interface(`virt_manage_svirt_home_content',`
##
##
#
@@ -98465,7 +98526,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -618,54 +410,36 @@ interface(`virt_relabel_svirt_home_content',`
+@@ -618,54 +428,36 @@ interface(`virt_relabel_svirt_home_content',`
##
##
#
@@ -98529,7 +98590,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -673,54 +447,38 @@ interface(`virt_home_filetrans',`
+@@ -673,54 +465,38 @@ interface(`virt_home_filetrans',`
##
##
#
@@ -98596,7 +98657,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -728,52 +486,39 @@ interface(`virt_manage_generic_virt_home_content',`
+@@ -728,52 +504,58 @@ interface(`virt_manage_generic_virt_home_content',`
##
##
#
@@ -98635,14 +98696,31 @@ index facdee8..fddb027 100644
-##
-##
-##
--##
--## The name of the object being created.
--##
--##
+##
++#
++interface(`virt_read_log',`
++ gen_require(`
++ type virt_log_t;
++ ')
++
++ logging_search_logs($1)
++ read_files_pattern($1, virt_log_t, virt_log_t)
++')
++
++########################################
++##
++## Allow the specified domain to append
++## virt log files.
++##
++##
+ ##
+-## The name of the object being created.
++## Domain allowed access.
+ ##
+ ##
#
-interface(`virt_home_filetrans_virt_home',`
-+interface(`virt_read_log',`
++interface(`virt_append_log',`
gen_require(`
- type virt_home_t;
+ type virt_log_t;
@@ -98650,23 +98728,22 @@ index facdee8..fddb027 100644
- userdom_user_home_dir_filetrans($1, virt_home_t, $2, $3)
+ logging_search_logs($1)
-+ read_files_pattern($1, virt_log_t, virt_log_t)
++ append_files_pattern($1, virt_log_t, virt_log_t)
')
########################################
##
-## Read virt pid files.
-+## Allow the specified domain to append
-+## virt log files.
++## Allow domain to manage virt log files
##
##
##
-@@ -781,19 +526,18 @@ interface(`virt_home_filetrans_virt_home',`
+@@ -781,19 +563,19 @@ interface(`virt_home_filetrans_virt_home',`
##
##
#
-interface(`virt_read_pid_files',`
-+interface(`virt_append_log',`
++interface(`virt_manage_log',`
gen_require(`
- type virt_var_run_t;
+ type virt_log_t;
@@ -98674,34 +98751,34 @@ index facdee8..fddb027 100644
- files_search_pids($1)
- read_files_pattern($1, virt_var_run_t, virt_var_run_t)
-+ logging_search_logs($1)
-+ append_files_pattern($1, virt_log_t, virt_log_t)
++ manage_dirs_pattern($1, virt_log_t, virt_log_t)
++ manage_files_pattern($1, virt_log_t, virt_log_t)
++ manage_lnk_files_pattern($1, virt_log_t, virt_log_t)
')
########################################
##
-## Create, read, write, and delete
-## virt pid files.
-+## Allow domain to manage virt log files
++## Allow domain to getattr virt image direcories
##
##
##
-@@ -801,18 +545,19 @@ interface(`virt_read_pid_files',`
+@@ -801,18 +583,18 @@ interface(`virt_read_pid_files',`
##
##
#
-interface(`virt_manage_pid_files',`
-+interface(`virt_manage_log',`
++interface(`virt_getattr_images',`
gen_require(`
- type virt_var_run_t;
-+ type virt_log_t;
++ attribute virt_image_type;
')
- files_search_pids($1)
- manage_files_pattern($1, virt_var_run_t, virt_var_run_t)
-+ manage_dirs_pattern($1, virt_log_t, virt_log_t)
-+ manage_files_pattern($1, virt_log_t, virt_log_t)
-+ manage_lnk_files_pattern($1, virt_log_t, virt_log_t)
++ virt_search_lib($1)
++ allow $1 virt_image_type:file getattr_file_perms;
')
########################################
@@ -98711,7 +98788,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -820,18 +565,18 @@ interface(`virt_manage_pid_files',`
+@@ -820,18 +602,18 @@ interface(`virt_manage_pid_files',`
##
##
#
@@ -98735,7 +98812,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -839,20 +584,73 @@ interface(`virt_search_lib',`
+@@ -839,20 +621,73 @@ interface(`virt_search_lib',`
##
##
#
@@ -98814,7 +98891,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -860,74 +658,265 @@ interface(`virt_read_lib_files',`
+@@ -860,74 +695,265 @@ interface(`virt_read_lib_files',`
##
##
#
@@ -98877,10 +98954,12 @@ index facdee8..fddb027 100644
+ manage_dirs_pattern($1, virt_image_t, virt_image_t)
+ manage_files_pattern($1, virt_image_t, virt_image_t)
+ read_lnk_files_pattern($1, virt_image_t, virt_image_t)
-+')
-+
-+########################################
-+##
+ ')
+
+ ########################################
+ ##
+-## Create objects in virt pid
+-## directories with a private type.
+## Execute virt server in the virt domain.
+##
+##
@@ -98900,12 +98979,10 @@ index facdee8..fddb027 100644
+ allow $1 virtd_unit_file_t:service manage_service_perms;
+
+ ps_process_pattern($1, virtd_t)
- ')
-
- ########################################
- ##
--## Create objects in virt pid
--## directories with a private type.
++')
++
++########################################
++##
+## Ptrace the svirt domain
+##
+##
@@ -98925,12 +99002,13 @@ index facdee8..fddb027 100644
+#######################################
+##
+## Execute Sandbox Files
-+##
-+##
-+##
-+## Domain allowed access.
-+##
-+##
+ ##
+ ##
+ ##
+ ## Domain allowed access.
+ ##
+ ##
+-##
+#
+interface(`virt_exec_sandbox_files',`
+ gen_require(`
@@ -98943,13 +99021,14 @@ index facdee8..fddb027 100644
+#######################################
+##
+## Manage Sandbox Files
- ##
- ##
++##
++##
##
- ## Domain allowed access.
+-## The type of the object to be created.
++## Domain allowed access.
##
##
--##
+-##
+#
+interface(`virt_manage_sandbox_files',`
+ gen_require(`
@@ -98969,11 +99048,11 @@ index facdee8..fddb027 100644
+##
+##
##
--## The type of the object to be created.
+-## The object class of the object being created.
+## Domain allowed access.
##
##
--##
+-##
+#
+interface(`virt_relabel_sandbox_filesystem',`
+ gen_require(`
@@ -98989,14 +99068,16 @@ index facdee8..fddb027 100644
+##
+##
##
--## The object class of the object being created.
+-## The name of the object being created.
+## Domain allowed access.
##
##
--##
-+#
+-##
+ #
+-interface(`virt_pid_filetrans',`
+interface(`virt_mounton_sandbox_file',`
-+ gen_require(`
+ gen_require(`
+- type virt_var_run_t;
+ type svirt_sandbox_file_t;
+ ')
+
@@ -99008,17 +99089,13 @@ index facdee8..fddb027 100644
+## Connect to virt over a unix domain stream socket.
+##
+##
- ##
--## The name of the object being created.
++##
+## Domain allowed access.
- ##
- ##
--##
- #
--interface(`virt_pid_filetrans',`
++##
++##
++#
+interface(`virt_stream_connect_sandbox',`
- gen_require(`
-- type virt_var_run_t;
++ gen_require(`
+ attribute svirt_sandbox_domain;
+ type svirt_sandbox_file_t;
')
@@ -99074,10 +99151,11 @@ index facdee8..fddb027 100644
+ optional_policy(`
+ ptchown_run(virt_domain, $2)
+ ')
-+')
-+
-+########################################
-+##
+ ')
+
+ ########################################
+ ##
+-## Append virt log files.
+## Do not audit attempts to write virt daemon unnamed pipes.
+##
+##
@@ -99093,16 +99171,15 @@ index facdee8..fddb027 100644
+
+ dontaudit $1 virtd_t:fd use;
+ dontaudit $1 virtd_t:fifo_file write_fifo_file_perms;
- ')
-
- ########################################
- ##
--## Append virt log files.
++')
++
++########################################
++##
+## Send a sigkill to virtual machines
##
##
##
-@@ -935,19 +924,17 @@ interface(`virt_read_log',`
+@@ -935,19 +961,17 @@ interface(`virt_read_log',`
##
##
#
@@ -99126,7 +99203,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -955,20 +942,17 @@ interface(`virt_append_log',`
+@@ -955,20 +979,17 @@ interface(`virt_append_log',`
##
##
#
@@ -99151,7 +99228,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -976,18 +960,17 @@ interface(`virt_manage_log',`
+@@ -976,18 +997,17 @@ interface(`virt_manage_log',`
##
##
#
@@ -99174,7 +99251,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -995,36 +978,57 @@ interface(`virt_search_images',`
+@@ -995,36 +1015,57 @@ interface(`virt_search_images',`
##
##
#
@@ -99251,7 +99328,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -1032,20 +1036,28 @@ interface(`virt_read_images',`
+@@ -1032,20 +1073,28 @@ interface(`virt_read_images',`
##
##
#
@@ -99287,7 +99364,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -1053,37 +1065,131 @@ interface(`virt_rw_all_image_chr_files',`
+@@ -1053,37 +1102,131 @@ interface(`virt_rw_all_image_chr_files',`
##
##
#
@@ -99433,7 +99510,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -1091,36 +1197,54 @@ interface(`virt_manage_virt_cache',`
+@@ -1091,36 +1234,54 @@ interface(`virt_manage_virt_cache',`
##
##
#
@@ -99507,7 +99584,7 @@ index facdee8..fddb027 100644
##
##
##
-@@ -1136,50 +1260,36 @@ interface(`virt_manage_images',`
+@@ -1136,50 +1297,36 @@ interface(`virt_manage_images',`
#
interface(`virt_admin',`
gen_require(`
@@ -99549,8 +99626,7 @@ index facdee8..fddb027 100644
-
- files_search_tmp($1)
- admin_pattern($1, { virt_tmp_type virt_tmp_t })
-+ allow $1 virt_domain:process signal_perms;
-
+-
- files_search_etc($1)
- admin_pattern($1, { virt_etc_t virt_etc_rw_t virtd_keytab_t })
-
@@ -99559,7 +99635,8 @@ index facdee8..fddb027 100644
-
- files_search_pids($1)
- admin_pattern($1, { virt_var_run_t virtd_lxc_var_run_t svirt_var_run_t })
--
++ allow $1 virt_domain:process signal_perms;
+
- files_search_var($1)
- admin_pattern($1, svirt_cache_t)
-
@@ -99580,7 +99657,7 @@ index facdee8..fddb027 100644
+ virt_stream_connect($1)
')
diff --git a/virt.te b/virt.te
-index f03dcf5..1bbfa18 100644
+index f03dcf5..fb96958 100644
--- a/virt.te
+++ b/virt.te
@@ -1,150 +1,197 @@
@@ -100274,7 +100351,7 @@ index f03dcf5..1bbfa18 100644
logging_log_filetrans(virtd_t, virt_log_t, { file dir })
manage_dirs_pattern(virtd_t, virt_var_lib_t, virt_var_lib_t)
-@@ -503,16 +370,12 @@ manage_files_pattern(virtd_t, virt_var_run_t, virt_var_run_t)
+@@ -503,23 +370,20 @@ manage_files_pattern(virtd_t, virt_var_run_t, virt_var_run_t)
manage_sock_files_pattern(virtd_t, virt_var_run_t, virt_var_run_t)
files_pid_filetrans(virtd_t, virt_var_run_t, { file dir })
@@ -100296,10 +100373,11 @@ index f03dcf5..1bbfa18 100644
kernel_read_system_state(virtd_t)
kernel_read_network_state(virtd_t)
kernel_rw_net_sysctls(virtd_t)
-@@ -520,6 +383,7 @@ kernel_read_kernel_sysctls(virtd_t)
+ kernel_read_kernel_sysctls(virtd_t)
kernel_request_load_module(virtd_t)
kernel_search_debugfs(virtd_t)
- kernel_setsched(virtd_t)
+-kernel_setsched(virtd_t)
++kernel_dontaudit_setsched(virtd_t)
+kernel_write_proc_files(virtd_t)
corecmd_exec_bin(virtd_t)
diff --git a/selinux-policy.spec b/selinux-policy.spec
index c6ee813..840b31c 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.13.1
-Release: 35%{?dist}
+Release: 36%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -580,6 +580,19 @@ SELinux Reference policy mls base module.
%endif
%changelog
+* Fri Mar 14 2014 Miroslav Grepl 3.13.1-36
+- Add additional fixes for systemd_networkd_t
+- Allow systemd-logind to manage user_tmpfs_t
+- Allow systemd-logind to mount /run/user/1000 to get gdm working
+- Dontaudit attempts to setsched on the kernel_t threads
+- Allow munin mail plugins to read network systcl
+- Fix git_system_enable_homedirs boolean
+- Make cimtest script 03_defineVS.py of ComputerSystem group working
+- Make abrt-java-connector working
+- Allow net_admin cap for fence_virtd running as fenced_t
+- Allow vmtools_helper_t to execute bin_t
+- Add support for /usr/share/joomla
+
* Thu Mar 13 2014 Miroslav Grepl 3.13.1-35
- sshd to read network sysctls
- Allow vmtools_helper_t to execute bin_t