diff --git a/docker-selinux.tgz b/docker-selinux.tgz
index df508b3..e74221f 100644
Binary files a/docker-selinux.tgz and b/docker-selinux.tgz differ
diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch
index 6a4e7cc..47e5103 100644
--- a/policy-rawhide-base.patch
+++ b/policy-rawhide-base.patch
@@ -15416,7 +15416,7 @@ index d7c11a0..6b3331d 100644
/var/run/shm/.* <>
-')
diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if
-index 8416beb..4d615ff 100644
+index 8416beb..cdeecad 100644
--- a/policy/modules/kernel/filesystem.if
+++ b/policy/modules/kernel/filesystem.if
@@ -631,6 +631,27 @@ interface(`fs_getattr_cgroup',`
@@ -16467,39 +16467,48 @@ index 8416beb..4d615ff 100644
##
##
##
-@@ -2234,18 +2587,533 @@ interface(`fs_mount_iso9660_fs',`
+@@ -2234,18 +2587,17 @@ interface(`fs_mount_iso9660_fs',`
##
##
#
-interface(`fs_remount_iso9660_fs',`
+interface(`fs_manage_hugetlbfs_dirs',`
-+ gen_require(`
+ gen_require(`
+- type iso9660_t;
+ type hugetlbfs_t;
-+ ')
-+
+ ')
+
+- allow $1 iso9660_t:filesystem remount;
+ manage_dirs_pattern($1, hugetlbfs_t, hugetlbfs_t)
-+')
-+
-+########################################
-+##
+ ')
+
+ ########################################
+ ##
+-## Unmount an iso9660 filesystem, which
+-## is usually used on CDs.
+## Read hugetlbfs files.
-+##
-+##
-+##
-+## Domain allowed access.
-+##
-+##
-+#
+ ##
+ ##
+ ##
+@@ -2253,38 +2605,557 @@ interface(`fs_remount_iso9660_fs',`
+ ##
+ ##
+ #
+-interface(`fs_unmount_iso9660_fs',`
+interface(`fs_read_hugetlbfs_files',`
-+ gen_require(`
+ gen_require(`
+- type iso9660_t;
+ type hugetlbfs_t;
-+ ')
-+
+ ')
+
+- allow $1 iso9660_t:filesystem unmount;
+ read_files_pattern($1, hugetlbfs_t, hugetlbfs_t)
-+')
-+
-+########################################
-+##
+ ')
+
+ ########################################
+ ##
+-## Get the attributes of an iso9660
+-## filesystem, which is usually used on CDs.
+## Read and write hugetlbfs files.
+##
+##
@@ -16987,48 +16996,39 @@ index 8416beb..4d615ff 100644
+##
+#
+interface(`fs_write_kdbus_files', `
- gen_require(`
-- type iso9660_t;
++ gen_require(`
+ type kdbusfs_t;
- ')
-
-- allow $1 iso9660_t:filesystem remount;
++ ')
++
+ write_files_pattern($1, kdbusfs_t, kdbusfs_t)
+ fs_search_tmpfs($1)
+ dev_search_sysfs($1)
- ')
-
- ########################################
- ##
--## Unmount an iso9660 filesystem, which
--## is usually used on CDs.
++')
++
++########################################
++##
+## Read and write kdbusfs files.
- ##
- ##
- ##
-@@ -2253,38 +3121,41 @@ interface(`fs_remount_iso9660_fs',`
- ##
- ##
- #
--interface(`fs_unmount_iso9660_fs',`
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
+interface(`fs_rw_kdbus_files',`
- gen_require(`
-- type iso9660_t;
++ gen_require(`
+ type kdbusfs_t;
+
- ')
-
-- allow $1 iso9660_t:filesystem unmount;
++ ')
++
+ read_lnk_files_pattern($1, kdbusfs_t, kdbusfs_t)
+ rw_files_pattern($1, kdbusfs_t, kdbusfs_t)
+ fs_search_tmpfs($1)
+ dev_search_sysfs($1)
- ')
-
- ########################################
- ##
--## Get the attributes of an iso9660
--## filesystem, which is usually used on CDs.
++')
++
++########################################
++##
+## Do not audit attempts to open,
+## get attributes, read and write
+## cgroup files.
@@ -17265,7 +17265,7 @@ index 8416beb..4d615ff 100644
##
##
##
-@@ -2719,6 +3685,47 @@ interface(`fs_search_rpc',`
+@@ -2719,6 +3685,65 @@ interface(`fs_search_rpc',`
########################################
##
@@ -17310,10 +17310,28 @@ index 8416beb..4d615ff 100644
+
+########################################
+##
++## Relabel directory on removable storage.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`fs_relabel_pstore_dirs',`
++ gen_require(`
++ type pstore_t;
++ ')
++
++ relabel_dirs_pattern($1, pstore_t, pstore_t)
++')
++
++########################################
++##
## Search removable storage directories.
##
##
-@@ -2741,7 +3748,7 @@ interface(`fs_search_removable',`
+@@ -2741,7 +3766,7 @@ interface(`fs_search_removable',`
##
##
##
@@ -17322,7 +17340,7 @@ index 8416beb..4d615ff 100644
##
##
#
-@@ -2777,7 +3784,7 @@ interface(`fs_read_removable_files',`
+@@ -2777,7 +3802,7 @@ interface(`fs_read_removable_files',`
##
##
##
@@ -17331,7 +17349,7 @@ index 8416beb..4d615ff 100644
##
##
#
-@@ -2970,6 +3977,7 @@ interface(`fs_manage_nfs_dirs',`
+@@ -2970,6 +3995,7 @@ interface(`fs_manage_nfs_dirs',`
type nfs_t;
')
@@ -17339,7 +17357,7 @@ index 8416beb..4d615ff 100644
allow $1 nfs_t:dir manage_dir_perms;
')
-@@ -3010,6 +4018,7 @@ interface(`fs_manage_nfs_files',`
+@@ -3010,6 +4036,7 @@ interface(`fs_manage_nfs_files',`
type nfs_t;
')
@@ -17347,7 +17365,7 @@ index 8416beb..4d615ff 100644
manage_files_pattern($1, nfs_t, nfs_t)
')
-@@ -3050,6 +4059,7 @@ interface(`fs_manage_nfs_symlinks',`
+@@ -3050,6 +4077,7 @@ interface(`fs_manage_nfs_symlinks',`
type nfs_t;
')
@@ -17355,7 +17373,7 @@ index 8416beb..4d615ff 100644
manage_lnk_files_pattern($1, nfs_t, nfs_t)
')
-@@ -3137,6 +4147,24 @@ interface(`fs_nfs_domtrans',`
+@@ -3137,6 +4165,24 @@ interface(`fs_nfs_domtrans',`
########################################
##
@@ -17380,7 +17398,7 @@ index 8416beb..4d615ff 100644
## Mount a NFS server pseudo filesystem.
##
##
-@@ -3263,6 +4291,24 @@ interface(`fs_getattr_nfsd_files',`
+@@ -3263,6 +4309,24 @@ interface(`fs_getattr_nfsd_files',`
getattr_files_pattern($1, nfsd_fs_t, nfsd_fs_t)
')
@@ -17405,7 +17423,7 @@ index 8416beb..4d615ff 100644
########################################
##
## Read and write NFS server files.
-@@ -3283,6 +4329,24 @@ interface(`fs_rw_nfsd_fs',`
+@@ -3283,6 +4347,24 @@ interface(`fs_rw_nfsd_fs',`
########################################
##
@@ -17430,7 +17448,7 @@ index 8416beb..4d615ff 100644
## Allow the type to associate to ramfs filesystems.
##
##
-@@ -3392,7 +4456,7 @@ interface(`fs_search_ramfs',`
+@@ -3392,7 +4474,7 @@ interface(`fs_search_ramfs',`
########################################
##
@@ -17439,7 +17457,7 @@ index 8416beb..4d615ff 100644
##
##
##
-@@ -3429,7 +4493,7 @@ interface(`fs_manage_ramfs_dirs',`
+@@ -3429,7 +4511,7 @@ interface(`fs_manage_ramfs_dirs',`
########################################
##
@@ -17448,7 +17466,7 @@ index 8416beb..4d615ff 100644
##
##
##
-@@ -3447,7 +4511,7 @@ interface(`fs_dontaudit_read_ramfs_files',`
+@@ -3447,7 +4529,7 @@ interface(`fs_dontaudit_read_ramfs_files',`
########################################
##
@@ -17457,7 +17475,7 @@ index 8416beb..4d615ff 100644
##
##
##
-@@ -3779,6 +4843,24 @@ interface(`fs_mount_tmpfs',`
+@@ -3779,6 +4861,24 @@ interface(`fs_mount_tmpfs',`
########################################
##
@@ -17482,7 +17500,7 @@ index 8416beb..4d615ff 100644
## Remount a tmpfs filesystem.
##
##
-@@ -3815,6 +4897,24 @@ interface(`fs_unmount_tmpfs',`
+@@ -3815,6 +4915,24 @@ interface(`fs_unmount_tmpfs',`
########################################
##
@@ -17507,7 +17525,7 @@ index 8416beb..4d615ff 100644
## Get the attributes of a tmpfs
## filesystem.
##
-@@ -3839,39 +4939,76 @@ interface(`fs_getattr_tmpfs',`
+@@ -3839,39 +4957,76 @@ interface(`fs_getattr_tmpfs',`
##
##
##
@@ -17593,7 +17611,7 @@ index 8416beb..4d615ff 100644
##
##
##
-@@ -3879,36 +5016,35 @@ interface(`fs_relabelfrom_tmpfs',`
+@@ -3879,36 +5034,35 @@ interface(`fs_relabelfrom_tmpfs',`
##
##
#
@@ -17637,7 +17655,7 @@ index 8416beb..4d615ff 100644
##
##
##
-@@ -3916,35 +5052,36 @@ interface(`fs_dontaudit_getattr_tmpfs_dirs',`
+@@ -3916,35 +5070,36 @@ interface(`fs_dontaudit_getattr_tmpfs_dirs',`
##
##
#
@@ -17681,7 +17699,7 @@ index 8416beb..4d615ff 100644
##
##
##
-@@ -3952,17 +5089,17 @@ interface(`fs_setattr_tmpfs_dirs',`
+@@ -3952,17 +5107,17 @@ interface(`fs_setattr_tmpfs_dirs',`
##
##
#
@@ -17702,7 +17720,7 @@ index 8416beb..4d615ff 100644
##
##
##
-@@ -3970,31 +5107,30 @@ interface(`fs_search_tmpfs',`
+@@ -3970,31 +5125,30 @@ interface(`fs_search_tmpfs',`
##
##
#
@@ -17740,7 +17758,7 @@ index 8416beb..4d615ff 100644
')
########################################
-@@ -4105,7 +5241,7 @@ interface(`fs_dontaudit_rw_tmpfs_files',`
+@@ -4105,7 +5259,7 @@ interface(`fs_dontaudit_rw_tmpfs_files',`
type tmpfs_t;
')
@@ -17749,7 +17767,7 @@ index 8416beb..4d615ff 100644
')
########################################
-@@ -4165,6 +5301,24 @@ interface(`fs_rw_tmpfs_files',`
+@@ -4165,6 +5319,24 @@ interface(`fs_rw_tmpfs_files',`
########################################
##
@@ -17774,7 +17792,7 @@ index 8416beb..4d615ff 100644
## Read tmpfs link files.
##
##
-@@ -4202,7 +5356,7 @@ interface(`fs_rw_tmpfs_chr_files',`
+@@ -4202,7 +5374,7 @@ interface(`fs_rw_tmpfs_chr_files',`
########################################
##
@@ -17783,7 +17801,7 @@ index 8416beb..4d615ff 100644
##
##
##
-@@ -4221,6 +5375,60 @@ interface(`fs_dontaudit_use_tmpfs_chr_dev',`
+@@ -4221,6 +5393,60 @@ interface(`fs_dontaudit_use_tmpfs_chr_dev',`
########################################
##
@@ -17844,7 +17862,7 @@ index 8416beb..4d615ff 100644
## Relabel character nodes on tmpfs filesystems.
##
##
-@@ -4278,6 +5486,44 @@ interface(`fs_relabel_tmpfs_blk_file',`
+@@ -4278,6 +5504,44 @@ interface(`fs_relabel_tmpfs_blk_file',`
########################################
##
@@ -17889,7 +17907,7 @@ index 8416beb..4d615ff 100644
## Read and write, create and delete generic
## files on tmpfs filesystems.
##
-@@ -4297,6 +5543,25 @@ interface(`fs_manage_tmpfs_files',`
+@@ -4297,6 +5561,25 @@ interface(`fs_manage_tmpfs_files',`
########################################
##
@@ -17915,7 +17933,7 @@ index 8416beb..4d615ff 100644
## Read and write, create and delete symbolic
## links on tmpfs filesystems.
##
-@@ -4407,6 +5672,25 @@ interface(`fs_search_xenfs',`
+@@ -4407,6 +5690,25 @@ interface(`fs_search_xenfs',`
allow $1 xenfs_t:dir search_dir_perms;
')
@@ -17941,7 +17959,7 @@ index 8416beb..4d615ff 100644
########################################
##
## Create, read, write, and delete directories
-@@ -4503,6 +5787,8 @@ interface(`fs_mount_all_fs',`
+@@ -4503,6 +5805,8 @@ interface(`fs_mount_all_fs',`
')
allow $1 filesystem_type:filesystem mount;
@@ -17950,7 +17968,7 @@ index 8416beb..4d615ff 100644
')
########################################
-@@ -4549,7 +5835,7 @@ interface(`fs_unmount_all_fs',`
+@@ -4549,7 +5853,7 @@ interface(`fs_unmount_all_fs',`
##
##
## Allow the specified domain to
@@ -17959,7 +17977,7 @@ index 8416beb..4d615ff 100644
## Example attributes:
##
##
-@@ -4596,6 +5882,26 @@ interface(`fs_dontaudit_getattr_all_fs',`
+@@ -4596,6 +5900,26 @@ interface(`fs_dontaudit_getattr_all_fs',`
########################################
##
@@ -17986,7 +18004,7 @@ index 8416beb..4d615ff 100644
## Get the quotas of all filesystems.
##
##
-@@ -4671,6 +5977,25 @@ interface(`fs_getattr_all_dirs',`
+@@ -4671,6 +5995,25 @@ interface(`fs_getattr_all_dirs',`
########################################
##
@@ -18012,7 +18030,7 @@ index 8416beb..4d615ff 100644
## Search all directories with a filesystem type.
##
##
-@@ -4912,3 +6237,63 @@ interface(`fs_unconfined',`
+@@ -4912,3 +6255,63 @@ interface(`fs_unconfined',`
typeattribute $1 filesystem_unconfined_type;
')
@@ -33892,7 +33910,7 @@ index 79a45f6..af3877f 100644
+ read_files_pattern($1, init_var_lib_t, init_var_lib_t)
+')
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
-index 17eda24..34affdd 100644
+index 17eda24..6d9bef0 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -11,10 +11,31 @@ gen_require(`
@@ -34185,7 +34203,7 @@ index 17eda24..34affdd 100644
ifdef(`distro_gentoo',`
allow init_t self:process { getcap setcap };
-@@ -186,29 +321,238 @@ ifdef(`distro_gentoo',`
+@@ -186,29 +321,239 @@ ifdef(`distro_gentoo',`
')
ifdef(`distro_redhat',`
@@ -34317,6 +34335,7 @@ index 17eda24..34affdd 100644
+fs_manage_cgroup_files(init_t)
+fs_manage_hugetlbfs_dirs(init_t)
+fs_manage_tmpfs_dirs(init_t)
++fs_relabel_pstore_dirs(init_t)
+fs_relabel_tmpfs_dirs(init_t)
+fs_relabel_tmpfs_files(init_t)
+fs_relabel_tmpfs_fifo_files(init_t)
@@ -34433,7 +34452,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
-@@ -216,7 +560,31 @@ optional_policy(`
+@@ -216,7 +561,31 @@ optional_policy(`
')
optional_policy(`
@@ -34465,7 +34484,7 @@ index 17eda24..34affdd 100644
')
########################################
-@@ -225,9 +593,9 @@ optional_policy(`
+@@ -225,9 +594,9 @@ optional_policy(`
#
allow initrc_t self:process { getpgid setsched setpgid setrlimit getsched };
@@ -34477,7 +34496,7 @@ index 17eda24..34affdd 100644
allow initrc_t self:passwd rootok;
allow initrc_t self:key manage_key_perms;
-@@ -258,12 +626,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
+@@ -258,12 +627,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
allow initrc_t initrc_var_run_t:file manage_file_perms;
files_pid_filetrans(initrc_t, initrc_var_run_t, file)
@@ -34494,7 +34513,7 @@ index 17eda24..34affdd 100644
manage_dirs_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
manage_files_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
-@@ -279,23 +651,36 @@ kernel_change_ring_buffer_level(initrc_t)
+@@ -279,23 +652,36 @@ kernel_change_ring_buffer_level(initrc_t)
kernel_clear_ring_buffer(initrc_t)
kernel_get_sysvipc_info(initrc_t)
kernel_read_all_sysctls(initrc_t)
@@ -34537,7 +34556,7 @@ index 17eda24..34affdd 100644
corenet_tcp_sendrecv_all_ports(initrc_t)
corenet_udp_sendrecv_all_ports(initrc_t)
corenet_tcp_connect_all_ports(initrc_t)
-@@ -303,9 +688,11 @@ corenet_sendrecv_all_client_packets(initrc_t)
+@@ -303,9 +689,11 @@ corenet_sendrecv_all_client_packets(initrc_t)
dev_read_rand(initrc_t)
dev_read_urand(initrc_t)
@@ -34549,7 +34568,7 @@ index 17eda24..34affdd 100644
dev_rw_sysfs(initrc_t)
dev_list_usbfs(initrc_t)
dev_read_framebuffer(initrc_t)
-@@ -313,8 +700,10 @@ dev_write_framebuffer(initrc_t)
+@@ -313,8 +701,10 @@ dev_write_framebuffer(initrc_t)
dev_read_realtime_clock(initrc_t)
dev_read_sound_mixer(initrc_t)
dev_write_sound_mixer(initrc_t)
@@ -34560,7 +34579,7 @@ index 17eda24..34affdd 100644
dev_delete_lvm_control_dev(initrc_t)
dev_manage_generic_symlinks(initrc_t)
dev_manage_generic_files(initrc_t)
-@@ -322,8 +711,7 @@ dev_manage_generic_files(initrc_t)
+@@ -322,8 +712,7 @@ dev_manage_generic_files(initrc_t)
dev_delete_generic_symlinks(initrc_t)
dev_getattr_all_blk_files(initrc_t)
dev_getattr_all_chr_files(initrc_t)
@@ -34570,7 +34589,7 @@ index 17eda24..34affdd 100644
domain_kill_all_domains(initrc_t)
domain_signal_all_domains(initrc_t)
-@@ -332,7 +720,6 @@ domain_sigstop_all_domains(initrc_t)
+@@ -332,7 +721,6 @@ domain_sigstop_all_domains(initrc_t)
domain_sigchld_all_domains(initrc_t)
domain_read_all_domains_state(initrc_t)
domain_getattr_all_domains(initrc_t)
@@ -34578,7 +34597,7 @@ index 17eda24..34affdd 100644
domain_getsession_all_domains(initrc_t)
domain_use_interactive_fds(initrc_t)
# for lsof which is used by alsa shutdown:
-@@ -340,6 +727,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t)
+@@ -340,6 +728,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t)
domain_dontaudit_getattr_all_tcp_sockets(initrc_t)
domain_dontaudit_getattr_all_dgram_sockets(initrc_t)
domain_dontaudit_getattr_all_pipes(initrc_t)
@@ -34586,7 +34605,7 @@ index 17eda24..34affdd 100644
files_getattr_all_dirs(initrc_t)
files_getattr_all_files(initrc_t)
-@@ -347,14 +735,15 @@ files_getattr_all_symlinks(initrc_t)
+@@ -347,14 +736,15 @@ files_getattr_all_symlinks(initrc_t)
files_getattr_all_pipes(initrc_t)
files_getattr_all_sockets(initrc_t)
files_purge_tmp(initrc_t)
@@ -34604,7 +34623,7 @@ index 17eda24..34affdd 100644
files_read_usr_files(initrc_t)
files_manage_urandom_seed(initrc_t)
files_manage_generic_spool(initrc_t)
-@@ -364,8 +753,12 @@ files_list_isid_type_dirs(initrc_t)
+@@ -364,8 +754,12 @@ files_list_isid_type_dirs(initrc_t)
files_mounton_isid_type_dirs(initrc_t)
files_list_default(initrc_t)
files_mounton_default(initrc_t)
@@ -34618,7 +34637,7 @@ index 17eda24..34affdd 100644
fs_list_inotifyfs(initrc_t)
fs_register_binary_executable_type(initrc_t)
# rhgb-console writes to ramfs
-@@ -375,10 +768,11 @@ fs_mount_all_fs(initrc_t)
+@@ -375,10 +769,11 @@ fs_mount_all_fs(initrc_t)
fs_unmount_all_fs(initrc_t)
fs_remount_all_fs(initrc_t)
fs_getattr_all_fs(initrc_t)
@@ -34632,7 +34651,7 @@ index 17eda24..34affdd 100644
mcs_process_set_categories(initrc_t)
mls_file_read_all_levels(initrc_t)
-@@ -387,8 +781,10 @@ mls_process_read_up(initrc_t)
+@@ -387,8 +782,10 @@ mls_process_read_up(initrc_t)
mls_process_write_down(initrc_t)
mls_rangetrans_source(initrc_t)
mls_fd_share_all_levels(initrc_t)
@@ -34643,7 +34662,7 @@ index 17eda24..34affdd 100644
storage_getattr_fixed_disk_dev(initrc_t)
storage_setattr_fixed_disk_dev(initrc_t)
-@@ -398,6 +794,7 @@ term_use_all_terms(initrc_t)
+@@ -398,6 +795,7 @@ term_use_all_terms(initrc_t)
term_reset_tty_labels(initrc_t)
auth_rw_login_records(initrc_t)
@@ -34651,7 +34670,7 @@ index 17eda24..34affdd 100644
auth_setattr_login_records(initrc_t)
auth_rw_lastlog(initrc_t)
auth_read_pam_pid(initrc_t)
-@@ -416,20 +813,18 @@ logging_read_all_logs(initrc_t)
+@@ -416,20 +814,18 @@ logging_read_all_logs(initrc_t)
logging_append_all_logs(initrc_t)
logging_read_audit_config(initrc_t)
@@ -34675,7 +34694,7 @@ index 17eda24..34affdd 100644
ifdef(`distro_debian',`
dev_setattr_generic_dirs(initrc_t)
-@@ -451,7 +846,6 @@ ifdef(`distro_gentoo',`
+@@ -451,7 +847,6 @@ ifdef(`distro_gentoo',`
allow initrc_t self:process setfscreate;
dev_create_null_dev(initrc_t)
dev_create_zero_dev(initrc_t)
@@ -34683,7 +34702,7 @@ index 17eda24..34affdd 100644
term_create_console_dev(initrc_t)
# unfortunately /sbin/rc does stupid tricks
-@@ -486,6 +880,10 @@ ifdef(`distro_gentoo',`
+@@ -486,6 +881,10 @@ ifdef(`distro_gentoo',`
sysnet_setattr_config(initrc_t)
optional_policy(`
@@ -34694,7 +34713,7 @@ index 17eda24..34affdd 100644
alsa_read_lib(initrc_t)
')
-@@ -506,7 +904,7 @@ ifdef(`distro_redhat',`
+@@ -506,7 +905,7 @@ ifdef(`distro_redhat',`
# Red Hat systems seem to have a stray
# fd open from the initrd
@@ -34703,7 +34722,7 @@ index 17eda24..34affdd 100644
files_dontaudit_read_root_files(initrc_t)
# These seem to be from the initrd
-@@ -521,6 +919,7 @@ ifdef(`distro_redhat',`
+@@ -521,6 +920,7 @@ ifdef(`distro_redhat',`
files_create_boot_dirs(initrc_t)
files_create_boot_flag(initrc_t)
files_rw_boot_symlinks(initrc_t)
@@ -34711,7 +34730,7 @@ index 17eda24..34affdd 100644
# wants to read /.fonts directory
files_read_default_files(initrc_t)
files_mountpoint(initrc_tmp_t)
-@@ -541,6 +940,7 @@ ifdef(`distro_redhat',`
+@@ -541,6 +941,7 @@ ifdef(`distro_redhat',`
miscfiles_rw_localization(initrc_t)
miscfiles_setattr_localization(initrc_t)
miscfiles_relabel_localization(initrc_t)
@@ -34719,7 +34738,7 @@ index 17eda24..34affdd 100644
miscfiles_read_fonts(initrc_t)
miscfiles_read_hwdata(initrc_t)
-@@ -550,8 +950,44 @@ ifdef(`distro_redhat',`
+@@ -550,8 +951,44 @@ ifdef(`distro_redhat',`
')
optional_policy(`
@@ -34764,7 +34783,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
-@@ -559,14 +995,31 @@ ifdef(`distro_redhat',`
+@@ -559,14 +996,31 @@ ifdef(`distro_redhat',`
rpc_write_exports(initrc_t)
rpc_manage_nfs_state_data(initrc_t)
')
@@ -34796,7 +34815,7 @@ index 17eda24..34affdd 100644
')
')
-@@ -577,6 +1030,39 @@ ifdef(`distro_suse',`
+@@ -577,6 +1031,39 @@ ifdef(`distro_suse',`
')
')
@@ -34836,7 +34855,7 @@ index 17eda24..34affdd 100644
optional_policy(`
amavis_search_lib(initrc_t)
amavis_setattr_pid_files(initrc_t)
-@@ -589,6 +1075,8 @@ optional_policy(`
+@@ -589,6 +1076,8 @@ optional_policy(`
optional_policy(`
apache_read_config(initrc_t)
apache_list_modules(initrc_t)
@@ -34845,7 +34864,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
-@@ -610,6 +1098,7 @@ optional_policy(`
+@@ -610,6 +1099,7 @@ optional_policy(`
optional_policy(`
cgroup_stream_connect_cgred(initrc_t)
@@ -34853,7 +34872,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
-@@ -626,6 +1115,17 @@ optional_policy(`
+@@ -626,6 +1116,17 @@ optional_policy(`
')
optional_policy(`
@@ -34871,7 +34890,7 @@ index 17eda24..34affdd 100644
dev_getattr_printer_dev(initrc_t)
cups_read_log(initrc_t)
-@@ -642,9 +1142,13 @@ optional_policy(`
+@@ -642,9 +1143,13 @@ optional_policy(`
dbus_connect_system_bus(initrc_t)
dbus_system_bus_client(initrc_t)
dbus_read_config(initrc_t)
@@ -34885,7 +34904,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
-@@ -657,15 +1161,11 @@ optional_policy(`
+@@ -657,15 +1162,11 @@ optional_policy(`
')
optional_policy(`
@@ -34903,7 +34922,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
-@@ -686,6 +1186,15 @@ optional_policy(`
+@@ -686,6 +1187,15 @@ optional_policy(`
')
optional_policy(`
@@ -34919,7 +34938,7 @@ index 17eda24..34affdd 100644
inn_exec_config(initrc_t)
')
-@@ -726,6 +1235,7 @@ optional_policy(`
+@@ -726,6 +1236,7 @@ optional_policy(`
lpd_list_spool(initrc_t)
lpd_read_config(initrc_t)
@@ -34927,7 +34946,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
-@@ -743,7 +1253,13 @@ optional_policy(`
+@@ -743,7 +1254,13 @@ optional_policy(`
')
optional_policy(`
@@ -34942,7 +34961,7 @@ index 17eda24..34affdd 100644
mta_dontaudit_read_spool_symlinks(initrc_t)
')
-@@ -766,6 +1282,10 @@ optional_policy(`
+@@ -766,6 +1283,10 @@ optional_policy(`
')
optional_policy(`
@@ -34953,7 +34972,7 @@ index 17eda24..34affdd 100644
postgresql_manage_db(initrc_t)
postgresql_read_config(initrc_t)
')
-@@ -775,10 +1295,20 @@ optional_policy(`
+@@ -775,10 +1296,20 @@ optional_policy(`
')
optional_policy(`
@@ -34974,7 +34993,7 @@ index 17eda24..34affdd 100644
quota_manage_flags(initrc_t)
')
-@@ -787,6 +1317,10 @@ optional_policy(`
+@@ -787,6 +1318,10 @@ optional_policy(`
')
optional_policy(`
@@ -34985,7 +35004,7 @@ index 17eda24..34affdd 100644
fs_write_ramfs_sockets(initrc_t)
fs_search_ramfs(initrc_t)
-@@ -808,8 +1342,6 @@ optional_policy(`
+@@ -808,8 +1343,6 @@ optional_policy(`
# bash tries ioctl for some reason
files_dontaudit_ioctl_all_pids(initrc_t)
@@ -34994,7 +35013,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
-@@ -818,6 +1350,10 @@ optional_policy(`
+@@ -818,6 +1351,10 @@ optional_policy(`
')
optional_policy(`
@@ -35005,7 +35024,7 @@ index 17eda24..34affdd 100644
# shorewall-init script run /var/lib/shorewall/firewall
shorewall_lib_domtrans(initrc_t)
')
-@@ -827,10 +1363,12 @@ optional_policy(`
+@@ -827,10 +1364,12 @@ optional_policy(`
squid_manage_logs(initrc_t)
')
@@ -35018,7 +35037,7 @@ index 17eda24..34affdd 100644
optional_policy(`
ssh_dontaudit_read_server_keys(initrc_t)
-@@ -857,21 +1395,60 @@ optional_policy(`
+@@ -857,21 +1396,60 @@ optional_policy(`
')
optional_policy(`
@@ -35080,7 +35099,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
-@@ -887,6 +1464,10 @@ optional_policy(`
+@@ -887,6 +1465,10 @@ optional_policy(`
')
optional_policy(`
@@ -35091,7 +35110,7 @@ index 17eda24..34affdd 100644
# Set device ownerships/modes.
xserver_setattr_console_pipes(initrc_t)
-@@ -897,3 +1478,218 @@ optional_policy(`
+@@ -897,3 +1479,218 @@ optional_policy(`
optional_policy(`
zebra_read_config(initrc_t)
')
diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch
index 3bff382..dce4135 100644
--- a/policy-rawhide-contrib.patch
+++ b/policy-rawhide-contrib.patch
@@ -50403,7 +50403,7 @@ index 6194b80..e27c53d 100644
')
+
diff --git a/mozilla.te b/mozilla.te
-index 11ac8e4..cee5091 100644
+index 11ac8e4..b341bb0 100644
--- a/mozilla.te
+++ b/mozilla.te
@@ -6,17 +6,56 @@ policy_module(mozilla, 2.8.0)
@@ -50419,7 +50419,7 @@ index 11ac8e4..cee5091 100644
+##
##
-gen_tunable(mozilla_execstack, false)
-+gen_tunable(mozilla_plugin_can_network_connect, false)
++gen_tunable(mozilla_plugin_can_network_connect, true)
+
+##
+##
diff --git a/selinux-policy.spec b/selinux-policy.spec
index fb6d602..f052550 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.13.1
-Release: 160%{?dist}
+Release: 161%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -664,6 +664,9 @@ exit 0
%endif
%changelog
+* Mon Nov 30 2015 Lukas Vrabec 3.13.1-161
+- Set default value as true in boolean mozilla_plugin_can_network_connect. BZ(1286177)
+
* Tue Nov 24 2015 Lukas Vrabec 3.13.1-160
- Allow apcupsd sending mails about battery state. BZ(1274018)
- Allow pcp_pmcd_t domain transition to lvm_t. BZ(1277779)