##
## Allow the specified domain to
@@ -17836,7 +18042,7 @@ index 97fcdac..a75dbe4 100644
## Example attributes:
##
##
-@@ -4866,3 +5143,24 @@ interface(`fs_unconfined',`
+@@ -4866,3 +5162,24 @@ interface(`fs_unconfined',`
typeattribute $1 filesystem_unconfined_type;
')
@@ -20250,10 +20456,10 @@ index 2be17d2..bfabe3f 100644
+ userdom_execmod_user_home_files(staff_usertype)
+')
diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
-index e14b961..7cd6d4f 100644
+index e14b961..80db5fc 100644
--- a/policy/modules/roles/sysadm.te
+++ b/policy/modules/roles/sysadm.te
-@@ -24,20 +24,51 @@ ifndef(`enable_mls',`
+@@ -24,20 +24,47 @@ ifndef(`enable_mls',`
#
# Local policy
#
@@ -20293,11 +20499,7 @@ index e14b961..7cd6d4f 100644
# Add/remove user home directories
userdom_manage_user_home_dirs(sysadm_t)
userdom_home_filetrans_user_home_dir(sysadm_t)
-+userdom_manage_user_tmp_dirs(sysadm_t)
-+userdom_manage_user_tmp_files(sysadm_t)
-+userdom_manage_user_tmp_symlinks(sysadm_t)
-+userdom_manage_user_tmp_chr_files(sysadm_t)
-+userdom_manage_user_tmp_blk_files(sysadm_t)
++userdom_manage_tmp_role(sysadm_r, sysadm_t)
+
+optional_policy(`
+ ssh_filetrans_admin_home_content(sysadm_t)
@@ -20305,7 +20507,7 @@ index e14b961..7cd6d4f 100644
ifdef(`direct_sysadm_daemon',`
optional_policy(`
-@@ -55,6 +86,7 @@ ifndef(`enable_mls',`
+@@ -55,6 +82,7 @@ ifndef(`enable_mls',`
logging_manage_audit_log(sysadm_t)
logging_manage_audit_config(sysadm_t)
logging_run_auditctl(sysadm_t, sysadm_r)
@@ -20313,7 +20515,7 @@ index e14b961..7cd6d4f 100644
')
tunable_policy(`allow_ptrace',`
-@@ -67,9 +99,9 @@ optional_policy(`
+@@ -67,9 +95,9 @@ optional_policy(`
optional_policy(`
apache_run_helper(sysadm_t, sysadm_r)
@@ -20324,7 +20526,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -98,6 +130,10 @@ optional_policy(`
+@@ -98,6 +126,10 @@ optional_policy(`
')
optional_policy(`
@@ -20335,7 +20537,7 @@ index e14b961..7cd6d4f 100644
certwatch_run(sysadm_t, sysadm_r)
')
-@@ -110,11 +146,19 @@ optional_policy(`
+@@ -110,11 +142,19 @@ optional_policy(`
')
optional_policy(`
@@ -20356,7 +20558,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -128,6 +172,10 @@ optional_policy(`
+@@ -128,6 +168,10 @@ optional_policy(`
')
optional_policy(`
@@ -20367,7 +20569,7 @@ index e14b961..7cd6d4f 100644
dmesg_exec(sysadm_t)
')
-@@ -163,6 +211,13 @@ optional_policy(`
+@@ -163,6 +207,13 @@ optional_policy(`
ipsec_stream_connect(sysadm_t)
# for lsof
ipsec_getattr_key_sockets(sysadm_t)
@@ -20381,7 +20583,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -170,15 +225,20 @@ optional_policy(`
+@@ -170,15 +221,20 @@ optional_policy(`
')
optional_policy(`
@@ -20405,7 +20607,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -198,22 +258,19 @@ optional_policy(`
+@@ -198,22 +254,19 @@ optional_policy(`
modutils_run_depmod(sysadm_t, sysadm_r)
modutils_run_insmod(sysadm_t, sysadm_r)
modutils_run_update_mods(sysadm_t, sysadm_r)
@@ -20433,7 +20635,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -225,25 +282,47 @@ optional_policy(`
+@@ -225,25 +278,47 @@ optional_policy(`
')
optional_policy(`
@@ -20481,7 +20683,7 @@ index e14b961..7cd6d4f 100644
portage_run(sysadm_t, sysadm_r)
portage_run_gcc_config(sysadm_t, sysadm_r)
')
-@@ -253,19 +332,19 @@ optional_policy(`
+@@ -253,19 +328,19 @@ optional_policy(`
')
optional_policy(`
@@ -20505,7 +20707,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -274,10 +353,7 @@ optional_policy(`
+@@ -274,10 +349,7 @@ optional_policy(`
optional_policy(`
rpm_run(sysadm_t, sysadm_r)
@@ -20517,7 +20719,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -302,12 +378,18 @@ optional_policy(`
+@@ -302,12 +374,18 @@ optional_policy(`
')
optional_policy(`
@@ -20537,7 +20739,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -332,7 +414,10 @@ optional_policy(`
+@@ -332,7 +410,10 @@ optional_policy(`
')
optional_policy(`
@@ -20549,7 +20751,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -343,19 +428,15 @@ optional_policy(`
+@@ -343,19 +424,15 @@ optional_policy(`
')
optional_policy(`
@@ -20571,7 +20773,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -367,45 +448,45 @@ optional_policy(`
+@@ -367,45 +444,45 @@ optional_policy(`
')
optional_policy(`
@@ -20628,7 +20830,7 @@ index e14b961..7cd6d4f 100644
auth_role(sysadm_r, sysadm_t)
')
-@@ -418,10 +499,6 @@ ifndef(`distro_redhat',`
+@@ -418,10 +495,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -20639,7 +20841,7 @@ index e14b961..7cd6d4f 100644
dbus_role_template(sysadm, sysadm_r, sysadm_t)
')
-@@ -439,6 +516,7 @@ ifndef(`distro_redhat',`
+@@ -439,6 +512,7 @@ ifndef(`distro_redhat',`
optional_policy(`
gnome_role(sysadm_r, sysadm_t)
@@ -20647,7 +20849,7 @@ index e14b961..7cd6d4f 100644
')
optional_policy(`
-@@ -446,11 +524,66 @@ ifndef(`distro_redhat',`
+@@ -446,11 +520,66 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -25661,10 +25863,10 @@ index 59aa54f..f944a65 100644
/usr/sbin/named -- gen_context(system_u:object_r:named_exec_t,s0)
/usr/sbin/named-checkconf -- gen_context(system_u:object_r:named_checkconf_exec_t,s0)
diff --git a/policy/modules/services/bind.if b/policy/modules/services/bind.if
-index 44a1e3d..f5c476a 100644
+index 44a1e3d..7802b7b 100644
--- a/policy/modules/services/bind.if
+++ b/policy/modules/services/bind.if
-@@ -20,6 +20,30 @@ interface(`bind_initrc_domtrans',`
+@@ -20,6 +20,29 @@ interface(`bind_initrc_domtrans',`
########################################
##
@@ -25683,7 +25885,6 @@ index 44a1e3d..f5c476a 100644
+ ')
+
+ systemd_exec_systemctl($1)
-+ systemd_search_unit_dirs($1)
+ allow $1 named_unit_file_t:file read_file_perms;
+ allow $1 named_unit_file_t:service all_service_perms;
+
@@ -25695,7 +25896,7 @@ index 44a1e3d..f5c476a 100644
## Execute ndc in the ndc domain.
##
##
-@@ -186,7 +210,7 @@ interface(`bind_write_config',`
+@@ -186,7 +209,7 @@ interface(`bind_write_config',`
')
write_files_pattern($1, named_conf_t, named_conf_t)
@@ -25704,7 +25905,7 @@ index 44a1e3d..f5c476a 100644
')
########################################
-@@ -266,7 +290,7 @@ interface(`bind_setattr_pid_dirs',`
+@@ -266,7 +289,7 @@ interface(`bind_setattr_pid_dirs',`
type named_var_run_t;
')
@@ -25713,7 +25914,7 @@ index 44a1e3d..f5c476a 100644
')
########################################
-@@ -284,7 +308,7 @@ interface(`bind_setattr_zone_dirs',`
+@@ -284,7 +307,7 @@ interface(`bind_setattr_zone_dirs',`
type named_zone_t;
')
@@ -25722,7 +25923,7 @@ index 44a1e3d..f5c476a 100644
')
########################################
-@@ -308,6 +332,27 @@ interface(`bind_read_zone',`
+@@ -308,6 +331,27 @@ interface(`bind_read_zone',`
########################################
##
@@ -25750,7 +25951,7 @@ index 44a1e3d..f5c476a 100644
## Manage BIND zone files.
##
##
-@@ -359,10 +404,9 @@ interface(`bind_udp_chat_named',`
+@@ -359,10 +403,9 @@ interface(`bind_udp_chat_named',`
interface(`bind_admin',`
gen_require(`
type named_t, named_tmp_t, named_log_t;
@@ -25764,7 +25965,7 @@ index 44a1e3d..f5c476a 100644
')
allow $1 named_t:process { ptrace signal_perms };
-@@ -391,9 +435,10 @@ interface(`bind_admin',`
+@@ -391,9 +434,10 @@ interface(`bind_admin',`
admin_pattern($1, named_zone_t)
admin_pattern($1, dnssec_t)
@@ -27805,7 +28006,7 @@ index fd8cd0b..45096d8 100644
+/var/run/chronyd(/.*) gen_context(system_u:object_r:chronyd_var_run_t,s0)
+/var/run/chronyd\.sock gen_context(system_u:object_r:chronyd_var_run_t,s0)
diff --git a/policy/modules/services/chronyd.if b/policy/modules/services/chronyd.if
-index 9a0da94..fecceac 100644
+index 9a0da94..714f905 100644
--- a/policy/modules/services/chronyd.if
+++ b/policy/modules/services/chronyd.if
@@ -19,6 +19,24 @@ interface(`chronyd_domtrans',`
@@ -27833,7 +28034,7 @@ index 9a0da94..fecceac 100644
####################################
##
## Execute chronyd
-@@ -56,6 +74,126 @@ interface(`chronyd_read_log',`
+@@ -56,6 +74,125 @@ interface(`chronyd_read_log',`
read_files_pattern($1, chronyd_var_log_t, chronyd_var_log_t)
')
@@ -27912,7 +28113,6 @@ index 9a0da94..fecceac 100644
+ ')
+
+ systemd_exec_systemctl($1)
-+ systemd_search_unit_dirs($1)
+ allow $1 chronyd_unit_file_t:file read_file_perms;
+ allow $1 chronyd_unit_file_t:service all_service_perms;
+
@@ -27960,7 +28160,7 @@ index 9a0da94..fecceac 100644
####################################
##
## All of the rules required to administrate
-@@ -75,9 +213,9 @@ interface(`chronyd_read_log',`
+@@ -75,9 +212,9 @@ interface(`chronyd_read_log',`
#
interface(`chronyd_admin',`
gen_require(`
@@ -27973,7 +28173,7 @@ index 9a0da94..fecceac 100644
')
allow $1 chronyd_t:process { ptrace signal_perms };
-@@ -88,18 +226,19 @@ interface(`chronyd_admin',`
+@@ -88,18 +225,19 @@ interface(`chronyd_admin',`
role_transition $2 chronyd_initrc_exec_t system_r;
allow $2 system_r;
@@ -29061,10 +29261,10 @@ index 0000000..ed13d1e
+
diff --git a/policy/modules/services/collectd.te b/policy/modules/services/collectd.te
new file mode 100644
-index 0000000..1783fe6
+index 0000000..2ee2be0
--- /dev/null
+++ b/policy/modules/services/collectd.te
-@@ -0,0 +1,61 @@
+@@ -0,0 +1,77 @@
+policy_module(collectd, 1.0.0)
+
+########################################
@@ -29072,6 +29272,14 @@ index 0000000..1783fe6
+# Declarations
+#
+
++##
++##
++## Allow collectd to connect to the
++## network using TCP.
++##
++##
++gen_tunable(collectd_can_network_connect, false)
++
+type collectd_t;
+type collectd_exec_t;
+init_daemon_domain(collectd_t, collectd_exec_t)
@@ -29105,10 +29313,12 @@ index 0000000..1783fe6
+domain_use_interactive_fds(collectd_t)
+
+kernel_read_network_state(collectd_t)
++kernel_read_net_sysctls(collectd_t)
+kernel_read_system_state(collectd_t)
+
+dev_read_sysfs(collectd_t)
+
++files_getattr_all_dirs(collectd_t)
+files_read_etc_files(collectd_t)
+files_read_usr_files(collectd_t)
+
@@ -29120,6 +29330,12 @@ index 0000000..1783fe6
+
+sysnet_dns_name_resolve(collectd_t)
+
++tunable_policy(`collectd_can_network_connect',`
++ corenet_tcp_connect_all_ports(collectd_t)
++ corenet_tcp_sendrecv_all_ports(collectd_t)
++ corenet_sendrecv_all_client_packets(collectd_t)
++')
++
+optional_policy(`
+ apache_content_template(collectd)
+
@@ -29762,7 +29978,7 @@ index 2eefc08..6ea5693 100644
+
+/var/lib/glpi/files(/.*)? gen_context(system_u:object_r:cron_var_lib_t,s0)
diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if
-index 35241ed..d972767 100644
+index 35241ed..445ced4 100644
--- a/policy/modules/services/cron.if
+++ b/policy/modules/services/cron.if
@@ -12,6 +12,11 @@
@@ -29977,7 +30193,7 @@ index 35241ed..d972767 100644
##
##
##
-@@ -322,6 +331,30 @@ interface(`cron_initrc_domtrans',`
+@@ -322,6 +331,29 @@ interface(`cron_initrc_domtrans',`
########################################
##
@@ -29996,7 +30212,6 @@ index 35241ed..d972767 100644
+ ')
+
+ systemd_exec_systemctl($1)
-+ systemd_search_unit_dirs($1)
+ allow $1 crond_unit_file_t:file read_file_perms;
+ allow $1 crond_unit_file_t:service all_service_perms;
+
@@ -30008,7 +30223,7 @@ index 35241ed..d972767 100644
## Inherit and use a file descriptor
## from the cron daemon.
##
-@@ -377,6 +410,47 @@ interface(`cron_read_pipes',`
+@@ -377,6 +409,47 @@ interface(`cron_read_pipes',`
########################################
##
@@ -30056,7 +30271,7 @@ index 35241ed..d972767 100644
## Do not audit attempts to write cron daemon unnamed pipes.
##
##
-@@ -390,6 +464,7 @@ interface(`cron_dontaudit_write_pipes',`
+@@ -390,6 +463,7 @@ interface(`cron_dontaudit_write_pipes',`
type crond_t;
')
@@ -30064,7 +30279,7 @@ index 35241ed..d972767 100644
dontaudit $1 crond_t:fifo_file write;
')
-@@ -408,7 +483,43 @@ interface(`cron_rw_pipes',`
+@@ -408,7 +482,43 @@ interface(`cron_rw_pipes',`
type crond_t;
')
@@ -30109,7 +30324,7 @@ index 35241ed..d972767 100644
')
########################################
-@@ -468,6 +579,25 @@ interface(`cron_search_spool',`
+@@ -468,6 +578,25 @@ interface(`cron_search_spool',`
########################################
##
@@ -30135,7 +30350,7 @@ index 35241ed..d972767 100644
## Manage pid files used by cron
##
##
-@@ -481,6 +611,7 @@ interface(`cron_manage_pid_files',`
+@@ -481,6 +610,7 @@ interface(`cron_manage_pid_files',`
type crond_var_run_t;
')
@@ -30143,7 +30358,7 @@ index 35241ed..d972767 100644
manage_files_pattern($1, crond_var_run_t, crond_var_run_t)
')
-@@ -536,7 +667,7 @@ interface(`cron_write_system_job_pipes',`
+@@ -536,7 +666,7 @@ interface(`cron_write_system_job_pipes',`
type system_cronjob_t;
')
@@ -30152,7 +30367,7 @@ index 35241ed..d972767 100644
')
########################################
-@@ -554,7 +685,7 @@ interface(`cron_rw_system_job_pipes',`
+@@ -554,7 +684,7 @@ interface(`cron_rw_system_job_pipes',`
type system_cronjob_t;
')
@@ -30161,7 +30376,7 @@ index 35241ed..d972767 100644
')
########################################
-@@ -587,11 +718,14 @@ interface(`cron_rw_system_job_stream_sockets',`
+@@ -587,11 +717,14 @@ interface(`cron_rw_system_job_stream_sockets',`
#
interface(`cron_read_system_job_tmp_files',`
gen_require(`
@@ -30177,7 +30392,7 @@ index 35241ed..d972767 100644
')
########################################
-@@ -627,7 +761,47 @@ interface(`cron_dontaudit_append_system_job_tmp_files',`
+@@ -627,7 +760,47 @@ interface(`cron_dontaudit_append_system_job_tmp_files',`
interface(`cron_dontaudit_write_system_job_tmp_files',`
gen_require(`
type system_cronjob_tmp_t;
@@ -30226,7 +30441,7 @@ index 35241ed..d972767 100644
+ manage_files_pattern($1, system_cronjob_var_lib_t, system_cronjob_var_lib_t)
')
diff --git a/policy/modules/services/cron.te b/policy/modules/services/cron.te
-index f7583ab..86ea0ba 100644
+index f7583ab..4100ff7 100644
--- a/policy/modules/services/cron.te
+++ b/policy/modules/services/cron.te
@@ -10,18 +10,18 @@ gen_require(`
@@ -30591,7 +30806,7 @@ index f7583ab..86ea0ba 100644
ftp_read_log(system_cronjob_t)
')
-@@ -456,15 +545,24 @@ optional_policy(`
+@@ -456,15 +545,25 @@ optional_policy(`
')
optional_policy(`
@@ -30611,12 +30826,13 @@ index f7583ab..86ea0ba 100644
')
optional_policy(`
++ mta_read_config(system_cronjob_t)
mta_send_mail(system_cronjob_t)
+ mta_system_content(system_cron_spool_t)
')
optional_policy(`
-@@ -480,7 +578,7 @@ optional_policy(`
+@@ -480,7 +579,7 @@ optional_policy(`
prelink_manage_lib(system_cronjob_t)
prelink_manage_log(system_cronjob_t)
prelink_read_cache(system_cronjob_t)
@@ -30625,7 +30841,7 @@ index f7583ab..86ea0ba 100644
')
optional_policy(`
-@@ -495,6 +593,7 @@ optional_policy(`
+@@ -495,6 +594,7 @@ optional_policy(`
optional_policy(`
spamassassin_manage_lib_files(system_cronjob_t)
@@ -30633,7 +30849,7 @@ index f7583ab..86ea0ba 100644
')
optional_policy(`
-@@ -502,7 +601,13 @@ optional_policy(`
+@@ -502,7 +602,13 @@ optional_policy(`
')
optional_policy(`
@@ -30647,7 +30863,7 @@ index f7583ab..86ea0ba 100644
userdom_user_home_dir_filetrans_user_home_content(system_cronjob_t, { dir file lnk_file fifo_file sock_file })
')
-@@ -595,9 +700,12 @@ userdom_manage_user_home_content_sockets(cronjob_t)
+@@ -595,9 +701,12 @@ userdom_manage_user_home_content_sockets(cronjob_t)
#userdom_user_home_dir_filetrans_user_home_content(cronjob_t, notdevfile_class_set)
list_dirs_pattern(crond_t, user_cron_spool_t, user_cron_spool_t)
@@ -31173,7 +31389,7 @@ index 305ddf4..173cd16 100644
admin_pattern($1, ptal_etc_t)
diff --git a/policy/modules/services/cups.te b/policy/modules/services/cups.te
-index 0f28095..e6225d3 100644
+index 0f28095..825cafb 100644
--- a/policy/modules/services/cups.te
+++ b/policy/modules/services/cups.te
@@ -15,6 +15,7 @@ files_pid_file(cupsd_config_var_run_t)
@@ -31224,7 +31440,15 @@ index 0f28095..e6225d3 100644
kernel_read_system_state(cupsd_t)
kernel_read_network_state(cupsd_t)
-@@ -270,12 +274,6 @@ files_dontaudit_list_home(cupsd_t)
+@@ -211,6 +215,7 @@ mls_rangetrans_target(cupsd_t)
+ mls_socket_write_all_levels(cupsd_t)
+ mls_fd_use_all_levels(cupsd_t)
+
++term_use_usb_ttys(cupsd_t)
+ term_use_unallocated_ttys(cupsd_t)
+ term_search_ptys(cupsd_t)
+
+@@ -270,12 +275,6 @@ files_dontaudit_list_home(cupsd_t)
userdom_dontaudit_use_unpriv_user_fds(cupsd_t)
userdom_dontaudit_search_user_home_content(cupsd_t)
@@ -31237,7 +31461,7 @@ index 0f28095..e6225d3 100644
optional_policy(`
apm_domtrans_client(cupsd_t)
')
-@@ -297,8 +295,10 @@ optional_policy(`
+@@ -297,8 +296,10 @@ optional_policy(`
hal_dbus_chat(cupsd_t)
')
@@ -31248,7 +31472,7 @@ index 0f28095..e6225d3 100644
')
')
-@@ -311,10 +311,22 @@ optional_policy(`
+@@ -311,10 +312,22 @@ optional_policy(`
')
optional_policy(`
@@ -31271,7 +31495,7 @@ index 0f28095..e6225d3 100644
mta_send_mail(cupsd_t)
')
-@@ -371,8 +383,9 @@ files_tmp_filetrans(cupsd_config_t, cupsd_tmp_t, { lnk_file file dir })
+@@ -371,8 +384,9 @@ files_tmp_filetrans(cupsd_config_t, cupsd_tmp_t, { lnk_file file dir })
allow cupsd_config_t cupsd_var_run_t:file read_file_perms;
@@ -31282,7 +31506,7 @@ index 0f28095..e6225d3 100644
domtrans_pattern(cupsd_config_t, hplip_exec_t, hplip_t)
-@@ -393,6 +406,10 @@ dev_read_sysfs(cupsd_config_t)
+@@ -393,6 +407,10 @@ dev_read_sysfs(cupsd_config_t)
dev_read_urand(cupsd_config_t)
dev_read_rand(cupsd_config_t)
dev_rw_generic_usb_dev(cupsd_config_t)
@@ -31293,7 +31517,7 @@ index 0f28095..e6225d3 100644
files_search_all_mountpoints(cupsd_config_t)
-@@ -425,11 +442,11 @@ seutil_dontaudit_search_config(cupsd_config_t)
+@@ -425,11 +443,11 @@ seutil_dontaudit_search_config(cupsd_config_t)
userdom_dontaudit_use_unpriv_user_fds(cupsd_config_t)
userdom_dontaudit_search_user_home_dirs(cupsd_config_t)
@@ -31307,7 +31531,7 @@ index 0f28095..e6225d3 100644
ifdef(`distro_redhat',`
optional_policy(`
rpm_read_db(cupsd_config_t)
-@@ -453,6 +470,10 @@ optional_policy(`
+@@ -453,6 +471,10 @@ optional_policy(`
')
optional_policy(`
@@ -31318,7 +31542,7 @@ index 0f28095..e6225d3 100644
hal_domtrans(cupsd_config_t)
hal_read_tmp_files(cupsd_config_t)
hal_dontaudit_use_fds(hplip_t)
-@@ -467,6 +488,10 @@ optional_policy(`
+@@ -467,6 +489,10 @@ optional_policy(`
')
optional_policy(`
@@ -31329,7 +31553,7 @@ index 0f28095..e6225d3 100644
policykit_dbus_chat(cupsd_config_t)
userdom_read_all_users_state(cupsd_config_t)
')
-@@ -587,13 +612,17 @@ auth_use_nsswitch(cups_pdf_t)
+@@ -587,13 +613,17 @@ auth_use_nsswitch(cups_pdf_t)
miscfiles_read_localization(cups_pdf_t)
miscfiles_read_fonts(cups_pdf_t)
@@ -31349,7 +31573,7 @@ index 0f28095..e6225d3 100644
tunable_policy(`use_nfs_home_dirs',`
fs_search_auto_mountpoints(cups_pdf_t)
-@@ -606,6 +635,10 @@ tunable_policy(`use_samba_home_dirs',`
+@@ -606,6 +636,10 @@ tunable_policy(`use_samba_home_dirs',`
fs_manage_cifs_files(cups_pdf_t)
')
@@ -31360,7 +31584,7 @@ index 0f28095..e6225d3 100644
########################################
#
# HPLIP local policy
-@@ -639,7 +672,7 @@ manage_files_pattern(hplip_t, hplip_var_lib_t, hplip_var_lib_t)
+@@ -639,7 +673,7 @@ manage_files_pattern(hplip_t, hplip_var_lib_t, hplip_var_lib_t)
manage_lnk_files_pattern(hplip_t, hplip_var_lib_t, hplip_var_lib_t)
manage_fifo_files_pattern(hplip_t, hplip_tmp_t, hplip_tmp_t)
@@ -31369,7 +31593,7 @@ index 0f28095..e6225d3 100644
manage_files_pattern(hplip_t, hplip_var_run_t, hplip_var_run_t)
files_pid_filetrans(hplip_t, hplip_var_run_t, file)
-@@ -685,6 +718,7 @@ domain_use_interactive_fds(hplip_t)
+@@ -685,6 +719,7 @@ domain_use_interactive_fds(hplip_t)
files_read_etc_files(hplip_t)
files_read_etc_runtime_files(hplip_t)
files_read_usr_files(hplip_t)
@@ -31377,7 +31601,7 @@ index 0f28095..e6225d3 100644
logging_send_syslog_msg(hplip_t)
-@@ -696,8 +730,10 @@ userdom_dontaudit_use_unpriv_user_fds(hplip_t)
+@@ -696,8 +731,10 @@ userdom_dontaudit_use_unpriv_user_fds(hplip_t)
userdom_dontaudit_search_user_home_dirs(hplip_t)
userdom_dontaudit_search_user_home_content(hplip_t)
@@ -31909,7 +32133,7 @@ index 1a1becd..843d5fd 100644
+ dontaudit $1 session_bus_type:dbus send_msg;
')
diff --git a/policy/modules/services/dbus.te b/policy/modules/services/dbus.te
-index 1bff6ee..9540fee 100644
+index 1bff6ee..f0266a9 100644
--- a/policy/modules/services/dbus.te
+++ b/policy/modules/services/dbus.te
@@ -10,6 +10,7 @@ gen_require(`
@@ -31971,7 +32195,20 @@ index 1bff6ee..9540fee 100644
logging_send_audit_msgs(system_dbusd_t)
logging_send_syslog_msg(system_dbusd_t)
-@@ -141,6 +148,20 @@ optional_policy(`
+@@ -136,11 +143,33 @@ seutil_sigchld_newrole(system_dbusd_t)
+ userdom_dontaudit_use_unpriv_user_fds(system_dbusd_t)
+ userdom_dontaudit_search_user_home_dirs(system_dbusd_t)
+
++tunable_policy(`use_nfs_home_dirs',`
++ fs_read_nfs_files(system_dbusd_t)
++')
++
++tunable_policy(`use_samba_home_dirs',`
++ fs_read_cifs_files(system_dbusd_t)
++')
++
+ optional_policy(`
+ bind_domtrans(system_dbusd_t)
')
optional_policy(`
@@ -31992,7 +32229,7 @@ index 1bff6ee..9540fee 100644
policykit_dbus_chat(system_dbusd_t)
policykit_domtrans_auth(system_dbusd_t)
policykit_search_lib(system_dbusd_t)
-@@ -151,12 +172,166 @@ optional_policy(`
+@@ -151,12 +180,166 @@ optional_policy(`
')
optional_policy(`
@@ -32048,9 +32285,9 @@ index 1bff6ee..9540fee 100644
+')
+
+########################################
-+#
-+# session_bus_type rules
#
++# session_bus_type rules
++#
+dontaudit session_bus_type self:capability sys_resource;
+allow session_bus_type self:process { getattr sigkill signal };
+dontaudit session_bus_type self:process { ptrace setrlimit };
@@ -32135,7 +32372,7 @@ index 1bff6ee..9540fee 100644
+ fs_manage_cifs_dirs(session_bus_type)
+ fs_manage_cifs_files(session_bus_type)
+')
-
++
+optional_policy(`
+ gnome_read_gconf_home_files(session_bus_type)
+')
@@ -32143,7 +32380,7 @@ index 1bff6ee..9540fee 100644
+optional_policy(`
+ hal_dbus_chat(session_bus_type)
+')
-+
+
+optional_policy(`
+ xserver_search_xdm_lib(session_bus_type)
+ xserver_use_xdm_fds(session_bus_type)
@@ -33825,10 +34062,10 @@ index b886676..ab3af9c 100644
/var/run/dnsmasq\.pid -- gen_context(system_u:object_r:dnsmasq_var_run_t,s0)
/var/run/libvirt/network(/.*)? gen_context(system_u:object_r:dnsmasq_var_run_t,s0)
diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if
-index 9bd812b..f3c2d82 100644
+index 9bd812b..1bef72c 100644
--- a/policy/modules/services/dnsmasq.if
+++ b/policy/modules/services/dnsmasq.if
-@@ -41,6 +41,30 @@ interface(`dnsmasq_initrc_domtrans',`
+@@ -41,6 +41,29 @@ interface(`dnsmasq_initrc_domtrans',`
########################################
##
@@ -33847,7 +34084,6 @@ index 9bd812b..f3c2d82 100644
+ ')
+
+ systemd_exec_systemctl($1)
-+ systemd_search_unit_dirs($1)
+ allow $1 dnsmasq_unit_file_t:file read_file_perms;
+ allow $1 dnsmasq_unit_file_t:service all_service_perms;
+
@@ -33859,7 +34095,7 @@ index 9bd812b..f3c2d82 100644
## Send dnsmasq a signal
##
##
-@@ -101,9 +125,9 @@ interface(`dnsmasq_kill',`
+@@ -101,9 +124,9 @@ interface(`dnsmasq_kill',`
## Read dnsmasq config files.
##
##
@@ -33871,7 +34107,7 @@ index 9bd812b..f3c2d82 100644
##
#
interface(`dnsmasq_read_config',`
-@@ -120,9 +144,9 @@ interface(`dnsmasq_read_config',`
+@@ -120,9 +143,9 @@ interface(`dnsmasq_read_config',`
## Write to dnsmasq config files.
##
##
@@ -33883,7 +34119,7 @@ index 9bd812b..f3c2d82 100644
##
#
interface(`dnsmasq_write_config',`
-@@ -144,12 +168,12 @@ interface(`dnsmasq_write_config',`
+@@ -144,12 +167,12 @@ interface(`dnsmasq_write_config',`
##