+## Allow shared library text relocations in tmp files. @@ -9347,160 +9787,2335 @@ index 64ff4d7..8a9355a 100644 +## This is added to support java policy. +##
+##+-## Allow the specified domain to read generic +-## files in /usr. These files are various program +-## files that do not have more specific SELinux types. +-## Some examples of these files are: +-##
+-##+-## Generally, it is safe for many domains to have +-## this access. +-##
+-##++## Allow the specified domain to read generic ++## files in /usr. These files are various program ++## files that do not have more specific SELinux types. ++## Some examples of these files are: ++##
++##++## Generally, it is safe for many domains to have ++## this access. ++##
++##+-## Search the /var/lib directory. This is +-## necessary to access files or directories under +-## /var/lib that have a private type. For example, a +-## domain accessing a private library file in the +-## /var/lib directory: +-##
+-##+-## allow mydomain_t mylibfile_t:file read_file_perms; +-## files_search_var_lib(mydomain_t) +-##
+-##++## Search the /var/lib directory. This is ++## necessary to access files or directories under ++## /var/lib that have a private type. For example, a ++## domain accessing a private library file in the ++## /var/lib directory: ++##
++##++## allow mydomain_t mylibfile_t:file read_file_perms; ++## files_search_var_lib(mydomain_t) ++##
++##++## Create an object in the process ID directory (e.g., /var/run) ++## with a private type. Typically this is used for creating ++## private PID files in /var/run with the private type instead ++## of the general PID file type. To accomplish this goal, ++## either the program must be SELinux-aware, or use this interface. ++##
++##++## Related interfaces: ++##
++##++## Example usage with a domain that can create and ++## write its PID file with a private PID file type in the ++## /var/run directory: ++##
++##++## type mypidfile_t; ++## files_pid_file(mypidfile_t) ++## allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; ++## files_pid_filetrans(mydomain_t, mypidfile_t, file) ++##
++##+-## Create an object in the process ID directory (e.g., /var/run) +-## with a private type. Typically this is used for creating +-## private PID files in /var/run with the private type instead +-## of the general PID file type. To accomplish this goal, +-## either the program must be SELinux-aware, or use this interface. +-##
+-##+-## Related interfaces: +-##
+-##+-## Example usage with a domain that can create and +-## write its PID file with a private PID file type in the +-## /var/run directory: +-##
+-##+-## type mypidfile_t; +-## files_pid_file(mypidfile_t) +-## allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; +-## files_pid_filetrans(mydomain_t, mypidfile_t, file) +-##
+-##-+## Create a core file in /, -+##
-+##-+## Create a default_t direcrory -+##
-+##++## Create a core file in /, ++##
++##++## Create a default_t direcrory ++##
++##+## Identify file type as base file type. Tools will use this attribute, @@ -10578,103 +13466,185 @@ index 64ff4d7..8a9355a 100644 +##
+##+## Make the specified type readable for all domains. +##
+##