##
@@ -4933,7 +4935,7 @@ index f6eb485..164501c 100644
## This is an interface to support third party modules
## and its use is not allowed in upstream reference
## policy.
-@@ -1171,8 +1423,31 @@ interface(`apache_cgi_domain',`
+@@ -1171,8 +1425,31 @@ interface(`apache_cgi_domain',`
########################################
##
@@ -4967,7 +4969,7 @@ index f6eb485..164501c 100644
##
##
##
-@@ -1189,18 +1464,19 @@ interface(`apache_cgi_domain',`
+@@ -1189,18 +1466,19 @@ interface(`apache_cgi_domain',`
interface(`apache_admin',`
gen_require(`
attribute httpdcontent, httpd_script_exec_type;
@@ -4996,7 +4998,7 @@ index f6eb485..164501c 100644
init_labeled_script_domtrans($1, httpd_initrc_exec_t)
domain_system_change_exemption($1)
-@@ -1210,10 +1486,10 @@ interface(`apache_admin',`
+@@ -1210,10 +1488,10 @@ interface(`apache_admin',`
apache_manage_all_content($1)
miscfiles_manage_public_files($1)
@@ -5010,7 +5012,7 @@ index f6eb485..164501c 100644
admin_pattern($1, httpd_log_t)
admin_pattern($1, httpd_modules_t)
-@@ -1224,9 +1500,141 @@ interface(`apache_admin',`
+@@ -1224,9 +1502,141 @@ interface(`apache_admin',`
admin_pattern($1, httpd_var_run_t)
files_pid_filetrans($1, httpd_var_run_t, file)
@@ -13851,17 +13853,24 @@ index bbdd396..8328b95 100644
+ rhcs_rw_cluster_tmpfs(cmirrord_t)
+')
diff --git a/cobbler.fc b/cobbler.fc
-index 973d208..2b650a7 100644
+index 973d208..3d2a715 100644
--- a/cobbler.fc
+++ b/cobbler.fc
-@@ -4,6 +4,7 @@
+@@ -4,11 +4,14 @@
/usr/bin/cobblerd -- gen_context(system_u:object_r:cobblerd_exec_t,s0)
+/var/cache/cobbler(/.*)? gen_context(system_u:object_r:cobbler_var_lib_t,s0)
/var/lib/cobbler(/.*)? gen_context(system_u:object_r:cobbler_var_lib_t,s0)
++/var/lib/tftpboot/aarch64(/.*)? gen_context(system_u:object_r:cobbler_var_lib_t,s0)
/var/lib/tftpboot/etc(/.*)? gen_context(system_u:object_r:cobbler_var_lib_t,s0)
+ /var/lib/tftpboot/grub(/.*)? gen_context(system_u:object_r:cobbler_var_lib_t,s0)
+ /var/lib/tftpboot/images(/.*)? gen_context(system_u:object_r:cobbler_var_lib_t,s0)
++/var/lib/tftpboot/images2(/.*)? gen_context(system_u:object_r:cobbler_var_lib_t,s0)
+ /var/lib/tftpboot/memdisk -- gen_context(system_u:object_r:cobbler_var_lib_t,s0)
+ /var/lib/tftpboot/menu\.c32 -- gen_context(system_u:object_r:cobbler_var_lib_t,s0)
+ /var/lib/tftpboot/ppc(/.*)? gen_context(system_u:object_r:cobbler_var_lib_t,s0)
diff --git a/cobbler.if b/cobbler.if
index c223f81..8b567c1 100644
--- a/cobbler.if
@@ -57709,7 +57718,7 @@ index 0000000..22e6c96
+/usr/lib/mozilla/plugins-wrapped(/.*)? gen_context(system_u:object_r:nsplugin_rw_t,s0)
diff --git a/nsplugin.if b/nsplugin.if
new file mode 100644
-index 0000000..16f4789
+index 0000000..bceb527
--- /dev/null
+++ b/nsplugin.if
@@ -0,0 +1,474 @@
@@ -57820,7 +57829,7 @@ index 0000000..16f4789
+ userdom_use_inherited_user_terminals(nsplugin_t)
+ userdom_use_inherited_user_terminals(nsplugin_config_t)
+ userdom_dontaudit_setattr_user_home_content_files(nsplugin_t)
-+ userdom_manage_tmpfs_role($1, nsplugin_t)
++ userdom_manage_tmp_role($1, nsplugin_t)
+
+ optional_policy(`
+ pulseaudio_role($1, nsplugin_t)
@@ -73112,10 +73121,10 @@ index 6864479..0e7d875 100644
+/var/lib/pulse(/.*)? gen_context(system_u:object_r:pulseaudio_var_lib_t,s0)
+/var/run/pulse(/.*)? gen_context(system_u:object_r:pulseaudio_var_run_t,s0)
diff --git a/pulseaudio.if b/pulseaudio.if
-index 45843b5..116be8a 100644
+index 45843b5..4d1adac 100644
--- a/pulseaudio.if
+++ b/pulseaudio.if
-@@ -2,43 +2,48 @@
+@@ -2,43 +2,47 @@
########################################
##
@@ -73171,7 +73180,6 @@ index 45843b5..116be8a 100644
- allow $2 pulseaudio_tmp_t:file { manage_file_perms relabel_file_perms };
- allow $2 pulseaudio_tmp_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+ userdom_manage_tmp_role($1, pulseaudio_t)
-+ userdom_manage_tmpfs_role($1, pulseaudio_t)
- allow pulseaudio_t $2:unix_stream_socket connectto;
+ allow $2 pulseaudio_t:dbus send_msg;
@@ -73179,7 +73187,7 @@ index 45843b5..116be8a 100644
')
########################################
-@@ -65,9 +70,8 @@ interface(`pulseaudio_domtrans',`
+@@ -65,9 +69,8 @@ interface(`pulseaudio_domtrans',`
########################################
##
@@ -73191,7 +73199,7 @@ index 45843b5..116be8a 100644
##
##
##
-@@ -82,16 +86,16 @@ interface(`pulseaudio_domtrans',`
+@@ -82,16 +85,16 @@ interface(`pulseaudio_domtrans',`
#
interface(`pulseaudio_run',`
gen_require(`
@@ -73211,7 +73219,7 @@ index 45843b5..116be8a 100644
##
##
##
-@@ -104,13 +108,12 @@ interface(`pulseaudio_exec',`
+@@ -104,13 +107,12 @@ interface(`pulseaudio_exec',`
type pulseaudio_exec_t;
')
@@ -73226,7 +73234,7 @@ index 45843b5..116be8a 100644
##
##
##
-@@ -128,7 +131,7 @@ interface(`pulseaudio_dontaudit_exec',`
+@@ -128,7 +130,7 @@ interface(`pulseaudio_dontaudit_exec',`
########################################
##
@@ -73235,7 +73243,7 @@ index 45843b5..116be8a 100644
## processes.
##
##
-@@ -147,8 +150,8 @@ interface(`pulseaudio_signull',`
+@@ -147,8 +149,8 @@ interface(`pulseaudio_signull',`
#####################################
##
@@ -73246,7 +73254,7 @@ index 45843b5..116be8a 100644
##
##
##
-@@ -158,11 +161,15 @@ interface(`pulseaudio_signull',`
+@@ -158,11 +160,15 @@ interface(`pulseaudio_signull',`
#
interface(`pulseaudio_stream_connect',`
gen_require(`
@@ -73264,7 +73272,7 @@ index 45843b5..116be8a 100644
')
########################################
-@@ -188,9 +195,9 @@ interface(`pulseaudio_dbus_chat',`
+@@ -188,9 +194,9 @@ interface(`pulseaudio_dbus_chat',`
########################################
##
@@ -73276,7 +73284,7 @@ index 45843b5..116be8a 100644
##
## Domain allowed access.
##
-@@ -201,148 +208,190 @@ interface(`pulseaudio_setattr_home_dir',`
+@@ -201,148 +207,190 @@ interface(`pulseaudio_setattr_home_dir',`
type pulseaudio_home_t;
')
@@ -78413,7 +78421,7 @@ index 6d162e4..889c0ed 100644
userdom_dontaudit_search_user_home_dirs(radvd_t)
diff --git a/raid.fc b/raid.fc
-index 5806046..d83ec27 100644
+index 5806046..8bce88f 100644
--- a/raid.fc
+++ b/raid.fc
@@ -3,6 +3,11 @@
@@ -78428,13 +78436,16 @@ index 5806046..d83ec27 100644
/sbin/iprdump -- gen_context(system_u:object_r:mdadm_exec_t,s0)
/sbin/iprinit -- gen_context(system_u:object_r:mdadm_exec_t,s0)
/sbin/iprupdate -- gen_context(system_u:object_r:mdadm_exec_t,s0)
-@@ -16,6 +21,7 @@
+@@ -16,6 +21,10 @@
/usr/sbin/iprupdate -- gen_context(system_u:object_r:mdadm_exec_t,s0)
/usr/sbin/mdadm -- gen_context(system_u:object_r:mdadm_exec_t,s0)
/usr/sbin/mdmpd -- gen_context(system_u:object_r:mdadm_exec_t,s0)
+/usr/sbin/mdmon -- gen_context(system_u:object_r:mdadm_exec_t,s0)
/usr/sbin/raid-check -- gen_context(system_u:object_r:mdadm_exec_t,s0)
++/var/log/iprdbg -- gen_context(system_u:object_r:mdadm_log_t,s0)
++/var/log/iprdump.* -- gen_context(system_u:object_r:mdadm_log_t,s0)
++
/var/run/mdadm(/.*)? gen_context(system_u:object_r:mdadm_var_run_t,s0)
diff --git a/raid.if b/raid.if
index 951db7f..04b6dde 100644
@@ -78652,10 +78663,10 @@ index 951db7f..04b6dde 100644
+ files_etc_filetrans($1, mdadm_conf_t, file, "mdadm.conf")
')
diff --git a/raid.te b/raid.te
-index c99753f..26d52dc 100644
+index c99753f..0d4e845 100644
--- a/raid.te
+++ b/raid.te
-@@ -15,6 +15,15 @@ role mdadm_roles types mdadm_t;
+@@ -15,54 +15,92 @@ role mdadm_roles types mdadm_t;
type mdadm_initrc_exec_t;
init_script_file(mdadm_initrc_exec_t)
@@ -78671,7 +78682,13 @@ index c99753f..26d52dc 100644
type mdadm_var_run_t alias mdadm_map_t;
files_pid_file(mdadm_var_run_t)
dev_associate(mdadm_var_run_t)
-@@ -25,44 +34,67 @@ dev_associate(mdadm_var_run_t)
+
++type mdadm_log_t;
++logging_log_file(mdadm_log_t)
++
+ ########################################
+ #
+ # Local policy
#
allow mdadm_t self:capability { dac_override sys_admin ipc_lock };
@@ -78699,6 +78716,9 @@ index c99753f..26d52dc 100644
+files_pid_filetrans(mdadm_t, mdadm_var_run_t, { file dir })
+dev_filetrans(mdadm_t, mdadm_var_run_t, { file dir sock_file })
+
++manage_files_pattern(mdadm_t, mdadm_log_t, mdadm_log_t)
++logging_log_filetrans(mdadm_t, mdadm_log_t, file)
++
+can_exec(mdadm_t, mdadm_exec_t)
kernel_getattr_core_if(mdadm_t)
@@ -78748,7 +78768,7 @@ index c99753f..26d52dc 100644
mls_file_read_all_levels(mdadm_t)
mls_file_write_all_levels(mdadm_t)
-@@ -71,15 +103,22 @@ storage_dev_filetrans_fixed_disk(mdadm_t)
+@@ -71,15 +109,22 @@ storage_dev_filetrans_fixed_disk(mdadm_t)
storage_manage_fixed_disk(mdadm_t)
storage_read_scsi_generic(mdadm_t)
storage_write_scsi_generic(mdadm_t)
@@ -78772,7 +78792,7 @@ index c99753f..26d52dc 100644
userdom_dontaudit_use_unpriv_user_fds(mdadm_t)
userdom_dontaudit_search_user_home_content(mdadm_t)
-@@ -90,17 +129,38 @@ optional_policy(`
+@@ -90,17 +135,38 @@ optional_policy(`
')
optional_policy(`
@@ -109583,7 +109603,7 @@ index ae919b9..32cbf8c 100644
optional_policy(`
diff --git a/wine.if b/wine.if
-index fd2b6cc..c5ea35d 100644
+index fd2b6cc..9c4f14b 100644
--- a/wine.if
+++ b/wine.if
@@ -1,46 +1,58 @@
@@ -109696,7 +109716,7 @@ index fd2b6cc..c5ea35d 100644
userdom_unpriv_usertype($1, $1_wine_t)
- userdom_manage_user_tmpfs_files($1_wine_t)
-+ userdom_manage_tmpfs_role($2, $1_wine_t)
++ userdom_manage_tmp_role($2, $1_wine_t)
+ userdom_manage_home_role($2 ,$1_wine_t)
domain_mmap_low($1_wine_t)
@@ -109925,7 +109945,7 @@ index 304ae09..c1d10a1 100644
-/usr/bin/twm -- gen_context(system_u:object_r:wm_exec_t,s0)
+/usr/bin/twm -- gen_context(system_u:object_r:wm_exec_t,s0)
diff --git a/wm.if b/wm.if
-index 95f888d..36b2f81 100644
+index 95f888d..48fe249 100644
--- a/wm.if
+++ b/wm.if
@@ -1,4 +1,4 @@
@@ -109934,7 +109954,7 @@ index 95f888d..36b2f81 100644
#######################################
##
-@@ -29,69 +29,59 @@
+@@ -29,69 +29,58 @@
#
template(`wm_role_template',`
gen_require(`
@@ -109972,7 +109992,6 @@ index 95f888d..36b2f81 100644
- allow $1_wm_t $3:process { signull sigkill };
+ userdom_manage_home_role($2, $1_wm_t)
-+ userdom_manage_tmpfs_role($2, $1_wm_t)
+ userdom_manage_tmp_role($2, $1_wm_t)
+ userdom_exec_user_tmp_files($1_wm_t)
@@ -110026,7 +110045,7 @@ index 95f888d..36b2f81 100644
##
##
##
-@@ -104,33 +94,5 @@ interface(`wm_exec',`
+@@ -104,33 +93,5 @@ interface(`wm_exec',`
type wm_exec_t;
')
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 3656ec8..c58b252 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.13.1
-Release: 126%{?dist}
+Release: 127%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -602,6 +602,13 @@ SELinux Reference policy mls base module.
%endif
%changelog
+* Tue May 05 2015 Lukas Vrabec 3.13.1-127
+- Add missing typealiases in apache_content_template() for script domain/executable.
+- Don't use deprecated userdom_manage_tmpfs_role() interface calliing and use userdom_manage_tmp_role() instead.
+- Add support for new cobbler dir locations:
+- Add support for iprdbg logging files in /var/log.
+- Add relabel_user_home_dirs for use by docker_t
+
* Mon Apr 30 2015 Lukas Vrabec 3.13.1-126
- allow httpd_t to read nagios lib_var_lib_t to allow rddtool generate graphs which will be shown by httpd .
- Add nagios_read_lib() interface.