++##
++## Allow conman to manage nfs files
++##
++##
++gen_tunable(conman_use_nfs, false)
++
+type conman_t;
+type conman_exec_t;
+init_daemon_domain(conman_t, conman_exec_t)
@@ -17209,6 +17320,8 @@ index 000000000..25cbb9aff
+
+corecmd_exec_bin(conman_t)
+
++dev_read_urand(conman_t)
++
+logging_send_syslog_msg(conman_t)
+
+sysnet_dns_name_resolve(conman_t)
@@ -17216,6 +17329,7 @@ index 000000000..25cbb9aff
+userdom_use_user_ptys(conman_t)
+
+term_use_usb_ttys(conman_t)
++term_use_ptmx(conman_t)
+
+tunable_policy(`conman_can_network',`
+ corenet_sendrecv_all_client_packets(conman_t)
@@ -17223,6 +17337,11 @@ index 000000000..25cbb9aff
+ corenet_tcp_sendrecv_all_ports(conman_t)
+')
+
++tunable_policy(`conman_use_nfs',`
++ fs_manage_nfs_files(conman_t)
++ fs_read_nfs_symlinks(conman_t)
++')
++
+optional_policy(`
+ freeipmi_stream_connect(conman_t)
+')
@@ -19865,7 +19984,7 @@ index 1303b3036..f5bd4aee8 100644
+ logging_log_filetrans($1, var_log_t, file, "redhat-access-insights.log")
')
diff --git a/cron.te b/cron.te
-index 7de385956..f91dd2fe5 100644
+index 7de385956..46400791a 100644
--- a/cron.te
+++ b/cron.te
@@ -11,46 +11,54 @@ gen_require(`
@@ -20504,12 +20623,13 @@ index 7de385956..f91dd2fe5 100644
auth_use_nsswitch(system_cronjob_t)
-@@ -516,20 +520,26 @@ logging_read_generic_logs(system_cronjob_t)
+@@ -516,20 +520,28 @@ logging_read_generic_logs(system_cronjob_t)
logging_send_audit_msgs(system_cronjob_t)
logging_send_syslog_msg(system_cronjob_t)
-miscfiles_read_localization(system_cronjob_t)
--
++miscfiles_filetrans_named_content_letsencrypt(system_cronjob_t)
+
seutil_read_config(system_cronjob_t)
+userdom_manage_tmpfs_files(system_cronjob_t, file)
@@ -20534,7 +20654,7 @@ index 7de385956..f91dd2fe5 100644
selinux_validate_context(system_cronjob_t)
selinux_compute_access_vector(system_cronjob_t)
selinux_compute_create_context(system_cronjob_t)
-@@ -539,10 +549,22 @@ tunable_policy(`cron_can_relabel',`
+@@ -539,10 +551,26 @@ tunable_policy(`cron_can_relabel',`
')
optional_policy(`
@@ -20554,10 +20674,14 @@ index 7de385956..f91dd2fe5 100644
+
+optional_policy(`
+ cron_generic_log_filetrans_log_insights(system_cronjob_t)
++')
++
++optional_policy(`
++ chronyd_run_chronyc(system_cronjob_t,system_r)
')
optional_policy(`
-@@ -551,10 +573,6 @@ optional_policy(`
+@@ -551,10 +579,6 @@ optional_policy(`
optional_policy(`
dbus_system_bus_client(system_cronjob_t)
@@ -20568,7 +20692,7 @@ index 7de385956..f91dd2fe5 100644
')
optional_policy(`
-@@ -567,6 +585,10 @@ optional_policy(`
+@@ -567,6 +591,10 @@ optional_policy(`
')
optional_policy(`
@@ -20579,7 +20703,7 @@ index 7de385956..f91dd2fe5 100644
ftp_read_log(system_cronjob_t)
')
-@@ -591,6 +613,8 @@ optional_policy(`
+@@ -591,6 +619,8 @@ optional_policy(`
optional_policy(`
mta_read_config(system_cronjob_t)
mta_send_mail(system_cronjob_t)
@@ -20588,7 +20712,7 @@ index 7de385956..f91dd2fe5 100644
')
optional_policy(`
-@@ -598,7 +622,31 @@ optional_policy(`
+@@ -598,7 +628,31 @@ optional_policy(`
')
optional_policy(`
@@ -20620,7 +20744,7 @@ index 7de385956..f91dd2fe5 100644
')
optional_policy(`
-@@ -607,7 +655,12 @@ optional_policy(`
+@@ -607,7 +661,12 @@ optional_policy(`
')
optional_policy(`
@@ -20633,7 +20757,7 @@ index 7de385956..f91dd2fe5 100644
')
optional_policy(`
-@@ -615,12 +668,27 @@ optional_policy(`
+@@ -615,12 +674,27 @@ optional_policy(`
')
optional_policy(`
@@ -20663,7 +20787,7 @@ index 7de385956..f91dd2fe5 100644
#
allow cronjob_t self:process { signal_perms setsched };
-@@ -628,12 +696,32 @@ allow cronjob_t self:fifo_file rw_fifo_file_perms;
+@@ -628,12 +702,32 @@ allow cronjob_t self:fifo_file rw_fifo_file_perms;
allow cronjob_t self:unix_stream_socket create_stream_socket_perms;
allow cronjob_t self:unix_dgram_socket create_socket_perms;
@@ -20697,7 +20821,7 @@ index 7de385956..f91dd2fe5 100644
corenet_all_recvfrom_netlabel(cronjob_t)
corenet_tcp_sendrecv_generic_if(cronjob_t)
corenet_udp_sendrecv_generic_if(cronjob_t)
-@@ -641,66 +729,141 @@ corenet_tcp_sendrecv_generic_node(cronjob_t)
+@@ -641,66 +735,141 @@ corenet_tcp_sendrecv_generic_node(cronjob_t)
corenet_udp_sendrecv_generic_node(cronjob_t)
corenet_tcp_sendrecv_all_ports(cronjob_t)
corenet_udp_sendrecv_all_ports(cronjob_t)
@@ -27002,10 +27126,10 @@ index 000000000..d22ed691a
+')
diff --git a/dnssec.te b/dnssec.te
new file mode 100644
-index 000000000..238787661
+index 000000000..b93540692
--- /dev/null
+++ b/dnssec.te
-@@ -0,0 +1,91 @@
+@@ -0,0 +1,93 @@
+policy_module(dnssec, 1.0.0)
+
+########################################
@@ -27049,6 +27173,8 @@ index 000000000..238787661
+
+kernel_read_system_state(dnssec_trigger_t)
+
++can_exec(dnssec_trigger_t, dnssec_trigger_exec_t)
++
+corecmd_exec_bin(dnssec_trigger_t)
+corecmd_exec_shell(dnssec_trigger_t)
+corecmd_read_all_executables(dnssec_trigger_t)
@@ -31797,7 +31923,7 @@ index e5b15fb7e..220622e84 100644
diff --git a/ganesha.fc b/ganesha.fc
new file mode 100644
-index 000000000..855f58e55
+index 000000000..c723bfb97
--- /dev/null
+++ b/ganesha.fc
@@ -0,0 +1,12 @@
@@ -31809,8 +31935,8 @@ index 000000000..855f58e55
+
+/usr/lib/systemd/system/nfs-ganesha.*e -- gen_context(system_u:object_r:ganesha_unit_file_t,s0)
+
-+/var/log/ganesha.log -- gen_context(system_u:object_r:ganesha_var_log_t,s0)
-+/var/log/ganesha-gfapi.log -- gen_context(system_u:object_r:ganesha_var_log_t,s0)
++/var/log/ganesha.log.* -- gen_context(system_u:object_r:ganesha_var_log_t,s0)
++/var/log/ganesha-gfapi.log.* -- gen_context(system_u:object_r:ganesha_var_log_t,s0)
+
+/var/run/ganesha(/.*)? gen_context(system_u:object_r:ganesha_var_run_t,s0)
diff --git a/ganesha.if b/ganesha.if
@@ -39473,7 +39599,7 @@ index fbb54e7d8..05c377768 100644
########################################
diff --git a/inetd.te b/inetd.te
-index c6450df8a..ed6af7994 100644
+index c6450df8a..94760a2ec 100644
--- a/inetd.te
+++ b/inetd.te
@@ -21,6 +21,7 @@ files_pid_file(inetd_var_run_t)
@@ -39571,7 +39697,7 @@ index c6450df8a..ed6af7994 100644
dev_read_urand(inetd_child_t)
fs_getattr_xattr_fs(inetd_child_t)
-@@ -230,7 +244,15 @@ auth_use_nsswitch(inetd_child_t)
+@@ -230,7 +244,19 @@ auth_use_nsswitch(inetd_child_t)
logging_send_syslog_msg(inetd_child_t)
@@ -39579,6 +39705,10 @@ index c6450df8a..ed6af7994 100644
+sysnet_read_config(inetd_child_t)
+
+optional_policy(`
++ chronyd_run_chronyc(inetd_child_t,system_r)
++')
++
++optional_policy(`
+ kerberos_use(inetd_child_t)
+')
+
@@ -40028,7 +40158,7 @@ index 000000000..61f2003c8
+userdom_use_user_terminals(iotop_t)
diff --git a/ipa.fc b/ipa.fc
new file mode 100644
-index 000000000..74206edcb
+index 000000000..61fd84f00
--- /dev/null
+++ b/ipa.fc
@@ -0,0 +1,29 @@
@@ -40057,7 +40187,7 @@ index 000000000..74206edcb
+
+/var/log/ipa(/.*)? gen_context(system_u:object_r:ipa_log_t,s0)
+
-+/var/log/ipareplica-conncheck.log -- gen_context(system_u:object_r:ipa_log_t,s0)
++/var/log/ipareplica-conncheck.log.* -- gen_context(system_u:object_r:ipa_log_t,s0)
+
+/var/run/ipa(/.*)? gen_context(system_u:object_r:ipa_var_run_t,s0)
+
@@ -43698,10 +43828,10 @@ index 000000000..bd7e7fa17
+')
diff --git a/keepalived.te b/keepalived.te
new file mode 100644
-index 000000000..e5b8b3bbf
+index 000000000..f84877209
--- /dev/null
+++ b/keepalived.te
-@@ -0,0 +1,100 @@
+@@ -0,0 +1,101 @@
+policy_module(keepalived, 1.0.0)
+
+########################################
@@ -43743,6 +43873,7 @@ index 000000000..e5b8b3bbf
+kernel_read_network_state(keepalived_t)
+kernel_request_load_module(keepalived_t)
+kernel_rw_usermodehelper_state(keepalived_t)
++kernel_search_network_sysctl(keepalived_t)
+
+auth_use_nsswitch(keepalived_t)
+
@@ -46465,7 +46596,7 @@ index 73e2803ee..34ca3aa22 100644
role_transition $2 l2tpd_initrc_exec_t system_r;
allow $2 system_r;
diff --git a/l2tp.te b/l2tp.te
-index bb06a7fee..01e784bf5 100644
+index bb06a7fee..3339bd85c 100644
--- a/l2tp.te
+++ b/l2tp.te
@@ -27,7 +27,7 @@ files_pid_file(l2tpd_var_run_t)
@@ -46492,7 +46623,7 @@ index bb06a7fee..01e784bf5 100644
corenet_all_recvfrom_unlabeled(l2tpd_t)
corenet_all_recvfrom_netlabel(l2tpd_t)
corenet_raw_sendrecv_generic_if(l2tpd_t)
-@@ -75,19 +77,37 @@ corecmd_exec_bin(l2tpd_t)
+@@ -75,19 +77,38 @@ corecmd_exec_bin(l2tpd_t)
dev_read_urand(l2tpd_t)
@@ -46524,6 +46655,7 @@ index bb06a7fee..01e784bf5 100644
+ ipsec_mgmt_read_pid(l2tpd_t)
+ ipsec_filetrans_key_file(l2tpd_t)
+ ipsec_manage_key_file(l2tpd_t)
++ ipsec_kill_mgmt(l2tpd_t)
+')
+
+optional_policy(`
@@ -46812,7 +46944,7 @@ index 3602712d0..af83a5b6b 100644
+ allow $1 slapd_unit_file_t:service all_service_perms;
')
diff --git a/ldap.te b/ldap.te
-index 4c2b1110e..7b306e4bb 100644
+index 4c2b1110e..f01469806 100644
--- a/ldap.te
+++ b/ldap.te
@@ -21,6 +21,9 @@ files_config_file(slapd_etc_t)
@@ -46837,7 +46969,15 @@ index 4c2b1110e..7b306e4bb 100644
allow slapd_t self:fifo_file rw_fifo_file_perms;
allow slapd_t self:tcp_socket { accept listen };
-@@ -69,9 +72,7 @@ allow slapd_t slapd_lock_t:file manage_file_perms;
+@@ -60,6 +63,7 @@ read_lnk_files_pattern(slapd_t, slapd_cert_t, slapd_cert_t)
+ manage_dirs_pattern(slapd_t, slapd_db_t, slapd_db_t)
+ manage_files_pattern(slapd_t, slapd_db_t, slapd_db_t)
+ manage_lnk_files_pattern(slapd_t, slapd_db_t, slapd_db_t)
++allow slapd_t slapd_db_t:file map;
+
+ allow slapd_t slapd_etc_t:file read_file_perms;
+
+@@ -69,9 +73,7 @@ allow slapd_t slapd_lock_t:file manage_file_perms;
files_lock_filetrans(slapd_t, slapd_lock_t, file)
manage_dirs_pattern(slapd_t, slapd_log_t, slapd_log_t)
@@ -46848,7 +46988,7 @@ index 4c2b1110e..7b306e4bb 100644
logging_log_filetrans(slapd_t, slapd_log_t, { file dir })
manage_dirs_pattern(slapd_t, slapd_replog_t, slapd_replog_t)
-@@ -93,7 +94,6 @@ files_pid_filetrans(slapd_t, slapd_var_run_t, { dir file sock_file })
+@@ -93,7 +95,6 @@ files_pid_filetrans(slapd_t, slapd_var_run_t, { dir file sock_file })
kernel_read_system_state(slapd_t)
kernel_read_kernel_sysctls(slapd_t)
@@ -46856,7 +46996,7 @@ index 4c2b1110e..7b306e4bb 100644
corenet_all_recvfrom_netlabel(slapd_t)
corenet_tcp_sendrecv_generic_if(slapd_t)
corenet_tcp_sendrecv_generic_node(slapd_t)
-@@ -115,25 +115,26 @@ fs_getattr_all_fs(slapd_t)
+@@ -115,25 +116,26 @@ fs_getattr_all_fs(slapd_t)
fs_search_auto_mountpoints(slapd_t)
files_read_etc_runtime_files(slapd_t)
@@ -63258,7 +63398,7 @@ index bcd7d0a7d..9b397fdd7 100644
+ unconfined_dontaudit_rw_packet_sockets(nscd_t)
+')
diff --git a/nsd.fc b/nsd.fc
-index 4f2b1b663..6b300d54f 100644
+index 4f2b1b663..0e24b49a9 100644
--- a/nsd.fc
+++ b/nsd.fc
@@ -1,16 +1,19 @@
@@ -63290,7 +63430,7 @@ index 4f2b1b663..6b300d54f 100644
+/var/lib/nsd(/.*)? gen_context(system_u:object_r:nsd_zone_t,s0)
/var/run/nsd\.pid -- gen_context(system_u:object_r:nsd_var_run_t,s0)
+
-+/var/log/nsd\.log -- gen_context(system_u:object_r:nsd_log_t,s0)
++/var/log/nsd\.log.* -- gen_context(system_u:object_r:nsd_log_t,s0)
diff --git a/nsd.if b/nsd.if
index a9c60ff87..ad4f14ad6 100644
--- a/nsd.if
@@ -69407,7 +69547,7 @@ index 9b157305b..cb00f200a 100644
+ ')
')
diff --git a/openvswitch.te b/openvswitch.te
-index 44dbc99ab..7bcb16c59 100644
+index 44dbc99ab..6221f5b9a 100644
--- a/openvswitch.te
+++ b/openvswitch.te
@@ -9,11 +9,8 @@ type openvswitch_t;
@@ -69439,7 +69579,7 @@ index 44dbc99ab..7bcb16c59 100644
-allow openvswitch_t self:capability { net_admin sys_nice sys_resource ipc_lock };
-allow openvswitch_t self:process { setrlimit setsched signal };
-+allow openvswitch_t self:capability { dac_override net_admin ipc_lock sys_module sys_nice sys_rawio sys_resource chown setgid setpcap setuid };
++allow openvswitch_t self:capability { dac_override dac_read_search net_admin ipc_lock sys_module sys_nice sys_rawio sys_resource chown setgid setpcap setuid kill };
+allow openvswitch_t self:capability2 block_suspend;
+allow openvswitch_t self:process { fork setsched setrlimit signal setcap };
allow openvswitch_t self:fifo_file rw_fifo_file_perms;
@@ -82044,7 +82184,7 @@ index 7cb8b1f9c..bef72173b 100644
+ allow $1 puppet_var_run_t:dir search_dir_perms;
')
diff --git a/puppet.te b/puppet.te
-index 618dcfeed..5bd88a99d 100644
+index 618dcfeed..56b9252c6 100644
--- a/puppet.te
+++ b/puppet.te
@@ -6,25 +6,32 @@ policy_module(puppet, 1.4.0)
@@ -82106,7 +82246,7 @@ index 618dcfeed..5bd88a99d 100644
type puppetmaster_t;
type puppetmaster_exec_t;
-@@ -56,161 +62,174 @@ files_tmp_file(puppetmaster_tmp_t)
+@@ -56,161 +62,178 @@ files_tmp_file(puppetmaster_tmp_t)
########################################
#
@@ -82305,53 +82445,49 @@ index 618dcfeed..5bd88a99d 100644
+
+optional_policy(`
+ mysql_stream_connect(puppetagent_t)
++')
++
++optional_policy(`
++ postgresql_stream_connect(puppetagent_t)
++')
++
++optional_policy(`
++ cfengine_read_lib_files(puppetagent_t)
++')
++
++optional_policy(`
++ consoletype_exec(puppetagent_t)
')
optional_policy(`
- cfengine_read_lib_files(puppet_t)
-+ postgresql_stream_connect(puppetagent_t)
++ hostname_exec(puppetagent_t)
')
optional_policy(`
- consoletype_exec(puppet_t)
-+ cfengine_read_lib_files(puppetagent_t)
++ mount_domtrans(puppetagent_t)
')
optional_policy(`
- hostname_exec(puppet_t)
-+ consoletype_exec(puppetagent_t)
++ mta_send_mail(puppetagent_t)
')
optional_policy(`
- mount_domtrans(puppet_t)
-+ hostname_exec(puppetagent_t)
++ networkmanager_dbus_chat(puppetagent_t)
')
optional_policy(`
- mta_send_mail(puppet_t)
-+ mount_domtrans(puppetagent_t)
++ firewalld_dbus_chat(puppetagent_t)
')
optional_policy(`
- portage_domtrans(puppet_t)
- portage_domtrans_fetch(puppet_t)
- portage_domtrans_gcc_config(puppet_t)
-+ mta_send_mail(puppetagent_t)
- ')
-
- optional_policy(`
-- files_rw_var_files(puppet_t)
-+ networkmanager_dbus_chat(puppetagent_t)
-+')
-+
-+optional_policy(`
-+ firewalld_dbus_chat(puppetagent_t)
-+')
-
-- rpm_domtrans(puppet_t)
-- rpm_manage_db(puppet_t)
-- rpm_manage_log(puppet_t)
-+optional_policy(`
+ portage_domtrans(puppetagent_t)
+ portage_domtrans_fetch(puppetagent_t)
+ portage_domtrans_gcc_config(puppetagent_t)
@@ -82363,21 +82499,29 @@ index 618dcfeed..5bd88a99d 100644
+ rpm_domtrans(puppetagent_t)
+ rpm_manage_db(puppetagent_t)
+ rpm_manage_log(puppetagent_t)
+ ')
+
+ optional_policy(`
+- files_rw_var_files(puppet_t)
++ shorewall_domtrans(puppetagent_t)
+')
-+
+
+- rpm_domtrans(puppet_t)
+- rpm_manage_db(puppet_t)
+- rpm_manage_log(puppet_t)
+optional_policy(`
-+ shorewall_domtrans(puppetagent_t)
++ unconfined_domain_noaudit(puppetagent_t)
')
optional_policy(`
- unconfined_domain(puppet_t)
-+ unconfined_domain_noaudit(puppetagent_t)
++ shorewall_domtrans(puppet_t)
')
optional_policy(`
- usermanage_domtrans_groupadd(puppet_t)
- usermanage_domtrans_useradd(puppet_t)
-+ shorewall_domtrans(puppet_t)
++ rhsmcertd_dbus_chat(puppetagent_t)
')
########################################
@@ -82398,7 +82542,7 @@ index 618dcfeed..5bd88a99d 100644
allow puppetca_t puppet_var_lib_t:dir list_dir_perms;
manage_files_pattern(puppetca_t, puppet_var_lib_t, puppet_var_lib_t)
-@@ -221,6 +240,7 @@ allow puppetca_t puppet_log_t:dir search_dir_perms;
+@@ -221,6 +244,7 @@ allow puppetca_t puppet_log_t:dir search_dir_perms;
allow puppetca_t puppet_var_run_t:dir search_dir_perms;
kernel_read_system_state(puppetca_t)
@@ -82406,7 +82550,7 @@ index 618dcfeed..5bd88a99d 100644
kernel_read_kernel_sysctls(puppetca_t)
corecmd_exec_bin(puppetca_t)
-@@ -229,15 +249,12 @@ corecmd_exec_shell(puppetca_t)
+@@ -229,15 +253,12 @@ corecmd_exec_shell(puppetca_t)
dev_read_urand(puppetca_t)
dev_search_sysfs(puppetca_t)
@@ -82422,7 +82566,7 @@ index 618dcfeed..5bd88a99d 100644
miscfiles_read_generic_certs(puppetca_t)
seutil_read_file_contexts(puppetca_t)
-@@ -246,38 +263,48 @@ optional_policy(`
+@@ -246,38 +267,48 @@ optional_policy(`
hostname_exec(puppetca_t)
')
@@ -82488,7 +82632,7 @@ index 618dcfeed..5bd88a99d 100644
kernel_dontaudit_search_kernel_sysctl(puppetmaster_t)
kernel_read_network_state(puppetmaster_t)
-@@ -289,23 +316,24 @@ corecmd_exec_bin(puppetmaster_t)
+@@ -289,23 +320,24 @@ corecmd_exec_bin(puppetmaster_t)
corecmd_exec_shell(puppetmaster_t)
corenet_all_recvfrom_netlabel(puppetmaster_t)
@@ -82519,7 +82663,7 @@ index 618dcfeed..5bd88a99d 100644
selinux_validate_context(puppetmaster_t)
-@@ -314,26 +342,32 @@ auth_use_nsswitch(puppetmaster_t)
+@@ -314,26 +346,32 @@ auth_use_nsswitch(puppetmaster_t)
logging_send_syslog_msg(puppetmaster_t)
miscfiles_read_generic_certs(puppetmaster_t)
@@ -82557,7 +82701,7 @@ index 618dcfeed..5bd88a99d 100644
')
optional_policy(`
-@@ -342,3 +376,9 @@ optional_policy(`
+@@ -342,3 +380,9 @@ optional_policy(`
rpm_exec(puppetmaster_t)
rpm_read_db(puppetmaster_t)
')
@@ -108436,10 +108580,10 @@ index 27a8480bc..fc3fca520 100644
+
allow stunnel_t stunnel_port_t:tcp_socket name_bind;
diff --git a/svnserve.fc b/svnserve.fc
-index effffd028..12ca090e1 100644
+index effffd028..0d5c275de 100644
--- a/svnserve.fc
+++ b/svnserve.fc
-@@ -1,8 +1,13 @@
+@@ -1,8 +1,15 @@
-/etc/rc\.d/init\.d/svnserve -- gen_context(system_u:object_r:svnserve_initrc_exec_t,s0)
+/etc/rc.d/init.d/svnserve -- gen_context(system_u:object_r:svnserve_initrc_exec_t,s0)
@@ -108458,6 +108602,8 @@ index effffd028..12ca090e1 100644
+/var/svn(/.*)? gen_context(system_u:object_r:svnserve_content_t,s0)
+/var/subversion/repo(/.*)? gen_context(system_u:object_r:svnserve_content_t,s0)
+/var/lib/subversion/repo(/.*)? gen_context(system_u:object_r:svnserve_content_t,s0)
++
++/var/log/svnserve(/.*)? gen_context(system_u:object_r:svnserve_log_t,s0)
diff --git a/svnserve.if b/svnserve.if
index 2ac91b6e0..a97033d2b 100644
--- a/svnserve.if
@@ -108596,10 +108742,10 @@ index 2ac91b6e0..a97033d2b 100644
')
+
diff --git a/svnserve.te b/svnserve.te
-index 49d688d66..451a64768 100644
+index 49d688d66..f7e23fe71 100644
--- a/svnserve.te
+++ b/svnserve.te
-@@ -12,12 +12,18 @@ init_daemon_domain(svnserve_t, svnserve_exec_t)
+@@ -12,12 +12,21 @@ init_daemon_domain(svnserve_t, svnserve_exec_t)
type svnserve_initrc_exec_t;
init_script_file(svnserve_initrc_exec_t)
@@ -108615,10 +108761,13 @@ index 49d688d66..451a64768 100644
+type svnserve_tmp_t;
+files_tmp_file(svnserve_tmp_t)
+
++type svnserve_log_t;
++logging_log_file(svnserve_log_t)
++
########################################
#
# Local policy
-@@ -27,6 +33,11 @@ allow svnserve_t self:fifo_file rw_fifo_file_perms;
+@@ -27,6 +36,11 @@ allow svnserve_t self:fifo_file rw_fifo_file_perms;
allow svnserve_t self:tcp_socket create_stream_socket_perms;
allow svnserve_t self:unix_stream_socket { listen accept };
@@ -108630,17 +108779,19 @@ index 49d688d66..451a64768 100644
manage_dirs_pattern(svnserve_t, svnserve_content_t, svnserve_content_t)
manage_files_pattern(svnserve_t, svnserve_content_t, svnserve_content_t)
-@@ -34,9 +45,6 @@ manage_dirs_pattern(svnserve_t, svnserve_var_run_t, svnserve_var_run_t)
+@@ -34,8 +48,9 @@ manage_dirs_pattern(svnserve_t, svnserve_var_run_t, svnserve_var_run_t)
manage_files_pattern(svnserve_t, svnserve_var_run_t, svnserve_var_run_t)
files_pid_filetrans(svnserve_t, svnserve_var_run_t, { dir file })
-files_read_etc_files(svnserve_t)
-files_read_usr_files(svnserve_t)
--
++manage_files_pattern(svnserve_t, svnserve_log_t, svnserve_log_t)
++manage_dirs_pattern(svnserve_t, svnserve_log_t, svnserve_log_t)
++logging_log_filetrans(svnserve_t, svnserve_log_t, { dir file })
+
corenet_all_recvfrom_unlabeled(svnserve_t)
corenet_all_recvfrom_netlabel(svnserve_t)
- corenet_tcp_sendrecv_generic_if(svnserve_t)
-@@ -52,8 +60,9 @@ corenet_tcp_sendrecv_svn_port(svnserve_t)
+@@ -52,8 +67,13 @@ corenet_tcp_sendrecv_svn_port(svnserve_t)
corenet_udp_bind_svn_port(svnserve_t)
corenet_udp_sendrecv_svn_port(svnserve_t)
@@ -108652,6 +108803,10 @@ index 49d688d66..451a64768 100644
+logging_send_syslog_msg(svnserve_t)
sysnet_dns_name_resolve(svnserve_t)
++
++optional_policy(`
++ kerberos_use(svnserve_t)
++')
diff --git a/swift.fc b/swift.fc
new file mode 100644
index 000000000..6d897bc25
@@ -111616,10 +111771,10 @@ index 000000000..9524b50aa
+')
diff --git a/thumb.te b/thumb.te
new file mode 100644
-index 000000000..2b15dca23
+index 000000000..d6affa561
--- /dev/null
+++ b/thumb.te
-@@ -0,0 +1,172 @@
+@@ -0,0 +1,173 @@
+policy_module(thumb, 1.0.0)
+
+########################################
@@ -111670,6 +111825,7 @@ index 000000000..2b15dca23
+manage_files_pattern(thumb_t, thumb_home_t, thumb_home_t)
+userdom_user_home_dir_filetrans(thumb_t, thumb_home_t, dir, ".thumbnails")
+userdom_user_home_dir_filetrans(thumb_t, thumb_home_t, file, "missfont.log")
++userdom_user_home_dir_filetrans(thumb_t, thumb_home_t, file)
+userdom_dontaudit_access_check_user_content(thumb_t)
+userdom_rw_inherited_user_tmp_files(thumb_t)
+userdom_manage_home_texlive(thumb_t)
@@ -112173,10 +112329,10 @@ index 000000000..5185a9e8e
+ sssd_stream_connect(tlp_t)
+')
diff --git a/tmpreaper.te b/tmpreaper.te
-index 585a77f95..9858c8b8d 100644
+index 585a77f95..71981be9d 100644
--- a/tmpreaper.te
+++ b/tmpreaper.te
-@@ -5,20 +5,46 @@ policy_module(tmpreaper, 1.7.1)
+@@ -5,20 +5,47 @@ policy_module(tmpreaper, 1.7.1)
# Declarations
#
@@ -112208,6 +112364,7 @@ index 585a77f95..9858c8b8d 100644
type tmpreaper_exec_t;
init_system_domain(tmpreaper_t, tmpreaper_exec_t)
+application_domain(tmpreaper_t, tmpreaper_exec_t)
++init_nnp_daemon_domain(tmpreaper_t)
########################################
#
@@ -112224,7 +112381,7 @@ index 585a77f95..9858c8b8d 100644
dev_read_urand(tmpreaper_t)
-@@ -27,15 +53,16 @@ corecmd_exec_shell(tmpreaper_t)
+@@ -27,15 +54,16 @@ corecmd_exec_shell(tmpreaper_t)
fs_getattr_xattr_fs(tmpreaper_t)
fs_list_all(tmpreaper_t)
@@ -112246,7 +112403,7 @@ index 585a77f95..9858c8b8d 100644
mls_file_read_all_levels(tmpreaper_t)
mls_file_write_all_levels(tmpreaper_t)
-@@ -45,7 +72,6 @@ init_use_inherited_script_ptys(tmpreaper_t)
+@@ -45,7 +73,6 @@ init_use_inherited_script_ptys(tmpreaper_t)
logging_send_syslog_msg(tmpreaper_t)
@@ -112254,7 +112411,7 @@ index 585a77f95..9858c8b8d 100644
miscfiles_delete_man_pages(tmpreaper_t)
ifdef(`distro_debian',`
-@@ -53,10 +79,33 @@ ifdef(`distro_debian',`
+@@ -53,10 +80,33 @@ ifdef(`distro_debian',`
')
ifdef(`distro_redhat',`
@@ -112289,7 +112446,7 @@ index 585a77f95..9858c8b8d 100644
')
optional_policy(`
-@@ -64,6 +113,7 @@ optional_policy(`
+@@ -64,6 +114,7 @@ optional_policy(`
')
optional_policy(`
@@ -112297,7 +112454,7 @@ index 585a77f95..9858c8b8d 100644
apache_list_cache(tmpreaper_t)
apache_delete_cache_dirs(tmpreaper_t)
apache_delete_cache_files(tmpreaper_t)
-@@ -79,7 +129,19 @@ optional_policy(`
+@@ -79,7 +130,19 @@ optional_policy(`
')
optional_policy(`
@@ -112318,7 +112475,7 @@ index 585a77f95..9858c8b8d 100644
')
optional_policy(`
-@@ -89,3 +151,8 @@ optional_policy(`
+@@ -89,3 +152,8 @@ optional_policy(`
optional_policy(`
rpm_manage_cache(tmpreaper_t)
')
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 3286d6b..01b8a40 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.13.1
-Release: 298%{?dist}
+Release: 299%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -719,6 +719,32 @@ exit 0
%endif
%changelog
+* Tue Oct 24 2017 Lukas Vrabec