diff --git a/docker-selinux.tgz b/docker-selinux.tgz
index 6d06b4c..77f76d5 100644
Binary files a/docker-selinux.tgz and b/docker-selinux.tgz differ
diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch
index 35a266a..0813676 100644
--- a/policy-rawhide-base.patch
+++ b/policy-rawhide-base.patch
@@ -6288,7 +6288,7 @@ index 3f6e168..340e49f 100644
')
diff --git a/policy/modules/kernel/devices.fc b/policy/modules/kernel/devices.fc
-index b31c054..50a45cf 100644
+index b31c054..012cc6f 100644
--- a/policy/modules/kernel/devices.fc
+++ b/policy/modules/kernel/devices.fc
@@ -15,15 +15,18 @@
@@ -6396,7 +6396,7 @@ index b31c054..50a45cf 100644
/dev/card.* -c gen_context(system_u:object_r:xserver_misc_device_t,s0)
/dev/cmx.* -c gen_context(system_u:object_r:smartcard_device_t,s0)
-@@ -172,11 +193,16 @@ ifdef(`distro_suse', `
+@@ -172,15 +193,21 @@ ifdef(`distro_suse', `
/dev/touchscreen/ucb1x00 -c gen_context(system_u:object_r:mouse_device_t,s0)
/dev/touchscreen/mk712 -c gen_context(system_u:object_r:mouse_device_t,s0)
@@ -6413,7 +6413,12 @@ index b31c054..50a45cf 100644
/dev/xen/blktap.* -c gen_context(system_u:object_r:xen_device_t,s0)
/dev/xen/evtchn -c gen_context(system_u:object_r:xen_device_t,s0)
/dev/xen/gntdev -c gen_context(system_u:object_r:xen_device_t,s0)
-@@ -198,12 +224,27 @@ ifdef(`distro_debian',`
+ /dev/xen/gntalloc -c gen_context(system_u:object_r:xen_device_t,s0)
++/dev/xen/privcmd -c gen_context(system_u:object_r:xen_device_t,s0)
+
+ ifdef(`distro_debian',`
+ # this is a static /dev dir "backup mount"
+@@ -198,12 +225,27 @@ ifdef(`distro_debian',`
/lib/udev/devices/null -c gen_context(system_u:object_r:null_device_t,s0)
/lib/udev/devices/zero -c gen_context(system_u:object_r:zero_device_t,s0)
@@ -6444,7 +6449,7 @@ index b31c054..50a45cf 100644
+/usr/lib/udev/devices/null -c gen_context(system_u:object_r:null_device_t,s0)
+/usr/lib/udev/devices/zero -c gen_context(system_u:object_r:zero_device_t,s0)
diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
-index 76f285e..c542dd3 100644
+index 76f285e..5cd2702 100644
--- a/policy/modules/kernel/devices.if
+++ b/policy/modules/kernel/devices.if
@@ -143,13 +143,32 @@ interface(`dev_relabel_all_dev_nodes',`
@@ -8716,7 +8721,7 @@ index 76f285e..c542dd3 100644
## Read and write to the zero device (/dev/zero).
##
##
-@@ -4851,3 +5915,1019 @@ interface(`dev_unconfined',`
+@@ -4851,3 +5915,1020 @@ interface(`dev_unconfined',`
typeattribute $1 devices_unconfined_type;
')
@@ -9619,6 +9624,7 @@ index 76f285e..c542dd3 100644
+ filetrans_pattern($1, device_t, xen_device_t, chr_file, "blktap9")
+ filetrans_pattern($1, device_t, xen_device_t, chr_file, "gntdev")
+ filetrans_pattern($1, device_t, xen_device_t, chr_file, "gntalloc")
++ filetrans_pattern($1, device_t, xen_device_t, chr_file, "privcmd")
+ filetrans_pattern($1, device_t, sound_device_t, chr_file, "controlC0")
+ filetrans_pattern($1, device_t, sound_device_t, chr_file, "controlC1")
+ filetrans_pattern($1, device_t, sound_device_t, chr_file, "controlC2")
@@ -46330,10 +46336,10 @@ index a392fc4..78fa512 100644
+')
diff --git a/policy/modules/system/systemd.fc b/policy/modules/system/systemd.fc
new file mode 100644
-index 0000000..0e4185f
+index 0000000..6cf3942
--- /dev/null
+++ b/policy/modules/system/systemd.fc
-@@ -0,0 +1,68 @@
+@@ -0,0 +1,69 @@
+HOME_DIR/\.local/share/systemd(/.*)? gen_context(system_u:object_r:systemd_home_t,s0)
+/root/\.local/share/systemd(/.*)? gen_context(system_u:object_r:systemd_home_t,s0)
+
@@ -46356,6 +46362,7 @@ index 0000000..0e4185f
+
+/usr/lib/dracut/modules.d/.*\.service gen_context(system_u:object_r:systemd_unit_file_t,s0)
+/usr/lib/systemd/system(/.*)? gen_context(system_u:object_r:systemd_unit_file_t,s0)
++/run/systemd/transient(/.*)? gen_context(system_u:object_r:systemd_unit_file_t,s0)
+/usr/lib/systemd/system/systemd-machined\.service -- gen_context(system_u:object_r:systemd_machined_unit_file_t,s0)
+/usr/lib/systemd/system/systemd-networkd\.service gen_context(system_u:object_r:systemd_networkd_unit_file_t,s0)
+/usr/lib/systemd/system/systemd-resolved\.service gen_context(system_u:object_r:systemd_resolved_unit_file_t,s0)
@@ -48126,10 +48133,10 @@ index 0000000..ebd6cc8
+')
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
new file mode 100644
-index 0000000..6c16f21
+index 0000000..f799c5b
--- /dev/null
+++ b/policy/modules/system/systemd.te
-@@ -0,0 +1,928 @@
+@@ -0,0 +1,929 @@
+policy_module(systemd, 1.0.0)
+
+#######################################
@@ -49012,6 +49019,7 @@ index 0000000..6c16f21
+corenet_udp_bind_llmnr_port(systemd_resolved_t)
+
+dev_write_kmsg(systemd_resolved_t)
++dev_read_sysfs(systemd_resolved_t)
+
+sysnet_manage_config(systemd_resolved_t)
+
diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch
index fc313f0..7e8426d 100644
--- a/policy-rawhide-contrib.patch
+++ b/policy-rawhide-contrib.patch
@@ -25419,7 +25419,7 @@ index 23ab808..84735a8 100644
+/var/run/dnsmasq.* gen_context(system_u:object_r:dnsmasq_var_run_t,s0)
/var/run/libvirt/network(/.*)? gen_context(system_u:object_r:dnsmasq_var_run_t,s0)
diff --git a/dnsmasq.if b/dnsmasq.if
-index 19aa0b8..45c70c1 100644
+index 19aa0b8..a79982c 100644
--- a/dnsmasq.if
+++ b/dnsmasq.if
@@ -10,7 +10,6 @@
@@ -25666,7 +25666,7 @@ index 19aa0b8..45c70c1 100644
init_labeled_script_domtrans($1, dnsmasq_initrc_exec_t)
domain_system_change_exemption($1)
role_transition $2 dnsmasq_initrc_exec_t system_r;
-@@ -281,9 +395,13 @@ interface(`dnsmasq_admin',`
+@@ -281,9 +395,36 @@ interface(`dnsmasq_admin',`
files_list_var_lib($1)
admin_pattern($1, dnsmasq_lease_t)
@@ -25680,9 +25680,32 @@ index 19aa0b8..45c70c1 100644
+ dnsmasq_systemctl($1)
+ admin_pattern($1, dnsmasq_unit_file_t)
+ allow $1 dnsmasq_unit_file_t:service all_service_perms;
++')
++
++########################################
++##
++## Send and receive messages from
++## dnsmasq over dbus.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`dnsmasq_dbus_chat',`
++ gen_require(`
++ type dnsmasq_t;
++ class dbus send_msg;
++ ')
++
++ allow $1 dnsmasq_t:dbus send_msg;
++ allow dnsmasq_t $1:dbus send_msg;
')
++
++
diff --git a/dnsmasq.te b/dnsmasq.te
-index 37a3b7b..921056a 100644
+index 37a3b7b..0a64088 100644
--- a/dnsmasq.te
+++ b/dnsmasq.te
@@ -24,6 +24,9 @@ logging_log_file(dnsmasq_var_log_t)
@@ -25731,7 +25754,7 @@ index 37a3b7b..921056a 100644
userdom_dontaudit_use_unpriv_user_fds(dnsmasq_t)
userdom_dontaudit_search_user_home_dirs(dnsmasq_t)
-@@ -98,12 +105,21 @@ optional_policy(`
+@@ -98,12 +105,25 @@ optional_policy(`
')
optional_policy(`
@@ -25741,20 +25764,24 @@ index 37a3b7b..921056a 100644
+optional_policy(`
dbus_connect_system_bus(dnsmasq_t)
dbus_system_bus_client(dnsmasq_t)
++
++ optional_policy(`
++ networkmanager_dbus_chat(dnsmasq_t)
++ ')
++')
++
++optional_policy(`
++ dnsmasq_domtrans(dnsmasq_t)
')
optional_policy(`
- networkmanager_read_pid_files(dnsmasq_t)
-+ dnsmasq_domtrans(dnsmasq_t)
-+')
-+
-+optional_policy(`
+ networkmanager_read_conf(dnsmasq_t)
+ networkmanager_manage_pid_files(dnsmasq_t)
')
optional_policy(`
-@@ -124,6 +140,14 @@ optional_policy(`
+@@ -124,6 +144,14 @@ optional_policy(`
optional_policy(`
virt_manage_lib_files(dnsmasq_t)
@@ -25912,10 +25939,10 @@ index 0000000..d22ed69
+')
diff --git a/dnssec.te b/dnssec.te
new file mode 100644
-index 0000000..181a31b
+index 0000000..f186d85
--- /dev/null
+++ b/dnssec.te
-@@ -0,0 +1,87 @@
+@@ -0,0 +1,88 @@
+policy_module(dnssec, 1.0.0)
+
+########################################
@@ -25949,8 +25976,9 @@ index 0000000..181a31b
+
+manage_dirs_pattern(dnssec_trigger_t, dnssec_trigger_var_run_t, dnssec_trigger_var_run_t)
+manage_files_pattern(dnssec_trigger_t, dnssec_trigger_var_run_t, dnssec_trigger_var_run_t)
++manage_lnk_files_pattern(dnssec_trigger_t, dnssec_trigger_var_run_t, dnssec_trigger_var_run_t)
+allow dnssec_trigger_t dnssec_trigger_var_run_t:file relabelfrom_file_perms;
-+files_pid_filetrans(dnssec_trigger_t, dnssec_trigger_var_run_t, { dir file })
++files_pid_filetrans(dnssec_trigger_t, dnssec_trigger_var_run_t, { dir file lnk_file })
+
+manage_files_pattern(dnssec_trigger_t,dnssec_trigger_tmp_t,dnssec_trigger_tmp_t)
+manage_dirs_pattern(dnssec_trigger_t,dnssec_trigger_tmp_t,dnssec_trigger_tmp_t)
@@ -31935,10 +31963,10 @@ index 0000000..764ae00
+
diff --git a/glusterd.te b/glusterd.te
new file mode 100644
-index 0000000..59e84ca
+index 0000000..33654d5
--- /dev/null
+++ b/glusterd.te
-@@ -0,0 +1,295 @@
+@@ -0,0 +1,297 @@
+policy_module(glusterd, 1.1.3)
+
+##
@@ -32176,6 +32204,7 @@ index 0000000..59e84ca
+optional_policy(`
+ dbus_system_bus_client(glusterd_t)
+ dbus_connect_system_bus(glusterd_t)
++ unconfined_dbus_chat(glusterd_t)
+
+ optional_policy(`
+ policykit_dbus_chat(glusterd_t)
@@ -32221,6 +32250,7 @@ index 0000000..59e84ca
+ rpc_domtrans_nfsd(glusterd_t)
+ rpc_domtrans_rpcd(glusterd_t)
+ rpc_manage_nfs_state_data(glusterd_t)
++ rpc_manage_nfs_state_data_dir(glusterd_t)
+ rpcbind_stream_connect(glusterd_t)
+')
+
@@ -58382,7 +58412,7 @@ index 86dc29d..7380935 100644
+ logging_log_filetrans($1, NetworkManager_var_lib_t, file, "wpa_supplicant.log")
')
diff --git a/networkmanager.te b/networkmanager.te
-index 55f2009..2646460 100644
+index 55f2009..ab2d757 100644
--- a/networkmanager.te
+++ b/networkmanager.te
@@ -9,15 +9,18 @@ type NetworkManager_t;
@@ -58640,7 +58670,7 @@ index 55f2009..2646460 100644
consoletype_exec(NetworkManager_t)
')
-@@ -210,16 +260,11 @@ optional_policy(`
+@@ -210,31 +260,34 @@ optional_policy(`
optional_policy(`
dbus_system_domain(NetworkManager_t, NetworkManager_exec_t)
@@ -58659,7 +58689,12 @@ index 55f2009..2646460 100644
')
')
-@@ -231,10 +276,17 @@ optional_policy(`
+ optional_policy(`
+ dnsmasq_read_pid_files(NetworkManager_t)
++ dnsmasq_dbus_chat(NetworkManager_t)
+ dnsmasq_delete_pid_files(NetworkManager_t)
+ dnsmasq_domtrans(NetworkManager_t)
+ dnsmasq_initrc_domtrans(NetworkManager_t)
dnsmasq_kill(NetworkManager_t)
dnsmasq_signal(NetworkManager_t)
dnsmasq_signull(NetworkManager_t)
@@ -58678,7 +58713,7 @@ index 55f2009..2646460 100644
')
optional_policy(`
-@@ -246,10 +298,26 @@ optional_policy(`
+@@ -246,10 +299,26 @@ optional_policy(`
')
optional_policy(`
@@ -58705,7 +58740,7 @@ index 55f2009..2646460 100644
')
optional_policy(`
-@@ -257,15 +325,19 @@ optional_policy(`
+@@ -257,15 +326,19 @@ optional_policy(`
')
optional_policy(`
@@ -58727,7 +58762,7 @@ index 55f2009..2646460 100644
')
optional_policy(`
-@@ -274,10 +346,17 @@ optional_policy(`
+@@ -274,10 +347,17 @@ optional_policy(`
nscd_signull(NetworkManager_t)
nscd_kill(NetworkManager_t)
nscd_initrc_domtrans(NetworkManager_t)
@@ -58745,7 +58780,7 @@ index 55f2009..2646460 100644
')
optional_policy(`
-@@ -286,9 +365,12 @@ optional_policy(`
+@@ -286,9 +366,12 @@ optional_policy(`
openvpn_kill(NetworkManager_t)
openvpn_signal(NetworkManager_t)
openvpn_signull(NetworkManager_t)
@@ -58758,7 +58793,7 @@ index 55f2009..2646460 100644
policykit_domtrans_auth(NetworkManager_t)
policykit_read_lib(NetworkManager_t)
policykit_read_reload(NetworkManager_t)
-@@ -296,7 +378,7 @@ optional_policy(`
+@@ -296,7 +379,7 @@ optional_policy(`
')
optional_policy(`
@@ -58767,7 +58802,7 @@ index 55f2009..2646460 100644
')
optional_policy(`
-@@ -307,6 +389,7 @@ optional_policy(`
+@@ -307,6 +390,7 @@ optional_policy(`
ppp_signal(NetworkManager_t)
ppp_signull(NetworkManager_t)
ppp_read_config(NetworkManager_t)
@@ -58775,7 +58810,7 @@ index 55f2009..2646460 100644
')
optional_policy(`
-@@ -320,14 +403,21 @@ optional_policy(`
+@@ -320,14 +404,21 @@ optional_policy(`
')
optional_policy(`
@@ -58802,7 +58837,7 @@ index 55f2009..2646460 100644
')
optional_policy(`
-@@ -338,6 +428,13 @@ optional_policy(`
+@@ -338,6 +429,13 @@ optional_policy(`
vpn_relabelfrom_tun_socket(NetworkManager_t)
')
@@ -58816,7 +58851,7 @@ index 55f2009..2646460 100644
########################################
#
# wpa_cli local policy
-@@ -357,6 +454,4 @@ rw_sock_files_pattern(wpa_cli_t, NetworkManager_var_run_t, NetworkManager_var_ru
+@@ -357,6 +455,4 @@ rw_sock_files_pattern(wpa_cli_t, NetworkManager_var_run_t, NetworkManager_var_ru
init_dontaudit_use_fds(wpa_cli_t)
init_use_script_ptys(wpa_cli_t)
@@ -86765,15 +86800,16 @@ index 6cf79c4..1a605f9 100644
')
diff --git a/rhev.fc b/rhev.fc
new file mode 100644
-index 0000000..4b66adf
+index 0000000..013d1d9
--- /dev/null
+++ b/rhev.fc
-@@ -0,0 +1,13 @@
+@@ -0,0 +1,14 @@
+/usr/share/rhev-agent/rhev-agentd\.py -- gen_context(system_u:object_r:rhev_agentd_exec_t,s0)
+/usr/share/ovirt-guest-agent -- gen_context(system_u:object_r:rhev_agentd_exec_t,s0)
+
+/usr/share/rhev-agent/LockActiveSession\.py -- gen_context(system_u:object_r:rhev_agentd_exec_t,s0)
+/usr/share/ovirt-guest-agent/LockActiveSession\.py -- gen_context(system_u:object_r:rhev_agentd_exec_t,s0)
++/usr/share/ovirt-guest-agent/ovirt-guest-agent\.py -- gen_context(system_u:object_r:rhev_agentd_exec_t,s0)
+
+/usr/lib/systemd/system/ovirt-guest-agent.* -- gen_context(system_u:object_r:rhev_agentd_unit_file_t,s0)
+
@@ -88928,7 +88964,7 @@ index a6fb30c..38a2f09 100644
+/var/run/rpc\.statd\.pid -- gen_context(system_u:object_r:rpcd_var_run_t,s0)
+
diff --git a/rpc.if b/rpc.if
-index 0bf13c2..4f3c2b9 100644
+index 0bf13c2..ed393a0 100644
--- a/rpc.if
+++ b/rpc.if
@@ -1,4 +1,4 @@
@@ -89240,7 +89276,7 @@ index 0bf13c2..4f3c2b9 100644
##
##
##
-@@ -326,12 +345,31 @@ interface(`rpc_search_nfs_state_data',`
+@@ -326,12 +345,50 @@ interface(`rpc_search_nfs_state_data',`
')
files_search_var_lib($1)
@@ -89270,11 +89306,30 @@ index 0bf13c2..4f3c2b9 100644
+
+########################################
+##
++## Manage NFS state data in /var/lib/nfs.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`rpc_manage_nfs_state_data_dir',`
++ gen_require(`
++ type var_lib_nfs_t;
++ ')
++
++ files_search_var_lib($1)
++ allow $1 var_lib_nfs_t:dir manage_dir_perms;
++')
++
++########################################
++##
+## Read NFS state data in /var/lib/nfs.
##
##
##
-@@ -350,8 +388,7 @@ interface(`rpc_read_nfs_state_data',`
+@@ -350,8 +407,7 @@ interface(`rpc_read_nfs_state_data',`
########################################
##
@@ -89284,7 +89339,7 @@ index 0bf13c2..4f3c2b9 100644
##
##
##
-@@ -366,31 +403,68 @@ interface(`rpc_manage_nfs_state_data',`
+@@ -366,31 +422,68 @@ interface(`rpc_manage_nfs_state_data',`
files_search_var_lib($1)
manage_files_pattern($1, var_lib_nfs_t, var_lib_nfs_t)
@@ -89359,7 +89414,7 @@ index 0bf13c2..4f3c2b9 100644
')
allow $1 rpc_domain:process { ptrace signal_perms };
-@@ -411,7 +485,7 @@ interface(`rpc_admin',`
+@@ -411,7 +504,7 @@ interface(`rpc_admin',`
admin_pattern($1, rpcd_var_run_t)
files_list_all($1)
diff --git a/selinux-policy.spec b/selinux-policy.spec
index bdb1cab..c254865 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.13.1
-Release: 190%{?dist}
+Release: 191%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -647,6 +647,18 @@ exit 0
%endif
%changelog
+* Tue May 24 2016 Lukas Vrabec 3.13.1-191
+- Label /usr/share/ovirt-guest-agent/ovirt-guest-agent.py as rhev_agentd_exec_t
+- Allow dnssec_trigger_t to create lnk_file labeled as dnssec_trigger_var_run_t. BZ(1335954)
+- Allow ganesha-ha.sh script running under unconfined_t domain communicate with glusterd_t domains via dbus.
+- Allow ganesha daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled as var_lib_nfs_t.
+- Merge pull request #122 from NetworkManager/th/nm-dnsmasq-dbus
+- Merge pull request #125 from rhatdan/typebounds
+- Typebounds user domains
+- Allow systemd_resolved_t to check if ipv6 is disabled.
+- systemd added a new directory for unit files /run/systemd/transient. It should be labelled system_u:object_r:systemd_unit_file_t:s0, the same as /run/systemd/system, PID 1 will write units there. Resolves: #120
+- Label /dev/xen/privcmd as xen_device_t. BZ(1334115)
+
* Mon May 16 2016 Lukas Vrabec 3.13.1-190
- Label /var/log/ganesha.log as gluster_log_t Allow glusterd_t domain to create glusterd_log_t files. Label /var/run/ganesha.pid as gluster_var_run_t.
- Allow zabbix to connect to postgresql port