diff --git a/policy-F15.patch b/policy-F15.patch
index 746fd47..2ddc254 100644
--- a/policy-F15.patch
+++ b/policy-F15.patch
@@ -371,6 +371,35 @@ index 66e486e..bfda8e9 100644
gnome_manage_config(firstboot_t)
')
+diff --git a/policy/modules/admin/kdump.if b/policy/modules/admin/kdump.if
+index 4198ff5..df3f4d6 100644
+--- a/policy/modules/admin/kdump.if
++++ b/policy/modules/admin/kdump.if
+@@ -56,6 +56,24 @@ interface(`kdump_read_config',`
+ allow $1 kdump_etc_t:file read_file_perms;
+ ')
+
++#####################################
++##
++## Dontaudit read kdump configuration file.
++##
++##
++##
++## Domain to not audit.
++##
++##
++#
++interface(`kdump_dontaudit_read_config',`
++ gen_require(`
++ type kdump_etc_t;
++ ')
++
++ dontaudit $1 kdump_etc_t:file read_inherited_file_perms;
++')
++
+ ####################################
+ ##
+ ## Manage kdump configuration file.
diff --git a/policy/modules/admin/logrotate.te b/policy/modules/admin/logrotate.te
index 7390b15..a46b249 100644
--- a/policy/modules/admin/logrotate.te
@@ -35262,7 +35291,7 @@ index a4fbe31..a717e2d 100644
logging_list_logs($1)
diff --git a/policy/modules/services/uucp.te b/policy/modules/services/uucp.te
-index b775aaf..1e40c2a 100644
+index b775aaf..7718dbb 100644
--- a/policy/modules/services/uucp.te
+++ b/policy/modules/services/uucp.te
@@ -7,7 +7,6 @@ policy_module(uucp, 1.11.0)
@@ -35281,7 +35310,7 @@ index b775aaf..1e40c2a 100644
dev_read_urand(uucpd_t)
-@@ -113,13 +113,17 @@ optional_policy(`
+@@ -113,13 +113,19 @@ optional_policy(`
kerberos_use(uucpd_t)
')
@@ -35297,6 +35326,8 @@ index b775aaf..1e40c2a 100644
allow uux_t self:capability { setuid setgid };
-allow uux_t self:fifo_file write_file_perms;
+allow uux_t self:fifo_file write_fifo_file_perms;
++
++domtrans_pattern(uux_t, uucpd_exec_t, uucpd_t)
uucp_append_log(uux_t)
uucp_manage_spool(uux_t)
@@ -39445,7 +39476,7 @@ index 1c4b1e7..ffa4134 100644
/var/run/pam_ssh(/.*)? gen_context(system_u:object_r:var_auth_t,s0)
/var/run/sepermit(/.*)? gen_context(system_u:object_r:pam_var_run_t,s0)
diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
-index bea0ade..5ad363e 100644
+index bea0ade..f459bae 100644
--- a/policy/modules/system/authlogin.if
+++ b/policy/modules/system/authlogin.if
@@ -57,6 +57,8 @@ interface(`auth_use_pam',`
@@ -39615,7 +39646,7 @@ index bea0ade..5ad363e 100644
+ type faillog_t;
+ ')
+
-+ allow $1 faillog_t:file relable_file_perms;
++ allow $1 faillog_t:file relabel_file_perms;
+')
+
+########################################
@@ -41697,7 +41728,7 @@ index 1d1c399..3ab3a47 100644
+ tgtd_manage_semaphores(iscsid_t)
')
diff --git a/policy/modules/system/libraries.fc b/policy/modules/system/libraries.fc
-index 9df8c4d..7a942fc 100644
+index 9df8c4d..8d1d7fa 100644
--- a/policy/modules/system/libraries.fc
+++ b/policy/modules/system/libraries.fc
@@ -44,6 +44,7 @@ ifdef(`distro_redhat',`
@@ -41743,7 +41774,16 @@ index 9df8c4d..7a942fc 100644
/usr/lib(64)?(/.*)?/libnvidia.+\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib(64)?(/.*)?/nvidia_drv.*\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib(64)?/nero/plug-ins/libMP3\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
-@@ -208,6 +209,7 @@ HOME_DIR/.*/plugins/nppdf\.so.* -- gen_context(system_u:object_r:textrel_shlib_t
+@@ -198,8 +199,6 @@ HOME_DIR/.*/plugins/nppdf\.so.* -- gen_context(system_u:object_r:textrel_shlib_t
+ /usr/lib/libFLAC\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib/libfglrx_gamma\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib/mozilla/plugins/nppdf\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+-/usr/lib/maxima/[^/]+/binary-gcl/maxima -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+-/usr/lib64/maxima/[^/]+/binary-gcl/maxima -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib/mozilla/plugins/libvlcplugin\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib/nx/libXcomp\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib/nx/libjpeg\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+@@ -208,6 +207,7 @@ HOME_DIR/.*/plugins/nppdf\.so.* -- gen_context(system_u:object_r:textrel_shlib_t
/usr/lib(64)?/libstdc\+\+\.so\.2\.7\.2\.8 -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib(64)?/libg\+\+\.so\.2\.7\.2\.8 -- gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -41751,7 +41791,7 @@ index 9df8c4d..7a942fc 100644
/usr/lib(64)?/libglide3\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib(64)?/libglide3-v[0-9]*\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib(64)?/helix/plugins/[^/]*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
-@@ -247,6 +249,7 @@ HOME_DIR/.*/plugins/nppdf\.so.* -- gen_context(system_u:object_r:textrel_shlib_t
+@@ -247,6 +247,7 @@ HOME_DIR/.*/plugins/nppdf\.so.* -- gen_context(system_u:object_r:textrel_shlib_t
/usr/lib(64)?/ladspa/sc3_1427\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib(64)?/ladspa/sc4_1882\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib(64)?/ladspa/se4_1883\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -41759,7 +41799,7 @@ index 9df8c4d..7a942fc 100644
/usr/lib(64)?/ocaml/stublibs/dllnums\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
# Livna.org packages: xmms-mp3, ffmpeg, xvidcore, xine-lib, gsm, lame
-@@ -302,13 +305,8 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* -- gen_context(system_u:object_r:te
+@@ -302,13 +303,8 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* -- gen_context(system_u:object_r:te
/usr/lib/acroread/(.*/)?lib/[^/]*\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib/acroread/.+\.api -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib/acroread/(.*/)?ADMPlugin\.apl -- gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -41775,7 +41815,7 @@ index 9df8c4d..7a942fc 100644
') dnl end distro_redhat
#
-@@ -319,14 +317,150 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* -- gen_context(system_u:object_r:te
+@@ -319,14 +315,150 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* -- gen_context(system_u:object_r:te
/var/ftp/lib(64)?(/.*)? gen_context(system_u:object_r:lib_t,s0)
/var/ftp/lib(64)?/ld[^/]*\.so(\.[^/]*)* -- gen_context(system_u:object_r:ld_so_t,s0)
@@ -42721,7 +42761,7 @@ index 9c0faab..def8d5a 100644
## loading modules.
##
diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te
-index 74a4466..3120e0e 100644
+index 74a4466..7243733 100644
--- a/policy/modules/system/modutils.te
+++ b/policy/modules/system/modutils.te
@@ -18,6 +18,7 @@ type insmod_t;
@@ -42732,7 +42772,17 @@ index 74a4466..3120e0e 100644
role system_r types insmod_t;
# module loading config
-@@ -55,12 +56,15 @@ corecmd_search_bin(depmod_t)
+@@ -36,6 +37,9 @@ role system_r types update_modules_t;
+ type update_modules_tmp_t;
+ files_tmp_file(update_modules_tmp_t)
+
++type insmod_tmpfs_t;
++files_tmpfs_file(insmod_tmpfs_t)
++
+ ########################################
+ #
+ # depmod local policy
+@@ -55,12 +59,15 @@ corecmd_search_bin(depmod_t)
domain_use_interactive_fds(depmod_t)
@@ -42748,7 +42798,7 @@ index 74a4466..3120e0e 100644
fs_getattr_xattr_fs(depmod_t)
-@@ -74,6 +78,7 @@ userdom_use_user_terminals(depmod_t)
+@@ -74,6 +81,7 @@ userdom_use_user_terminals(depmod_t)
# Read System.map from home directories.
files_list_home(depmod_t)
userdom_read_user_home_content_files(depmod_t)
@@ -42756,7 +42806,7 @@ index 74a4466..3120e0e 100644
ifdef(`distro_ubuntu',`
optional_policy(`
-@@ -104,7 +109,7 @@ optional_policy(`
+@@ -104,11 +112,12 @@ optional_policy(`
# insmod local policy
#
@@ -42765,7 +42815,22 @@ index 74a4466..3120e0e 100644
allow insmod_t self:process { execmem sigchld sigkill sigstop signull signal };
allow insmod_t self:udp_socket create_socket_perms;
-@@ -125,6 +130,7 @@ kernel_write_proc_files(insmod_t)
+ allow insmod_t self:rawip_socket create_socket_perms;
++allow insmod_t self:shm create_shm_perms;
+
+ # Read module config and dependency information
+ list_dirs_pattern(insmod_t, modules_conf_t, modules_conf_t)
+@@ -118,6 +127,9 @@ read_files_pattern(insmod_t, modules_dep_t, modules_dep_t)
+
+ can_exec(insmod_t, insmod_exec_t)
+
++manage_files_pattern(insmod_t,insmod_tmpfs_t,insmod_tmpfs_t)
++fs_tmpfs_filetrans(insmod_t,insmod_tmpfs_t,file)
++
+ kernel_load_module(insmod_t)
+ kernel_read_system_state(insmod_t)
+ kernel_read_network_state(insmod_t)
+@@ -125,6 +137,7 @@ kernel_write_proc_files(insmod_t)
kernel_mount_debugfs(insmod_t)
kernel_mount_kvmfs(insmod_t)
kernel_read_debugfs(insmod_t)
@@ -42773,7 +42838,7 @@ index 74a4466..3120e0e 100644
# Rules for /proc/sys/kernel/tainted
kernel_read_kernel_sysctls(insmod_t)
kernel_rw_kernel_sysctl(insmod_t)
-@@ -142,6 +148,7 @@ dev_rw_agp(insmod_t)
+@@ -142,6 +155,7 @@ dev_rw_agp(insmod_t)
dev_read_sound(insmod_t)
dev_write_sound(insmod_t)
dev_rw_apm_bios(insmod_t)
@@ -42781,7 +42846,7 @@ index 74a4466..3120e0e 100644
domain_signal_all_domains(insmod_t)
domain_use_interactive_fds(insmod_t)
-@@ -160,11 +167,15 @@ files_write_kernel_modules(insmod_t)
+@@ -160,11 +174,15 @@ files_write_kernel_modules(insmod_t)
fs_getattr_xattr_fs(insmod_t)
fs_dontaudit_use_tmpfs_chr_dev(insmod_t)
@@ -42797,7 +42862,7 @@ index 74a4466..3120e0e 100644
logging_send_syslog_msg(insmod_t)
logging_search_logs(insmod_t)
-@@ -173,8 +184,7 @@ miscfiles_read_localization(insmod_t)
+@@ -173,8 +191,7 @@ miscfiles_read_localization(insmod_t)
seutil_read_file_contexts(insmod_t)
@@ -42807,7 +42872,7 @@ index 74a4466..3120e0e 100644
userdom_dontaudit_search_user_home_dirs(insmod_t)
if( ! secure_mode_insmod ) {
-@@ -186,8 +196,11 @@ optional_policy(`
+@@ -186,8 +203,11 @@ optional_policy(`
')
optional_policy(`
@@ -42821,7 +42886,7 @@ index 74a4466..3120e0e 100644
')
optional_policy(`
-@@ -235,6 +248,10 @@ optional_policy(`
+@@ -235,6 +255,10 @@ optional_policy(`
')
optional_policy(`
@@ -44543,7 +44608,7 @@ index 8e71fb7..350d003 100644
+ role_transition $1 dhcpc_exec_t system_r;
')
diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
-index dfbe736..5740b79 100644
+index dfbe736..e70feca 100644
--- a/policy/modules/system/sysnetwork.te
+++ b/policy/modules/system/sysnetwork.te
@@ -5,6 +5,13 @@ policy_module(sysnetwork, 1.11.0)
@@ -44701,10 +44766,14 @@ index dfbe736..5740b79 100644
')
optional_policy(`
-@@ -334,6 +379,10 @@ optional_policy(`
+@@ -334,6 +379,14 @@ optional_policy(`
')
optional_policy(`
++ kdump_dontaudit_read_config(ifconfig_t)
++')
++
++optional_policy(`
+ netutils_domtrans(dhcpc_t)
+')
+
@@ -44712,7 +44781,7 @@ index dfbe736..5740b79 100644
nis_use_ypbind(ifconfig_t)
')
-@@ -355,3 +404,9 @@ optional_policy(`
+@@ -355,3 +408,9 @@ optional_policy(`
xen_append_log(ifconfig_t)
xen_dontaudit_rw_unix_stream_sockets(ifconfig_t)
')
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 484f01a..e5b78cd 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -21,7 +21,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.9.8
-Release: 4%{?dist}
+Release: 5%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -471,6 +471,18 @@ exit 0
%endif
%changelog
+* Thu Nov 11 2010 Dan Walsh 3.9.8-5
+- kdump leaks kdump_etc_t to ifconfig, add dontaudit
+- uux needs to transition to uucpd_t
+- More init fixes relabels man,faillog
+- Remove maxima defs in libraries.fc
+- insmod needs to be able to create tmpfs_t files
+- ping needs setcap
+- init executes mcelog, initrc_t needs to manage faillog.
+- fix xserver_ralabel_xdm_tmp_dirs
+- Allow dovecot_deliver_t to list dovecot_etc_t
+- Run acroread as execmem_t
+
* Wed Nov 10 2010 Dan Walsh 3.9.8-4
- Fix init to be able to relabel wtmp, tmp files