##
@@ -4810,7 +4811,7 @@ index f6eb485..51b128e 100644
## This is an interface to support third party modules
## and its use is not allowed in upstream reference
## policy.
-@@ -1171,8 +1403,30 @@ interface(`apache_cgi_domain',`
+@@ -1171,8 +1404,30 @@ interface(`apache_cgi_domain',`
########################################
##
@@ -4843,7 +4844,7 @@ index f6eb485..51b128e 100644
##
##
##
-@@ -1189,18 +1443,19 @@ interface(`apache_cgi_domain',`
+@@ -1189,18 +1444,19 @@ interface(`apache_cgi_domain',`
interface(`apache_admin',`
gen_require(`
attribute httpdcontent, httpd_script_exec_type;
@@ -4872,7 +4873,7 @@ index f6eb485..51b128e 100644
init_labeled_script_domtrans($1, httpd_initrc_exec_t)
domain_system_change_exemption($1)
-@@ -1210,10 +1465,10 @@ interface(`apache_admin',`
+@@ -1210,10 +1466,10 @@ interface(`apache_admin',`
apache_manage_all_content($1)
miscfiles_manage_public_files($1)
@@ -4886,7 +4887,7 @@ index f6eb485..51b128e 100644
admin_pattern($1, httpd_log_t)
admin_pattern($1, httpd_modules_t)
-@@ -1224,9 +1479,141 @@ interface(`apache_admin',`
+@@ -1224,9 +1480,141 @@ interface(`apache_admin',`
admin_pattern($1, httpd_var_run_t)
files_pid_filetrans($1, httpd_var_run_t, file)
@@ -5033,7 +5034,7 @@ index f6eb485..51b128e 100644
+ filetrans_pattern($1, { httpd_user_content_t httpd_user_script_exec_t }, httpd_user_htaccess_t, file, ".htaccess")
')
diff --git a/apache.te b/apache.te
-index 6649962..a25874f 100644
+index 6649962..da729da 100644
--- a/apache.te
+++ b/apache.te
@@ -5,280 +5,339 @@ policy_module(apache, 2.7.2)
@@ -6352,7 +6353,7 @@ index 6649962..a25874f 100644
')
optional_policy(`
-@@ -842,20 +1031,39 @@ optional_policy(`
+@@ -842,20 +1031,40 @@ optional_policy(`
')
optional_policy(`
@@ -6363,6 +6364,7 @@ index 6649962..a25874f 100644
+
+optional_policy(`
+ passenger_exec(httpd_t)
++ passenger_kill(httpd_t)
+ passenger_manage_pid_content(httpd_t)
+')
+
@@ -6398,7 +6400,7 @@ index 6649962..a25874f 100644
')
optional_policy(`
-@@ -863,19 +1071,35 @@ optional_policy(`
+@@ -863,19 +1072,35 @@ optional_policy(`
')
optional_policy(`
@@ -6434,7 +6436,7 @@ index 6649962..a25874f 100644
udev_read_db(httpd_t)
')
-@@ -883,65 +1107,183 @@ optional_policy(`
+@@ -883,65 +1108,183 @@ optional_policy(`
yam_read_content(httpd_t)
')
@@ -6640,7 +6642,7 @@ index 6649962..a25874f 100644
files_dontaudit_search_pids(httpd_suexec_t)
files_search_home(httpd_suexec_t)
-@@ -950,123 +1292,74 @@ auth_use_nsswitch(httpd_suexec_t)
+@@ -950,123 +1293,74 @@ auth_use_nsswitch(httpd_suexec_t)
logging_search_logs(httpd_suexec_t)
logging_send_syslog_msg(httpd_suexec_t)
@@ -6795,7 +6797,7 @@ index 6649962..a25874f 100644
mysql_read_config(httpd_suexec_t)
tunable_policy(`httpd_can_network_connect_db',`
-@@ -1083,172 +1376,106 @@ optional_policy(`
+@@ -1083,172 +1377,106 @@ optional_policy(`
')
')
@@ -7032,7 +7034,7 @@ index 6649962..a25874f 100644
')
tunable_policy(`httpd_read_user_content',`
-@@ -1256,64 +1483,74 @@ tunable_policy(`httpd_read_user_content',`
+@@ -1256,64 +1484,74 @@ tunable_policy(`httpd_read_user_content',`
')
tunable_policy(`httpd_use_cifs',`
@@ -7129,7 +7131,7 @@ index 6649962..a25874f 100644
########################################
#
-@@ -1321,8 +1558,15 @@ miscfiles_read_localization(httpd_rotatelogs_t)
+@@ -1321,8 +1559,15 @@ miscfiles_read_localization(httpd_rotatelogs_t)
#
optional_policy(`
@@ -7146,7 +7148,7 @@ index 6649962..a25874f 100644
')
########################################
-@@ -1330,49 +1574,38 @@ optional_policy(`
+@@ -1330,49 +1575,38 @@ optional_policy(`
# User content local policy
#
@@ -7211,7 +7213,7 @@ index 6649962..a25874f 100644
kernel_read_system_state(httpd_passwd_t)
corecmd_exec_bin(httpd_passwd_t)
-@@ -1382,38 +1615,101 @@ dev_read_urand(httpd_passwd_t)
+@@ -1382,38 +1616,101 @@ dev_read_urand(httpd_passwd_t)
domain_use_interactive_fds(httpd_passwd_t)
@@ -24107,10 +24109,10 @@ index 0000000..1048292
+')
diff --git a/docker.te b/docker.te
new file mode 100644
-index 0000000..4b54a05
+index 0000000..47c8698
--- /dev/null
+++ b/docker.te
-@@ -0,0 +1,268 @@
+@@ -0,0 +1,270 @@
+policy_module(docker, 1.0.0)
+
+########################################
@@ -24211,6 +24213,7 @@ index 0000000..4b54a05
+manage_blk_files_pattern(docker_t, docker_var_lib_t, docker_var_lib_t)
+manage_files_pattern(docker_t, docker_var_lib_t, docker_var_lib_t)
+manage_lnk_files_pattern(docker_t, docker_var_lib_t, docker_var_lib_t)
++allow docker_t docker_var_lib_t:dir_file_class_set { relabelfrom relabelto };
+files_var_lib_filetrans(docker_t, docker_var_lib_t, { dir file lnk_file })
+
+manage_dirs_pattern(docker_t, docker_var_run_t, docker_var_run_t)
@@ -24249,6 +24252,7 @@ index 0000000..4b54a05
+
+fs_read_cgroup_files(docker_t)
+fs_read_tmpfs_symlinks(docker_t)
++fs_getattr_all_fs(docker_t)
+
+storage_raw_rw_fixed_disk(docker_t)
+
@@ -44602,10 +44606,10 @@ index 0000000..39f4a04
+')
diff --git a/motion.te b/motion.te
new file mode 100644
-index 0000000..b694afc
+index 0000000..c7f4eb5
--- /dev/null
+++ b/motion.te
-@@ -0,0 +1,64 @@
+@@ -0,0 +1,65 @@
+policy_module(motion, 1.0.0)
+
+########################################
@@ -44634,7 +44638,7 @@ index 0000000..b694afc
+# motion local policy
+#
+allow motion_t self:udp_socket { create connect getattr };
-+allow motion_t self:tcp_socket { bind create setopt listen };
++allow motion_t self:tcp_socket create_stream_socket_perms;
+allow motion_t self:netlink_route_socket r_netlink_socket_perms;
+
+manage_dirs_pattern(motion_t, motion_log_t, motion_log_t)
@@ -44651,6 +44655,7 @@ index 0000000..b694afc
+
+corenet_tcp_bind_http_cache_port(motion_t)
+corenet_tcp_bind_transproxy_port(motion_t)
++corenet_tcp_bind_us_cli_port(motion_t)
+corenet_tcp_connect_http_port(motion_t)
+corenet_tcp_bind_generic_node(motion_t)
+
@@ -45576,7 +45581,7 @@ index 6194b80..cafb2b0 100644
')
+
diff --git a/mozilla.te b/mozilla.te
-index 11ac8e4..ad56dac 100644
+index 11ac8e4..7bb38c6 100644
--- a/mozilla.te
+++ b/mozilla.te
@@ -6,17 +6,41 @@ policy_module(mozilla, 2.8.0)
@@ -46014,7 +46019,7 @@ index 11ac8e4..ad56dac 100644
')
optional_policy(`
-@@ -300,259 +324,247 @@ optional_policy(`
+@@ -300,259 +324,248 @@ optional_policy(`
########################################
#
@@ -46230,6 +46235,7 @@ index 11ac8e4..ad56dac 100644
-dev_dontaudit_getattr_all_blk_files(mozilla_plugin_t)
-dev_dontaudit_getattr_all_chr_files(mozilla_plugin_t)
+dev_dontaudit_getattr_all(mozilla_plugin_t)
++dev_dontaudit_leaked_xserver_misc(mozilla_plugin_t)
domain_use_interactive_fds(mozilla_plugin_t)
domain_dontaudit_read_all_domains_state(mozilla_plugin_t)
@@ -46409,7 +46415,7 @@ index 11ac8e4..ad56dac 100644
')
optional_policy(`
-@@ -560,7 +572,11 @@ optional_policy(`
+@@ -560,7 +573,11 @@ optional_policy(`
')
optional_policy(`
@@ -46422,7 +46428,7 @@ index 11ac8e4..ad56dac 100644
')
optional_policy(`
-@@ -568,108 +584,131 @@ optional_policy(`
+@@ -568,108 +585,131 @@ optional_policy(`
')
optional_policy(`
@@ -46980,15 +46986,17 @@ index 65a246a..fa86320 100644
netutils_domtrans_ping(mrtg_t)
diff --git a/mta.fc b/mta.fc
-index f42896c..cb2791a 100644
+index f42896c..1e1a679 100644
--- a/mta.fc
+++ b/mta.fc
-@@ -2,33 +2,43 @@ HOME_DIR/\.esmtp_queue -- gen_context(system_u:object_r:mail_home_t,s0)
+@@ -1,34 +1,45 @@
+-HOME_DIR/\.esmtp_queue -- gen_context(system_u:object_r:mail_home_t,s0)
HOME_DIR/\.forward[^/]* -- gen_context(system_u:object_r:mail_home_t,s0)
HOME_DIR/dead\.letter -- gen_context(system_u:object_r:mail_home_t,s0)
HOME_DIR/\.mailrc -- gen_context(system_u:object_r:mail_home_t,s0)
-HOME_DIR/Maildir(/.*)? gen_context(system_u:object_r:mail_home_rw_t,s0)
-HOME_DIR/\.maildir(/.*)? gen_context(system_u:object_r:mail_home_rw_t,s0)
++HOME_DIR/\.esmtp_queue(/.*)? gen_context(system_u:object_r:mail_home_rw_t,s0)
+HOME_DIR/Maildir(/.*)? gen_context(system_u:object_r:mail_home_rw_t,s0)
+HOME_DIR/.maildir(/.*)? gen_context(system_u:object_r:mail_home_rw_t,s0)
@@ -47010,10 +47018,10 @@ index f42896c..cb2791a 100644
+/etc/postfix/aliases.* gen_context(system_u:object_r:etc_aliases_t,s0)
+')
+
-+/root/\.esmtp_queue -- gen_context(system_u:object_r:mail_home_t,s0)
+/root/\.forward -- gen_context(system_u:object_r:mail_home_t,s0)
+/root/dead\.letter -- gen_context(system_u:object_r:mail_home_t,s0)
+/root/\.mailrc -- gen_context(system_u:object_r:mail_home_t,s0)
++/root/\.esmtp_queue(/.*)? gen_context(system_u:object_r:mail_home_rw_t,s0)
+/root/Maildir(/.*)? gen_context(system_u:object_r:mail_home_rw_t,s0)
+
+/usr/bin/esmtp -- gen_context(system_u:object_r:sendmail_exec_t,s0)
@@ -47040,8 +47048,9 @@ index f42896c..cb2791a 100644
/var/spool/mqueue\.in(/.*)? gen_context(system_u:object_r:mqueue_spool_t,s0)
-/var/spool/mail(/.*)? gen_context(system_u:object_r:mail_spool_t,s0)
+/var/spool/mail(/.*)? gen_context(system_u:object_r:mail_spool_t,s0)
++/var/spool/smtpd(/.*)? gen_context(system_u:object_r:mail_spool_t,s0)
diff --git a/mta.if b/mta.if
-index ed81cac..e968c28 100644
+index ed81cac..8f217ea 100644
--- a/mta.if
+++ b/mta.if
@@ -1,4 +1,4 @@
@@ -47981,7 +47990,7 @@ index ed81cac..e968c28 100644
##
##
##
-@@ -1081,3 +1051,175 @@ interface(`mta_rw_user_mail_stream_sockets',`
+@@ -1081,3 +1051,177 @@ interface(`mta_rw_user_mail_stream_sockets',`
allow $1 user_mail_domain:unix_stream_socket rw_socket_perms;
')
@@ -48108,6 +48117,7 @@ index ed81cac..e968c28 100644
+ userdom_admin_home_dir_filetrans($1, mail_home_rw_t, dir, "Maildir")
+ userdom_admin_home_dir_filetrans($1, mail_home_rw_t, dir, ".maildir")
+ userdom_admin_home_dir_filetrans($1, mail_home_rw_t, file, ".esmtp_queue")
++ userdom_admin_home_dir_filetrans($1, mail_home_rw_t, dir, ".esmtp_queue")
+')
+
+########################################
@@ -48132,6 +48142,7 @@ index ed81cac..e968c28 100644
+ userdom_user_home_dir_filetrans($1, mail_home_rw_t, dir, "Maildir")
+ userdom_user_home_dir_filetrans($1, mail_home_rw_t, dir, ".maildir")
+ userdom_user_home_dir_filetrans($1, mail_home_rw_t, file, ".esmtp_queue")
++ userdom_user_home_dir_filetrans($1, mail_home_rw_t, dir, ".esmtp_queue")
+')
+
+########################################
@@ -49770,7 +49781,7 @@ index 687af38..a77dc09 100644
+ mysql_stream_connect($1)
')
diff --git a/mysql.te b/mysql.te
-index 7584bbe..494cd37 100644
+index 7584bbe..ef51f2b 100644
--- a/mysql.te
+++ b/mysql.te
@@ -6,20 +6,15 @@ policy_module(mysql, 1.14.1)
@@ -49847,7 +49858,7 @@ index 7584bbe..494cd37 100644
manage_dirs_pattern(mysqld_t, mysqld_log_t, mysqld_log_t)
manage_files_pattern(mysqld_t, mysqld_log_t, mysqld_log_t)
-@@ -95,50 +92,56 @@ manage_files_pattern(mysqld_t, mysqld_var_run_t, mysqld_var_run_t)
+@@ -95,50 +92,57 @@ manage_files_pattern(mysqld_t, mysqld_var_run_t, mysqld_var_run_t)
manage_sock_files_pattern(mysqld_t, mysqld_var_run_t, mysqld_var_run_t)
files_pid_filetrans(mysqld_t, mysqld_var_run_t, { dir file sock_file })
@@ -49906,6 +49917,7 @@ index 7584bbe..494cd37 100644
-miscfiles_read_localization(mysqld_t)
+sysnet_read_config(mysqld_t)
++sysnet_exec_ifconfig(mysqld_t)
-userdom_search_user_home_dirs(mysqld_t)
-userdom_dontaudit_use_unpriv_user_fds(mysqld_t)
@@ -49921,7 +49933,7 @@ index 7584bbe..494cd37 100644
')
optional_policy(`
-@@ -146,6 +149,10 @@ optional_policy(`
+@@ -146,6 +150,10 @@ optional_policy(`
')
optional_policy(`
@@ -49932,7 +49944,7 @@ index 7584bbe..494cd37 100644
seutil_sigchld_newrole(mysqld_t)
')
-@@ -155,21 +162,18 @@ optional_policy(`
+@@ -155,21 +163,18 @@ optional_policy(`
#######################################
#
@@ -49959,7 +49971,7 @@ index 7584bbe..494cd37 100644
list_dirs_pattern(mysqld_safe_t, mysqld_log_t, mysqld_log_t)
manage_files_pattern(mysqld_safe_t, mysqld_log_t, mysqld_log_t)
-@@ -177,9 +181,7 @@ manage_lnk_files_pattern(mysqld_safe_t, mysqld_log_t, mysqld_log_t)
+@@ -177,9 +182,7 @@ manage_lnk_files_pattern(mysqld_safe_t, mysqld_log_t, mysqld_log_t)
logging_log_filetrans(mysqld_safe_t, mysqld_log_t, file)
manage_files_pattern(mysqld_safe_t, mysqld_var_run_t, mysqld_var_run_t)
@@ -49970,7 +49982,7 @@ index 7584bbe..494cd37 100644
kernel_read_system_state(mysqld_safe_t)
kernel_read_kernel_sysctls(mysqld_safe_t)
-@@ -187,21 +189,29 @@ kernel_read_kernel_sysctls(mysqld_safe_t)
+@@ -187,21 +190,29 @@ kernel_read_kernel_sysctls(mysqld_safe_t)
corecmd_exec_bin(mysqld_safe_t)
corecmd_exec_shell(mysqld_safe_t)
@@ -50006,7 +50018,7 @@ index 7584bbe..494cd37 100644
optional_policy(`
hostname_exec(mysqld_safe_t)
-@@ -209,7 +219,7 @@ optional_policy(`
+@@ -209,7 +220,7 @@ optional_policy(`
########################################
#
@@ -50015,7 +50027,7 @@ index 7584bbe..494cd37 100644
#
allow mysqlmanagerd_t self:capability { dac_override kill };
-@@ -218,11 +228,12 @@ allow mysqlmanagerd_t self:fifo_file rw_fifo_file_perms;
+@@ -218,11 +229,12 @@ allow mysqlmanagerd_t self:fifo_file rw_fifo_file_perms;
allow mysqlmanagerd_t self:tcp_socket create_stream_socket_perms;
allow mysqlmanagerd_t self:unix_stream_socket create_stream_socket_perms;
@@ -50033,7 +50045,7 @@ index 7584bbe..494cd37 100644
domtrans_pattern(mysqlmanagerd_t, mysqld_exec_t, mysqld_t)
-@@ -230,31 +241,20 @@ manage_files_pattern(mysqlmanagerd_t, mysqld_var_run_t, mysqlmanagerd_var_run_t)
+@@ -230,31 +242,20 @@ manage_files_pattern(mysqlmanagerd_t, mysqld_var_run_t, mysqlmanagerd_var_run_t)
manage_sock_files_pattern(mysqlmanagerd_t, mysqld_var_run_t, mysqlmanagerd_var_run_t)
filetrans_pattern(mysqlmanagerd_t, mysqld_var_run_t, mysqlmanagerd_var_run_t, { file sock_file })
@@ -52987,10 +52999,10 @@ index 0000000..28936b4
+')
diff --git a/nova.te b/nova.te
new file mode 100644
-index 0000000..bd2f08f
+index 0000000..f429163
--- /dev/null
+++ b/nova.te
-@@ -0,0 +1,318 @@
+@@ -0,0 +1,311 @@
+policy_module(nova, 1.0.0)
+
+########################################
@@ -53261,18 +53273,15 @@ index 0000000..bd2f08f
+allow nova_scheduler_t self:netlink_route_socket r_netlink_socket_perms;
+allow nova_scheduler_t self:udp_socket create_socket_perms;
+
-+#optional_policy(`
-+# unconfined_domain(nova_scheduler_t)
-+#')
++auth_read_passwd(nova_scheduler_t)
++
++init_read_utmp(nova_scheduler_t)
+
+#######################################
+#
+# nova vncproxy local policy
+#
+
-+#optional_policy(`
-+# unconfined_domain(nova_vncproxy_t)
-+#')
+
+#######################################
+#
@@ -53291,10 +53300,6 @@ index 0000000..bd2f08f
+ lvm_domtrans(nova_volume_t)
+')
+
-+#optional_policy(`
-+# unconfined_domain(nova_volume_t)
-+#')
-+
+#######################################
+#
+# nova sudo domain local policy
@@ -60036,7 +60041,7 @@ index 2c389ea..9155bd0 100644
+
+/var/run/passenger(/.*)? gen_context(system_u:object_r:passenger_var_run_t,s0)
diff --git a/passenger.if b/passenger.if
-index bf59ef7..0ec51d4 100644
+index bf59ef7..2d8335f 100644
--- a/passenger.if
+++ b/passenger.if
@@ -15,17 +15,16 @@ interface(`passenger_domtrans',`
@@ -60092,7 +60097,7 @@ index bf59ef7..0ec51d4 100644
##
##
##
-@@ -53,6 +69,93 @@ interface(`passenger_read_lib_files',`
+@@ -53,6 +69,112 @@ interface(`passenger_read_lib_files',`
type passenger_var_lib_t;
')
@@ -60121,7 +60126,7 @@ index bf59ef7..0ec51d4 100644
+ manage_files_pattern($1, passenger_var_lib_t, passenger_var_lib_t)
+ manage_lnk_files_pattern($1, passenger_var_lib_t, passenger_var_lib_t)
+ files_search_var_lib($1)
-+')
+ ')
+
+#####################################
+##
@@ -60186,7 +60191,26 @@ index bf59ef7..0ec51d4 100644
+ files_search_tmp($1)
+ manage_files_pattern($1, passenger_tmp_t, passenger_tmp_t)
+ manage_dirs_pattern($1, passenger_tmp_t, passenger_tmp_t)
- ')
++')
++
++########################################
++##
++## Send kill signals to passenger.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`passenger_kill',`
++ gen_require(`
++ type passenger_t;
++ ')
++
++ allow $1 passenger_t:process sigkill;
++')
++
diff --git a/passenger.te b/passenger.te
index 08ec33b..24ce7e8 100644
--- a/passenger.te
@@ -73437,10 +73461,10 @@ index afc0068..3105104 100644
+ ')
')
diff --git a/quantum.te b/quantum.te
-index 8644d8b..e95fc34 100644
+index 8644d8b..96f804c 100644
--- a/quantum.te
+++ b/quantum.te
-@@ -5,92 +5,129 @@ policy_module(quantum, 1.1.0)
+@@ -5,92 +5,131 @@ policy_module(quantum, 1.1.0)
# Declarations
#
@@ -73485,7 +73509,8 @@ index 8644d8b..e95fc34 100644
-allow quantum_t self:key manage_key_perms;
-allow quantum_t self:tcp_socket { accept listen };
-allow quantum_t self:unix_stream_socket { accept listen };
-+allow neutron_t self:capability { sys_ptrace kill setgid setuid sys_resource net_admin sys_admin };
++allow neutron_t self:capability { dac_override sys_ptrace kill setgid setuid sys_resource net_admin sys_admin net_raw };
++
+allow neutron_t self:capability2 block_suspend;
+allow neutron_t self:process { setsched setrlimit signal_perms };
+allow neutron_t self:fifo_file rw_fifo_file_perms;
@@ -73521,6 +73546,7 @@ index 8644d8b..e95fc34 100644
-can_exec(quantum_t, quantum_tmp_t)
+kernel_rw_kernel_sysctl(neutron_t)
++kernel_rw_net_sysctls(neutron_t)
+kernel_read_system_state(neutron_t)
+kernel_read_network_state(neutron_t)
+kernel_request_load_module(neutron_t)
@@ -73581,45 +73607,45 @@ index 8644d8b..e95fc34 100644
+sysnet_exec_ifconfig(neutron_t)
+sysnet_manage_ifconfig_run(neutron_t)
+sysnet_filetrans_named_content_ifconfig(neutron_t)
++
++optional_policy(`
++ brctl_domtrans(neutron_t)
++')
optional_policy(`
- brctl_domtrans(quantum_t)
-+ brctl_domtrans(neutron_t)
++ dnsmasq_domtrans(neutron_t)
++ dnsmasq_signal(neutron_t)
++ dnsmasq_read_state(neutron_t)
')
optional_policy(`
- mysql_stream_connect(quantum_t)
- mysql_read_config(quantum_t)
-+ dnsmasq_domtrans(neutron_t)
-+ dnsmasq_signal(neutron_t)
-+ dnsmasq_read_state(neutron_t)
++ iptables_domtrans(neutron_t)
+')
- mysql_tcp_connect(quantum_t)
+optional_policy(`
-+ iptables_domtrans(neutron_t)
- ')
-
- optional_policy(`
-- postgresql_stream_connect(quantum_t)
-- postgresql_unpriv_client(quantum_t)
+ mysql_stream_connect(neutron_t)
+ mysql_read_db_lnk_files(neutron_t)
+ mysql_read_config(neutron_t)
+ mysql_tcp_connect(neutron_t)
-+')
+ ')
-- postgresql_tcp_connect(quantum_t)
-+optional_policy(`
+ optional_policy(`
+- postgresql_stream_connect(quantum_t)
+- postgresql_unpriv_client(quantum_t)
+ postgresql_stream_connect(neutron_t)
+ postgresql_unpriv_client(neutron_t)
+ postgresql_tcp_connect(neutron_t)
- ')
-+
++')
+
+- postgresql_tcp_connect(quantum_t)
+optional_policy(`
+ openvswitch_domtrans(neutron_t)
+ openvswitch_stream_connect(neutron_t)
-+')
+ ')
+
+optional_policy(`
+ sudo_exec(neutron_t)
@@ -93156,7 +93182,7 @@ index a240455..16a04bf 100644
- admin_pattern($1, sssd_log_t)
')
diff --git a/sssd.te b/sssd.te
-index 2d8db1f..8edae62 100644
+index 2d8db1f..83033bf 100644
--- a/sssd.te
+++ b/sssd.te
@@ -28,9 +28,12 @@ logging_log_file(sssd_var_log_t)
@@ -93224,7 +93250,7 @@ index 2d8db1f..8edae62 100644
files_list_var_lib(sssd_t)
fs_list_inotifyfs(sssd_t)
-@@ -94,14 +88,15 @@ selinux_validate_context(sssd_t)
+@@ -94,17 +88,20 @@ selinux_validate_context(sssd_t)
seutil_read_file_contexts(sssd_t)
# sssd wants to write /etc/selinux//logins/ for SELinux PAM module
@@ -93242,7 +93268,12 @@ index 2d8db1f..8edae62 100644
auth_domtrans_chk_passwd(sssd_t)
auth_domtrans_upd_passwd(sssd_t)
auth_manage_cache(sssd_t)
-@@ -112,18 +107,34 @@ logging_send_syslog_msg(sssd_t)
++# Bogus allow because we don't handle keyring properly in code.
++auth_login_manage_key(sssd_t)
+
+ init_read_utmp(sssd_t)
+
+@@ -112,18 +109,34 @@ logging_send_syslog_msg(sssd_t)
logging_send_audit_msgs(sssd_t)
miscfiles_read_generic_certs(sssd_t)
@@ -93452,10 +93483,10 @@ index 0000000..80c6480
+')
diff --git a/stapserver.te b/stapserver.te
new file mode 100644
-index 0000000..2540ebd
+index 0000000..0522744
--- /dev/null
+++ b/stapserver.te
-@@ -0,0 +1,113 @@
+@@ -0,0 +1,114 @@
+policy_module(systemtap, 1.1.0)
+
+########################################
@@ -93530,6 +93561,7 @@ index 0000000..2540ebd
+files_search_kernel_modules(stapserver_t)
+
+fs_search_cgroup_dirs(stapserver_t)
++fs_getattr_all_fs(stapserver_t)
+
+auth_use_nsswitch(stapserver_t)
+
@@ -93971,10 +94003,10 @@ index 0000000..df82c36
+')
diff --git a/swift.te b/swift.te
new file mode 100644
-index 0000000..3faae22
+index 0000000..159ae72
--- /dev/null
+++ b/swift.te
-@@ -0,0 +1,87 @@
+@@ -0,0 +1,89 @@
+policy_module(swift, 1.0.0)
+
+########################################
@@ -94051,6 +94083,8 @@ index 0000000..3faae22
+
+files_dontaudit_search_home(swift_t)
+
++fs_getattr_all_fs(swift_t)
++
+auth_use_nsswitch(swift_t)
+
+libs_exec_ldconfig(swift_t)
@@ -101108,7 +101142,7 @@ index facdee8..88dcafb 100644
+ virt_stream_connect($1)
')
diff --git a/virt.te b/virt.te
-index f03dcf5..25f4104 100644
+index f03dcf5..a26950d 100644
--- a/virt.te
+++ b/virt.te
@@ -1,150 +1,212 @@
@@ -102572,7 +102606,7 @@ index f03dcf5..25f4104 100644
selinux_get_enforce_mode(virtd_lxc_t)
selinux_get_fs_mount(virtd_lxc_t)
selinux_validate_context(virtd_lxc_t)
-@@ -974,194 +1133,297 @@ selinux_compute_create_context(virtd_lxc_t)
+@@ -974,194 +1133,299 @@ selinux_compute_create_context(virtd_lxc_t)
selinux_compute_relabel_context(virtd_lxc_t)
selinux_compute_user_contexts(virtd_lxc_t)
@@ -102629,6 +102663,7 @@ index f03dcf5..25f4104 100644
+allow svirt_sandbox_domain self:unix_stream_socket { create_stream_socket_perms connectto };
+allow svirt_sandbox_domain self:unix_dgram_socket { sendto create_socket_perms };
+allow svirt_sandbox_domain self:passwd rootok;
++allow svirt_sandbox_domain self:filesystem associate;
+
+tunable_policy(`deny_ptrace',`',`
+ allow svirt_sandbox_domain self:process ptrace;
@@ -102799,6 +102834,7 @@ index f03dcf5..25f4104 100644
+ docker_manage_lib_files(svirt_lxc_net_t)
+ docker_manage_lib_dirs(svirt_lxc_net_t)
+ docker_read_share_files(svirt_sandbox_domain)
++ docker_exec_lib(svirt_sandbox_domain)
+ docker_lib_filetrans(svirt_sandbox_domain,svirt_sandbox_file_t, sock_file)
+ docker_use_ptys(svirt_sandbox_domain)
+')
@@ -102829,8 +102865,8 @@ index f03dcf5..25f4104 100644
+')
+
+tunable_policy(`virt_use_samba',`
-+ fs_manage_nfs_files(svirt_sandbox_domain)
+ fs_manage_cifs_files(svirt_sandbox_domain)
++ fs_manage_cifs_dirs(svirt_sandbox_domain)
+ fs_read_cifs_symlinks(svirt_sandbox_domain)
')
@@ -103007,7 +103043,7 @@ index f03dcf5..25f4104 100644
allow virt_qmf_t self:tcp_socket create_stream_socket_perms;
allow virt_qmf_t self:netlink_route_socket create_netlink_socket_perms;
-@@ -1174,12 +1436,12 @@ dev_read_sysfs(virt_qmf_t)
+@@ -1174,12 +1438,12 @@ dev_read_sysfs(virt_qmf_t)
dev_read_rand(virt_qmf_t)
dev_read_urand(virt_qmf_t)
@@ -103022,7 +103058,7 @@ index f03dcf5..25f4104 100644
sysnet_read_config(virt_qmf_t)
optional_policy(`
-@@ -1192,9 +1454,8 @@ optional_policy(`
+@@ -1192,9 +1456,8 @@ optional_policy(`
########################################
#
@@ -103033,7 +103069,7 @@ index f03dcf5..25f4104 100644
allow virt_bridgehelper_t self:process { setcap getcap };
allow virt_bridgehelper_t self:capability { setpcap setgid setuid net_admin };
allow virt_bridgehelper_t self:tcp_socket create_stream_socket_perms;
-@@ -1207,5 +1468,218 @@ kernel_read_network_state(virt_bridgehelper_t)
+@@ -1207,5 +1470,218 @@ kernel_read_network_state(virt_bridgehelper_t)
corenet_rw_tun_tap_dev(virt_bridgehelper_t)
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 150d041..69704c9 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.13.1
-Release: 48%{?dist}
+Release: 49%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -588,6 +588,32 @@ SELinux Reference policy mls base module.
%endif
%changelog
+* Mon May 5 2014 Miroslav Grepl 3.13.1-49
+- Fix labeling for /root/\.yubico
+- userdom_search_admin_dir() calling needs to be optional in kernel.te
+- Dontaudit leaked xserver_misc_device_t into plugins
+- Allow all domains to search through all base_file_types, this should be back ported to RHEL7 policy
+- Need to allow sssd_t to manage kernel keyrings in login programs since they don't get labeled with user domains
+- Bootloader wants to look at init state
+- Add MCS/MLS Constraints to kernel keyring, also add MCS Constraints to ipc, sem.msgq, shm
+- init reads kdbump etc files
+- Add support for tcp/9697
+- Fix labeling for /var/run/user//gvfs
+- Add support for us_cli ports
+- fix sysnet_use_ldap
+- Allow mysql to execute ifconfig if Red Hat OpenStack
+- ALlow stap-server to get attr on all fs
+- Fix mail_pool_t to mail_spool_t
+- Dontaudit leaked xserver_misc_device_t into plugins
+- Need to allow sssd_t to manage kernel keyrings in login programs since they don't get labeled with user domains
+- Add new labeling for /var/spool/smtpd
+- Allow httpd_t to kill passenger
+- Allow apache cgi scripts to use inherited httpd_t unix_stream_sockets
+- Allow nova-scheduler to read passwd/utmp files
+- Additional rules required by openstack, needs backport to F20 and RHEL7
+- Additional access required by docker
+- ALlow motion to use tcp/8082 port
+
* Fri Apr 25 2014 Miroslav Grepl 3.13.1-48
- Fix virt_use_samba boolean
- Looks like all domains that use dbus libraries are now reading /dev/urand