diff --git a/container-selinux.tgz b/container-selinux.tgz
index b3dd705..7e7df53 100644
Binary files a/container-selinux.tgz and b/container-selinux.tgz differ
diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch
index e04a90c..9f3f960 100644
--- a/policy-rawhide-base.patch
+++ b/policy-rawhide-base.patch
@@ -1,5 +1,5 @@
diff --git a/.gitmodules b/.gitmodules
-index 360bd03..e794aa3 100644
+index 360bd0388..e794aa369 100644
--- a/.gitmodules
+++ b/.gitmodules
@@ -1,3 +1,4 @@
@@ -9,7 +9,7 @@ index 360bd03..e794aa3 100644
+ url = https://github.com/fedora-selinux/selinux-policy-contrib
+ branch = rawhide
diff --git a/Makefile b/Makefile
-index ec7b5cb..e2936c6 100644
+index ec7b5cba8..673db6491 100644
--- a/Makefile
+++ b/Makefile
@@ -61,6 +61,7 @@ SEMODULE ?= $(tc_usrsbindir)/semodule
@@ -29,6 +29,15 @@ index ec7b5cb..e2936c6 100644
net_contexts := $(builddir)net_contexts
all_layers := $(shell find $(wildcard $(moddir)/*) -maxdepth 0 -type d)
+@@ -365,7 +366,7 @@ $(moddir)/kernel/corenetwork.if: $(moddir)/kernel/corenetwork.te.in $(moddir)/ke
+ @echo "# $(notdir $@).in or $(notdir $@).m4 file should be modified." >> $@
+ @echo "#" >> $@
+ $(verbose) cat $@.in >> $@
+- $(verbose) $(GREP) "^[[:blank:]]*network_(interface|node|port|packet)(_controlled)?\(.*\)" $< \
++ $(verbose) $(GREP) "^[[:blank:]]*(network_(interface|node|port|packet)(_controlled)?)|ib_(pkey|endport)\(.*\)" $< \
+ | $(M4) -D self_contained_policy $(M4PARAM) $(m4divert) $@.m4 $(m4undivert) - \
+ | $(SED) -e 's/dollarsone/\$$1/g' -e 's/dollarszero/\$$0/g' >> $@
+
@@ -609,15 +610,16 @@ resetlabels:
# Clean everything
#
@@ -56,7 +65,7 @@ index ec7b5cb..e2936c6 100644
ifndef LOCAL_ROOT
rm -f $(fcsort)
diff --git a/Rules.modular b/Rules.modular
-index 313d837..4f261a9 100644
+index 313d8375b..1e92c7d5d 100644
--- a/Rules.modular
+++ b/Rules.modular
@@ -71,7 +71,7 @@ $(modpkgdir)/%.pp: $(builddir)%.pp
@@ -68,7 +77,16 @@ index 313d837..4f261a9 100644
@test -d $(tmpdir) || mkdir -p $(tmpdir)
$(verbose) $(M4) $(M4PARAM) -s $^ > $(@:.mod=.tmp)
$(verbose) $(CHECKMODULE) -m $(@:.mod=.tmp) -o $@
-@@ -201,6 +201,7 @@ validate: $(base_pkg) $(mod_pkgs)
+@@ -168,6 +168,8 @@ $(tmpdir)/all_attrs_types.conf $(tmpdir)/only_te_rules.conf $(tmpdir)/all_post.c
+ $(verbose) $(GREP) ^netifcon $(tmpdir)/all_te_files.conf >> $(tmpdir)/all_post.conf || true
+ $(verbose) $(GREP) ^nodecon $(tmpdir)/all_te_files.conf >> $(tmpdir)/all_post.conf || true
+ $(verbose) $(comment_move_decl) $(tmpdir)/all_te_files.conf > $(tmpdir)/only_te_rules.conf
++ $(verbose) $(GREP) ^ibpkeycon $(tmpdir)/all_te_files.conf >> $@ || true
++ $(verbose) $(GREP) ^ibendportcon $(tmpdir)/all_te_files.conf >> $@ || true
+
+ ########################################
+ #
+@@ -201,6 +203,7 @@ validate: $(base_pkg) $(mod_pkgs)
@echo "Validating policy linking."
$(verbose) $(SEMOD_LNK) -o $(tmpdir)/test.lnk $^
$(verbose) $(SEMOD_EXP) $(tmpdir)/test.lnk $(tmpdir)/policy.bin
@@ -76,8 +94,21 @@ index 313d837..4f261a9 100644
@echo "Success."
########################################
+diff --git a/Rules.monolithic b/Rules.monolithic
+index 808a5398a..77f71cd95 100644
+--- a/Rules.monolithic
++++ b/Rules.monolithic
+@@ -155,6 +155,8 @@ $(tmpdir)/all_attrs_types.conf $(tmpdir)/only_te_rules.conf $(tmpdir)/all_post.c
+ $(verbose) $(GREP) ^netifcon $(tmpdir)/all_te_files.conf >> $(tmpdir)/all_post.conf || true
+ $(verbose) $(GREP) ^nodecon $(tmpdir)/all_te_files.conf >> $(tmpdir)/all_post.conf || true
+ $(verbose) $(comment_move_decl) $(tmpdir)/all_te_files.conf > $(tmpdir)/only_te_rules.conf
++ $(verbose) $(GREP) ^ibpkeycon $(tmpdir)/all_te_files.conf >> $@ || true
++ $(verbose) $(GREP) ^ibendportcon $(tmpdir)/all_te_files.conf >> $@ || true
+
+ ########################################
+ #
diff --git a/config/appconfig-mcs/default_contexts b/config/appconfig-mcs/default_contexts
-index 801d97b..698d54c 100644
+index 801d97b6f..698d54ce8 100644
--- a/config/appconfig-mcs/default_contexts
+++ b/config/appconfig-mcs/default_contexts
@@ -1,4 +1,4 @@
@@ -88,13 +119,13 @@ index 801d97b..698d54c 100644
system_r:sshd_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0
diff --git a/config/appconfig-mcs/openssh_contexts b/config/appconfig-mcs/openssh_contexts
new file mode 100644
-index 0000000..6de0b01
+index 000000000..6de0b016d
--- /dev/null
+++ b/config/appconfig-mcs/openssh_contexts
@@ -0,0 +1 @@
+privsep_preauth=sshd_net_t
diff --git a/config/appconfig-mcs/staff_u_default_contexts b/config/appconfig-mcs/staff_u_default_contexts
-index 881a292..5606c4e 100644
+index 881a292e3..5606c4ea6 100644
--- a/config/appconfig-mcs/staff_u_default_contexts
+++ b/config/appconfig-mcs/staff_u_default_contexts
@@ -1,7 +1,7 @@
@@ -108,7 +139,7 @@ index 881a292..5606c4e 100644
staff_r:staff_sudo_t:s0 staff_r:staff_t:s0
diff --git a/config/appconfig-mcs/sysadm_u_default_contexts b/config/appconfig-mcs/sysadm_u_default_contexts
new file mode 100644
-index 0000000..b8fda95
+index 000000000..b8fda9543
--- /dev/null
+++ b/config/appconfig-mcs/sysadm_u_default_contexts
@@ -0,0 +1,12 @@
@@ -126,13 +157,13 @@ index 0000000..b8fda95
+
diff --git a/config/appconfig-mcs/systemd_contexts b/config/appconfig-mcs/systemd_contexts
new file mode 100644
-index 0000000..ff32acc
+index 000000000..ff32accd1
--- /dev/null
+++ b/config/appconfig-mcs/systemd_contexts
@@ -0,0 +1 @@
+runtime=system_u:object_r:systemd_runtime_unit_file_t:s0
diff --git a/config/appconfig-mcs/user_u_default_contexts b/config/appconfig-mcs/user_u_default_contexts
-index cacbc93..56d6071 100644
+index cacbc939f..56d6071c2 100644
--- a/config/appconfig-mcs/user_u_default_contexts
+++ b/config/appconfig-mcs/user_u_default_contexts
@@ -1,7 +1,7 @@
@@ -145,14 +176,14 @@ index cacbc93..56d6071 100644
user_r:user_su_t:s0 user_r:user_t:s0
user_r:user_sudo_t:s0 user_r:user_t:s0
diff --git a/config/appconfig-mcs/virtual_domain_context b/config/appconfig-mcs/virtual_domain_context
-index d387b42..150f281 100644
+index d387b428b..150f281d1 100644
--- a/config/appconfig-mcs/virtual_domain_context
+++ b/config/appconfig-mcs/virtual_domain_context
@@ -1 +1,2 @@
system_u:system_r:svirt_t:s0
+system_u:system_r:svirt_tcg_t:s0
diff --git a/config/appconfig-mls/default_contexts b/config/appconfig-mls/default_contexts
-index 801d97b..698d54c 100644
+index 801d97b6f..698d54ce8 100644
--- a/config/appconfig-mls/default_contexts
+++ b/config/appconfig-mls/default_contexts
@@ -1,4 +1,4 @@
@@ -163,13 +194,13 @@ index 801d97b..698d54c 100644
system_r:sshd_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0
diff --git a/config/appconfig-mls/openssh_contexts b/config/appconfig-mls/openssh_contexts
new file mode 100644
-index 0000000..6de0b01
+index 000000000..6de0b016d
--- /dev/null
+++ b/config/appconfig-mls/openssh_contexts
@@ -0,0 +1 @@
+privsep_preauth=sshd_net_t
diff --git a/config/appconfig-mls/staff_u_default_contexts b/config/appconfig-mls/staff_u_default_contexts
-index 881a292..5606c4e 100644
+index 881a292e3..5606c4ea6 100644
--- a/config/appconfig-mls/staff_u_default_contexts
+++ b/config/appconfig-mls/staff_u_default_contexts
@@ -1,7 +1,7 @@
@@ -183,13 +214,13 @@ index 881a292..5606c4e 100644
staff_r:staff_sudo_t:s0 staff_r:staff_t:s0
diff --git a/config/appconfig-mls/systemd_contexts b/config/appconfig-mls/systemd_contexts
new file mode 100644
-index 0000000..ff32acc
+index 000000000..ff32accd1
--- /dev/null
+++ b/config/appconfig-mls/systemd_contexts
@@ -0,0 +1 @@
+runtime=system_u:object_r:systemd_runtime_unit_file_t:s0
diff --git a/config/appconfig-mls/user_u_default_contexts b/config/appconfig-mls/user_u_default_contexts
-index cacbc93..56d6071 100644
+index cacbc939f..56d6071c2 100644
--- a/config/appconfig-mls/user_u_default_contexts
+++ b/config/appconfig-mls/user_u_default_contexts
@@ -1,7 +1,7 @@
@@ -202,7 +233,7 @@ index cacbc93..56d6071 100644
user_r:user_su_t:s0 user_r:user_t:s0
user_r:user_sudo_t:s0 user_r:user_t:s0
diff --git a/config/appconfig-standard/default_contexts b/config/appconfig-standard/default_contexts
-index 64a0a90..25ee341 100644
+index 64a0a90c3..25ee341c1 100644
--- a/config/appconfig-standard/default_contexts
+++ b/config/appconfig-standard/default_contexts
@@ -1,4 +1,4 @@
@@ -213,13 +244,13 @@ index 64a0a90..25ee341 100644
system_r:sshd_t user_r:user_t staff_r:staff_t sysadm_r:sysadm_t unconfined_r:unconfined_t
diff --git a/config/appconfig-standard/openssh_contexts b/config/appconfig-standard/openssh_contexts
new file mode 100644
-index 0000000..6de0b01
+index 000000000..6de0b016d
--- /dev/null
+++ b/config/appconfig-standard/openssh_contexts
@@ -0,0 +1 @@
+privsep_preauth=sshd_net_t
diff --git a/config/appconfig-standard/staff_u_default_contexts b/config/appconfig-standard/staff_u_default_contexts
-index c2a5ea8..300694c 100644
+index c2a5ea871..300694ce8 100644
--- a/config/appconfig-standard/staff_u_default_contexts
+++ b/config/appconfig-standard/staff_u_default_contexts
@@ -1,7 +1,7 @@
@@ -233,7 +264,7 @@ index c2a5ea8..300694c 100644
staff_r:staff_sudo_t staff_r:staff_t
diff --git a/config/appconfig-standard/sysadm_u_default_contexts b/config/appconfig-standard/sysadm_u_default_contexts
new file mode 100644
-index 0000000..b8fda95
+index 000000000..b8fda9543
--- /dev/null
+++ b/config/appconfig-standard/sysadm_u_default_contexts
@@ -0,0 +1,12 @@
@@ -251,13 +282,13 @@ index 0000000..b8fda95
+
diff --git a/config/appconfig-standard/systemd_contexts b/config/appconfig-standard/systemd_contexts
new file mode 100644
-index 0000000..ff32acc
+index 000000000..ff32accd1
--- /dev/null
+++ b/config/appconfig-standard/systemd_contexts
@@ -0,0 +1 @@
+runtime=system_u:object_r:systemd_runtime_unit_file_t:s0
diff --git a/config/appconfig-standard/user_u_default_contexts b/config/appconfig-standard/user_u_default_contexts
-index f5bfac3..63b7eec 100644
+index f5bfac34a..63b7eecd1 100644
--- a/config/appconfig-standard/user_u_default_contexts
+++ b/config/appconfig-standard/user_u_default_contexts
@@ -1,7 +1,7 @@
@@ -270,7 +301,7 @@ index f5bfac3..63b7eec 100644
user_r:user_su_t user_r:user_t
user_r:user_sudo_t user_r:user_t
diff --git a/config/appconfig-standard/virtual_domain_context b/config/appconfig-standard/virtual_domain_context
-index c049e10..150f281 100644
+index c049e104b..150f281d1 100644
--- a/config/appconfig-standard/virtual_domain_context
+++ b/config/appconfig-standard/virtual_domain_context
@@ -1 +1,2 @@
@@ -278,7 +309,7 @@ index c049e10..150f281 100644
+system_u:system_r:svirt_t:s0
+system_u:system_r:svirt_tcg_t:s0
diff --git a/config/file_contexts.subs_dist b/config/file_contexts.subs_dist
-index d392dec..4565e9b 100644
+index d392decfe..4565e9b87 100644
--- a/config/file_contexts.subs_dist
+++ b/config/file_contexts.subs_dist
@@ -19,3 +19,4 @@
@@ -288,7 +319,7 @@ index d392dec..4565e9b 100644
+/sbin /usr/sbin
diff --git a/man/man8/ftpd_selinux.8 b/man/man8/ftpd_selinux.8
deleted file mode 100644
-index 5bebd82..0000000
+index 5bebd82d4..000000000
--- a/man/man8/ftpd_selinux.8
+++ /dev/null
@@ -1,65 +0,0 @@
@@ -359,7 +390,7 @@ index 5bebd82..0000000
-selinux(8), ftpd(8), setsebool(8), semanage(8), restorecon(8)
diff --git a/man/man8/git_selinux.8 b/man/man8/git_selinux.8
deleted file mode 100644
-index e9c43b1..0000000
+index e9c43b190..000000000
--- a/man/man8/git_selinux.8
+++ /dev/null
@@ -1,109 +0,0 @@
@@ -474,7 +505,7 @@ index e9c43b1..0000000
-selinux(8), git(8), chcon(1), semodule(8), setsebool(8)
diff --git a/man/man8/httpd_selinux.8 b/man/man8/httpd_selinux.8
deleted file mode 100644
-index 16e8b13..0000000
+index 16e8b1323..000000000
--- a/man/man8/httpd_selinux.8
+++ /dev/null
@@ -1,120 +0,0 @@
@@ -600,7 +631,7 @@ index 16e8b13..0000000
-
diff --git a/man/man8/kerberos_selinux.8 b/man/man8/kerberos_selinux.8
deleted file mode 100644
-index a8f81c8..0000000
+index a8f81c8e7..000000000
--- a/man/man8/kerberos_selinux.8
+++ /dev/null
@@ -1,28 +0,0 @@
@@ -634,7 +665,7 @@ index a8f81c8..0000000
-selinux(8), kerberos(1), chcon(1), setsebool(8)
diff --git a/man/man8/named_selinux.8 b/man/man8/named_selinux.8
deleted file mode 100644
-index fce0b48..0000000
+index fce0b4815..000000000
--- a/man/man8/named_selinux.8
+++ /dev/null
@@ -1,30 +0,0 @@
@@ -670,7 +701,7 @@ index fce0b48..0000000
-
diff --git a/man/man8/nfs_selinux.8 b/man/man8/nfs_selinux.8
deleted file mode 100644
-index 8e30c4c..0000000
+index 8e30c4c65..000000000
--- a/man/man8/nfs_selinux.8
+++ /dev/null
@@ -1,31 +0,0 @@
@@ -707,14 +738,14 @@ index 8e30c4c..0000000
-selinux(8), chcon(1), setsebool(8)
diff --git a/man/man8/nis_selinux.8 b/man/man8/nis_selinux.8
deleted file mode 100644
-index 6271c95..0000000
+index 6271c951f..000000000
--- a/man/man8/nis_selinux.8
+++ /dev/null
@@ -1 +0,0 @@
-.so man8/ypbind_selinux.8
diff --git a/man/man8/rsync_selinux.8 b/man/man8/rsync_selinux.8
deleted file mode 100644
-index ad9ccf5..0000000
+index ad9ccf5cd..000000000
--- a/man/man8/rsync_selinux.8
+++ /dev/null
@@ -1,52 +0,0 @@
@@ -772,7 +803,7 @@ index ad9ccf5..0000000
-selinux(8), rsync(1), chcon(1), setsebool(8), semanage(8)
diff --git a/man/man8/samba_selinux.8 b/man/man8/samba_selinux.8
deleted file mode 100644
-index ca702c7..0000000
+index ca702c799..000000000
--- a/man/man8/samba_selinux.8
+++ /dev/null
@@ -1,56 +0,0 @@
@@ -834,7 +865,7 @@ index ca702c7..0000000
-selinux(8), samba(7), chcon(1), setsebool(8), semanage(8)
diff --git a/man/man8/ypbind_selinux.8 b/man/man8/ypbind_selinux.8
deleted file mode 100644
-index 5061a5f..0000000
+index 5061a5f04..000000000
--- a/man/man8/ypbind_selinux.8
+++ /dev/null
@@ -1,19 +0,0 @@
@@ -858,7 +889,7 @@ index 5061a5f..0000000
-.SH "SEE ALSO"
-selinux(8), ypbind(8), chcon(1), setsebool(8)
diff --git a/policy/constraints b/policy/constraints
-index 3a45f23..ee7d7b3 100644
+index 3a45f236b..ee7d7b392 100644
--- a/policy/constraints
+++ b/policy/constraints
@@ -105,6 +105,18 @@ constrain process { transition dyntransition noatsecure siginh rlimitinh }
@@ -896,7 +927,7 @@ index 3a45f23..ee7d7b3 100644
constrain socket_class_set { create relabelto relabelfrom }
(
diff --git a/policy/flask/access_vectors b/policy/flask/access_vectors
-index a94b169..536babe 100644
+index a94b16980..1c258d804 100644
--- a/policy/flask/access_vectors
+++ b/policy/flask/access_vectors
@@ -20,6 +20,7 @@ common file
@@ -1124,7 +1155,23 @@ index a94b169..536babe 100644
class x_pointer
inherits x_device
-@@ -865,3 +931,28 @@ inherits database
+@@ -859,9 +925,44 @@ inherits database
+ set_value
+ }
+
++class infiniband_pkey
++{
++ access
++}
++
++class infiniband_endport
++{
++ manage_subnet
++}
++
+ class db_language
+ inherits database
+ {
implement
execute
}
@@ -1154,10 +1201,10 @@ index a94b169..536babe 100644
+class cap2_userns
+inherits cap2
diff --git a/policy/flask/security_classes b/policy/flask/security_classes
-index 14a4799..3bd5d69 100644
+index 14a479911..1ffbfa3e8 100644
--- a/policy/flask/security_classes
+++ b/policy/flask/security_classes
-@@ -121,6 +121,18 @@ class kernel_service
+@@ -121,14 +121,43 @@ class kernel_service
class tun_socket
@@ -1176,7 +1223,14 @@ index 14a4799..3bd5d69 100644
# Still More SE-X Windows stuff
class x_pointer # userspace
class x_keyboard # userspace
-@@ -131,4 +143,17 @@ class db_view # userspace
+
++# Infiniband
++class infiniband_pkey
++class infiniband_endport
++
+ # More Database stuff
+ class db_schema # userspace
+ class db_view # userspace
class db_sequence # userspace
class db_language # userspace
@@ -1195,7 +1249,7 @@ index 14a4799..3bd5d69 100644
+
# FLASK
diff --git a/policy/global_booleans b/policy/global_booleans
-index 66e85ea..d02654d 100644
+index 66e85ea54..d02654d7f 100644
--- a/policy/global_booleans
+++ b/policy/global_booleans
@@ -6,7 +6,7 @@
@@ -1208,7 +1262,7 @@ index 66e85ea..d02654d 100644
## user domains.
##
diff --git a/policy/global_tunables b/policy/global_tunables
-index 4705ab6..b82865c 100644
+index 4705ab618..b82865c43 100644
--- a/policy/global_tunables
+++ b/policy/global_tunables
@@ -6,52 +6,59 @@
@@ -1339,7 +1393,7 @@ index 4705ab6..b82865c 100644
+##
+gen_tunable(mount_anyfile, false)
diff --git a/policy/mcs b/policy/mcs
-index 216b3d1..064ec83 100644
+index 216b3d125..064ec83b6 100644
--- a/policy/mcs
+++ b/policy/mcs
@@ -1,4 +1,6 @@
@@ -1461,7 +1515,7 @@ index 216b3d1..064ec83 100644
+
') dnl end enable_mcs
diff --git a/policy/mls b/policy/mls
-index f11e5e2..c67dbb9 100644
+index f11e5e2b7..c67dbb976 100644
--- a/policy/mls
+++ b/policy/mls
@@ -70,7 +70,9 @@ mlsconstrain { file lnk_file fifo_file } { create relabelto }
@@ -1565,7 +1619,7 @@ index f11e5e2..c67dbb9 100644
(( l1 eq l2 ) or
(( t1 == mlsdbwritetoclr ) and ( h1 dom l2 ) and ( l1 domby l2 )) or
diff --git a/policy/modules/admin/bootloader.fc b/policy/modules/admin/bootloader.fc
-index 2626ebf..5745bb2 100644
+index 2626ebf95..5745bb240 100644
--- a/policy/modules/admin/bootloader.fc
+++ b/policy/modules/admin/bootloader.fc
@@ -1,11 +1,16 @@
@@ -1593,7 +1647,7 @@ index 2626ebf..5745bb2 100644
-/usr/sbin/grub2-probe -- gen_context(system_u:object_r:bootloader_exec_t,s0)
+/var/lib/os-prober(/.*)? gen_context(system_u:object_r:bootloader_var_lib_t,s0)
diff --git a/policy/modules/admin/bootloader.if b/policy/modules/admin/bootloader.if
-index cc8df9d..90467f3 100644
+index cc8df9d7d..90467f3af 100644
--- a/policy/modules/admin/bootloader.if
+++ b/policy/modules/admin/bootloader.if
@@ -19,6 +19,24 @@ interface(`bootloader_domtrans',`
@@ -1737,7 +1791,7 @@ index cc8df9d..90467f3 100644
+ files_etc_filetrans($1,bootloader_etc_t,file, "zipl.conf")
+')
diff --git a/policy/modules/admin/bootloader.te b/policy/modules/admin/bootloader.te
-index 0fd5c5f..a14addb 100644
+index 0fd5c5f2e..a14addb41 100644
--- a/policy/modules/admin/bootloader.te
+++ b/policy/modules/admin/bootloader.te
@@ -20,13 +20,20 @@ type bootloader_t;
@@ -1908,7 +1962,7 @@ index 0fd5c5f..a14addb 100644
+ udev_read_pid_files(bootloader_t)
')
diff --git a/policy/modules/admin/consoletype.fc b/policy/modules/admin/consoletype.fc
-index b7f053b..5d4fc31 100644
+index b7f053bf6..5d4fc3188 100644
--- a/policy/modules/admin/consoletype.fc
+++ b/policy/modules/admin/consoletype.fc
@@ -1,2 +1,4 @@
@@ -1917,7 +1971,7 @@ index b7f053b..5d4fc31 100644
+
+/usr/sbin/consoletype -- gen_context(system_u:object_r:consoletype_exec_t,s0)
diff --git a/policy/modules/admin/consoletype.if b/policy/modules/admin/consoletype.if
-index 0f57d3b..655d07f 100644
+index 0f57d3bc0..655d07f01 100644
--- a/policy/modules/admin/consoletype.if
+++ b/policy/modules/admin/consoletype.if
@@ -19,10 +19,6 @@ interface(`consoletype_domtrans',`
@@ -1932,7 +1986,7 @@ index 0f57d3b..655d07f 100644
########################################
diff --git a/policy/modules/admin/consoletype.te b/policy/modules/admin/consoletype.te
-index cd5e005..247259a 100644
+index cd5e005ce..247259ac4 100644
--- a/policy/modules/admin/consoletype.te
+++ b/policy/modules/admin/consoletype.te
@@ -7,8 +7,8 @@ policy_module(consoletype, 1.10.0)
@@ -1996,7 +2050,7 @@ index cd5e005..247259a 100644
optional_policy(`
diff --git a/policy/modules/admin/dmesg.fc b/policy/modules/admin/dmesg.fc
-index d6cc2d9..0685b19 100644
+index d6cc2d970..0685b190d 100644
--- a/policy/modules/admin/dmesg.fc
+++ b/policy/modules/admin/dmesg.fc
@@ -1,2 +1,4 @@
@@ -2005,7 +2059,7 @@ index d6cc2d9..0685b19 100644
+
+/usr/bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0)
diff --git a/policy/modules/admin/dmesg.te b/policy/modules/admin/dmesg.te
-index 72bc6d8..bb4a6f0 100644
+index 72bc6d815..bb4a6f0d7 100644
--- a/policy/modules/admin/dmesg.te
+++ b/policy/modules/admin/dmesg.te
@@ -9,6 +9,10 @@ type dmesg_t;
@@ -2056,7 +2110,7 @@ index 72bc6d8..bb4a6f0 100644
optional_policy(`
seutil_sigchld_newrole(dmesg_t)
diff --git a/policy/modules/admin/netutils.fc b/policy/modules/admin/netutils.fc
-index 407078f..1a09bea 100644
+index 407078f4b..1a09bead7 100644
--- a/policy/modules/admin/netutils.fc
+++ b/policy/modules/admin/netutils.fc
@@ -1,15 +1,22 @@
@@ -2085,7 +2139,7 @@ index 407078f..1a09bea 100644
/usr/sbin/send_arp -- gen_context(system_u:object_r:ping_exec_t,s0)
/usr/sbin/tcpdump -- gen_context(system_u:object_r:netutils_exec_t,s0)
diff --git a/policy/modules/admin/netutils.if b/policy/modules/admin/netutils.if
-index c6ca761..0c86bfd 100644
+index c6ca761c9..0c86bfd54 100644
--- a/policy/modules/admin/netutils.if
+++ b/policy/modules/admin/netutils.if
@@ -42,6 +42,7 @@ interface(`netutils_run',`
@@ -2147,7 +2201,7 @@ index c6ca761..0c86bfd 100644
')
diff --git a/policy/modules/admin/netutils.te b/policy/modules/admin/netutils.te
-index c44c359..5038ed0 100644
+index c44c3592a..5038ed0d5 100644
--- a/policy/modules/admin/netutils.te
+++ b/policy/modules/admin/netutils.te
@@ -7,10 +7,10 @@ policy_module(netutils, 1.12.1)
@@ -2349,7 +2403,7 @@ index c44c359..5038ed0 100644
+ term_dontaudit_use_all_ptys(traceroute_t)
+')
diff --git a/policy/modules/admin/su.fc b/policy/modules/admin/su.fc
-index 688abc2..3d89250 100644
+index 688abc2ae..3d89250a6 100644
--- a/policy/modules/admin/su.fc
+++ b/policy/modules/admin/su.fc
@@ -3,3 +3,4 @@
@@ -2358,7 +2412,7 @@ index 688abc2..3d89250 100644
/usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0)
+/usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0)
diff --git a/policy/modules/admin/su.if b/policy/modules/admin/su.if
-index 03ec5ca..1e3ace4 100644
+index 03ec5cafe..1e3ace4cf 100644
--- a/policy/modules/admin/su.if
+++ b/policy/modules/admin/su.if
@@ -41,13 +41,14 @@ template(`su_restricted_domain_template', `
@@ -2554,7 +2608,7 @@ index 03ec5ca..1e3ace4 100644
#######################################
diff --git a/policy/modules/admin/su.te b/policy/modules/admin/su.te
-index 85bb77e..a430233 100644
+index 85bb77e05..a4302332a 100644
--- a/policy/modules/admin/su.te
+++ b/policy/modules/admin/su.te
@@ -9,3 +9,82 @@ attribute su_domain_type;
@@ -2641,7 +2695,7 @@ index 85bb77e..a430233 100644
+ xserver_domtrans_xauth(su_domain_type)
+')
diff --git a/policy/modules/admin/sudo.fc b/policy/modules/admin/sudo.fc
-index 7bddc02..2b59ed0 100644
+index 7bddc02a4..2b59ed0a0 100644
--- a/policy/modules/admin/sudo.fc
+++ b/policy/modules/admin/sudo.fc
@@ -1,2 +1,4 @@
@@ -2650,7 +2704,7 @@ index 7bddc02..2b59ed0 100644
+
+/var/db/sudo(/.*)? gen_context(system_u:object_r:sudo_db_t,s0)
diff --git a/policy/modules/admin/sudo.if b/policy/modules/admin/sudo.if
-index 0960199..2e75ec7 100644
+index 096019932..2e75ec7de 100644
--- a/policy/modules/admin/sudo.if
+++ b/policy/modules/admin/sudo.if
@@ -32,6 +32,7 @@ template(`sudo_role_template',`
@@ -2835,7 +2889,7 @@ index 0960199..2e75ec7 100644
+ manage_files_pattern($1, sudo_db_t, sudo_db_t)
+')
diff --git a/policy/modules/admin/sudo.te b/policy/modules/admin/sudo.te
-index d9fce57..174f893 100644
+index d9fce57ab..174f89336 100644
--- a/policy/modules/admin/sudo.te
+++ b/policy/modules/admin/sudo.te
@@ -7,3 +7,111 @@ attribute sudodomain;
@@ -2951,7 +3005,7 @@ index d9fce57..174f893 100644
+ fprintd_dbus_chat(sudodomain)
+')
diff --git a/policy/modules/admin/usermanage.fc b/policy/modules/admin/usermanage.fc
-index f82f0ce..7b8915d 100644
+index f82f0ce0a..7b8915d47 100644
--- a/policy/modules/admin/usermanage.fc
+++ b/policy/modules/admin/usermanage.fc
@@ -20,6 +20,7 @@ ifdef(`distro_gentoo',`
@@ -2971,7 +3025,7 @@ index f82f0ce..7b8915d 100644
/usr/share/cracklib(/.*)? gen_context(system_u:object_r:crack_db_t,s0)
diff --git a/policy/modules/admin/usermanage.if b/policy/modules/admin/usermanage.if
-index 99e3903..fa68362 100644
+index 99e3903ea..fa68362ea 100644
--- a/policy/modules/admin/usermanage.if
+++ b/policy/modules/admin/usermanage.if
@@ -17,10 +17,6 @@ interface(`usermanage_domtrans_chfn',`
@@ -3128,7 +3182,7 @@ index 99e3903..fa68362 100644
##
##
diff --git a/policy/modules/admin/usermanage.te b/policy/modules/admin/usermanage.te
-index 1d732f1..121ace8 100644
+index 1d732f1e7..121ace88e 100644
--- a/policy/modules/admin/usermanage.te
+++ b/policy/modules/admin/usermanage.te
@@ -26,6 +26,7 @@ type chfn_exec_t;
@@ -3611,7 +3665,7 @@ index 1d732f1..121ace8 100644
+ stapserver_manage_lib(useradd_t)
+')
diff --git a/policy/modules/apps/seunshare.if b/policy/modules/apps/seunshare.if
-index 1dc7a85..e4f6fc2 100644
+index 1dc7a85d3..e4f6fc227 100644
--- a/policy/modules/apps/seunshare.if
+++ b/policy/modules/apps/seunshare.if
@@ -43,18 +43,18 @@ interface(`seunshare_run',`
@@ -3695,7 +3749,7 @@ index 1dc7a85..e4f6fc2 100644
+ corecmd_shell_domtrans($1_seunshare_t, $1_t)
')
diff --git a/policy/modules/apps/seunshare.te b/policy/modules/apps/seunshare.te
-index 7590165..f50f799 100644
+index 759016583..f50f79935 100644
--- a/policy/modules/apps/seunshare.te
+++ b/policy/modules/apps/seunshare.te
@@ -5,40 +5,65 @@ policy_module(seunshare, 1.1.0)
@@ -3785,7 +3839,7 @@ index 7590165..f50f799 100644
+ fs_mounton_fusefs(seunshare_domain)
')
diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
-index 33e0f8d..1b07806 100644
+index 33e0f8dad..1b078065a 100644
--- a/policy/modules/kernel/corecommands.fc
+++ b/policy/modules/kernel/corecommands.fc
@@ -1,9 +1,10 @@
@@ -4171,7 +4225,7 @@ index 33e0f8d..1b07806 100644
+/usr/lib/ruby/gems/.*/agents(/.*)? gen_context(system_u:object_r:bin_t,s0)
+/usr/lib/virtualbox/VBoxManage -- gen_context(system_u:object_r:bin_t,s0)
diff --git a/policy/modules/kernel/corecommands.if b/policy/modules/kernel/corecommands.if
-index 9e9263a..cb42593 100644
+index 9e9263a68..cb425934b 100644
--- a/policy/modules/kernel/corecommands.if
+++ b/policy/modules/kernel/corecommands.if
@@ -8,6 +8,22 @@
@@ -4481,7 +4535,7 @@ index 9e9263a..cb42593 100644
+ filetrans_pattern($1, bin_t, $2, $3, $4)
+')
diff --git a/policy/modules/kernel/corecommands.te b/policy/modules/kernel/corecommands.te
-index 20c76cf..cc63dcc 100644
+index 20c76cff9..cc63dcc9c 100644
--- a/policy/modules/kernel/corecommands.te
+++ b/policy/modules/kernel/corecommands.te
@@ -13,7 +13,8 @@ attribute exec_type;
@@ -4503,7 +4557,7 @@ index 20c76cf..cc63dcc 100644
type chroot_exec_t;
diff --git a/policy/modules/kernel/corenetwork.fc b/policy/modules/kernel/corenetwork.fc
-index f9b25c1..9af1f7a 100644
+index f9b25c12f..9af1f7a61 100644
--- a/policy/modules/kernel/corenetwork.fc
+++ b/policy/modules/kernel/corenetwork.fc
@@ -8,3 +8,6 @@
@@ -4514,7 +4568,7 @@ index f9b25c1..9af1f7a 100644
+/usr/lib/udev/devices/ppp -c gen_context(system_u:object_r:ppp_device_t,s0)
+/usr/lib/udev/devices/net/.* -c gen_context(system_u:object_r:tun_tap_device_t,s0)
diff --git a/policy/modules/kernel/corenetwork.if.in b/policy/modules/kernel/corenetwork.if.in
-index 07126bd..04cf2da 100644
+index 07126bdcc..379aac1bb 100644
--- a/policy/modules/kernel/corenetwork.if.in
+++ b/policy/modules/kernel/corenetwork.if.in
@@ -55,6 +55,7 @@ interface(`corenet_reserved_port',`
@@ -5152,18 +5206,10 @@ index 07126bd..04cf2da 100644
## Bind TCP sockets to all reserved ports.
##
##
-@@ -1785,31 +2176,284 @@ interface(`corenet_tcp_bind_all_reserved_ports',`
- attribute reserved_port_type;
- ')
+@@ -1791,6 +2182,24 @@ interface(`corenet_tcp_bind_all_reserved_ports',`
-- allow $1 reserved_port_type:tcp_socket name_bind;
-- allow $1 self:capability net_bind_service;
-+ allow $1 reserved_port_type:tcp_socket name_bind;
-+ allow $1 self:capability net_bind_service;
-+')
-+
-+########################################
-+##
+ ########################################
+ ##
+## Do not audit attempts to bind DCCP sockets to all reserved ports.
+##
+##
@@ -5182,25 +5228,39 @@ index 07126bd..04cf2da 100644
+
+########################################
+##
-+## Do not audit attempts to bind TCP sockets to all reserved ports.
+ ## Do not audit attempts to bind TCP sockets to all reserved ports.
+ ##
+ ##
+@@ -1846,6 +2255,24 @@ interface(`corenet_dontaudit_udp_bind_all_reserved_ports',`
+
+ ########################################
+ ##
++## Bind DCCP sockets to all ports > 1024.
+##
+##
+##
-+## Domain to not audit.
++## Domain allowed access.
+##
+##
+#
-+interface(`corenet_dontaudit_tcp_bind_all_reserved_ports',`
++interface(`corenet_dccp_bind_all_unreserved_ports',`
+ gen_require(`
-+ attribute reserved_port_type;
++ attribute unreserved_port_type;
+ ')
+
-+ dontaudit $1 reserved_port_type:tcp_socket name_bind;
++ allow $1 unreserved_port_type:dccp_socket name_bind;
+')
+
+########################################
+##
-+## Bind UDP sockets to all reserved ports.
+ ## Bind TCP sockets to all ports > 1024.
+ ##
+ ##
+@@ -1864,6 +2291,24 @@ interface(`corenet_tcp_bind_all_unreserved_ports',`
+
+ ########################################
+ ##
++## Bind TCP sockets to all ports > 1024.
+##
+##
+##
@@ -5208,36 +5268,42 @@ index 07126bd..04cf2da 100644
+##
+##
+#
-+interface(`corenet_udp_bind_all_reserved_ports',`
++interface(`corenet_tcp_bind_unreserved_ports',`
+ gen_require(`
-+ attribute reserved_port_type;
++ attribute unreserved_port_type;
+ ')
+
-+ allow $1 reserved_port_type:udp_socket name_bind;
-+ allow $1 self:capability net_bind_service;
++ allow $1 unreserved_port_type:tcp_socket name_bind;
+')
+
+########################################
+##
-+## Do not audit attempts to bind UDP sockets to all reserved ports.
+ ## Bind UDP sockets to all ports > 1024.
+ ##
+ ##
+@@ -1882,6 +2327,60 @@ interface(`corenet_udp_bind_all_unreserved_ports',`
+
+ ########################################
+ ##
++## Bind TCP sockets to all ports > 32768.
+##
+##
+##
-+## Domain to not audit.
++## Domain allowed access.
+##
+##
+#
-+interface(`corenet_dontaudit_udp_bind_all_reserved_ports',`
++interface(`corenet_tcp_bind_all_ephemeral_ports',`
+ gen_require(`
-+ attribute reserved_port_type;
++ attribute ephemeral_port_type;
+ ')
+
-+ dontaudit $1 reserved_port_type:udp_socket name_bind;
++ allow $1 ephemeral_port_type:tcp_socket name_bind;
+')
+
+########################################
+##
-+## Bind DCCP sockets to all ports > 1024.
++## Bind UDP sockets to all ports > 32768.
+##
+##
+##
@@ -5245,17 +5311,17 @@ index 07126bd..04cf2da 100644
+##
+##
+#
-+interface(`corenet_dccp_bind_all_unreserved_ports',`
++interface(`corenet_udp_bind_all_ephemeral_ports',`
+ gen_require(`
-+ attribute unreserved_port_type;
++ attribute ephemeral_port_type;
+ ')
+
-+ allow $1 unreserved_port_type:dccp_socket name_bind;
++ allow $1 ephemeral_port_type:udp_socket name_bind;
+')
+
+########################################
+##
-+## Bind TCP sockets to all ports > 1024.
++## Connect DCCP sockets to reserved ports.
+##
+##
+##
@@ -5263,17 +5329,24 @@ index 07126bd..04cf2da 100644
+##
+##
+#
-+interface(`corenet_tcp_bind_all_unreserved_ports',`
++interface(`corenet_dccp_connect_all_reserved_ports',`
+ gen_require(`
-+ attribute unreserved_port_type;
++ attribute reserved_port_type;
+ ')
+
-+ allow $1 unreserved_port_type:tcp_socket name_bind;
++ allow $1 reserved_port_type:dccp_socket name_connect;
+')
+
+########################################
+##
-+## Bind TCP sockets to all ports > 1024.
+ ## Connect TCP sockets to reserved ports.
+ ##
+ ##
+@@ -1900,6 +2399,42 @@ interface(`corenet_tcp_connect_all_reserved_ports',`
+
+ ########################################
+ ##
++## Connect DCCP sockets to all ports > 1024.
+##
+##
+##
@@ -5281,35 +5354,42 @@ index 07126bd..04cf2da 100644
+##
+##
+#
-+interface(`corenet_tcp_bind_unreserved_ports',`
++interface(`corenet_dccp_connect_all_unreserved_ports',`
+ gen_require(`
+ attribute unreserved_port_type;
+ ')
+
-+ allow $1 unreserved_port_type:tcp_socket name_bind;
++ allow $1 unreserved_port_type:dccp_socket name_connect;
+')
+
-+########################################
++#######################################
+##
-+## Bind UDP sockets to all ports > 1024.
++## Connect TCP sockets to ports > 1024.
+##
+##
-+##
-+## Domain allowed access.
-+##
++##
++## Domain allowed access.
++##
+##
+#
-+interface(`corenet_udp_bind_all_unreserved_ports',`
-+ gen_require(`
-+ attribute unreserved_port_type;
-+ ')
++interface(`corenet_tcp_connect_unreserved_ports',`
++ gen_require(`
++ type unreserved_port_t;
++ ')
+
-+ allow $1 unreserved_port_type:udp_socket name_bind;
++ allow $1 unreserved_port_t:tcp_socket name_connect;
+')
+
+########################################
+##
-+## Bind TCP sockets to all ports > 32768.
+ ## Connect TCP sockets to all ports > 1024.
+ ##
+ ##
+@@ -1918,6 +2453,43 @@ interface(`corenet_tcp_connect_all_unreserved_ports',`
+
+ ########################################
+ ##
++## Connect TCP sockets to all ports > 32768.
+##
+##
+##
@@ -5317,35 +5397,43 @@ index 07126bd..04cf2da 100644
+##
+##
+#
-+interface(`corenet_tcp_bind_all_ephemeral_ports',`
++interface(`corenet_tcp_connect_all_ephemeral_ports',`
+ gen_require(`
+ attribute ephemeral_port_type;
+ ')
+
-+ allow $1 ephemeral_port_type:tcp_socket name_bind;
++ allow $1 ephemeral_port_type:tcp_socket name_connect;
+')
+
+########################################
+##
-+## Bind UDP sockets to all ports > 32768.
++## Do not audit attempts to connect DCCP sockets
++## all reserved ports.
+##
+##
+##
-+## Domain allowed access.
++## Domain to not audit.
+##
+##
+#
-+interface(`corenet_udp_bind_all_ephemeral_ports',`
++interface(`corenet_dontaudit_dccp_connect_all_reserved_ports',`
+ gen_require(`
-+ attribute ephemeral_port_type;
++ attribute reserved_port_type;
+ ')
+
-+ allow $1 ephemeral_port_type:udp_socket name_bind;
++ dontaudit $1 reserved_port_type:dccp_socket name_connect;
+')
+
+########################################
+##
-+## Connect DCCP sockets to reserved ports.
+ ## Do not audit attempts to connect TCP sockets
+ ## all reserved ports.
+ ##
+@@ -1937,6 +2509,24 @@ interface(`corenet_dontaudit_tcp_connect_all_reserved_ports',`
+
+ ########################################
+ ##
++## Connect DCCP sockets to rpc ports.
+##
+##
+##
@@ -5353,348 +5441,147 @@ index 07126bd..04cf2da 100644
+##
+##
+#
-+interface(`corenet_dccp_connect_all_reserved_ports',`
++interface(`corenet_dccp_connect_all_rpc_ports',`
+ gen_require(`
-+ attribute reserved_port_type;
++ attribute rpc_port_type;
+ ')
+
-+ allow $1 reserved_port_type:dccp_socket name_connect;
++ allow $1 rpc_port_type:dccp_socket name_connect;
+')
+
+########################################
+##
-+## Connect TCP sockets to reserved ports.
+ ## Connect TCP sockets to rpc ports.
+ ##
+ ##
+@@ -1955,6 +2545,25 @@ interface(`corenet_tcp_connect_all_rpc_ports',`
+
+ ########################################
+ ##
++## Do not audit attempts to connect DCCP sockets
++## all rpc ports.
+##
+##
+##
-+## Domain allowed access.
++## Domain to not audit.
+##
+##
+#
-+interface(`corenet_tcp_connect_all_reserved_ports',`
++interface(`corenet_dontaudit_dccp_connect_all_rpc_ports',`
+ gen_require(`
-+ attribute reserved_port_type;
++ attribute rpc_port_type;
+ ')
+
-+ allow $1 reserved_port_type:tcp_socket name_connect;
++ dontaudit $1 rpc_port_type:dccp_socket name_connect;
+')
+
+########################################
+##
-+## Connect DCCP sockets to all ports > 1024.
+ ## Do not audit attempts to connect TCP sockets
+ ## all rpc ports.
+ ##
+@@ -1993,6 +2602,42 @@ interface(`corenet_rw_tun_tap_dev',`
+
+ ########################################
+ ##
++## Relabel to and from the TUN/TAP virtual network device.
+##
+##
+##
-+## Domain allowed access.
++## The domain allowed access.
+##
+##
+#
-+interface(`corenet_dccp_connect_all_unreserved_ports',`
++interface(`corenet_relabel_tun_tap_dev',`
+ gen_require(`
-+ attribute unreserved_port_type;
++ type tun_tap_device_t;
+ ')
+
-+ allow $1 unreserved_port_type:dccp_socket name_connect;
++ relabel_chr_files_pattern($1, tun_tap_device_t, tun_tap_device_t)
+')
+
-+#######################################
++########################################
+##
-+## Connect TCP sockets to ports > 1024.
++## Read and write inherited TUN/TAP virtual network device.
+##
+##
-+##
-+## Domain allowed access.
-+##
++##
++## The domain allowed access.
++##
+##
+#
-+interface(`corenet_tcp_connect_unreserved_ports',`
-+ gen_require(`
-+ type unreserved_port_t;
-+ ')
++interface(`corenet_rw_inherited_tun_tap_dev',`
++ gen_require(`
++ type tun_tap_device_t;
++ ')
+
-+ allow $1 unreserved_port_t:tcp_socket name_connect;
- ')
-
- ########################################
- ##
--## Do not audit attempts to bind TCP sockets to all reserved ports.
-+## Connect TCP sockets to all ports > 1024.
- ##
- ##
- ##
--## Domain to not audit.
-+## Domain allowed access.
- ##
- ##
- #
--interface(`corenet_dontaudit_tcp_bind_all_reserved_ports',`
-+interface(`corenet_tcp_connect_all_unreserved_ports',`
- gen_require(`
-- attribute reserved_port_type;
-+ attribute unreserved_port_type;
- ')
-
-- dontaudit $1 reserved_port_type:tcp_socket name_bind;
-+ allow $1 unreserved_port_type:tcp_socket name_connect;
- ')
-
- ########################################
- ##
--## Bind UDP sockets to all reserved ports.
-+## Connect TCP sockets to all ports > 32768.
- ##
- ##
- ##
-@@ -1817,18 +2461,18 @@ interface(`corenet_dontaudit_tcp_bind_all_reserved_ports',`
- ##
- ##
- #
--interface(`corenet_udp_bind_all_reserved_ports',`
-+interface(`corenet_tcp_connect_all_ephemeral_ports',`
- gen_require(`
-- attribute reserved_port_type;
-+ attribute ephemeral_port_type;
- ')
-
-- allow $1 reserved_port_type:udp_socket name_bind;
-- allow $1 self:capability net_bind_service;
-+ allow $1 ephemeral_port_type:tcp_socket name_connect;
- ')
-
- ########################################
- ##
--## Do not audit attempts to bind UDP sockets to all reserved ports.
-+## Do not audit attempts to connect DCCP sockets
-+## all reserved ports.
- ##
- ##
- ##
-@@ -1836,35 +2480,36 @@ interface(`corenet_udp_bind_all_reserved_ports',`
- ##
- ##
- #
--interface(`corenet_dontaudit_udp_bind_all_reserved_ports',`
-+interface(`corenet_dontaudit_dccp_connect_all_reserved_ports',`
- gen_require(`
- attribute reserved_port_type;
- ')
-
-- dontaudit $1 reserved_port_type:udp_socket name_bind;
-+ dontaudit $1 reserved_port_type:dccp_socket name_connect;
- ')
-
- ########################################
- ##
--## Bind TCP sockets to all ports > 1024.
-+## Do not audit attempts to connect TCP sockets
-+## all reserved ports.
- ##
- ##
- ##
--## Domain allowed access.
-+## Domain to not audit.
- ##
- ##
- #
--interface(`corenet_tcp_bind_all_unreserved_ports',`
-+interface(`corenet_dontaudit_tcp_connect_all_reserved_ports',`
- gen_require(`
-- attribute unreserved_port_type;
-+ attribute reserved_port_type;
- ')
-
-- allow $1 unreserved_port_type:tcp_socket name_bind;
-+ dontaudit $1 reserved_port_type:tcp_socket name_connect;
- ')
-
- ########################################
- ##
--## Bind UDP sockets to all ports > 1024.
-+## Connect DCCP sockets to rpc ports.
- ##
- ##
- ##
-@@ -1872,17 +2517,17 @@ interface(`corenet_tcp_bind_all_unreserved_ports',`
- ##
- ##
- #
--interface(`corenet_udp_bind_all_unreserved_ports',`
-+interface(`corenet_dccp_connect_all_rpc_ports',`
- gen_require(`
-- attribute unreserved_port_type;
-+ attribute rpc_port_type;
- ')
-
-- allow $1 unreserved_port_type:udp_socket name_bind;
-+ allow $1 rpc_port_type:dccp_socket name_connect;
- ')
-
- ########################################
- ##
--## Connect TCP sockets to reserved ports.
-+## Connect TCP sockets to rpc ports.
- ##
- ##
- ##
-@@ -1890,36 +2535,37 @@ interface(`corenet_udp_bind_all_unreserved_ports',`
- ##
- ##
- #
--interface(`corenet_tcp_connect_all_reserved_ports',`
-+interface(`corenet_tcp_connect_all_rpc_ports',`
- gen_require(`
-- attribute reserved_port_type;
-+ attribute rpc_port_type;
- ')
-
-- allow $1 reserved_port_type:tcp_socket name_connect;
-+ allow $1 rpc_port_type:tcp_socket name_connect;
- ')
-
- ########################################
- ##
--## Connect TCP sockets to all ports > 1024.
-+## Do not audit attempts to connect DCCP sockets
-+## all rpc ports.
- ##
- ##
- ##
--## Domain allowed access.
-+## Domain to not audit.
- ##
- ##
- #
--interface(`corenet_tcp_connect_all_unreserved_ports',`
-+interface(`corenet_dontaudit_dccp_connect_all_rpc_ports',`
- gen_require(`
-- attribute unreserved_port_type;
-+ attribute rpc_port_type;
- ')
-
-- allow $1 unreserved_port_type:tcp_socket name_connect;
-+ dontaudit $1 rpc_port_type:dccp_socket name_connect;
- ')
-
- ########################################
- ##
- ## Do not audit attempts to connect TCP sockets
--## all reserved ports.
-+## all rpc ports.
++ allow $1 tun_tap_device_t:chr_file rw_inherited_chr_file_perms;
++')
++
++########################################
++##
+ ## Do not audit attempts to read or write the TUN/TAP
+ ## virtual network device.
##
- ##
- ##
-@@ -1927,54 +2573,54 @@ interface(`corenet_tcp_connect_all_unreserved_ports',`
+@@ -2020,31 +2665,50 @@ interface(`corenet_dontaudit_rw_tun_tap_dev',`
##
##
#
--interface(`corenet_dontaudit_tcp_connect_all_reserved_ports',`
-+interface(`corenet_dontaudit_tcp_connect_all_rpc_ports',`
- gen_require(`
-- attribute reserved_port_type;
-+ attribute rpc_port_type;
- ')
-
-- dontaudit $1 reserved_port_type:tcp_socket name_connect;
-+ dontaudit $1 rpc_port_type:tcp_socket name_connect;
- ')
-
- ########################################
- ##
--## Connect TCP sockets to rpc ports.
-+## Read and write the TUN/TAP virtual network device.
- ##
- ##
- ##
--## Domain allowed access.
+-interface(`corenet_getattr_ppp_dev',`
++interface(`corenet_getattr_ppp_dev',`
++ gen_require(`
++ type ppp_device_t;
++ ')
++
++ allow $1 ppp_device_t:chr_file getattr;
++')
++
++########################################
++##
++## Read and write the point-to-point device.
++##
++##
++##
+## The domain allowed access.
- ##
- ##
- #
--interface(`corenet_tcp_connect_all_rpc_ports',`
-+interface(`corenet_rw_tun_tap_dev',`
++##
++##
++#
++interface(`corenet_rw_ppp_dev',`
gen_require(`
-- attribute rpc_port_type;
-+ type tun_tap_device_t;
+ type ppp_device_t;
')
-- allow $1 rpc_port_type:tcp_socket name_connect;
+- allow $1 ppp_device_t:chr_file getattr;
+ dev_list_all_dev_nodes($1)
-+ allow $1 tun_tap_device_t:chr_file rw_chr_file_perms;
++ allow $1 ppp_device_t:chr_file rw_chr_file_perms;
')
########################################
##
--## Do not audit attempts to connect TCP sockets
--## all rpc ports.
-+## Relabel to and from the TUN/TAP virtual network device.
- ##
- ##
- ##
--## Domain to not audit.
-+## The domain allowed access.
- ##
- ##
- #
--interface(`corenet_dontaudit_tcp_connect_all_rpc_ports',`
-+interface(`corenet_relabel_tun_tap_dev',`
- gen_require(`
-- attribute rpc_port_type;
-+ type tun_tap_device_t;
- ')
-
-- dontaudit $1 rpc_port_type:tcp_socket name_connect;
-+ relabel_chr_files_pattern($1, tun_tap_device_t, tun_tap_device_t)
- ')
-
- ########################################
- ##
--## Read and write the TUN/TAP virtual network device.
-+## Read and write inherited TUN/TAP virtual network device.
+-## Read and write the point-to-point device.
++## Bind DCCP sockets to all RPC ports.
##
##
##
-@@ -1982,13 +2628,12 @@ interface(`corenet_dontaudit_tcp_connect_all_rpc_ports',`
+-## The domain allowed access.
++## Domain allowed access.
##
##
#
--interface(`corenet_rw_tun_tap_dev',`
-+interface(`corenet_rw_inherited_tun_tap_dev',`
+-interface(`corenet_rw_ppp_dev',`
++interface(`corenet_dccp_bind_all_rpc_ports',`
gen_require(`
- type tun_tap_device_t;
+- type ppp_device_t;
++ attribute rpc_port_type;
')
- dev_list_all_dev_nodes($1)
-- allow $1 tun_tap_device_t:chr_file rw_chr_file_perms;
-+ allow $1 tun_tap_device_t:chr_file rw_inherited_chr_file_perms;
+- allow $1 ppp_device_t:chr_file rw_chr_file_perms;
++ allow $1 rpc_port_type:dccp_socket name_bind;
++ allow $1 self:capability net_bind_service;
')
########################################
-@@ -2049,6 +2694,25 @@ interface(`corenet_rw_ppp_dev',`
-
- ########################################
- ##
-+## Bind DCCP sockets to all RPC ports.
-+##
-+##
-+##
-+## Domain allowed access.
-+##
-+##
-+#
-+interface(`corenet_dccp_bind_all_rpc_ports',`
-+ gen_require(`
-+ attribute rpc_port_type;
-+ ')
-+
-+ allow $1 rpc_port_type:dccp_socket name_bind;
-+ allow $1 self:capability net_bind_service;
-+')
-+
-+########################################
-+##
- ## Bind TCP sockets to all RPC ports.
- ##
- ##
@@ -2068,6 +2732,24 @@ interface(`corenet_tcp_bind_all_rpc_ports',`
########################################
@@ -5939,7 +5826,7 @@ index 07126bd..04cf2da 100644
corenet_tcp_recvfrom_labeled($1, $2)
corenet_udp_recvfrom_labeled($1, $2)
corenet_raw_recvfrom_labeled($1, $2)
-@@ -3134,3 +3929,70 @@ interface(`corenet_unconfined',`
+@@ -3134,3 +3929,188 @@ interface(`corenet_unconfined',`
typeattribute $1 corenet_unconfined_type;
')
@@ -6010,8 +5897,126 @@ index 07126bd..04cf2da 100644
+ dev_filetrans($1, tun_tap_device_t, chr_file, "tap29")
+ dev_filetrans($1, ppp_device_t, chr_file, "ppp")
+')
++
++########################################
++##
++## Define type to be an infiniband pkey type
++##
++##
++##
++## Define type to be an infiniband pkey type
++##
++##
++## This is for supporting third party modules and its
++## use is not allowed in upstream reference policy.
++##
++##
++##
++##
++## Type to be used for infiniband pkeys.
++##
++##
++#
++interface(`corenet_ib_pkey',`
++ gen_require(`
++ attribute ibpkey_type;
++ ')
++
++ typeattribute $1 ibpkey_type;
++')
++
++########################################
++##
++## Access unlabeled infiniband pkeys.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`corenet_ib_access_unlabeled_pkeys',`
++ kernel_ib_access_unlabeled_pkeys($1)
++')
++
++########################################
++##
++## Access all labeled infiniband pkeys.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`corenet_ib_access_all_pkeys',`
++ gen_require(`
++ attribute ibpkey_type;
++ ')
++
++ allow $1 ibpkey_type:infiniband_pkey access;
++')
++
++########################################
++##
++## Define type to be an infiniband endport
++##
++##
++##
++## Define type to be an infiniband endport
++##
++##
++## This is for supporting third party modules and its
++## use is not allowed in upstream reference policy.
++##
++##
++##
++##
++## Type to be used for infiniband endports.
++##
++##
++#
++interface(`corenet_ib_endport',`
++ gen_require(`
++ attribute ibendport_type;
++ ')
++
++ typeattribute $1 ibendport_type;
++')
++
++########################################
++##
++## Manage subnets on all labeled Infiniband endports
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`corenet_ib_manage_subnet_all_endports',`
++ gen_require(`
++ attribute ibendport_type;
++ ')
++
++ allow $1 ibendport_type:infiniband_endport manage_subnet;
++')
++
++########################################
++##
++## Manage subnet on all unlabeled Infiniband endports
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`corenet_ib_manage_subnet_unlabeled_endports',`
++ kernel_ib_manage_subnet_unlabeled_endports($1)
++')
diff --git a/policy/modules/kernel/corenetwork.if.m4 b/policy/modules/kernel/corenetwork.if.m4
-index 8e0f9cd..b9f45b9 100644
+index 8e0f9cd14..2fe34db47 100644
--- a/policy/modules/kernel/corenetwork.if.m4
+++ b/policy/modules/kernel/corenetwork.if.m4
@@ -631,6 +631,26 @@ interface(`corenet_udp_bind_$1_port',`
@@ -6065,8 +6070,83 @@ index 8e0f9cd..b9f45b9 100644
'') dnl end create_port_interfaces
define(`create_packet_interfaces',``
+@@ -776,6 +813,48 @@ interface(`corenet_relabelto_$1_packets',`
+ ')
+ '') dnl end create_port_interfaces
+
++define(`create_ibpkey_interfaces',``
++########################################
++##
++## Access the infiniband fabric on the $1 ibpkey.
++##
++##
++##
++## Domain allowed access.
++##
++##
++##
++#
++interface(`corenet_ib_access_$1_pkey',`
++ gen_require(`
++ $3 $1_$2;
++ ')
++
++ allow dollarsone $1_$2:infiniband_pkey access;
++')
++'') dnl end create_ibpkey_interfaces
++
++define(`create_ibendport_interfaces',``
++########################################
++##
++## Manage the subnet on $1 ibendport.
++##
++##
++##
++## Domain allowed access.
++##
++##
++##
++#
++interface(`corenet_ib_manage_subnet_$1_endport',`
++ gen_require(`
++ $3 $1_$2;
++ ')
++
++ allow dollarsone $1_$2:infiniband_endport manage_subnet;
++')
++'') dnl end create_ibendport_interfaces
++
+ #
+ # create_netif_*_interfaces(linux_interfacename)
+ #
+@@ -851,3 +930,25 @@ define(`network_packet',`
+ create_packet_interfaces($1_client)
+ create_packet_interfaces($1_server)
+ ')
++
++# create_ibpkey_*_interfaces(name, subnet_prefix, pkeynum,mls_sensitivity)
++# (these wrap create_port_interfaces to handle attributes and types)
++define(`create_ibpkey_type_interfaces',`create_ibpkey_interfaces($1,ibpkey_t,type,determine_reserved_capability(shift($*)))')
++
++#
++# ib_pkey(name,subnet_prefix pkeynum mls_sensitivity)
++#
++define(`ib_pkey',`
++create_ibpkey_type_interfaces($*)
++')
++
++# create_ibendport_*_interfaces(name, devname, portnum,mls_sensitivity)
++# (these wrap create_port_interfaces to handle attributes and types)
++define(`create_ibendport_type_interfaces',`create_ibendport_interfaces($1,ibendport_t,type,determine_reserved_capability(shift($*)))')
++
++#
++# ib_endport(name,device_name, portnum mls_sensitivity)
++#
++define(`ib_endport',`
++create_ibendport_type_interfaces($*)
++')
diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
-index b191055..61c55fd 100644
+index b191055f9..c3bbc8ea2 100644
--- a/policy/modules/kernel/corenetwork.te.in
+++ b/policy/modules/kernel/corenetwork.te.in
@@ -5,6 +5,7 @@ policy_module(corenetwork, 1.19.2)
@@ -6077,13 +6157,15 @@ index b191055..61c55fd 100644
attribute client_packet_type;
# This is an optimization for { port_type -port_t }
attribute defined_port_type;
-@@ -14,12 +15,14 @@ attribute node_type;
+@@ -14,12 +15,16 @@ attribute node_type;
attribute packet_type;
attribute port_type;
attribute reserved_port_type;
+attribute ephemeral_port_type;
attribute rpc_port_type;
attribute server_packet_type;
++attribute ibpkey_type;
++attribute ibendport_type;
# This is an optimization for { port_type -reserved_port_type }
attribute unreserved_port_type;
@@ -6092,7 +6174,7 @@ index b191055..61c55fd 100644
type ppp_device_t;
dev_node(ppp_device_t)
-@@ -29,6 +32,7 @@ dev_node(ppp_device_t)
+@@ -29,6 +34,7 @@ dev_node(ppp_device_t)
#
type tun_tap_device_t;
dev_node(tun_tap_device_t)
@@ -6100,7 +6182,7 @@ index b191055..61c55fd 100644
########################################
#
-@@ -38,6 +42,18 @@ dev_node(tun_tap_device_t)
+@@ -38,6 +44,18 @@ dev_node(tun_tap_device_t)
#
# client_packet_t is the default type of IPv4 and IPv6 client packets.
#
@@ -6119,7 +6201,7 @@ index b191055..61c55fd 100644
type client_packet_t, packet_type, client_packet_type;
#
-@@ -46,6 +62,7 @@ type client_packet_t, packet_type, client_packet_type;
+@@ -46,6 +64,7 @@ type client_packet_t, packet_type, client_packet_type;
#
type netlabel_peer_t;
sid netmsg gen_context(system_u:object_r:netlabel_peer_t,mls_systemhigh)
@@ -6127,7 +6209,7 @@ index b191055..61c55fd 100644
#
# port_t is the default type of INET port numbers.
-@@ -59,6 +76,12 @@ sid port gen_context(system_u:object_r:port_t,s0)
+@@ -59,6 +78,12 @@ sid port gen_context(system_u:object_r:port_t,s0)
type unreserved_port_t, port_type, unreserved_port_type;
#
@@ -6140,7 +6222,7 @@ index b191055..61c55fd 100644
# reserved_port_t is the type of INET port numbers below 1024.
#
type reserved_port_t, port_type, reserved_port_type;
-@@ -76,63 +99,82 @@ type server_packet_t, packet_type, server_packet_type;
+@@ -76,63 +101,82 @@ type server_packet_t, packet_type, server_packet_type;
network_port(afs_bos, udp,7007,s0)
network_port(afs_fs, tcp,2040,s0, udp,7000,s0, udp,7005,s0)
network_port(afs_ka, udp,7004,s0)
@@ -6233,7 +6315,7 @@ index b191055..61c55fd 100644
network_port(gopher, tcp,70,s0, udp,70,s0)
network_port(gpsd, tcp,2947,s0)
network_port(hadoop_datanode, tcp,50010,s0)
-@@ -140,45 +182,61 @@ network_port(hadoop_namenode, tcp,8020,s0)
+@@ -140,45 +184,61 @@ network_port(hadoop_namenode, tcp,8020,s0)
network_port(hddtemp, tcp,7634,s0)
network_port(howl, tcp,5335,s0, udp,5353,s0)
network_port(hplip, tcp,1782,s0, tcp,2207,s0, tcp,2208,s0, tcp, 8290,s0, tcp,50000,s0, tcp,50002,s0, tcp,8292,s0, tcp,9100,s0, tcp,9101,s0, tcp,9102,s0, tcp,9220,s0, tcp,9221,s0, tcp,9222,s0, tcp,9280,s0, tcp,9281,s0, tcp,9282,s0, tcp,9290,s0, tcp,9291,s0)
@@ -6311,7 +6393,7 @@ index b191055..61c55fd 100644
network_port(msnp, tcp,1863,s0, udp,1863,s0)
network_port(mssql, tcp,1433-1434,s0, udp,1433-1434,s0)
network_port(ms_streaming, tcp,1755,s0, udp,1755,s0)
-@@ -186,101 +244,130 @@ network_port(munin, tcp,4949,s0, udp,4949,s0)
+@@ -186,101 +246,130 @@ network_port(munin, tcp,4949,s0, udp,4949,s0)
network_port(mxi, tcp,8005,s0, udp,8005,s0)
network_port(mysqld, tcp,1186,s0, tcp,3306,s0, tcp,63132-63164,s0)
network_port(mysqlmanagerd, tcp,2273,s0)
@@ -6462,7 +6544,7 @@ index b191055..61c55fd 100644
network_port(xserver, tcp,6000-6020,s0)
network_port(zarafa, tcp,236,s0, tcp,237,s0)
network_port(zabbix, tcp,10051,s0)
-@@ -288,19 +375,23 @@ network_port(zabbix_agent, tcp,10050,s0)
+@@ -288,19 +377,23 @@ network_port(zabbix_agent, tcp,10050,s0)
network_port(zookeeper_client, tcp,2181,s0)
network_port(zookeeper_election, tcp,3888,s0)
network_port(zookeeper_leader, tcp,2888,s0)
@@ -6489,7 +6571,7 @@ index b191055..61c55fd 100644
########################################
#
-@@ -333,6 +424,8 @@ sid netif gen_context(system_u:object_r:netif_t,s0 - mls_systemhigh)
+@@ -333,6 +426,8 @@ sid netif gen_context(system_u:object_r:netif_t,s0 - mls_systemhigh)
build_option(`enable_mls',`
network_interface(lo, lo, s0 - mls_systemhigh)
@@ -6498,7 +6580,7 @@ index b191055..61c55fd 100644
',`
typealias netif_t alias { lo_netif_t netif_lo_t };
')
-@@ -345,9 +438,28 @@ typealias netif_t alias { lo_netif_t netif_lo_t };
+@@ -345,9 +440,34 @@ typealias netif_t alias { lo_netif_t netif_lo_t };
allow corenet_unconfined_type node_type:node *;
allow corenet_unconfined_type netif_type:netif *;
allow corenet_unconfined_type packet_type:packet *;
@@ -6512,6 +6594,12 @@ index b191055..61c55fd 100644
+allow corenet_unconfined_type port_type:{ dccp_socket tcp_socket udp_socket rawip_socket } name_bind;
+allow corenet_unconfined_type node_type:{ dccp_socket tcp_socket udp_socket rawip_socket } node_bind;
+
++# Infiniband
++corenet_ib_access_all_pkeys(corenet_unconfined_type)
++corenet_ib_manage_subnet_all_endports(corenet_unconfined_type)
++corenet_ib_access_unlabeled_pkeys(corenet_unconfined_type)
++corenet_ib_manage_subnet_unlabeled_endports(corenet_unconfined_type)
++
+#
+# Rules coverning the use of unlabeled types
+#
@@ -6530,7 +6618,7 @@ index b191055..61c55fd 100644
+typealias neutron_server_packet_t alias quantum_server_packet_t;
+typealias neutron_client_packet_t alias quantum_client_packet_t;
diff --git a/policy/modules/kernel/corenetwork.te.m4 b/policy/modules/kernel/corenetwork.te.m4
-index 3f6e168..340e49f 100644
+index 3f6e16889..abd046c56 100644
--- a/policy/modules/kernel/corenetwork.te.m4
+++ b/policy/modules/kernel/corenetwork.te.m4
@@ -86,6 +86,11 @@ define(`add_port_attribute',`dnl
@@ -6553,8 +6641,38 @@ index 3f6e168..340e49f 100644
ifelse(`$2',`',`',`declare_portcons($1_port_t,shift($*))')dnl
')
+@@ -111,3 +117,29 @@ define(`network_packet',`
+ type $1_client_packet_t, packet_type, client_packet_type;
+ type $1_server_packet_t, packet_type, server_packet_type;
+ ')
++
++define(`declare_ibpkeycons',`dnl
++ibpkeycon $2 $3 gen_context(system_u:object_r:$1,$4)
++ifelse(`$5',`',`',`declare_ibpkeycons($1,shiftn(4,$*))')dnl
++')
++
++#
++# ib_pkey(nam, subnet_prefix, pkey_num, mls_sensitivity [,subnet_prefix, pkey_num, mls_sensitivity[,...]])
++#
++define(`ib_pkey',`
++type $1_ibpkey_t, ibpkey_type;
++ifelse(`$2',`',`',`declare_ibpkeycons($1_ibpkey_t,shift($*))')dnl
++')
++
++define(`declare_ibendportcons',`dnl
++ibendportcon $2 $3 gen_context(system_u:object_r:$1,$4)
++ifelse(`$5',`',`',`declare_ibendportcons($1,shiftn(4,$*))')dnl
++')
++
++#
++# ib_endport (name, dev_name, port_num, mls_sensitivity [, dev_name, port_num mls_sensitivity[,...]])
++#
++define(`ib_endport',`
++type $1_ibendport_t, ibendport_type;
++ifelse(`$2',`',`',`declare_ibendportcons($1_ibendport_t,shift($*))')dnl
++')
diff --git a/policy/modules/kernel/devices.fc b/policy/modules/kernel/devices.fc
-index b31c054..3ad1127 100644
+index b31c05491..3ad1127cc 100644
--- a/policy/modules/kernel/devices.fc
+++ b/policy/modules/kernel/devices.fc
@@ -15,15 +15,18 @@
@@ -6730,7 +6848,7 @@ index b31c054..3ad1127 100644
+/usr/lib/udev/devices/null -c gen_context(system_u:object_r:null_device_t,s0)
+/usr/lib/udev/devices/zero -c gen_context(system_u:object_r:zero_device_t,s0)
diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
-index 76f285e..732931f 100644
+index 76f285ea6..732931f47 100644
--- a/policy/modules/kernel/devices.if
+++ b/policy/modules/kernel/devices.if
@@ -143,13 +143,32 @@ interface(`dev_relabel_all_dev_nodes',`
@@ -9841,7 +9959,7 @@ index 76f285e..732931f 100644
+ filetrans_pattern($1, device_t, xserver_misc_device_t, chr_file, "card9")
+')
diff --git a/policy/modules/kernel/devices.te b/policy/modules/kernel/devices.te
-index 0b1a871..db382e7 100644
+index 0b1a8715a..db382e7c2 100644
--- a/policy/modules/kernel/devices.te
+++ b/policy/modules/kernel/devices.te
@@ -15,11 +15,12 @@ attribute devices_unconfined_type;
@@ -10036,7 +10154,7 @@ index 0b1a871..db382e7 100644
+dev_getattr_all(devices_unconfined_type)
+
diff --git a/policy/modules/kernel/domain.if b/policy/modules/kernel/domain.if
-index 6a1e4d1..4b87be8 100644
+index 6a1e4d156..4b87be8e4 100644
--- a/policy/modules/kernel/domain.if
+++ b/policy/modules/kernel/domain.if
@@ -76,33 +76,8 @@ interface(`domain_type',`
@@ -10387,7 +10505,7 @@ index 6a1e4d1..4b87be8 100644
+ allow $1 domain:process rlimitinh;
')
diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
-index cf04cb5..5831355 100644
+index cf04cb509..5831355b0 100644
--- a/policy/modules/kernel/domain.te
+++ b/policy/modules/kernel/domain.te
@@ -4,17 +4,49 @@ policy_module(domain, 1.11.0)
@@ -10951,7 +11069,7 @@ index cf04cb5..5831355 100644
+ unconfined_server_stream_connect(domain)
+')
diff --git a/policy/modules/kernel/files.fc b/policy/modules/kernel/files.fc
-index b876c48..2e591a5 100644
+index b876c48ad..2e591a538 100644
--- a/policy/modules/kernel/files.fc
+++ b/policy/modules/kernel/files.fc
@@ -18,6 +18,7 @@ ifdef(`distro_redhat',`
@@ -11222,7 +11340,7 @@ index b876c48..2e591a5 100644
+
+/sysroot/ostree/deploy/.*-atomic/deploy(/.*)? gen_context(system_u:object_r:root_t,s0)
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
-index f962f76..c1b46d8 100644
+index f962f76ad..c1b46d8f3 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -19,6 +19,136 @@
@@ -15365,7 +15483,7 @@ index f962f76..c1b46d8 100644
+ allow $1 modules_object_t:dir mounton;
+')
diff --git a/policy/modules/kernel/files.te b/policy/modules/kernel/files.te
-index 1a03abd..3221f80 100644
+index 1a03abdd7..3221f8018 100644
--- a/policy/modules/kernel/files.te
+++ b/policy/modules/kernel/files.te
@@ -5,12 +5,16 @@ policy_module(files, 1.18.1)
@@ -15568,7 +15686,7 @@ index 1a03abd..3221f80 100644
allow files_unconfined_type file_type:file execmod;
')
diff --git a/policy/modules/kernel/filesystem.fc b/policy/modules/kernel/filesystem.fc
-index d7c11a0..f521a50 100644
+index d7c11a0b3..f521a50f8 100644
--- a/policy/modules/kernel/filesystem.fc
+++ b/policy/modules/kernel/filesystem.fc
@@ -1,23 +1,28 @@
@@ -15611,7 +15729,7 @@ index d7c11a0..f521a50 100644
/var/run/shm/.* <>
-')
diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if
-index 8416beb..b5b7a0a 100644
+index 8416beb43..b5b7a0ae8 100644
--- a/policy/modules/kernel/filesystem.if
+++ b/policy/modules/kernel/filesystem.if
@@ -577,6 +577,24 @@ interface(`fs_mount_cgroup', `
@@ -19645,7 +19763,7 @@ index 8416beb..b5b7a0a 100644
+ allow $1 tracefs_t:filesystem unmount;
+')
diff --git a/policy/modules/kernel/filesystem.te b/policy/modules/kernel/filesystem.te
-index e7d1738..b10afaf 100644
+index e7d173844..b10afaff0 100644
--- a/policy/modules/kernel/filesystem.te
+++ b/policy/modules/kernel/filesystem.te
@@ -26,14 +26,20 @@ fs_use_xattr ext2 gen_context(system_u:object_r:fs_t,s0);
@@ -19844,7 +19962,7 @@ index e7d1738..b10afaf 100644
+allow filesystem_unconfined_type filesystem_type:{ file } ~entrypoint;
+allow filesystem_unconfined_type filesystem_type:{ dir lnk_file sock_file fifo_file chr_file blk_file } *;
diff --git a/policy/modules/kernel/kernel.fc b/policy/modules/kernel/kernel.fc
-index 7be4ddf..9710b33 100644
+index 7be4ddf74..9710b3336 100644
--- a/policy/modules/kernel/kernel.fc
+++ b/policy/modules/kernel/kernel.fc
@@ -1 +1,5 @@
@@ -19855,7 +19973,7 @@ index 7be4ddf..9710b33 100644
+/sys/kernel/debug -d gen_context(system_u:object_r:debugfs_t,s0)
+/sys/kernel/debug/.* <>
diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
-index e100d88..5113b22 100644
+index e100d886b..355a67b18 100644
--- a/policy/modules/kernel/kernel.if
+++ b/policy/modules/kernel/kernel.if
@@ -126,6 +126,24 @@ interface(`kernel_setsched',`
@@ -20692,7 +20810,7 @@ index e100d88..5113b22 100644
## Unconfined access to kernel module resources.
##
##
-@@ -2972,5 +3387,649 @@ interface(`kernel_unconfined',`
+@@ -2972,5 +3387,685 @@ interface(`kernel_unconfined',`
')
typeattribute $1 kern_unconfined;
@@ -21113,6 +21231,42 @@ index e100d88..5113b22 100644
+
+########################################
+##
++## Access unlabeled infiniband pkeys.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`kernel_ib_access_unlabeled_pkeys',`
++ gen_require(`
++ type unlabeled_t;
++ ')
++
++ allow $1 unlabeled_t:infiniband_pkey access;
++')
++
++########################################
++##
++## Manage subnet on unlabeled Infiniband endports.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`kernel_ib_manage_subnet_unlabeled_endports',`
++ gen_require(`
++ type unlabeled_t;
++ ')
++
++ allow $1 unlabeled_t:infiniband_endport manage_subnet;
++')
++
++########################################
++##
+## Allow caller to read the security state symbolic links.
+##
+##
@@ -21344,7 +21498,7 @@ index e100d88..5113b22 100644
+')
+
diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
-index 8dbab4c..a2f0d06 100644
+index 8dbab4c5e..af9ee60b6 100644
--- a/policy/modules/kernel/kernel.te
+++ b/policy/modules/kernel/kernel.te
@@ -25,6 +25,9 @@ attribute kern_unconfined;
@@ -21472,11 +21626,16 @@ index 8dbab4c..a2f0d06 100644
corenet_all_recvfrom_netlabel(kernel_t)
# Kernel-generated traffic e.g., ICMP replies:
corenet_raw_sendrecv_all_if(kernel_t)
-@@ -244,17 +278,21 @@ corenet_tcp_sendrecv_all_if(kernel_t)
+@@ -244,17 +278,26 @@ corenet_tcp_sendrecv_all_if(kernel_t)
corenet_tcp_sendrecv_all_nodes(kernel_t)
corenet_raw_send_generic_node(kernel_t)
corenet_send_all_packets(kernel_t)
+corenet_filetrans_all_named_dev(kernel_t)
++
++corenet_ib_access_all_pkeys(kernel_t)
++corenet_ib_access_unlabeled_pkeys(kernel_t)
++corenet_ib_manage_subnet_all_endports(kernel_t)
++corenet_ib_manage_subnet_unlabeled_endports(kernel_t)
dev_read_sysfs(kernel_t)
dev_search_usbfs(kernel_t)
@@ -21498,7 +21657,7 @@ index 8dbab4c..a2f0d06 100644
# Mount root file system. Used when loading a policy
# from initrd, then mounting the root filesystem
-@@ -263,7 +301,8 @@ fs_unmount_all_fs(kernel_t)
+@@ -263,7 +306,8 @@ fs_unmount_all_fs(kernel_t)
selinux_load_policy(kernel_t)
@@ -21508,7 +21667,7 @@ index 8dbab4c..a2f0d06 100644
corecmd_exec_shell(kernel_t)
corecmd_list_bin(kernel_t)
-@@ -277,13 +316,23 @@ files_list_root(kernel_t)
+@@ -277,13 +321,23 @@ files_list_root(kernel_t)
files_list_etc(kernel_t)
files_list_home(kernel_t)
files_read_usr_files(kernel_t)
@@ -21532,7 +21691,7 @@ index 8dbab4c..a2f0d06 100644
ifdef(`distro_redhat',`
# Bugzilla 222337
-@@ -291,11 +340,29 @@ ifdef(`distro_redhat',`
+@@ -291,11 +345,29 @@ ifdef(`distro_redhat',`
')
optional_policy(`
@@ -21562,7 +21721,7 @@ index 8dbab4c..a2f0d06 100644
')
optional_policy(`
-@@ -305,6 +372,19 @@ optional_policy(`
+@@ -305,6 +377,19 @@ optional_policy(`
optional_policy(`
logging_send_syslog_msg(kernel_t)
@@ -21582,7 +21741,7 @@ index 8dbab4c..a2f0d06 100644
')
optional_policy(`
-@@ -312,6 +392,11 @@ optional_policy(`
+@@ -312,6 +397,11 @@ optional_policy(`
')
optional_policy(`
@@ -21594,7 +21753,7 @@ index 8dbab4c..a2f0d06 100644
# nfs kernel server needs kernel UDP access. It is less risky and painful
# to just give it everything.
allow kernel_t self:tcp_socket create_stream_socket_perms;
-@@ -332,9 +417,6 @@ optional_policy(`
+@@ -332,9 +422,6 @@ optional_policy(`
sysnet_read_config(kernel_t)
@@ -21604,7 +21763,7 @@ index 8dbab4c..a2f0d06 100644
rpc_udp_rw_nfs_sockets(kernel_t)
tunable_policy(`nfs_export_all_ro',`
-@@ -343,9 +425,7 @@ optional_policy(`
+@@ -343,9 +430,7 @@ optional_policy(`
fs_read_noxattr_fs_files(kernel_t)
fs_read_noxattr_fs_symlinks(kernel_t)
@@ -21615,7 +21774,7 @@ index 8dbab4c..a2f0d06 100644
')
tunable_policy(`nfs_export_all_rw',`
-@@ -354,7 +434,7 @@ optional_policy(`
+@@ -354,7 +439,7 @@ optional_policy(`
fs_read_noxattr_fs_files(kernel_t)
fs_read_noxattr_fs_symlinks(kernel_t)
@@ -21624,7 +21783,7 @@ index 8dbab4c..a2f0d06 100644
')
')
-@@ -364,9 +444,22 @@ optional_policy(`
+@@ -364,9 +449,22 @@ optional_policy(`
')
optional_policy(`
@@ -21647,7 +21806,7 @@ index 8dbab4c..a2f0d06 100644
########################################
#
# Unlabeled process local policy
-@@ -388,6 +481,8 @@ optional_policy(`
+@@ -388,6 +486,8 @@ optional_policy(`
if( ! secure_mode_insmod ) {
allow can_load_kernmodule self:capability sys_module;
@@ -21656,7 +21815,7 @@ index 8dbab4c..a2f0d06 100644
# load_module() calls stop_machine() which
# calls sched_setscheduler()
allow can_load_kernmodule self:capability sys_nice;
-@@ -399,14 +494,38 @@ if( ! secure_mode_insmod ) {
+@@ -399,14 +499,38 @@ if( ! secure_mode_insmod ) {
# Rules for unconfined acccess to this module
#
@@ -21700,7 +21859,7 @@ index 8dbab4c..a2f0d06 100644
+read_lnk_files_pattern(kernel_system_state_reader, proc_t, proc_t)
+list_dirs_pattern(kernel_system_state_reader, proc_t, proc_t)
diff --git a/policy/modules/kernel/mcs.if b/policy/modules/kernel/mcs.if
-index b08a6e8..43d504b 100644
+index b08a6e849..43d504b88 100644
--- a/policy/modules/kernel/mcs.if
+++ b/policy/modules/kernel/mcs.if
@@ -44,11 +44,7 @@ interface(`mcs_constrained',`
@@ -21776,7 +21935,7 @@ index b08a6e8..43d504b 100644
+ refpolicywarn(`$0() has been deprecated, please remove mcs_constrained() instead.')
+')
diff --git a/policy/modules/kernel/mcs.te b/policy/modules/kernel/mcs.te
-index 2da98c2..31bed0a 100644
+index 2da98c257..31bed0a7c 100644
--- a/policy/modules/kernel/mcs.te
+++ b/policy/modules/kernel/mcs.te
@@ -11,3 +11,4 @@ attribute mcssetcats;
@@ -21785,7 +21944,7 @@ index 2da98c2..31bed0a 100644
attribute mcs_constrained_type;
+attribute mcsnetwrite;
diff --git a/policy/modules/kernel/mls.if b/policy/modules/kernel/mls.if
-index d178478..42bf05b 100644
+index d178478da..42bf05bcd 100644
--- a/policy/modules/kernel/mls.if
+++ b/policy/modules/kernel/mls.if
@@ -100,6 +100,26 @@ interface(`mls_file_write_to_clearance',`
@@ -21816,7 +21975,7 @@ index d178478..42bf05b 100644
##
##
diff --git a/policy/modules/kernel/mls.te b/policy/modules/kernel/mls.te
-index 8c7bd90..66ee5b9 100644
+index 8c7bd90d2..66ee5b9a1 100644
--- a/policy/modules/kernel/mls.te
+++ b/policy/modules/kernel/mls.te
@@ -12,6 +12,7 @@ attribute mlsfilewritetoclr;
@@ -21828,14 +21987,14 @@ index 8c7bd90..66ee5b9 100644
attribute mlsnetread;
attribute mlsnetreadtoclr;
diff --git a/policy/modules/kernel/selinux.fc b/policy/modules/kernel/selinux.fc
-index 7be4ddf..4d4c577 100644
+index 7be4ddf74..4d4c577ad 100644
--- a/policy/modules/kernel/selinux.fc
+++ b/policy/modules/kernel/selinux.fc
@@ -1 +1 @@
-# This module currently does not have any file contexts.
+/selinux -l gen_context(system_u:object_r:security_t,s0)
diff --git a/policy/modules/kernel/selinux.if b/policy/modules/kernel/selinux.if
-index 6d0811d..708f074 100644
+index 6d0811da3..708f07490 100644
--- a/policy/modules/kernel/selinux.if
+++ b/policy/modules/kernel/selinux.if
@@ -40,7 +40,7 @@ interface(`selinux_labeled_boolean',`
@@ -22204,7 +22363,7 @@ index 6d0811d..708f074 100644
+ mls_trusted_object($1)
')
diff --git a/policy/modules/kernel/selinux.te b/policy/modules/kernel/selinux.te
-index e0a973b..7d3e431 100644
+index e0a973ba1..7d3e431ee 100644
--- a/policy/modules/kernel/selinux.te
+++ b/policy/modules/kernel/selinux.te
@@ -17,6 +17,7 @@ gen_bool(secure_mode_policyload,false)
@@ -22270,7 +22429,7 @@ index e0a973b..7d3e431 100644
')
}
diff --git a/policy/modules/kernel/storage.fc b/policy/modules/kernel/storage.fc
-index 54f1827..6910c88 100644
+index 54f182702..6910c8869 100644
--- a/policy/modules/kernel/storage.fc
+++ b/policy/modules/kernel/storage.fc
@@ -7,6 +7,7 @@
@@ -22309,7 +22468,7 @@ index 54f1827..6910c88 100644
+/usr/lib/udev/devices/loop.* -b gen_context(system_u:object_r:fixed_disk_device_t,mls_systemhigh)
+/usr/lib/udev/devices/fuse -c gen_context(system_u:object_r:fuse_device_t,s0)
diff --git a/policy/modules/kernel/storage.if b/policy/modules/kernel/storage.if
-index 64c4cd0..52070af 100644
+index 64c4cd01c..52070af0b 100644
--- a/policy/modules/kernel/storage.if
+++ b/policy/modules/kernel/storage.if
@@ -22,6 +22,30 @@ interface(`storage_getattr_fixed_disk_dev',`
@@ -22958,7 +23117,7 @@ index 64c4cd0..52070af 100644
+
+')
diff --git a/policy/modules/kernel/storage.te b/policy/modules/kernel/storage.te
-index 156c333..02f5a3c 100644
+index 156c33310..02f5a3c91 100644
--- a/policy/modules/kernel/storage.te
+++ b/policy/modules/kernel/storage.te
@@ -57,3 +57,9 @@ dev_node(tape_device_t)
@@ -22972,7 +23131,7 @@ index 156c333..02f5a3c 100644
+ dev_manage_generic_blk_files(fixed_disk_raw_write)
+')
diff --git a/policy/modules/kernel/terminal.fc b/policy/modules/kernel/terminal.fc
-index 0ea25b6..37069ae 100644
+index 0ea25b653..37069ae93 100644
--- a/policy/modules/kernel/terminal.fc
+++ b/policy/modules/kernel/terminal.fc
@@ -14,12 +14,13 @@
@@ -23000,7 +23159,7 @@ index 0ea25b6..37069ae 100644
+
+/usr/lib/udev/devices/pts -d gen_context(system_u:object_r:devpts_t,s0-mls_systemhigh)
diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if
-index cbb729b..ce0291e 100644
+index cbb729b66..ce0291ec6 100644
--- a/policy/modules/kernel/terminal.if
+++ b/policy/modules/kernel/terminal.if
@@ -124,7 +124,7 @@ interface(`term_user_tty',`
@@ -23876,7 +24035,7 @@ index cbb729b..ce0291e 100644
+ dev_filetrans($1, tty_device_t, chr_file, "xvc9")
')
diff --git a/policy/modules/kernel/terminal.te b/policy/modules/kernel/terminal.te
-index 66e116a..a0a5d90 100644
+index 66e116a3f..a0a5d90fe 100644
--- a/policy/modules/kernel/terminal.te
+++ b/policy/modules/kernel/terminal.te
@@ -29,6 +29,7 @@ files_mountpoint(devpts_t)
@@ -23898,21 +24057,21 @@ index 66e116a..a0a5d90 100644
dev_node(virtio_device_t)
diff --git a/policy/modules/kernel/unlabelednet.fc b/policy/modules/kernel/unlabelednet.fc
new file mode 100644
-index 0000000..f310b9d
+index 000000000..f310b9d55
--- /dev/null
+++ b/policy/modules/kernel/unlabelednet.fc
@@ -0,0 +1 @@
+# No unlabelednet file contexts.
diff --git a/policy/modules/kernel/unlabelednet.if b/policy/modules/kernel/unlabelednet.if
new file mode 100644
-index 0000000..0ce0470
+index 000000000..0ce04703a
--- /dev/null
+++ b/policy/modules/kernel/unlabelednet.if
@@ -0,0 +1 @@
+## Policy for allowing confined domains to use unlabeled_t packets
diff --git a/policy/modules/kernel/unlabelednet.te b/policy/modules/kernel/unlabelednet.te
new file mode 100644
-index 0000000..48caabc
+index 000000000..48caabc7e
--- /dev/null
+++ b/policy/modules/kernel/unlabelednet.te
@@ -0,0 +1,12 @@
@@ -23929,7 +24088,7 @@ index 0000000..48caabc
+allow domain unlabeled_t:packet { send recv };
+
diff --git a/policy/modules/roles/auditadm.te b/policy/modules/roles/auditadm.te
-index 834a065..ff93697 100644
+index 834a065de..ff9369756 100644
--- a/policy/modules/roles/auditadm.te
+++ b/policy/modules/roles/auditadm.te
@@ -7,7 +7,7 @@ policy_module(auditadm, 2.2.0)
@@ -23966,7 +24125,7 @@ index 834a065..ff93697 100644
consoletype_exec(auditadm_t)
')
diff --git a/policy/modules/roles/logadm.te b/policy/modules/roles/logadm.te
-index 3a45a3e..7499f24 100644
+index 3a45a3ef0..7499f24b5 100644
--- a/policy/modules/roles/logadm.te
+++ b/policy/modules/roles/logadm.te
@@ -7,13 +7,12 @@ policy_module(logadm, 1.0.0)
@@ -23986,7 +24145,7 @@ index 3a45a3e..7499f24 100644
+allow logadm_t self:capability { dac_override dac_read_search kill sys_nice };
logging_admin(logadm_t, logadm_r)
diff --git a/policy/modules/roles/secadm.te b/policy/modules/roles/secadm.te
-index da11120..621ec5a 100644
+index da111206f..621ec5afc 100644
--- a/policy/modules/roles/secadm.te
+++ b/policy/modules/roles/secadm.te
@@ -7,8 +7,11 @@ policy_module(secadm, 2.4.0)
@@ -24027,7 +24186,7 @@ index da11120..621ec5a 100644
init_exec(secadm_t)
diff --git a/policy/modules/roles/staff.if b/policy/modules/roles/staff.if
-index 234a940..a92415a 100644
+index 234a940f9..a92415a9d 100644
--- a/policy/modules/roles/staff.if
+++ b/policy/modules/roles/staff.if
@@ -1,4 +1,20 @@
@@ -24053,10 +24212,10 @@ index 234a940..a92415a 100644
########################################
##
diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
-index 0fef1fc..25e60c8 100644
+index 0fef1fca2..88ac7d6bb 100644
--- a/policy/modules/roles/staff.te
+++ b/policy/modules/roles/staff.te
-@@ -8,12 +8,73 @@ policy_module(staff, 2.4.0)
+@@ -8,11 +8,73 @@ policy_module(staff, 2.4.0)
role staff_r;
userdom_unpriv_user_template(staff)
@@ -24073,7 +24232,8 @@ index 0fef1fc..25e60c8 100644
#
# Local policy
#
-
++corenet_ib_access_unlabeled_pkeys(staff_t)
++
+kernel_read_ring_buffer(staff_t)
+kernel_getattr_core_if(staff_t)
+kernel_getattr_message_if(staff_t)
@@ -24126,11 +24286,10 @@ index 0fef1fc..25e60c8 100644
+optional_policy(`
+ accountsd_read_lib_files(staff_t)
+')
-+
+
optional_policy(`
apache_role(staff_r, staff_t)
- ')
-@@ -23,11 +84,128 @@ optional_policy(`
+@@ -23,11 +85,128 @@ optional_policy(`
')
optional_policy(`
@@ -24260,7 +24419,7 @@ index 0fef1fc..25e60c8 100644
')
optional_policy(`
-@@ -35,20 +213,74 @@ optional_policy(`
+@@ -35,20 +214,74 @@ optional_policy(`
')
optional_policy(`
@@ -24337,7 +24496,7 @@ index 0fef1fc..25e60c8 100644
')
optional_policy(`
-@@ -56,7 +288,20 @@ optional_policy(`
+@@ -56,7 +289,20 @@ optional_policy(`
')
optional_policy(`
@@ -24359,7 +24518,7 @@ index 0fef1fc..25e60c8 100644
')
ifndef(`distro_redhat',`
-@@ -65,10 +310,6 @@ ifndef(`distro_redhat',`
+@@ -65,10 +311,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -24370,7 +24529,7 @@ index 0fef1fc..25e60c8 100644
cdrecord_role(staff_r, staff_t)
')
-@@ -78,10 +319,6 @@ ifndef(`distro_redhat',`
+@@ -78,10 +320,6 @@ ifndef(`distro_redhat',`
optional_policy(`
dbus_role_template(staff, staff_r, staff_t)
@@ -24381,7 +24540,7 @@ index 0fef1fc..25e60c8 100644
')
optional_policy(`
-@@ -101,10 +338,6 @@ ifndef(`distro_redhat',`
+@@ -101,10 +339,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -24392,7 +24551,7 @@ index 0fef1fc..25e60c8 100644
java_role(staff_r, staff_t)
')
-@@ -125,10 +358,6 @@ ifndef(`distro_redhat',`
+@@ -125,10 +359,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -24403,7 +24562,7 @@ index 0fef1fc..25e60c8 100644
pyzor_role(staff_r, staff_t)
')
-@@ -141,10 +370,6 @@ ifndef(`distro_redhat',`
+@@ -141,10 +371,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -24414,7 +24573,7 @@ index 0fef1fc..25e60c8 100644
spamassassin_role(staff_r, staff_t)
')
-@@ -176,3 +401,24 @@ ifndef(`distro_redhat',`
+@@ -176,3 +402,24 @@ ifndef(`distro_redhat',`
wireshark_role(staff_r, staff_t)
')
')
@@ -24440,7 +24599,7 @@ index 0fef1fc..25e60c8 100644
+ ')
+')
diff --git a/policy/modules/roles/sysadm.if b/policy/modules/roles/sysadm.if
-index ff92430..36740ea 100644
+index ff9243078..36740eab3 100644
--- a/policy/modules/roles/sysadm.if
+++ b/policy/modules/roles/sysadm.if
@@ -70,6 +70,23 @@ interface(`sysadm_shell_domtrans',`
@@ -24468,10 +24627,10 @@ index ff92430..36740ea 100644
##
## Execute a generic bin program in the sysadm domain.
diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
-index 2522ca6..8932351 100644
+index 2522ca6c0..800f41930 100644
--- a/policy/modules/roles/sysadm.te
+++ b/policy/modules/roles/sysadm.te
-@@ -5,39 +5,102 @@ policy_module(sysadm, 2.6.1)
+@@ -5,39 +5,105 @@ policy_module(sysadm, 2.6.1)
# Declarations
#
@@ -24555,6 +24714,9 @@ index 2522ca6..8932351 100644
+userdom_manage_tmp_role(sysadm_r, sysadm_t)
+userdom_exec_admin_home_files(sysadm_t)
+
++corenet_ib_access_unlabeled_pkeys(sysadm_t)
++corenet_ib_manage_subnet_unlabeled_endports(sysadm_t)
++
+optional_policy(`
+ abrt_filetrans_named_content(sysadm_t)
+')
@@ -24584,7 +24746,7 @@ index 2522ca6..8932351 100644
ifdef(`direct_sysadm_daemon',`
optional_policy(`
-@@ -55,13 +118,7 @@ ifdef(`distro_gentoo',`
+@@ -55,13 +121,7 @@ ifdef(`distro_gentoo',`
init_exec_rc(sysadm_t)
')
@@ -24599,7 +24761,7 @@ index 2522ca6..8932351 100644
domain_ptrace_all_domains(sysadm_t)
')
-@@ -71,9 +128,9 @@ optional_policy(`
+@@ -71,9 +131,9 @@ optional_policy(`
optional_policy(`
apache_run_helper(sysadm_t, sysadm_r)
@@ -24610,7 +24772,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -87,6 +144,7 @@ optional_policy(`
+@@ -87,6 +147,7 @@ optional_policy(`
optional_policy(`
asterisk_stream_connect(sysadm_t)
@@ -24618,7 +24780,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -110,11 +168,17 @@ optional_policy(`
+@@ -110,11 +171,17 @@ optional_policy(`
')
optional_policy(`
@@ -24636,20 +24798,20 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -122,11 +186,27 @@ optional_policy(`
+@@ -122,11 +189,27 @@ optional_policy(`
')
optional_policy(`
- consoletype_run(sysadm_t, sysadm_r)
+ cron_admin_role(sysadm_r, sysadm_t)
++')
++
++optional_policy(`
++ consoletype_exec(sysadm_t)
')
optional_policy(`
- cvs_exec(sysadm_t)
-+ consoletype_exec(sysadm_t)
-+')
-+
-+optional_policy(`
+ daemonstools_run_start(sysadm_t, sysadm_r)
+')
+
@@ -24666,7 +24828,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -140,6 +220,10 @@ optional_policy(`
+@@ -140,6 +223,10 @@ optional_policy(`
')
optional_policy(`
@@ -24677,7 +24839,7 @@ index 2522ca6..8932351 100644
dmesg_exec(sysadm_t)
')
-@@ -156,6 +240,10 @@ optional_policy(`
+@@ -156,6 +243,10 @@ optional_policy(`
')
optional_policy(`
@@ -24688,7 +24850,7 @@ index 2522ca6..8932351 100644
fstools_run(sysadm_t, sysadm_r)
')
-@@ -164,6 +252,11 @@ optional_policy(`
+@@ -164,6 +255,11 @@ optional_policy(`
')
optional_policy(`
@@ -24700,7 +24862,7 @@ index 2522ca6..8932351 100644
hadoop_role(sysadm_r, sysadm_t)
')
-@@ -172,13 +265,31 @@ optional_policy(`
+@@ -172,13 +268,31 @@ optional_policy(`
# at things (e.g., ipsec auto --status)
# probably should create an ipsec_admin role for this kind of thing
ipsec_exec_mgmt(sysadm_t)
@@ -24732,7 +24894,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -190,11 +301,12 @@ optional_policy(`
+@@ -190,11 +304,12 @@ optional_policy(`
')
optional_policy(`
@@ -24747,7 +24909,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -210,22 +322,21 @@ optional_policy(`
+@@ -210,22 +325,21 @@ optional_policy(`
modutils_run_depmod(sysadm_t, sysadm_r)
modutils_run_insmod(sysadm_t, sysadm_r)
modutils_run_update_mods(sysadm_t, sysadm_r)
@@ -24777,7 +24939,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -237,14 +348,32 @@ optional_policy(`
+@@ -237,14 +351,32 @@ optional_policy(`
')
optional_policy(`
@@ -24810,7 +24972,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -252,10 +381,20 @@ optional_policy(`
+@@ -252,10 +384,20 @@ optional_policy(`
')
optional_policy(`
@@ -24831,7 +24993,7 @@ index 2522ca6..8932351 100644
portage_run(sysadm_t, sysadm_r)
portage_run_fetch(sysadm_t, sysadm_r)
portage_run_gcc_config(sysadm_t, sysadm_r)
-@@ -266,35 +405,46 @@ optional_policy(`
+@@ -266,35 +408,46 @@ optional_policy(`
')
optional_policy(`
@@ -24885,7 +25047,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -308,6 +458,7 @@ optional_policy(`
+@@ -308,6 +461,7 @@ optional_policy(`
optional_policy(`
screen_role_template(sysadm, sysadm_r, sysadm_t)
@@ -24893,7 +25055,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -315,12 +466,20 @@ optional_policy(`
+@@ -315,12 +469,20 @@ optional_policy(`
')
optional_policy(`
@@ -24915,7 +25077,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -345,30 +504,38 @@ optional_policy(`
+@@ -345,30 +507,38 @@ optional_policy(`
')
optional_policy(`
@@ -24963,7 +25125,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -380,10 +547,6 @@ optional_policy(`
+@@ -380,10 +550,6 @@ optional_policy(`
')
optional_policy(`
@@ -24974,7 +25136,7 @@ index 2522ca6..8932351 100644
usermanage_run_admin_passwd(sysadm_t, sysadm_r)
usermanage_run_groupadd(sysadm_t, sysadm_r)
usermanage_run_useradd(sysadm_t, sysadm_r)
-@@ -391,6 +554,9 @@ optional_policy(`
+@@ -391,6 +557,9 @@ optional_policy(`
optional_policy(`
virt_stream_connect(sysadm_t)
@@ -24984,7 +25146,7 @@ index 2522ca6..8932351 100644
')
optional_policy(`
-@@ -398,31 +564,34 @@ optional_policy(`
+@@ -398,31 +567,34 @@ optional_policy(`
')
optional_policy(`
@@ -25025,7 +25187,7 @@ index 2522ca6..8932351 100644
auth_role(sysadm_r, sysadm_t)
')
-@@ -435,10 +604,6 @@ ifndef(`distro_redhat',`
+@@ -435,10 +607,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -25036,7 +25198,7 @@ index 2522ca6..8932351 100644
dbus_role_template(sysadm, sysadm_r, sysadm_t)
optional_policy(`
-@@ -459,15 +624,79 @@ ifndef(`distro_redhat',`
+@@ -459,15 +627,79 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -25121,21 +25283,21 @@ index 2522ca6..8932351 100644
+')
diff --git a/policy/modules/roles/sysadm_secadm.fc b/policy/modules/roles/sysadm_secadm.fc
new file mode 100644
-index 0000000..ae3b6db
+index 000000000..ae3b6db92
--- /dev/null
+++ b/policy/modules/roles/sysadm_secadm.fc
@@ -0,0 +1 @@
+# No context
diff --git a/policy/modules/roles/sysadm_secadm.if b/policy/modules/roles/sysadm_secadm.if
new file mode 100644
-index 0000000..bd83148
+index 000000000..bd83148e1
--- /dev/null
+++ b/policy/modules/roles/sysadm_secadm.if
@@ -0,0 +1 @@
+## No Interfaces
diff --git a/policy/modules/roles/sysadm_secadm.te b/policy/modules/roles/sysadm_secadm.te
new file mode 100644
-index 0000000..63bc797
+index 000000000..63bc79792
--- /dev/null
+++ b/policy/modules/roles/sysadm_secadm.te
@@ -0,0 +1,25 @@
@@ -25166,7 +25328,7 @@ index 0000000..63bc797
+logging_stream_connect_syslog(sysadm_t)
diff --git a/policy/modules/roles/unconfineduser.fc b/policy/modules/roles/unconfineduser.fc
new file mode 100644
-index 0000000..d9efb90
+index 000000000..d9efb902a
--- /dev/null
+++ b/policy/modules/roles/unconfineduser.fc
@@ -0,0 +1,8 @@
@@ -25180,7 +25342,7 @@ index 0000000..d9efb90
+#/usr/sbin/xrdp-sesman -- gen_context(system_u:object_r:unconfined_exec_t,s0)
diff --git a/policy/modules/roles/unconfineduser.if b/policy/modules/roles/unconfineduser.if
new file mode 100644
-index 0000000..f730286
+index 000000000..f73028658
--- /dev/null
+++ b/policy/modules/roles/unconfineduser.if
@@ -0,0 +1,745 @@
@@ -25931,7 +26093,7 @@ index 0000000..f730286
+
diff --git a/policy/modules/roles/unconfineduser.te b/policy/modules/roles/unconfineduser.te
new file mode 100644
-index 0000000..883d9ea
+index 000000000..883d9eaa3
--- /dev/null
+++ b/policy/modules/roles/unconfineduser.te
@@ -0,0 +1,362 @@
@@ -26298,7 +26460,7 @@ index 0000000..883d9ea
+gen_user(unconfined_u, user, unconfined_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
+
diff --git a/policy/modules/roles/unprivuser.if b/policy/modules/roles/unprivuser.if
-index 3835596..fbca2be 100644
+index 383559646..fbca2be81 100644
--- a/policy/modules/roles/unprivuser.if
+++ b/policy/modules/roles/unprivuser.if
@@ -1,4 +1,4 @@
@@ -26308,7 +26470,7 @@ index 3835596..fbca2be 100644
########################################
##
diff --git a/policy/modules/roles/unprivuser.te b/policy/modules/roles/unprivuser.te
-index 6d77e81..74de333 100644
+index 6d77e81c5..74de33345 100644
--- a/policy/modules/roles/unprivuser.te
+++ b/policy/modules/roles/unprivuser.te
@@ -1,5 +1,12 @@
@@ -26500,7 +26662,7 @@ index 6d77e81..74de333 100644
+ ')
')
diff --git a/policy/modules/services/postgresql.fc b/policy/modules/services/postgresql.fc
-index a26f84f..f4a44eb 100644
+index a26f84f40..f4a44ebc6 100644
--- a/policy/modules/services/postgresql.fc
+++ b/policy/modules/services/postgresql.fc
@@ -10,11 +10,16 @@
@@ -26540,7 +26702,7 @@ index a26f84f..f4a44eb 100644
-/var/run/postmaster.* gen_context(system_u:object_r:postgresql_var_run_t,s0)
+#/var/run/postmaster.* gen_context(system_u:object_r:postgresql_var_run_t,s0)
diff --git a/policy/modules/services/postgresql.if b/policy/modules/services/postgresql.if
-index 9d2f311..2d782e0 100644
+index 9d2f31168..2d782e051 100644
--- a/policy/modules/services/postgresql.if
+++ b/policy/modules/services/postgresql.if
@@ -10,90 +10,46 @@
@@ -26895,7 +27057,7 @@ index 9d2f311..2d782e0 100644
+ postgresql_filetrans_named_content($1)
')
diff --git a/policy/modules/services/postgresql.te b/policy/modules/services/postgresql.te
-index 0306134..bb5f3dd 100644
+index 03061349c..bb5f3dd51 100644
--- a/policy/modules/services/postgresql.te
+++ b/policy/modules/services/postgresql.te
@@ -19,25 +19,32 @@ gen_require(`
@@ -27120,7 +27282,7 @@ index 0306134..bb5f3dd 100644
+ ')
+')
diff --git a/policy/modules/services/ssh.fc b/policy/modules/services/ssh.fc
-index 76d9f66..7528851 100644
+index 76d9f66ec..7528851ad 100644
--- a/policy/modules/services/ssh.fc
+++ b/policy/modules/services/ssh.fc
@@ -1,16 +1,42 @@
@@ -27169,7 +27331,7 @@ index 76d9f66..7528851 100644
+/root/\.ssh(/.*)? gen_context(system_u:object_r:ssh_home_t,s0)
+/root/\.shosts gen_context(system_u:object_r:ssh_home_t,s0)
diff --git a/policy/modules/services/ssh.if b/policy/modules/services/ssh.if
-index fe0c682..79d568a 100644
+index fe0c68272..79d568a54 100644
--- a/policy/modules/services/ssh.if
+++ b/policy/modules/services/ssh.if
@@ -32,10 +32,11 @@
@@ -27902,7 +28064,7 @@ index fe0c682..79d568a 100644
+ ps_process_pattern($1, sshd_t)
+')
diff --git a/policy/modules/services/ssh.te b/policy/modules/services/ssh.te
-index cc877c7..3038b08 100644
+index cc877c7b0..3038b0862 100644
--- a/policy/modules/services/ssh.te
+++ b/policy/modules/services/ssh.te
@@ -6,43 +6,69 @@ policy_module(ssh, 2.4.2)
@@ -28576,7 +28738,7 @@ index cc877c7..3038b08 100644
+ xserver_rw_xdm_pipes(ssh_agent_type)
+')
diff --git a/policy/modules/services/xserver.fc b/policy/modules/services/xserver.fc
-index 8274418..a47fd0b4 100644
+index 8274418c6..a47fd0b4d 100644
--- a/policy/modules/services/xserver.fc
+++ b/policy/modules/services/xserver.fc
@@ -2,13 +2,39 @@
@@ -28745,7 +28907,7 @@ index 8274418..a47fd0b4 100644
+/var/lib/pqsql/\.Xauthority.* -- gen_context(system_u:object_r:xauth_home_t,s0)
+
diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
-index 6bf0ecc..e6be63a 100644
+index 6bf0ecc2d..e6be63aa8 100644
--- a/policy/modules/services/xserver.if
+++ b/policy/modules/services/xserver.if
@@ -18,100 +18,36 @@
@@ -30505,7 +30667,7 @@ index 6bf0ecc..e6be63a 100644
+')
+
diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
-index 8b40377..fc04c66 100644
+index 8b403774f..fc04c66d5 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -26,28 +26,66 @@ gen_require(`
@@ -32032,7 +32194,7 @@ index 8b40377..fc04c66 100644
+ dev_dontaudit_rw_dri(dridomain)
+')
diff --git a/policy/modules/system/application.if b/policy/modules/system/application.if
-index 1b6619e..be02b96 100644
+index 1b6619e64..be02b9618 100644
--- a/policy/modules/system/application.if
+++ b/policy/modules/system/application.if
@@ -43,6 +43,27 @@ interface(`application_executable_file',`
@@ -32143,7 +32305,7 @@ index 1b6619e..be02b96 100644
+ allow $1 application_domain_type:socket_class_set getattr;
+')
diff --git a/policy/modules/system/application.te b/policy/modules/system/application.te
-index c6fdab7..af71c62 100644
+index c6fdab72d..af71c62f7 100644
--- a/policy/modules/system/application.te
+++ b/policy/modules/system/application.te
@@ -6,15 +6,40 @@ attribute application_domain_type;
@@ -32189,7 +32351,7 @@ index c6fdab7..af71c62 100644
sudo_sigchld(application_domain_type)
')
diff --git a/policy/modules/system/authlogin.fc b/policy/modules/system/authlogin.fc
-index 2479587..890e1e2 100644
+index 247958765..890e1e293 100644
--- a/policy/modules/system/authlogin.fc
+++ b/policy/modules/system/authlogin.fc
@@ -1,14 +1,28 @@
@@ -32284,7 +32446,7 @@ index 2479587..890e1e2 100644
/var/(db|adm)/sudo(/.*)? gen_context(system_u:object_r:pam_var_run_t,s0)
/var/lib/sudo(/.*)? gen_context(system_u:object_r:pam_var_run_t,s0)
diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
-index 3efd5b6..3db526f 100644
+index 3efd5b669..3db526f84 100644
--- a/policy/modules/system/authlogin.if
+++ b/policy/modules/system/authlogin.if
@@ -23,11 +23,17 @@ interface(`auth_role',`
@@ -33202,7 +33364,7 @@ index 3efd5b6..3db526f 100644
+ allow $1 login_pgm:key manage_key_perms;
+')
diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
-index 09b791d..2d255df 100644
+index 09b791dcc..2d255df93 100644
--- a/policy/modules/system/authlogin.te
+++ b/policy/modules/system/authlogin.te
@@ -5,6 +5,19 @@ policy_module(authlogin, 2.5.1)
@@ -33705,7 +33867,7 @@ index 09b791d..2d255df 100644
+ ssh_read_user_home_files(login_pgm)
+')
diff --git a/policy/modules/system/clock.fc b/policy/modules/system/clock.fc
-index c5e05ca..c9ddbee 100644
+index c5e05ca70..c9ddbeeca 100644
--- a/policy/modules/system/clock.fc
+++ b/policy/modules/system/clock.fc
@@ -3,3 +3,5 @@
@@ -33715,7 +33877,7 @@ index c5e05ca..c9ddbee 100644
+/usr/sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0)
+
diff --git a/policy/modules/system/clock.if b/policy/modules/system/clock.if
-index d475c2d..55305d5 100644
+index d475c2deb..55305d5f3 100644
--- a/policy/modules/system/clock.if
+++ b/policy/modules/system/clock.if
@@ -117,3 +117,40 @@ interface(`clock_rw_adjtime',`
@@ -33760,7 +33922,7 @@ index d475c2d..55305d5 100644
+ files_etc_filetrans($1, adjtime_t, file, "adjtime" )
+')
diff --git a/policy/modules/system/clock.te b/policy/modules/system/clock.te
-index edece47..2e7b811 100644
+index edece47dc..2e7b81176 100644
--- a/policy/modules/system/clock.te
+++ b/policy/modules/system/clock.te
@@ -20,7 +20,7 @@ role system_r types hwclock_t;
@@ -33807,7 +33969,7 @@ index edece47..2e7b811 100644
')
diff --git a/policy/modules/system/fstools.fc b/policy/modules/system/fstools.fc
-index 948ce2a..8cab8ae 100644
+index 948ce2a32..8cab8aef2 100644
--- a/policy/modules/system/fstools.fc
+++ b/policy/modules/system/fstools.fc
@@ -1,4 +1,3 @@
@@ -33880,7 +34042,7 @@ index 948ce2a..8cab8ae 100644
+
+/var/run/blkid(/.*)? gen_context(system_u:object_r:fsadm_var_run_t,s0)
diff --git a/policy/modules/system/fstools.if b/policy/modules/system/fstools.if
-index 016a770..3fce820 100644
+index 016a770b9..3fce820a5 100644
--- a/policy/modules/system/fstools.if
+++ b/policy/modules/system/fstools.if
@@ -154,3 +154,42 @@ interface(`fstools_getattr_swap_files',`
@@ -33927,7 +34089,7 @@ index 016a770..3fce820 100644
+ files_pid_filetrans($1, fsadm_var_run_t, dir, "blkid")
+')
diff --git a/policy/modules/system/fstools.te b/policy/modules/system/fstools.te
-index 3f48d30..cb4f966 100644
+index 3f48d300a..cb4f966c0 100644
--- a/policy/modules/system/fstools.te
+++ b/policy/modules/system/fstools.te
@@ -13,9 +13,15 @@ role system_r types fsadm_t;
@@ -34080,7 +34242,7 @@ index 3f48d30..cb4f966 100644
xen_rw_image_files(fsadm_t)
')
diff --git a/policy/modules/system/getty.fc b/policy/modules/system/getty.fc
-index e1a1848..4927638 100644
+index e1a1848a2..492763873 100644
--- a/policy/modules/system/getty.fc
+++ b/policy/modules/system/getty.fc
@@ -3,8 +3,12 @@
@@ -34099,7 +34261,7 @@ index e1a1848..4927638 100644
/var/run/mgetty\.pid.* -- gen_context(system_u:object_r:getty_var_run_t,s0)
diff --git a/policy/modules/system/getty.if b/policy/modules/system/getty.if
-index e4376aa..2c98c56 100644
+index e4376aa98..2c98c5647 100644
--- a/policy/modules/system/getty.if
+++ b/policy/modules/system/getty.if
@@ -96,3 +96,45 @@ interface(`getty_rw_config',`
@@ -34149,7 +34311,7 @@ index e4376aa..2c98c56 100644
+ allow $1 getty_unit_file_t:service start;
+')
diff --git a/policy/modules/system/getty.te b/policy/modules/system/getty.te
-index f6743ea..ef08ff3 100644
+index f6743ea19..ef08ff3cf 100644
--- a/policy/modules/system/getty.te
+++ b/policy/modules/system/getty.te
@@ -27,13 +27,24 @@ files_tmp_file(getty_tmp_t)
@@ -34237,7 +34399,7 @@ index f6743ea..ef08ff3 100644
optional_policy(`
diff --git a/policy/modules/system/hostname.fc b/policy/modules/system/hostname.fc
-index 9dfecf7..6d00f5c 100644
+index 9dfecf77c..6d00f5c13 100644
--- a/policy/modules/system/hostname.fc
+++ b/policy/modules/system/hostname.fc
@@ -1,2 +1,4 @@
@@ -34246,7 +34408,7 @@ index 9dfecf7..6d00f5c 100644
+
+/usr/bin/hostname -- gen_context(system_u:object_r:hostname_exec_t,s0)
diff --git a/policy/modules/system/hostname.if b/policy/modules/system/hostname.if
-index 187f04f..cf0af09 100644
+index 187f04f83..cf0af0991 100644
--- a/policy/modules/system/hostname.if
+++ b/policy/modules/system/hostname.if
@@ -53,7 +53,6 @@ interface(`hostname_run',`
@@ -34258,7 +34420,7 @@ index 187f04f..cf0af09 100644
interface(`hostname_exec',`
gen_require(`
diff --git a/policy/modules/system/hostname.te b/policy/modules/system/hostname.te
-index 24a7889..619b32e 100644
+index 24a78897a..619b32ebe 100644
--- a/policy/modules/system/hostname.te
+++ b/policy/modules/system/hostname.te
@@ -23,33 +23,36 @@ dontaudit hostname_t self:capability sys_tty_config;
@@ -34325,7 +34487,7 @@ index 24a7889..619b32e 100644
xen_dontaudit_use_fds(hostname_t)
')
diff --git a/policy/modules/system/hotplug.fc b/policy/modules/system/hotplug.fc
-index caf736b..91c4c6f 100644
+index caf736b3b..91c4c6f23 100644
--- a/policy/modules/system/hotplug.fc
+++ b/policy/modules/system/hotplug.fc
@@ -7,5 +7,8 @@
@@ -34338,7 +34500,7 @@ index caf736b..91c4c6f 100644
/var/run/usb(/.*)? gen_context(system_u:object_r:hotplug_var_run_t,s0)
/var/run/hotplug(/.*)? gen_context(system_u:object_r:hotplug_var_run_t,s0)
diff --git a/policy/modules/system/hotplug.if b/policy/modules/system/hotplug.if
-index 40eb10c..2a0a32c 100644
+index 40eb10c60..2a0a32c2d 100644
--- a/policy/modules/system/hotplug.if
+++ b/policy/modules/system/hotplug.if
@@ -34,7 +34,7 @@ interface(`hotplug_domtrans',`
@@ -34351,7 +34513,7 @@ index 40eb10c..2a0a32c 100644
corecmd_search_bin($1)
diff --git a/policy/modules/system/hotplug.te b/policy/modules/system/hotplug.te
-index b2097e7..0a49e14 100644
+index b2097e743..0a49e14ba 100644
--- a/policy/modules/system/hotplug.te
+++ b/policy/modules/system/hotplug.te
@@ -23,7 +23,7 @@ files_pid_file(hotplug_var_run_t)
@@ -34406,7 +34568,7 @@ index b2097e7..0a49e14 100644
')
diff --git a/policy/modules/system/init.fc b/policy/modules/system/init.fc
-index bc0ffc8..37b8ea5 100644
+index bc0ffc84e..37b8ea5ec 100644
--- a/policy/modules/system/init.fc
+++ b/policy/modules/system/init.fc
@@ -1,6 +1,9 @@
@@ -34474,7 +34636,7 @@ index bc0ffc8..37b8ea5 100644
')
+/var/run/systemd(/.*)? gen_context(system_u:object_r:init_var_run_t,s0)
diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if
-index 79a45f6..6ed0c39 100644
+index 79a45f62e..6ed0c399a 100644
--- a/policy/modules/system/init.if
+++ b/policy/modules/system/init.if
@@ -1,5 +1,21 @@
@@ -36309,7 +36471,7 @@ index 79a45f6..6ed0c39 100644
+ allow $1 init_var_lib_t:dir search_dir_perms;
+')
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
-index 17eda24..055193c 100644
+index 17eda2480..055193c5d 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -11,10 +11,31 @@ gen_require(`
@@ -37801,7 +37963,7 @@ index 17eda24..055193c 100644
+ ')
+ ')
diff --git a/policy/modules/system/ipsec.fc b/policy/modules/system/ipsec.fc
-index 662e79b..d32012f 100644
+index 662e79be8..d32012ffe 100644
--- a/policy/modules/system/ipsec.fc
+++ b/policy/modules/system/ipsec.fc
@@ -1,14 +1,26 @@
@@ -37863,7 +38025,7 @@ index 662e79b..d32012f 100644
+/var/run/pluto/ipsec\.info -- gen_context(system_u:object_r:ipsec_mgmt_var_run_t, s0)
+/var/run/pluto/ipsec_setup\.pid -- gen_context(system_u:object_r:ipsec_mgmt_var_run_t, s0)
diff --git a/policy/modules/system/ipsec.if b/policy/modules/system/ipsec.if
-index 0d4c8d3..537aa42 100644
+index 0d4c8d35e..537aa4274 100644
--- a/policy/modules/system/ipsec.if
+++ b/policy/modules/system/ipsec.if
@@ -18,6 +18,24 @@ interface(`ipsec_domtrans',`
@@ -38105,7 +38267,7 @@ index 0d4c8d3..537aa42 100644
+ ps_process_pattern($1, ipsec_mgmt_t)
+')
diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te
-index 312cd04..102b975 100644
+index 312cd0417..102b975de 100644
--- a/policy/modules/system/ipsec.te
+++ b/policy/modules/system/ipsec.te
@@ -48,6 +48,9 @@ init_system_domain(ipsec_mgmt_t, ipsec_mgmt_exec_t)
@@ -38444,7 +38606,7 @@ index 312cd04..102b975 100644
+userdom_use_inherited_user_terminals(setkey_t)
+userdom_read_user_tmp_files(setkey_t)
diff --git a/policy/modules/system/iptables.fc b/policy/modules/system/iptables.fc
-index 73a1c4e..1ca98b8 100644
+index 73a1c4e1e..1ca98b865 100644
--- a/policy/modules/system/iptables.fc
+++ b/policy/modules/system/iptables.fc
@@ -1,22 +1,49 @@
@@ -38514,7 +38676,7 @@ index 73a1c4e..1ca98b8 100644
+
+/var/run/xtables.* -- gen_context(system_u:object_r:iptables_var_run_t,s0)
diff --git a/policy/modules/system/iptables.if b/policy/modules/system/iptables.if
-index c42fbc3..bf211db 100644
+index c42fbc329..bf211dbee 100644
--- a/policy/modules/system/iptables.if
+++ b/policy/modules/system/iptables.if
@@ -17,10 +17,6 @@ interface(`iptables_domtrans',`
@@ -38582,7 +38744,7 @@ index c42fbc3..bf211db 100644
+ files_pid_filetrans($1, iptables_var_run_t, file, "xtables.lock")
+')
diff --git a/policy/modules/system/iptables.te b/policy/modules/system/iptables.te
-index be8ed1e..91d1296 100644
+index be8ed1e6c..91d1296b8 100644
--- a/policy/modules/system/iptables.te
+++ b/policy/modules/system/iptables.te
@@ -16,15 +16,21 @@ role iptables_roles types iptables_t;
@@ -38765,14 +38927,14 @@ index be8ed1e..91d1296 100644
optional_policy(`
diff --git a/policy/modules/system/kdbus.fc b/policy/modules/system/kdbus.fc
new file mode 100644
-index 0000000..1bb8bf6
+index 000000000..1bb8bf6d7
--- /dev/null
+++ b/policy/modules/system/kdbus.fc
@@ -0,0 +1 @@
+# empty
diff --git a/policy/modules/system/kdbus.if b/policy/modules/system/kdbus.if
new file mode 100644
-index 0000000..6a1c9ed
+index 000000000..6a1c9ed87
--- /dev/null
+++ b/policy/modules/system/kdbus.if
@@ -0,0 +1,2 @@
@@ -38780,7 +38942,7 @@ index 0000000..6a1c9ed
+
diff --git a/policy/modules/system/kdbus.te b/policy/modules/system/kdbus.te
new file mode 100644
-index 0000000..c814795
+index 000000000..c8147952a
--- /dev/null
+++ b/policy/modules/system/kdbus.te
@@ -0,0 +1,14 @@
@@ -38799,7 +38961,7 @@ index 0000000..c814795
+fs_manage_kdbus_dirs(systemd_logind_t)
+fs_manage_kdbus_files(systemd_logind_t)
diff --git a/policy/modules/system/libraries.fc b/policy/modules/system/libraries.fc
-index 73bb3c0..a70bee5 100644
+index 73bb3c00c..a70bee5b0 100644
--- a/policy/modules/system/libraries.fc
+++ b/policy/modules/system/libraries.fc
@@ -1,3 +1,4 @@
@@ -39143,7 +39305,7 @@ index 73bb3c0..a70bee5 100644
+
+/usr/sbin/ldconfig -- gen_context(system_u:object_r:ldconfig_exec_t,s0)
diff --git a/policy/modules/system/libraries.if b/policy/modules/system/libraries.if
-index 808ba93..b717d97 100644
+index 808ba93eb..b717d9709 100644
--- a/policy/modules/system/libraries.if
+++ b/policy/modules/system/libraries.if
@@ -66,6 +66,25 @@ interface(`libs_exec_ldconfig',`
@@ -39366,7 +39528,7 @@ index 808ba93..b717d97 100644
+ files_etc_filetrans($1, ld_so_cache_t, file, "ld.so.preload~")
+')
diff --git a/policy/modules/system/libraries.te b/policy/modules/system/libraries.te
-index 54f8fa5..b9dbbe0 100644
+index 54f8fa5c8..b9dbbe005 100644
--- a/policy/modules/system/libraries.te
+++ b/policy/modules/system/libraries.te
@@ -32,14 +32,14 @@ files_tmp_file(ldconfig_tmp_t)
@@ -39490,7 +39652,7 @@ index 54f8fa5..b9dbbe0 100644
- unconfined_domain(ldconfig_t)
-')
diff --git a/policy/modules/system/locallogin.fc b/policy/modules/system/locallogin.fc
-index be6a81b..a5303e9 100644
+index be6a81b80..a5303e920 100644
--- a/policy/modules/system/locallogin.fc
+++ b/policy/modules/system/locallogin.fc
@@ -1,3 +1,8 @@
@@ -39503,7 +39665,7 @@ index be6a81b..a5303e9 100644
+/usr/sbin/sulogin -- gen_context(system_u:object_r:sulogin_exec_t,s0)
+/usr/sbin/sushell -- gen_context(system_u:object_r:sulogin_exec_t,s0)
diff --git a/policy/modules/system/locallogin.if b/policy/modules/system/locallogin.if
-index 0e3c2a9..ea9bd57 100644
+index 0e3c2a977..ea9bd57dc 100644
--- a/policy/modules/system/locallogin.if
+++ b/policy/modules/system/locallogin.if
@@ -129,3 +129,59 @@ interface(`locallogin_domtrans_sulogin',`
@@ -39567,7 +39729,7 @@ index 0e3c2a9..ea9bd57 100644
+ userdom_admin_home_dir_filetrans($1, local_login_home_t, file, ".hushlogin")
+')
diff --git a/policy/modules/system/locallogin.te b/policy/modules/system/locallogin.te
-index 446fa99..fcf08ac 100644
+index 446fa9908..fcf08acb2 100644
--- a/policy/modules/system/locallogin.te
+++ b/policy/modules/system/locallogin.te
@@ -13,9 +13,8 @@ auth_login_entry_type(local_login_t)
@@ -39782,7 +39944,7 @@ index 446fa99..fcf08ac 100644
+ plymouthd_exec_plymouth(sulogin_t)
')
diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc
-index b50c5fe..9eacd9b 100644
+index b50c5fe81..9eacd9ba1 100644
--- a/policy/modules/system/logging.fc
+++ b/policy/modules/system/logging.fc
@@ -1,11 +1,15 @@
@@ -39874,7 +40036,7 @@ index b50c5fe..9eacd9b 100644
+/var/webmin(/.*)? gen_context(system_u:object_r:var_log_t,s0)
+
diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if
-index 4e94884..7b39545 100644
+index 4e9488463..7b395456f 100644
--- a/policy/modules/system/logging.if
+++ b/policy/modules/system/logging.if
@@ -233,7 +233,7 @@ interface(`logging_run_auditd',`
@@ -40500,7 +40662,7 @@ index 4e94884..7b39545 100644
+')
+
diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
-index 59b04c1..2ad89c5 100644
+index 59b04c1a2..2ad89c533 100644
--- a/policy/modules/system/logging.te
+++ b/policy/modules/system/logging.te
@@ -4,6 +4,29 @@ policy_module(logging, 1.20.1)
@@ -40996,7 +41158,7 @@ index 59b04c1..2ad89c5 100644
+
+logging_stream_connect_syslog(syslog_client_type)
diff --git a/policy/modules/system/lvm.fc b/policy/modules/system/lvm.fc
-index 6b91740..7724116 100644
+index 6b917403e..772411608 100644
--- a/policy/modules/system/lvm.fc
+++ b/policy/modules/system/lvm.fc
@@ -23,6 +23,8 @@ ifdef(`distro_gentoo',`
@@ -41130,7 +41292,7 @@ index 6b91740..7724116 100644
+
+/var/run/storaged(/.*)? gen_context(system_u:object_r:lvm_var_run_t,s0)
diff --git a/policy/modules/system/lvm.if b/policy/modules/system/lvm.if
-index 58bc27f..842ce28 100644
+index 58bc27f22..842ce28c4 100644
--- a/policy/modules/system/lvm.if
+++ b/policy/modules/system/lvm.if
@@ -1,5 +1,41 @@
@@ -41450,7 +41612,7 @@ index 58bc27f..842ce28 100644
+
+
diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te
-index 79048c4..b0cb1e5 100644
+index 79048c410..b0cb1e565 100644
--- a/policy/modules/system/lvm.te
+++ b/policy/modules/system/lvm.te
@@ -12,6 +12,9 @@ init_daemon_domain(clvmd_t, clvmd_exec_t)
@@ -41731,7 +41893,7 @@ index 79048c4..b0cb1e5 100644
udev_read_pid_files(lvm_t)
')
diff --git a/policy/modules/system/miscfiles.fc b/policy/modules/system/miscfiles.fc
-index 9fe8e01..c62c761 100644
+index 9fe8e01e3..c62c76136 100644
--- a/policy/modules/system/miscfiles.fc
+++ b/policy/modules/system/miscfiles.fc
@@ -9,11 +9,16 @@ ifdef(`distro_gentoo',`
@@ -41801,7 +41963,7 @@ index 9fe8e01..c62c761 100644
/var/spool/postfix/etc/localtime -- gen_context(system_u:object_r:locale_t,s0)
')
diff --git a/policy/modules/system/miscfiles.if b/policy/modules/system/miscfiles.if
-index fc28bc3..e4b9a3b 100644
+index fc28bc31b..e4b9a3bf0 100644
--- a/policy/modules/system/miscfiles.if
+++ b/policy/modules/system/miscfiles.if
@@ -67,6 +67,27 @@ interface(`miscfiles_read_all_certs',`
@@ -42082,7 +42244,7 @@ index fc28bc3..e4b9a3b 100644
+ files_var_filetrans($1, public_content_t, dir, "ftp")
+')
diff --git a/policy/modules/system/miscfiles.te b/policy/modules/system/miscfiles.te
-index 1361961..be6b7fc 100644
+index 1361961d0..be6b7fc80 100644
--- a/policy/modules/system/miscfiles.te
+++ b/policy/modules/system/miscfiles.te
@@ -4,7 +4,6 @@ policy_module(miscfiles, 1.11.0)
@@ -42107,7 +42269,7 @@ index 1361961..be6b7fc 100644
#
# Base type for the tests directory.
diff --git a/policy/modules/system/modutils.fc b/policy/modules/system/modutils.fc
-index 9933677..7875b79 100644
+index 993367709..7875b79fa 100644
--- a/policy/modules/system/modutils.fc
+++ b/policy/modules/system/modutils.fc
@@ -10,8 +10,6 @@ ifdef(`distro_gentoo',`
@@ -42136,7 +42298,7 @@ index 9933677..7875b79 100644
+
+/var/run/tmpfiles.d/kmod.conf -- gen_context(system_u:object_r:insmod_var_run_t,s0)
diff --git a/policy/modules/system/modutils.if b/policy/modules/system/modutils.if
-index 7449974..b792900 100644
+index 7449974f6..b79290062 100644
--- a/policy/modules/system/modutils.if
+++ b/policy/modules/system/modutils.if
@@ -12,11 +12,28 @@
@@ -42332,7 +42494,7 @@ index 7449974..b792900 100644
+ #files_kernel_modules_filetrans($1, modules_dep_t, file, "modules.symbols.bin")
+')
diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te
-index 7a363b8..aa59857 100644
+index 7a363b8b2..aa59857ad 100644
--- a/policy/modules/system/modutils.te
+++ b/policy/modules/system/modutils.te
@@ -5,7 +5,7 @@ policy_module(modutils, 1.14.0)
@@ -42613,7 +42775,7 @@ index 7a363b8..aa59857 100644
ifdef(`distro_gentoo',`
diff --git a/policy/modules/system/mount.fc b/policy/modules/system/mount.fc
-index a38605e..f035d9f 100644
+index a38605e50..f035d9fbb 100644
--- a/policy/modules/system/mount.fc
+++ b/policy/modules/system/mount.fc
@@ -1,6 +1,26 @@
@@ -42646,7 +42808,7 @@ index a38605e..f035d9f 100644
+/usr/sbin/umount\.ecryptfs_private -- gen_context(system_u:object_r:mount_ecryptfs_exec_t,s0)
+/usr/sbin/umount\.ecryptfs -- gen_context(system_u:object_r:mount_ecryptfs_exec_t,s0)
diff --git a/policy/modules/system/mount.if b/policy/modules/system/mount.if
-index 4584457..8f676d0 100644
+index 4584457b1..8f676d0c8 100644
--- a/policy/modules/system/mount.if
+++ b/policy/modules/system/mount.if
@@ -16,6 +16,13 @@ interface(`mount_domtrans',`
@@ -43012,7 +43174,7 @@ index 4584457..8f676d0 100644
')
+
diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
-index 459a0ef..ed4756e 100644
+index 459a0efbc..ed4756edc 100644
--- a/policy/modules/system/mount.te
+++ b/policy/modules/system/mount.te
@@ -5,13 +5,6 @@ policy_module(mount, 1.16.1)
@@ -43459,7 +43621,7 @@ index 459a0ef..ed4756e 100644
+ unconfined_domain(unconfined_mount_t)
')
diff --git a/policy/modules/system/netlabel.fc b/policy/modules/system/netlabel.fc
-index b263a8a..15576ab 100644
+index b263a8af5..15576ab83 100644
--- a/policy/modules/system/netlabel.fc
+++ b/policy/modules/system/netlabel.fc
@@ -1 +1,6 @@
@@ -43470,7 +43632,7 @@ index b263a8a..15576ab 100644
+/usr/sbin/netlabelctl -- gen_context(system_u:object_r:netlabel_mgmt_exec_t,s0)
+/usr/sbin/netlabel-config -- gen_context(system_u:object_r:netlabel_mgmt_exec_t,s0)
diff --git a/policy/modules/system/netlabel.te b/policy/modules/system/netlabel.te
-index cbbda4a..d7c67bc 100644
+index cbbda4a3e..d7c67bc40 100644
--- a/policy/modules/system/netlabel.te
+++ b/policy/modules/system/netlabel.te
@@ -7,9 +7,13 @@ policy_module(netlabel, 1.3.0)
@@ -43513,7 +43675,7 @@ index cbbda4a..d7c67bc 100644
+userdom_use_inherited_user_terminals(netlabel_mgmt_t)
+
diff --git a/policy/modules/system/selinuxutil.fc b/policy/modules/system/selinuxutil.fc
-index d43f3b1..c5053db 100644
+index d43f3b194..c5053dbbd 100644
--- a/policy/modules/system/selinuxutil.fc
+++ b/policy/modules/system/selinuxutil.fc
@@ -6,13 +6,15 @@
@@ -43569,7 +43731,7 @@ index d43f3b1..c5053db 100644
+/etc/share/selinux/targeted(/.*)? gen_context(system_u:object_r:semanage_store_t,s0)
+/etc/share/selinux/mls(/.*)? gen_context(system_u:object_r:semanage_store_t,s0)
diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if
-index 3822072..0395f48 100644
+index 38220721d..0395f4810 100644
--- a/policy/modules/system/selinuxutil.if
+++ b/policy/modules/system/selinuxutil.if
@@ -135,6 +135,42 @@ interface(`seutil_exec_loadpolicy',`
@@ -44393,7 +44555,7 @@ index 3822072..0395f48 100644
+ allow semanage_t $1:dbus send_msg;
+')
diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te
-index dc46420..27d8d49 100644
+index dc4642022..27d8d49ba 100644
--- a/policy/modules/system/selinuxutil.te
+++ b/policy/modules/system/selinuxutil.te
@@ -11,14 +11,16 @@ gen_require(`
@@ -45240,7 +45402,7 @@ index dc46420..27d8d49 100644
+ policykit_dbus_chat(policy_manager_domain)
')
diff --git a/policy/modules/system/setrans.fc b/policy/modules/system/setrans.fc
-index bea4629..06e2834 100644
+index bea462999..06e2834f7 100644
--- a/policy/modules/system/setrans.fc
+++ b/policy/modules/system/setrans.fc
@@ -2,4 +2,7 @@
@@ -45252,7 +45414,7 @@ index bea4629..06e2834 100644
/var/run/setrans(/.*)? gen_context(system_u:object_r:setrans_var_run_t,mls_systemhigh)
+/var/run/mcstransd\.pid gen_context(system_u:object_r:setrans_var_run_t,mls_systemhigh)
diff --git a/policy/modules/system/setrans.if b/policy/modules/system/setrans.if
-index efa9c27..536a514 100644
+index efa9c27f6..536a514fc 100644
--- a/policy/modules/system/setrans.if
+++ b/policy/modules/system/setrans.if
@@ -40,3 +40,21 @@ interface(`setrans_translate_context',`
@@ -45278,7 +45440,7 @@ index efa9c27..536a514 100644
+ manage_files_pattern($1, setrans_var_run_t, setrans_var_run_t)
+')
diff --git a/policy/modules/system/setrans.te b/policy/modules/system/setrans.te
-index 1447687..0b1da4d 100644
+index 1447687d5..0b1da4d3e 100644
--- a/policy/modules/system/setrans.te
+++ b/policy/modules/system/setrans.te
@@ -12,6 +12,7 @@ gen_require(`
@@ -45306,7 +45468,7 @@ index 1447687..0b1da4d 100644
seutil_read_config(setrans_t)
diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc
-index 40edc18..95f4458 100644
+index 40edc18ab..95f4458d2 100644
--- a/policy/modules/system/sysnetwork.fc
+++ b/policy/modules/system/sysnetwork.fc
@@ -17,23 +17,29 @@ ifdef(`distro_debian',`
@@ -45382,7 +45544,7 @@ index 40edc18..95f4458 100644
+/etc/firestarter/firestarter\.sh gen_context(system_u:object_r:dhcpc_helper_exec_t,s0)
+
diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if
-index 2cea692..e3cb4f2 100644
+index 2cea692c0..e3cb4f2ef 100644
--- a/policy/modules/system/sysnetwork.if
+++ b/policy/modules/system/sysnetwork.if
@@ -38,11 +38,30 @@ interface(`sysnet_domtrans_dhcpc',`
@@ -45955,7 +46117,7 @@ index 2cea692..e3cb4f2 100644
+ files_etc_filetrans($1, net_conf_t, file)
+')
diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
-index a392fc4..41a5b08 100644
+index a392fc4bc..41a5b082f 100644
--- a/policy/modules/system/sysnetwork.te
+++ b/policy/modules/system/sysnetwork.te
@@ -5,6 +5,13 @@ policy_module(sysnetwork, 1.15.4)
@@ -46382,7 +46544,7 @@ index a392fc4..41a5b08 100644
+')
diff --git a/policy/modules/system/systemd.fc b/policy/modules/system/systemd.fc
new file mode 100644
-index 0000000..121b422
+index 000000000..121b42208
--- /dev/null
+++ b/policy/modules/system/systemd.fc
@@ -0,0 +1,81 @@
@@ -46469,7 +46631,7 @@ index 0000000..121b422
+/var/run/initramfs(/.*)? <>
diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if
new file mode 100644
-index 0000000..d1356af
+index 000000000..d1356af89
--- /dev/null
+++ b/policy/modules/system/systemd.if
@@ -0,0 +1,1842 @@
@@ -48317,7 +48479,7 @@ index 0000000..d1356af
+')
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
new file mode 100644
-index 0000000..35fc2b8
+index 000000000..35fc2b865
--- /dev/null
+++ b/policy/modules/system/systemd.te
@@ -0,0 +1,1020 @@
@@ -49342,7 +49504,7 @@ index 0000000..35fc2b8
+init_rw_initctl(systemd_initctl_t)
+init_stream_connectto(systemd_initctl_t)
diff --git a/policy/modules/system/udev.fc b/policy/modules/system/udev.fc
-index f41857e..49fd32e 100644
+index f41857e09..49fd32e17 100644
--- a/policy/modules/system/udev.fc
+++ b/policy/modules/system/udev.fc
@@ -1,6 +1,8 @@
@@ -49395,7 +49557,7 @@ index f41857e..49fd32e 100644
ifdef(`distro_debian',`
/var/run/xen-hotplug -d gen_context(system_u:object_r:udev_var_run_t,s0)
diff --git a/policy/modules/system/udev.if b/policy/modules/system/udev.if
-index 9a1650d..d7e8a01 100644
+index 9a1650d37..d7e8a0193 100644
--- a/policy/modules/system/udev.if
+++ b/policy/modules/system/udev.if
@@ -34,6 +34,7 @@ interface(`udev_domtrans',`
@@ -49639,7 +49801,7 @@ index 9a1650d..d7e8a01 100644
########################################
diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
-index 39f185f..a313a7d 100644
+index 39f185f68..a313a7d1a 100644
--- a/policy/modules/system/udev.te
+++ b/policy/modules/system/udev.te
@@ -17,16 +17,17 @@ init_daemon_domain(udev_t, udev_exec_t)
@@ -49914,7 +50076,7 @@ index 39f185f..a313a7d 100644
optional_policy(`
diff --git a/policy/modules/system/unconfined.fc b/policy/modules/system/unconfined.fc
-index 0abaf84..8b34dbc 100644
+index 0abaf8432..8b34dbc09 100644
--- a/policy/modules/system/unconfined.fc
+++ b/policy/modules/system/unconfined.fc
@@ -1,21 +1 @@
@@ -49940,7 +50102,7 @@ index 0abaf84..8b34dbc 100644
-/usr/lib/openoffice/program/[^/]+\.bin -- gen_context(system_u:object_r:unconfined_execmem_exec_t,s0)
-')
diff --git a/policy/modules/system/unconfined.if b/policy/modules/system/unconfined.if
-index 5ca20a9..5454d16 100644
+index 5ca20a97d..5454d1668 100644
--- a/policy/modules/system/unconfined.if
+++ b/policy/modules/system/unconfined.if
@@ -12,53 +12,57 @@
@@ -50489,7 +50651,7 @@ index 5ca20a9..5454d16 100644
+ allow $1 unconfined_service_t:process signull;
')
diff --git a/policy/modules/system/unconfined.te b/policy/modules/system/unconfined.te
-index 5fe902d..b31eeba 100644
+index 5fe902db3..b31eeba97 100644
--- a/policy/modules/system/unconfined.te
+++ b/policy/modules/system/unconfined.te
@@ -1,207 +1,32 @@
@@ -50714,7 +50876,7 @@ index 5fe902d..b31eeba 100644
+ virt_transition_svirt(unconfined_service_t, system_r)
')
diff --git a/policy/modules/system/userdomain.fc b/policy/modules/system/userdomain.fc
-index db75976..c54480a 100644
+index db7597682..c54480a1d 100644
--- a/policy/modules/system/userdomain.fc
+++ b/policy/modules/system/userdomain.fc
@@ -1,4 +1,37 @@
@@ -50757,7 +50919,7 @@ index db75976..c54480a 100644
+/var/tmp/hsperfdata_root gen_context(system_u:object_r:user_tmp_t,s0)
+
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
-index 9dc60c6..d5e8f38 100644
+index 9dc60c6c0..d5e8f386a 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -30,9 +30,11 @@ template(`userdom_base_user_template',`
@@ -55878,7 +56040,7 @@ index 9dc60c6..d5e8f38 100644
+ ')
')
diff --git a/policy/modules/system/userdomain.te b/policy/modules/system/userdomain.te
-index f4ac38d..1589d60 100644
+index f4ac38dc7..1589d6065 100644
--- a/policy/modules/system/userdomain.te
+++ b/policy/modules/system/userdomain.te
@@ -7,48 +7,43 @@ policy_module(userdomain, 4.9.1)
@@ -56370,7 +56532,7 @@ index f4ac38d..1589d60 100644
+ ssh_signal(confined_admindomain)
+')
diff --git a/policy/policy_capabilities b/policy/policy_capabilities
-index db3cbca..710bd7c 100644
+index db3cbca45..710bd7cd2 100644
--- a/policy/policy_capabilities
+++ b/policy/policy_capabilities
@@ -31,3 +31,14 @@ policycap network_peer_controls;
@@ -56389,7 +56551,7 @@ index db3cbca..710bd7c 100644
+
+
diff --git a/policy/support/misc_patterns.spt b/policy/support/misc_patterns.spt
-index e79d545..101086d 100644
+index e79d54501..101086d66 100644
--- a/policy/support/misc_patterns.spt
+++ b/policy/support/misc_patterns.spt
@@ -4,7 +4,7 @@
@@ -56420,7 +56582,7 @@ index e79d545..101086d 100644
')
diff --git a/policy/support/obj_perm_sets.spt b/policy/support/obj_perm_sets.spt
-index 6e91317..dc1c884 100644
+index 6e9131723..dc1c884fe 100644
--- a/policy/support/obj_perm_sets.spt
+++ b/policy/support/obj_perm_sets.spt
@@ -28,8 +28,7 @@ define(`devfile_class_set', `{ chr_file blk_file }')
@@ -56536,7 +56698,7 @@ index 6e91317..dc1c884 100644
+#
+define(`manage_service_perms', `{ start stop status reload enable disable } ')
diff --git a/policy/users b/policy/users
-index c4ebc7e..30d6d7a 100644
+index c4ebc7e43..30d6d7a71 100644
--- a/policy/users
+++ b/policy/users
@@ -15,7 +15,7 @@
@@ -56575,7 +56737,7 @@ index c4ebc7e..30d6d7a 100644
-')
+gen_user(root, user, unconfined_r sysadm_r staff_r ifdef(`enable_mls',`secadm_r auditadm_r') system_r, s0, s0 - mls_systemhigh, mcs_allcats)
diff --git a/support/Makefile.devel b/support/Makefile.devel
-index b96e9b3..ff7340f 100644
+index b96e9b3d1..ff7340fdb 100644
--- a/support/Makefile.devel
+++ b/support/Makefile.devel
@@ -26,7 +26,6 @@ XMLLINT := $(BINDIR)/xmllint
@@ -56586,3 +56748,16 @@ index b96e9b3..ff7340f 100644
QUIET ?= y
genxml := $(PYTHON) $(HEADERDIR)/support/segenxml.py
+diff --git a/support/comment_move_decl.sed b/support/comment_move_decl.sed
+index 00b94b6ad..90813480d 100644
+--- a/support/comment_move_decl.sed
++++ b/support/comment_move_decl.sed
+@@ -6,7 +6,7 @@
+ /optional \{/,/} # end optional/b nextline
+
+ /^[[:blank:]]*(attribute(_role)?|type(alias)?) /s/^/# this line was moved by the build process: &/
+-/^[[:blank:]]*(port|node|netif|genfs)con /s/^/# this line was moved by the build process: &/
++/^[[:blank:]]*(port|node|netif|genfs|ibpkey|ibendport)con /s/^/# this line was moved by the build process: &/
+ /^[[:blank:]]*fs_use_(xattr|task|trans) /s/^/# this line was moved by the build process: &/
+ /^[[:blank:]]*sid /s/^/# this line was moved by the build process: &/
+ /^[[:blank:]]*bool /s/^/# this line was moved by the build process: &/
diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch
index 1f51d3d..97d1a04 100644
--- a/policy-rawhide-contrib.patch
+++ b/policy-rawhide-contrib.patch
@@ -1,12 +1,12 @@
diff --git a/.gitignore b/.gitignore
new file mode 100644
-index 0000000..bea5755
+index 000000000..bea575523
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1 @@
+TAGS
diff --git a/abrt.fc b/abrt.fc
-index 1a93dc5..e948aef 100644
+index 1a93dc578..e948aef59 100644
--- a/abrt.fc
+++ b/abrt.fc
@@ -1,31 +1,47 @@
@@ -81,7 +81,7 @@ index 1a93dc5..e948aef 100644
-/var/spool/abrt-retrace(/.*)? gen_context(system_u:object_r:abrt_retrace_spool_t,s0)
-/var/spool/retrace-server(/.*)? gen_context(system_u:object_r:abrt_retrace_spool_t,s0)
diff --git a/abrt.if b/abrt.if
-index 058d908..ee0c559 100644
+index 058d908e4..ee0c55969 100644
--- a/abrt.if
+++ b/abrt.if
@@ -1,4 +1,42 @@
@@ -589,7 +589,7 @@ index 058d908..ee0c559 100644
+')
+
diff --git a/abrt.te b/abrt.te
-index eb50f07..4e5a592 100644
+index eb50f070f..4e5a59207 100644
--- a/abrt.te
+++ b/abrt.te
@@ -6,11 +6,10 @@ policy_module(abrt, 1.4.1)
@@ -1225,7 +1225,7 @@ index eb50f07..4e5a592 100644
-
-miscfiles_read_localization(abrt_domain)
diff --git a/accountsd.fc b/accountsd.fc
-index f9d8d7a..0682710 100644
+index f9d8d7a92..068271030 100644
--- a/accountsd.fc
+++ b/accountsd.fc
@@ -1,3 +1,5 @@
@@ -1235,7 +1235,7 @@ index f9d8d7a..0682710 100644
/usr/lib/accountsservice/accounts-daemon -- gen_context(system_u:object_r:accountsd_exec_t,s0)
diff --git a/accountsd.if b/accountsd.if
-index bd5ec9a..554177c 100644
+index bd5ec9ab0..554177cd2 100644
--- a/accountsd.if
+++ b/accountsd.if
@@ -126,23 +126,51 @@ interface(`accountsd_manage_lib_files',`
@@ -1296,7 +1296,7 @@ index bd5ec9a..554177c 100644
+ allow $1 accountsd_unit_file_t:service all_service_perms;
')
diff --git a/accountsd.te b/accountsd.te
-index 3593510..7c13845 100644
+index 3593510d8..7c13845fd 100644
--- a/accountsd.te
+++ b/accountsd.te
@@ -4,6 +4,10 @@ gen_require(`
@@ -1377,7 +1377,7 @@ index 3593510..7c13845 100644
+ xserver_manage_xdm_etc_files(accountsd_t)
')
diff --git a/acct.if b/acct.if
-index 81280d0..bc4038b 100644
+index 81280d008..bc4038b45 100644
--- a/acct.if
+++ b/acct.if
@@ -83,6 +83,24 @@ interface(`acct_manage_data',`
@@ -1421,7 +1421,7 @@ index 81280d0..bc4038b 100644
domain_system_change_exemption($1)
role_transition $2 acct_initrc_exec_t system_r;
diff --git a/acct.te b/acct.te
-index 8b9ad83..f4f2486 100644
+index 8b9ad83c5..f4f24864b 100644
--- a/acct.te
+++ b/acct.te
@@ -40,8 +40,6 @@ corecmd_exec_shell(acct_t)
@@ -1451,7 +1451,7 @@ index 8b9ad83..f4f2486 100644
userdom_dontaudit_use_unpriv_user_fds(acct_t)
diff --git a/ada.te b/ada.te
-index 8d42c97..2377f8f 100644
+index 8d42c97ae..2377f8f82 100644
--- a/ada.te
+++ b/ada.te
@@ -20,7 +20,7 @@ role ada_roles types ada_t;
@@ -1464,7 +1464,7 @@ index 8d42c97..2377f8f 100644
optional_policy(`
unconfined_domain(ada_t)
diff --git a/afs.fc b/afs.fc
-index 8926c16..206ea16 100644
+index 8926c1696..206ea16fd 100644
--- a/afs.fc
+++ b/afs.fc
@@ -3,6 +3,8 @@
@@ -1488,7 +1488,7 @@ index 8926c16..206ea16 100644
/usr/afs/db -d gen_context(system_u:object_r:afs_dbdir_t,s0)
/usr/afs/db/pr.* -- gen_context(system_u:object_r:afs_pt_db_t,s0)
diff --git a/afs.if b/afs.if
-index 3b41be6..97d99f9 100644
+index 3b41be699..97d99f979 100644
--- a/afs.if
+++ b/afs.if
@@ -40,6 +40,24 @@ interface(`afs_rw_udp_sockets',`
@@ -1538,7 +1538,7 @@ index 3b41be6..97d99f9 100644
afs_initrc_domtrans($1)
domain_system_change_exemption($1)
diff --git a/afs.te b/afs.te
-index 90ce637..8cf712d 100644
+index 90ce63748..8cf712d15 100644
--- a/afs.te
+++ b/afs.te
@@ -72,7 +72,7 @@ role system_r types afs_vlserver_t;
@@ -1729,7 +1729,7 @@ index 90ce637..8cf712d 100644
sysnet_read_config(afs_domain)
+
diff --git a/aiccu.if b/aiccu.if
-index 3b5dcb9..fbe187f 100644
+index 3b5dcb947..fbe187fe1 100644
--- a/aiccu.if
+++ b/aiccu.if
@@ -79,9 +79,13 @@ interface(`aiccu_admin',`
@@ -1748,7 +1748,7 @@ index 3b5dcb9..fbe187f 100644
domain_system_change_exemption($1)
role_transition $2 aiccu_initrc_exec_t system_r;
diff --git a/aiccu.te b/aiccu.te
-index 5d2b90e..7374df0 100644
+index 5d2b90e04..7374df0b9 100644
--- a/aiccu.te
+++ b/aiccu.te
@@ -48,7 +48,6 @@ corenet_all_recvfrom_unlabeled(aiccu_t)
@@ -1787,7 +1787,7 @@ index 5d2b90e..7374df0 100644
sysnet_domtrans_ifconfig(aiccu_t)
')
diff --git a/aide.if b/aide.if
-index 01cbb67..94a4a24 100644
+index 01cbb67df..94a4a2406 100644
--- a/aide.if
+++ b/aide.if
@@ -67,9 +67,13 @@ interface(`aide_admin',`
@@ -1806,7 +1806,7 @@ index 01cbb67..94a4a24 100644
files_list_etc($1)
diff --git a/aide.te b/aide.te
-index 03831e6..3d35fff 100644
+index 03831e6e5..3d35fff8e 100644
--- a/aide.te
+++ b/aide.te
@@ -10,6 +10,7 @@ attribute_role aide_roles;
@@ -1858,7 +1858,7 @@ index 03831e6..3d35fff 100644
optional_policy(`
seutil_use_newrole_fds(aide_t)
diff --git a/aisexec.if b/aisexec.if
-index a2997fa..861cebd 100644
+index a2997fa57..861cebdf9 100644
--- a/aisexec.if
+++ b/aisexec.if
@@ -83,9 +83,13 @@ interface(`aisexecd_admin',`
@@ -1877,7 +1877,7 @@ index a2997fa..861cebd 100644
domain_system_change_exemption($1)
role_transition $2 aisexec_initrc_exec_t system_r;
diff --git a/aisexec.te b/aisexec.te
-index 4e4f063..808e067 100644
+index 4e4f06364..808e067e8 100644
--- a/aisexec.te
+++ b/aisexec.te
@@ -63,6 +63,7 @@ files_pid_filetrans(aisexec_t, aisexec_var_run_t, { file sock_file })
@@ -1911,7 +1911,7 @@ index 4e4f063..808e067 100644
rhcs_rw_fenced_semaphores(aisexec_t)
diff --git a/ajaxterm.fc b/ajaxterm.fc
new file mode 100644
-index 0000000..aeb1888
+index 000000000..aeb1888a7
--- /dev/null
+++ b/ajaxterm.fc
@@ -0,0 +1,6 @@
@@ -1923,7 +1923,7 @@ index 0000000..aeb1888
+/var/run/ajaxterm\.pid -- gen_context(system_u:object_r:ajaxterm_var_run_t,s0)
diff --git a/ajaxterm.if b/ajaxterm.if
new file mode 100644
-index 0000000..7abe946
+index 000000000..7abe946d4
--- /dev/null
+++ b/ajaxterm.if
@@ -0,0 +1,90 @@
@@ -2019,7 +2019,7 @@ index 0000000..7abe946
+')
diff --git a/ajaxterm.te b/ajaxterm.te
new file mode 100644
-index 0000000..a95a4ad
+index 000000000..a95a4adf3
--- /dev/null
+++ b/ajaxterm.te
@@ -0,0 +1,60 @@
@@ -2084,7 +2084,7 @@ index 0000000..a95a4ad
+')
+
diff --git a/alsa.fc b/alsa.fc
-index 33d9d31..58bf182 100644
+index 33d9d3111..58bf1829a 100644
--- a/alsa.fc
+++ b/alsa.fc
@@ -23,4 +23,10 @@ ifdef(`distro_debian',`
@@ -2100,7 +2100,7 @@ index 33d9d31..58bf182 100644
+
+/var/run/alsactl\.pid -- gen_context(system_u:object_r:alsa_var_run_t,s0)
diff --git a/alsa.if b/alsa.if
-index ca8d8cf..053a30a 100644
+index ca8d8cf3b..053a30ad4 100644
--- a/alsa.if
+++ b/alsa.if
@@ -168,6 +168,7 @@ interface(`alsa_manage_home_files',`
@@ -2216,7 +2216,7 @@ index ca8d8cf..053a30a 100644
#########################################
diff --git a/alsa.te b/alsa.te
-index 4b153f1..a799cd3 100644
+index 4b153f179..a799cd394 100644
--- a/alsa.te
+++ b/alsa.te
@@ -15,6 +15,9 @@ role alsa_roles types alsa_t;
@@ -2297,7 +2297,7 @@ index 4b153f1..a799cd3 100644
userdom_manage_unpriv_user_shared_mem(alsa_t)
userdom_search_user_home_dirs(alsa_t)
diff --git a/amanda.fc b/amanda.fc
-index 7f4dfbc..e5c9f45 100644
+index 7f4dfbca3..e5c9f45b8 100644
--- a/amanda.fc
+++ b/amanda.fc
@@ -1,5 +1,6 @@
@@ -2317,7 +2317,7 @@ index 7f4dfbc..e5c9f45 100644
/usr/sbin/amrecover -- gen_context(system_u:object_r:amanda_recover_exec_t,s0)
diff --git a/amanda.te b/amanda.te
-index 519051c..89302e2 100644
+index 519051c7d..89302e2d9 100644
--- a/amanda.te
+++ b/amanda.te
@@ -9,11 +9,14 @@ attribute_role amanda_recover_roles;
@@ -2460,7 +2460,7 @@ index 519051c..89302e2 100644
+ fstools_signal(amanda_t)
+')
diff --git a/amavis.fc b/amavis.fc
-index 17689a7..8aa6849 100644
+index 17689a707..8aa684917 100644
--- a/amavis.fc
+++ b/amavis.fc
@@ -12,8 +12,6 @@ ifdef(`distro_debian',`
@@ -2473,7 +2473,7 @@ index 17689a7..8aa6849 100644
/var/lib/amavis(/.*)? gen_context(system_u:object_r:amavis_var_lib_t,s0)
diff --git a/amavis.if b/amavis.if
-index 60d4f8c..18ef077 100644
+index 60d4f8c90..18ef0772c 100644
--- a/amavis.if
+++ b/amavis.if
@@ -54,6 +54,7 @@ interface(`amavis_read_spool_files',`
@@ -2527,7 +2527,7 @@ index 60d4f8c..18ef077 100644
domain_system_change_exemption($1)
role_transition $2 amavis_initrc_exec_t system_r;
diff --git a/amavis.te b/amavis.te
-index 91fa72a..1736250 100644
+index 91fa72ae1..1736250ae 100644
--- a/amavis.te
+++ b/amavis.te
@@ -39,14 +39,14 @@ type amavis_quarantine_t;
@@ -2621,7 +2621,7 @@ index 91fa72a..1736250 100644
postfix_list_spool(amavis_t)
')
diff --git a/amtu.te b/amtu.te
-index 16d0d66..60abfd0 100644
+index 16d0d66eb..60abfd080 100644
--- a/amtu.te
+++ b/amtu.te
@@ -24,11 +24,10 @@ kernel_read_system_state(amtu_t)
@@ -2638,7 +2638,7 @@ index 16d0d66..60abfd0 100644
optional_policy(`
nscd_dontaudit_search_pid(amtu_t)
diff --git a/anaconda.fc b/anaconda.fc
-index b098089..fe35beb 100644
+index b098089d0..fe35bebfd 100644
--- a/anaconda.fc
+++ b/anaconda.fc
@@ -1 +1,13 @@
@@ -2656,7 +2656,7 @@ index b098089..fe35beb 100644
+/var/lib/preupgrade(/.*)? gen_context(system_u:object_r:preupgrade_data_t,s0)
+/var/log/preupgrade(/.*)? gen_context(system_u:object_r:preupgrade_data_t,s0)
diff --git a/anaconda.if b/anaconda.if
-index 14a61b7..76d9329 100644
+index 14a61b7e1..76d93294d 100644
--- a/anaconda.if
+++ b/anaconda.if
@@ -1 +1,132 @@
@@ -2793,7 +2793,7 @@ index 14a61b7..76d9329 100644
+ files_search_var_lib($1)
+')
diff --git a/anaconda.te b/anaconda.te
-index aa44abf..9e76516 100644
+index aa44abfe4..9e76516c2 100644
--- a/anaconda.te
+++ b/anaconda.te
@@ -4,6 +4,10 @@ gen_require(`
@@ -2899,7 +2899,7 @@ index aa44abf..9e76516 100644
+')
diff --git a/antivirus.fc b/antivirus.fc
new file mode 100644
-index 0000000..219f32d
+index 000000000..219f32db0
--- /dev/null
+++ b/antivirus.fc
@@ -0,0 +1,44 @@
@@ -2949,7 +2949,7 @@ index 0000000..219f32d
+
diff --git a/antivirus.if b/antivirus.if
new file mode 100644
-index 0000000..36251b9
+index 000000000..36251b926
--- /dev/null
+++ b/antivirus.if
@@ -0,0 +1,325 @@
@@ -3280,7 +3280,7 @@ index 0000000..36251b9
+')
diff --git a/antivirus.te b/antivirus.te
new file mode 100644
-index 0000000..d202f69
+index 000000000..d202f695a
--- /dev/null
+++ b/antivirus.te
@@ -0,0 +1,274 @@
@@ -3559,7 +3559,7 @@ index 0000000..d202f69
+ spamassassin_read_pid_files(antivirus_domain)
+')
diff --git a/apache.fc b/apache.fc
-index 7caefc3..966c2f3 100644
+index 7caefc353..966c2f3e6 100644
--- a/apache.fc
+++ b/apache.fc
@@ -1,162 +1,218 @@
@@ -3921,7 +3921,7 @@ index 7caefc3..966c2f3 100644
+/var/run/dirsrv/admin-serv.* gen_context(system_u:object_r:httpd_var_run_t,s0)
+/opt/dirsrv/var/run/dirsrv/dsgw/cookies(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
diff --git a/apache.if b/apache.if
-index f6eb485..fe461a3 100644
+index f6eb4851f..fe461a3fc 100644
--- a/apache.if
+++ b/apache.if
@@ -1,9 +1,9 @@
@@ -5575,7 +5575,7 @@ index f6eb485..fe461a3 100644
+ ps_process_pattern(httpd_t, $1)
')
diff --git a/apache.te b/apache.te
-index 6649962..6dd10dd 100644
+index 6649962b6..6dd10dd7d 100644
--- a/apache.te
+++ b/apache.te
@@ -5,280 +5,346 @@ policy_module(apache, 2.7.2)
@@ -7951,7 +7951,7 @@ index 6649962..6dd10dd 100644
')
+
diff --git a/apcupsd.fc b/apcupsd.fc
-index 5ec0e13..97c204f 100644
+index 5ec0e13c8..97c204fe5 100644
--- a/apcupsd.fc
+++ b/apcupsd.fc
@@ -1,18 +1,23 @@
@@ -7984,7 +7984,7 @@ index 5ec0e13..97c204f 100644
+/var/www/apcupsd/upsstats\.cgi -- gen_context(system_u:object_r:apcupsd_cgi_script_exec_t,s0)
+/var/www/cgi-bin/apcgui(/.*)? gen_context(system_u:object_r:apcupsd_cgi_script_exec_t,s0)
diff --git a/apcupsd.if b/apcupsd.if
-index f3c0aba..f6e25ed 100644
+index f3c0abac6..f6e25eda4 100644
--- a/apcupsd.if
+++ b/apcupsd.if
@@ -102,7 +102,7 @@ interface(`apcupsd_append_log',`
@@ -8093,7 +8093,7 @@ index f3c0aba..f6e25ed 100644
+ files_etc_filetrans(apcupsd_t, apcupsd_power_t, file, "powerfail")
')
diff --git a/apcupsd.te b/apcupsd.te
-index 080bc4d..a78dbce 100644
+index 080bc4ddb..a78dbced6 100644
--- a/apcupsd.te
+++ b/apcupsd.te
@@ -24,12 +24,18 @@ files_tmp_file(apcupsd_tmp_t)
@@ -8240,7 +8240,7 @@ index 080bc4d..a78dbce 100644
+ sysnet_dns_name_resolve(apcupsd_cgi_script_t)
')
diff --git a/apm.fc b/apm.fc
-index ce27d2f..b2ba16a 100644
+index ce27d2fb3..b2ba16a04 100644
--- a/apm.fc
+++ b/apm.fc
@@ -1,3 +1,4 @@
@@ -8258,7 +8258,7 @@ index ce27d2f..b2ba16a 100644
/var/log/acpid.* -- gen_context(system_u:object_r:apmd_log_t,s0)
diff --git a/apm.if b/apm.if
-index 1a7a97e..2c7252a 100644
+index 1a7a97e5c..2c7252a39 100644
--- a/apm.if
+++ b/apm.if
@@ -141,6 +141,30 @@ interface(`apm_stream_connect',`
@@ -8308,7 +8308,7 @@ index 1a7a97e..2c7252a 100644
domain_system_change_exemption($1)
role_transition $2 apmd_initrc_exec_t system_r;
diff --git a/apm.te b/apm.te
-index 7fd431b..f944ecc 100644
+index 7fd431bcd..f944eccf1 100644
--- a/apm.te
+++ b/apm.te
@@ -35,12 +35,15 @@ files_type(apmd_var_lib_t)
@@ -8424,7 +8424,7 @@ index 7fd431b..f944ecc 100644
optional_policy(`
diff --git a/apt.if b/apt.if
-index cde81d2..2fe0201 100644
+index cde81d248..2fe02018a 100644
--- a/apt.if
+++ b/apt.if
@@ -171,7 +171,7 @@ interface(`apt_read_cache',`
@@ -8437,7 +8437,7 @@ index cde81d2..2fe0201 100644
')
diff --git a/apt.te b/apt.te
-index efa8530..ae5d0c9 100644
+index efa853059..ae5d0c9f2 100644
--- a/apt.te
+++ b/apt.te
@@ -39,7 +39,7 @@ logging_log_file(apt_var_log_t)
@@ -8488,7 +8488,7 @@ index efa8530..ae5d0c9 100644
optional_policy(`
backup_manage_store_files(apt_t)
diff --git a/arpwatch.fc b/arpwatch.fc
-index 9ca0d0f..9a1a61f 100644
+index 9ca0d0fb8..9a1a61f82 100644
--- a/arpwatch.fc
+++ b/arpwatch.fc
@@ -1,5 +1,7 @@
@@ -8500,7 +8500,7 @@ index 9ca0d0f..9a1a61f 100644
/var/arpwatch(/.*)? gen_context(system_u:object_r:arpwatch_data_t,s0)
diff --git a/arpwatch.if b/arpwatch.if
-index 50c9b9c..533a555 100644
+index 50c9b9c87..533a555a2 100644
--- a/arpwatch.if
+++ b/arpwatch.if
@@ -119,6 +119,30 @@ interface(`arpwatch_dontaudit_rw_packet_sockets',`
@@ -8562,7 +8562,7 @@ index 50c9b9c..533a555 100644
+ allow $1 arpwatch_unit_file_t:service all_service_perms;
')
diff --git a/arpwatch.te b/arpwatch.te
-index 2d7bf34..766a91a 100644
+index 2d7bf345b..766a91a41 100644
--- a/arpwatch.te
+++ b/arpwatch.te
@@ -21,6 +21,9 @@ files_tmp_file(arpwatch_tmp_t)
@@ -8626,7 +8626,7 @@ index 2d7bf34..766a91a 100644
userdom_dontaudit_use_unpriv_user_fds(arpwatch_t)
diff --git a/asterisk.if b/asterisk.if
-index 2077053..198a02a 100644
+index 2077053ea..198a02ab4 100644
--- a/asterisk.if
+++ b/asterisk.if
@@ -124,9 +124,13 @@ interface(`asterisk_admin',`
@@ -8645,7 +8645,7 @@ index 2077053..198a02a 100644
domain_system_change_exemption($1)
role_transition $2 asterisk_initrc_exec_t system_r;
diff --git a/asterisk.te b/asterisk.te
-index 7e41350..1e0f4c4 100644
+index 7e4135022..1e0f4c49b 100644
--- a/asterisk.te
+++ b/asterisk.te
@@ -19,7 +19,7 @@ type asterisk_log_t;
@@ -8715,7 +8715,7 @@ index 7e41350..1e0f4c4 100644
diff --git a/authconfig.fc b/authconfig.fc
new file mode 100644
-index 0000000..4579cfe
+index 000000000..4579cfe17
--- /dev/null
+++ b/authconfig.fc
@@ -0,0 +1,3 @@
@@ -8724,7 +8724,7 @@ index 0000000..4579cfe
+/var/lib/authconfig(/.*)? gen_context(system_u:object_r:authconfig_var_lib_t,s0)
diff --git a/authconfig.if b/authconfig.if
new file mode 100644
-index 0000000..316c324
+index 000000000..316c324f2
--- /dev/null
+++ b/authconfig.if
@@ -0,0 +1,127 @@
@@ -8857,7 +8857,7 @@ index 0000000..316c324
+')
diff --git a/authconfig.te b/authconfig.te
new file mode 100644
-index 0000000..362a049
+index 000000000..362a049e9
--- /dev/null
+++ b/authconfig.te
@@ -0,0 +1,33 @@
@@ -8895,7 +8895,7 @@ index 0000000..362a049
+
+unconfined_domain_noaudit(authconfig_t)
diff --git a/automount.fc b/automount.fc
-index 92adb37..0a2ffc6 100644
+index 92adb37e1..0a2ffc62d 100644
--- a/automount.fc
+++ b/automount.fc
@@ -1,6 +1,8 @@
@@ -8908,7 +8908,7 @@ index 92adb37..0a2ffc6 100644
/var/lock/subsys/autofs -- gen_context(system_u:object_r:automount_lock_t,s0)
diff --git a/automount.if b/automount.if
-index f24e369..4484a98 100644
+index f24e36960..4484a98da 100644
--- a/automount.if
+++ b/automount.if
@@ -29,7 +29,6 @@ interface(`automount_domtrans',`
@@ -9005,7 +9005,7 @@ index f24e369..4484a98 100644
+ allow $1 automount_unit_file_t:service all_service_perms;
')
diff --git a/automount.te b/automount.te
-index 27d2f40..1297f5b 100644
+index 27d2f400b..1297f5bbe 100644
--- a/automount.te
+++ b/automount.te
@@ -22,6 +22,9 @@ type automount_tmp_t;
@@ -9093,7 +9093,7 @@ index 27d2f40..1297f5b 100644
+')
+
diff --git a/avahi.fc b/avahi.fc
-index e9fe2ca..4c2d076 100644
+index e9fe2cac1..4c2d0769e 100644
--- a/avahi.fc
+++ b/avahi.fc
@@ -1,5 +1,7 @@
@@ -9105,7 +9105,7 @@ index e9fe2ca..4c2d076 100644
/usr/sbin/avahi-dnsconfd -- gen_context(system_u:object_r:avahi_exec_t,s0)
/usr/sbin/avahi-autoipd -- gen_context(system_u:object_r:avahi_exec_t,s0)
diff --git a/avahi.if b/avahi.if
-index 9078c3d..2f6b250 100644
+index 9078c3d85..2f6b2503e 100644
--- a/avahi.if
+++ b/avahi.if
@@ -211,6 +211,30 @@ interface(`avahi_dontaudit_search_pid',`
@@ -9168,7 +9168,7 @@ index 9078c3d..2f6b250 100644
+ allow $1 avahi_unit_file_t:service all_service_perms;
')
diff --git a/avahi.te b/avahi.te
-index b8355b3..51ce1b6 100644
+index b8355b32f..51ce1b60f 100644
--- a/avahi.te
+++ b/avahi.te
@@ -13,17 +13,21 @@ type avahi_initrc_exec_t;
@@ -9231,7 +9231,7 @@ index b8355b3..51ce1b6 100644
userdom_dontaudit_search_user_home_dirs(avahi_t)
diff --git a/awstats.fc b/awstats.fc
-index 11e6d5f..73b4ea4 100644
+index 11e6d5ffe..73b4ea47c 100644
--- a/awstats.fc
+++ b/awstats.fc
@@ -1,5 +1,5 @@
@@ -9243,7 +9243,7 @@ index 11e6d5f..73b4ea4 100644
/var/lib/awstats(/.*)? gen_context(system_u:object_r:awstats_var_lib_t,s0)
diff --git a/awstats.te b/awstats.te
-index c1b16c3..ffbf2cb 100644
+index c1b16c392..ffbf2cb8f 100644
--- a/awstats.te
+++ b/awstats.te
@@ -26,6 +26,7 @@ type awstats_var_lib_t;
@@ -9303,7 +9303,7 @@ index c1b16c3..ffbf2cb 100644
+read_files_pattern(awstats_script_t, awstats_var_lib_t, awstats_var_lib_t)
+files_search_var_lib(awstats_script_t)
diff --git a/backup.te b/backup.te
-index 7811450..e787033 100644
+index 7811450b6..e78703340 100644
--- a/backup.te
+++ b/backup.te
@@ -21,7 +21,7 @@ files_type(backup_store_t)
@@ -9333,7 +9333,7 @@ index 7811450..e787033 100644
optional_policy(`
cron_system_entry(backup_t, backup_exec_t)
diff --git a/bacula.fc b/bacula.fc
-index 27ec3d5..65aa71b 100644
+index 27ec3d519..65aa71bf6 100644
--- a/bacula.fc
+++ b/bacula.fc
@@ -8,6 +8,8 @@
@@ -9346,7 +9346,7 @@ index 27ec3d5..65aa71b 100644
/var/log/bacula.* gen_context(system_u:object_r:bacula_log_t,s0)
diff --git a/bacula.if b/bacula.if
-index dcd774e..c240ffa 100644
+index dcd774ee4..c240ffaf6 100644
--- a/bacula.if
+++ b/bacula.if
@@ -69,6 +69,7 @@ interface(`bacula_admin',`
@@ -9358,7 +9358,7 @@ index dcd774e..c240ffa 100644
allow $1 bacula_t:process { ptrace signal_perms };
diff --git a/bacula.te b/bacula.te
-index f16b000..1a7c80f 100644
+index f16b00008..1a7c80f01 100644
--- a/bacula.te
+++ b/bacula.te
@@ -27,6 +27,9 @@ type bacula_store_t;
@@ -9496,7 +9496,7 @@ index f16b000..1a7c80f 100644
+ ')
+')
diff --git a/bcfg2.fc b/bcfg2.fc
-index fb42e35..8af0e14 100644
+index fb42e352b..8af0e14ce 100644
--- a/bcfg2.fc
+++ b/bcfg2.fc
@@ -1,5 +1,7 @@
@@ -9508,7 +9508,7 @@ index fb42e35..8af0e14 100644
/var/lib/bcfg2(/.*)? gen_context(system_u:object_r:bcfg2_var_lib_t,s0)
diff --git a/bcfg2.if b/bcfg2.if
-index ec95d36..186271b 100644
+index ec95d361e..186271b74 100644
--- a/bcfg2.if
+++ b/bcfg2.if
@@ -117,6 +117,32 @@ interface(`bcfg2_manage_lib_dirs',`
@@ -9577,7 +9577,7 @@ index ec95d36..186271b 100644
+ ')
')
diff --git a/bcfg2.te b/bcfg2.te
-index c3fd7b1..e189593 100644
+index c3fd7b148..e18959384 100644
--- a/bcfg2.te
+++ b/bcfg2.te
@@ -15,6 +15,9 @@ init_script_file(bcfg2_initrc_exec_t)
@@ -9602,7 +9602,7 @@ index c3fd7b1..e189593 100644
-
-miscfiles_read_localization(bcfg2_t)
diff --git a/bind.fc b/bind.fc
-index 2b9a3a1..982ce9b 100644
+index 2b9a3a10d..982ce9b71 100644
--- a/bind.fc
+++ b/bind.fc
@@ -1,54 +1,78 @@
@@ -9727,7 +9727,7 @@ index 2b9a3a1..982ce9b 100644
+/var/named/dynamic(/.*)? gen_context(system_u:object_r:named_cache_t,s0)
+')
diff --git a/bind.if b/bind.if
-index 531a8f2..3fcf187 100644
+index 531a8f244..3fcf18722 100644
--- a/bind.if
+++ b/bind.if
@@ -20,6 +20,30 @@ interface(`bind_initrc_domtrans',`
@@ -9908,7 +9908,7 @@ index 531a8f2..3fcf187 100644
+ allow $1 named_unit_file_t:service all_service_perms;
')
diff --git a/bind.te b/bind.te
-index 1241123..73543d3 100644
+index 124112346..73543d306 100644
--- a/bind.te
+++ b/bind.te
@@ -34,7 +34,7 @@ type named_checkconf_exec_t;
@@ -10083,7 +10083,7 @@ index 1241123..73543d3 100644
userdom_use_user_terminals(ndc_t)
diff --git a/bird.te b/bird.te
-index 1d60c27..f8bb700 100644
+index 1d60c2730..f8bb70055 100644
--- a/bird.te
+++ b/bird.te
@@ -51,7 +51,6 @@ corenet_tcp_connect_bgp_port(bird_t)
@@ -10095,7 +10095,7 @@ index 1d60c27..f8bb700 100644
logging_send_syslog_msg(bird_t)
diff --git a/bitlbee.fc b/bitlbee.fc
-index e9708d6..61362d0 100644
+index e9708d6cc..61362d088 100644
--- a/bitlbee.fc
+++ b/bitlbee.fc
@@ -7,7 +7,7 @@
@@ -10108,7 +10108,7 @@ index e9708d6..61362d0 100644
/var/run/bitlbee\.pid -- gen_context(system_u:object_r:bitlbee_var_run_t,s0)
/var/run/bitlbee\.sock -s gen_context(system_u:object_r:bitlbee_var_run_t,s0)
diff --git a/bitlbee.if b/bitlbee.if
-index e73fb79..2badfc0 100644
+index e73fb799e..2badfc0d9 100644
--- a/bitlbee.if
+++ b/bitlbee.if
@@ -44,9 +44,13 @@ interface(`bitlbee_admin',`
@@ -10127,7 +10127,7 @@ index e73fb79..2badfc0 100644
domain_system_change_exemption($1)
role_transition $2 bitlbee_initrc_exec_t system_r;
diff --git a/bitlbee.te b/bitlbee.te
-index f5c1a48..102fa8e 100644
+index f5c1a48b6..102fa8eae 100644
--- a/bitlbee.te
+++ b/bitlbee.te
@@ -33,11 +33,14 @@ files_pid_file(bitlbee_var_run_t)
@@ -10209,7 +10209,7 @@ index f5c1a48..102fa8e 100644
+
diff --git a/blkmapd.fc b/blkmapd.fc
new file mode 100644
-index 0000000..5e59fb4
+index 000000000..5e59fb414
--- /dev/null
+++ b/blkmapd.fc
@@ -0,0 +1,6 @@
@@ -10221,7 +10221,7 @@ index 0000000..5e59fb4
+/var/run/blkmapd\.pid -- gen_context(system_u:object_r:blkmapd_var_run_t,s0)
diff --git a/blkmapd.if b/blkmapd.if
new file mode 100644
-index 0000000..7666379
+index 000000000..76663796f
--- /dev/null
+++ b/blkmapd.if
@@ -0,0 +1,121 @@
@@ -10348,7 +10348,7 @@ index 0000000..7666379
+')
diff --git a/blkmapd.te b/blkmapd.te
new file mode 100644
-index 0000000..6cfb355
+index 000000000..6cfb35592
--- /dev/null
+++ b/blkmapd.te
@@ -0,0 +1,44 @@
@@ -10397,7 +10397,7 @@ index 0000000..6cfb355
+ rpc_read_nfs_state_data(blkmapd_t)
+')
diff --git a/blueman.fc b/blueman.fc
-index c295d2e..4f84e9c 100644
+index c295d2e01..4f84e9c14 100644
--- a/blueman.fc
+++ b/blueman.fc
@@ -1,3 +1,4 @@
@@ -10406,7 +10406,7 @@ index c295d2e..4f84e9c 100644
/var/lib/blueman(/.*)? gen_context(system_u:object_r:blueman_var_lib_t,s0)
diff --git a/blueman.if b/blueman.if
-index 16ec525..1dd4059 100644
+index 16ec52526..1dd40595c 100644
--- a/blueman.if
+++ b/blueman.if
@@ -38,6 +38,7 @@ interface(`blueman_dbus_chat',`
@@ -10418,7 +10418,7 @@ index 16ec525..1dd4059 100644
########################################
diff --git a/blueman.te b/blueman.te
-index 3a5032e..3facb71 100644
+index 3a5032e06..3facb7156 100644
--- a/blueman.te
+++ b/blueman.te
@@ -7,7 +7,7 @@ policy_module(blueman, 1.1.0)
@@ -10513,7 +10513,7 @@ index 3a5032e..3facb71 100644
+ xserver_read_state_xdm(blueman_t)
+')
diff --git a/bluetooth.fc b/bluetooth.fc
-index 2b9c7f3..0086b95 100644
+index 2b9c7f329..0086b95d1 100644
--- a/bluetooth.fc
+++ b/bluetooth.fc
@@ -5,10 +5,14 @@
@@ -10532,7 +10532,7 @@ index 2b9c7f3..0086b95 100644
/usr/sbin/bluetoothd -- gen_context(system_u:object_r:bluetooth_exec_t,s0)
/usr/sbin/hciattach -- gen_context(system_u:object_r:bluetooth_exec_t,s0)
diff --git a/bluetooth.if b/bluetooth.if
-index c723a0a..1c29d21 100644
+index c723a0ae0..1c29d21e7 100644
--- a/bluetooth.if
+++ b/bluetooth.if
@@ -37,7 +37,12 @@ interface(`bluetooth_role',`
@@ -10663,7 +10663,7 @@ index c723a0a..1c29d21 100644
+ allow $1 bluetooth_unit_file_t:service all_service_perms;
')
diff --git a/bluetooth.te b/bluetooth.te
-index 851769e..4b11e96 100644
+index 851769e55..4b11e9620 100644
--- a/bluetooth.te
+++ b/bluetooth.te
@@ -49,12 +49,15 @@ files_type(bluetooth_var_lib_t)
@@ -10764,7 +10764,7 @@ index 851769e..4b11e96 100644
term_dontaudit_use_all_ttys(bluetooth_helper_t)
diff --git a/boinc.fc b/boinc.fc
-index 6d3ccad..9c69f28 100644
+index 6d3ccad60..9c69f28ab 100644
--- a/boinc.fc
+++ b/boinc.fc
@@ -1,9 +1,15 @@
@@ -10790,7 +10790,7 @@ index 6d3ccad..9c69f28 100644
+/var/log/boinc\.log.* -- gen_context(system_u:object_r:boinc_log_t,s0)
+/var/log/boincerr\.log.* -- gen_context(system_u:object_r:boinc_log_t,s0)
diff --git a/boinc.if b/boinc.if
-index 02fefaa..308616e 100644
+index 02fefaaf7..308616e8d 100644
--- a/boinc.if
+++ b/boinc.if
@@ -1,9 +1,166 @@
@@ -11010,7 +11010,7 @@ index 02fefaa..308616e 100644
+ ')
')
diff --git a/boinc.te b/boinc.te
-index 687d4c4..ff57137 100644
+index 687d4c48d..ff5713723 100644
--- a/boinc.te
+++ b/boinc.te
@@ -1,4 +1,4 @@
@@ -11312,7 +11312,7 @@ index 687d4c4..ff57137 100644
+ unconfined_domain(boinc_project_t)
+')
diff --git a/brctl.te b/brctl.te
-index c5a9113..1919abd 100644
+index c5a91138c..1919abdd8 100644
--- a/brctl.te
+++ b/brctl.te
@@ -24,6 +24,7 @@ allow brctl_t self:unix_dgram_socket create_socket_perms;
@@ -11338,7 +11338,7 @@ index c5a9113..1919abd 100644
xen_dontaudit_rw_unix_stream_sockets(brctl_t)
diff --git a/brltty.fc b/brltty.fc
new file mode 100644
-index 0000000..05e3528
+index 000000000..05e352897
--- /dev/null
+++ b/brltty.fc
@@ -0,0 +1,10 @@
@@ -11354,7 +11354,7 @@ index 0000000..05e3528
+
diff --git a/brltty.if b/brltty.if
new file mode 100644
-index 0000000..968c957
+index 000000000..968c957ab
--- /dev/null
+++ b/brltty.if
@@ -0,0 +1,80 @@
@@ -11440,7 +11440,7 @@ index 0000000..968c957
+')
diff --git a/brltty.te b/brltty.te
new file mode 100644
-index 0000000..c167267
+index 000000000..c167267f8
--- /dev/null
+++ b/brltty.te
@@ -0,0 +1,70 @@
@@ -11515,7 +11515,7 @@ index 0000000..c167267
+
+term_use_unallocated_ttys(brltty_t)
diff --git a/bugzilla.fc b/bugzilla.fc
-index fce0b6e..9efceac 100644
+index fce0b6ebf..9efceac4e 100644
--- a/bugzilla.fc
+++ b/bugzilla.fc
@@ -1,4 +1,4 @@
@@ -11527,7 +11527,7 @@ index fce0b6e..9efceac 100644
-/var/lib/bugzilla(/.*)? gen_context(system_u:object_r:httpd_bugzilla_rw_content_t,s0)
+/var/lib/bugzilla(/.*)? gen_context(system_u:object_r:bugzilla_rw_content_t,s0)
diff --git a/bugzilla.if b/bugzilla.if
-index 1b22262..d9ea246 100644
+index 1b22262d5..d9ea246a1 100644
--- a/bugzilla.if
+++ b/bugzilla.if
@@ -12,10 +12,10 @@
@@ -11614,7 +11614,7 @@ index 1b22262..d9ea246 100644
+ ')
')
diff --git a/bugzilla.te b/bugzilla.te
-index 18623e3..c62f617 100644
+index 18623e39e..c62f617e1 100644
--- a/bugzilla.te
+++ b/bugzilla.te
@@ -6,42 +6,55 @@ policy_module(bugzilla, 1.1.0)
@@ -11694,7 +11694,7 @@ index 18623e3..c62f617 100644
')
diff --git a/bumblebee.fc b/bumblebee.fc
new file mode 100644
-index 0000000..b5ee23b
+index 000000000..b5ee23be7
--- /dev/null
+++ b/bumblebee.fc
@@ -0,0 +1,7 @@
@@ -11707,7 +11707,7 @@ index 0000000..b5ee23b
+/var/run/bumblebee.* gen_context(system_u:object_r:bumblebee_var_run_t,s0)
diff --git a/bumblebee.if b/bumblebee.if
new file mode 100644
-index 0000000..2d2e60c
+index 000000000..2d2e60c19
--- /dev/null
+++ b/bumblebee.if
@@ -0,0 +1,122 @@
@@ -11835,7 +11835,7 @@ index 0000000..2d2e60c
+')
diff --git a/bumblebee.te b/bumblebee.te
new file mode 100644
-index 0000000..9aee6f3
+index 000000000..9aee6f327
--- /dev/null
+++ b/bumblebee.te
@@ -0,0 +1,63 @@
@@ -11903,7 +11903,7 @@ index 0000000..9aee6f3
+ apm_stream_connect(bumblebee_t)
+')
diff --git a/cachefilesd.fc b/cachefilesd.fc
-index 648c790..aa03fc8 100644
+index 648c7902b..aa03fc8ae 100644
--- a/cachefilesd.fc
+++ b/cachefilesd.fc
@@ -1,9 +1,34 @@
@@ -11945,7 +11945,7 @@ index 648c790..aa03fc8 100644
-/var/run/cachefilesd\.pid -- gen_context(system_u:object_r:cachefilesd_var_run_t,s0)
+/var/run/cachefilesd\.pid -- gen_context(system_u:object_r:cachefilesd_var_run_t,s0)
diff --git a/cachefilesd.if b/cachefilesd.if
-index 8de2ab9..3b41945 100644
+index 8de2ab9c5..3b419455f 100644
--- a/cachefilesd.if
+++ b/cachefilesd.if
@@ -1,39 +1,35 @@
@@ -12011,7 +12011,7 @@ index 8de2ab9..3b41945 100644
+ domtrans_pattern($1, cachefilesd_exec_t, cachefilesd_t)
')
diff --git a/cachefilesd.te b/cachefilesd.te
-index a3760bc..22ed920 100644
+index a3760bc92..22ed920b7 100644
--- a/cachefilesd.te
+++ b/cachefilesd.te
@@ -1,52 +1,125 @@
@@ -12163,7 +12163,7 @@ index a3760bc..22ed920 100644
+
+init_sigchld_script(cachefiles_kernel_t)
diff --git a/calamaris.if b/calamaris.if
-index cd9c528..ba793b7 100644
+index cd9c52871..ba793b748 100644
--- a/calamaris.if
+++ b/calamaris.if
@@ -42,7 +42,7 @@ interface(`calamaris_run',`
@@ -12176,7 +12176,7 @@ index cd9c528..ba793b7 100644
')
diff --git a/calamaris.te b/calamaris.te
-index 7e57460..8d8cd78 100644
+index 7e574604b..8d8cd78e5 100644
--- a/calamaris.te
+++ b/calamaris.te
@@ -23,7 +23,7 @@ files_type(calamaris_www_t)
@@ -12218,7 +12218,7 @@ index 7e57460..8d8cd78 100644
optional_policy(`
diff --git a/callweaver.te b/callweaver.te
-index 0e5be4c..b9a407f 100644
+index 0e5be4cdf..b9a407f90 100644
--- a/callweaver.te
+++ b/callweaver.te
@@ -84,4 +84,3 @@ term_use_ptmx(callweaver_t)
@@ -12227,7 +12227,7 @@ index 0e5be4c..b9a407f 100644
-miscfiles_read_localization(callweaver_t)
diff --git a/canna.if b/canna.if
-index 400db07..f416e22 100644
+index 400db07a2..f416e22a7 100644
--- a/canna.if
+++ b/canna.if
@@ -43,9 +43,13 @@ interface(`canna_admin',`
@@ -12246,7 +12246,7 @@ index 400db07..f416e22 100644
domain_system_change_exemption($1)
role_transition $2 canna_initrc_exec_t system_r;
diff --git a/canna.te b/canna.te
-index 9fe6162..5c505e7 100644
+index 9fe61621f..5c505e7de 100644
--- a/canna.te
+++ b/canna.te
@@ -52,7 +52,6 @@ files_pid_filetrans(canna_t, canna_var_run_t, { dir sock_file })
@@ -12276,7 +12276,7 @@ index 9fe6162..5c505e7 100644
sysnet_read_config(canna_t)
diff --git a/ccs.if b/ccs.if
-index 5ded72d..cb94e5e 100644
+index 5ded72d37..cb94e5ea7 100644
--- a/ccs.if
+++ b/ccs.if
@@ -98,20 +98,24 @@ interface(`ccs_manage_config',`
@@ -12308,7 +12308,7 @@ index 5ded72d..cb94e5e 100644
files_search_var_lib($1)
admin_pattern($1, ccs_var_lib_t)
diff --git a/ccs.te b/ccs.te
-index 658134d..58deece 100644
+index 658134d8a..58deeceaa 100644
--- a/ccs.te
+++ b/ccs.te
@@ -37,7 +37,7 @@ files_pid_file(ccs_var_run_t)
@@ -12356,7 +12356,7 @@ index 658134d..58deece 100644
optional_policy(`
diff --git a/cdrecord.if b/cdrecord.if
-index fbc20f6..4de4a00 100644
+index fbc20f694..4de4a005c 100644
--- a/cdrecord.if
+++ b/cdrecord.if
@@ -27,6 +27,9 @@ interface(`cdrecord_role',`
@@ -12371,7 +12371,7 @@ index fbc20f6..4de4a00 100644
ps_process_pattern($2, cdrecord_t)
')
diff --git a/cdrecord.te b/cdrecord.te
-index 16883c9..97e9a42 100644
+index 16883c9c3..97e9a429e 100644
--- a/cdrecord.te
+++ b/cdrecord.te
@@ -29,7 +29,7 @@ role cdrecord_roles types cdrecord_t;
@@ -12418,7 +12418,7 @@ index 16883c9..97e9a42 100644
optional_policy(`
resmgr_stream_connect(cdrecord_t)
diff --git a/certmaster.if b/certmaster.if
-index 0c53b18..ef29f6e 100644
+index 0c53b189b..ef29f6e6c 100644
--- a/certmaster.if
+++ b/certmaster.if
@@ -117,13 +117,16 @@ interface(`certmaster_manage_log',`
@@ -12442,7 +12442,7 @@ index 0c53b18..ef29f6e 100644
domain_system_change_exemption($1)
role_transition $2 certmaster_initrc_exec_t system_r;
diff --git a/certmaster.te b/certmaster.te
-index 4a87873..113f3b3 100644
+index 4a878730b..113f3b32f 100644
--- a/certmaster.te
+++ b/certmaster.te
@@ -65,11 +65,10 @@ corenet_tcp_sendrecv_certmaster_port(certmaster_t)
@@ -12460,7 +12460,7 @@ index 4a87873..113f3b3 100644
+
+mta_send_mail(certmaster_t)
diff --git a/certmonger.fc b/certmonger.fc
-index ed298d8..c887648 100644
+index ed298d8b6..c88764838 100644
--- a/certmonger.fc
+++ b/certmonger.fc
@@ -1,7 +1,12 @@
@@ -12477,7 +12477,7 @@ index ed298d8..c887648 100644
/var/run/certmonger.* gen_context(system_u:object_r:certmonger_var_run_t,s0)
diff --git a/certmonger.if b/certmonger.if
-index 008f8ef..144c074 100644
+index 008f8ef26..144c0740a 100644
--- a/certmonger.if
+++ b/certmonger.if
@@ -160,16 +160,20 @@ interface(`certmonger_admin',`
@@ -12505,7 +12505,7 @@ index 008f8ef..144c074 100644
admin_pattern($1, certmonger_var_run_t)
')
diff --git a/certmonger.te b/certmonger.te
-index 550b287..80de6d3 100644
+index 550b287ce..80de6d3b7 100644
--- a/certmonger.te
+++ b/certmonger.te
@@ -18,18 +18,26 @@ files_type(certmonger_var_lib_t)
@@ -12680,7 +12680,7 @@ index 550b287..80de6d3 100644
+ ')
+')
diff --git a/certwatch.te b/certwatch.te
-index 171fafb..e88a026 100644
+index 171fafb99..e88a0268a 100644
--- a/certwatch.te
+++ b/certwatch.te
@@ -20,33 +20,45 @@ role certwatch_roles types certwatch_t;
@@ -12735,7 +12735,7 @@ index 171fafb..e88a026 100644
')
diff --git a/cfengine.if b/cfengine.if
-index a731122..5279d4e 100644
+index a7311229f..5279d4e3a 100644
--- a/cfengine.if
+++ b/cfengine.if
@@ -13,7 +13,6 @@
@@ -12835,7 +12835,7 @@ index a731122..5279d4e 100644
')
+
diff --git a/cfengine.te b/cfengine.te
-index fbe3ad9..21ab8e1 100644
+index fbe3ad955..21ab8e176 100644
--- a/cfengine.te
+++ b/cfengine.te
@@ -41,18 +41,13 @@ create_files_pattern(cfengine_domain, cfengine_log_t, cfengine_log_t)
@@ -12869,7 +12869,7 @@ index fbe3ad9..21ab8e1 100644
domain_read_all_domains_state(cfengine_monitord_t)
diff --git a/cgdcbxd.fc b/cgdcbxd.fc
new file mode 100644
-index 0000000..7567038
+index 000000000..756703813
--- /dev/null
+++ b/cgdcbxd.fc
@@ -0,0 +1,5 @@
@@ -12880,7 +12880,7 @@ index 0000000..7567038
+/var/run/cgdcbxd\.pid -- gen_context(system_u:object_r:cgdcbxd_var_run_t,s0)
diff --git a/cgdcbxd.if b/cgdcbxd.if
new file mode 100644
-index 0000000..1efacf1
+index 000000000..1efacf1d1
--- /dev/null
+++ b/cgdcbxd.if
@@ -0,0 +1,99 @@
@@ -12985,7 +12985,7 @@ index 0000000..1efacf1
+')
diff --git a/cgdcbxd.te b/cgdcbxd.te
new file mode 100644
-index 0000000..06ff1b0
+index 000000000..06ff1b01a
--- /dev/null
+++ b/cgdcbxd.te
@@ -0,0 +1,36 @@
@@ -13026,7 +13026,7 @@ index 0000000..06ff1b0
+
+domain_dontaudit_read_all_domains_state(cgdcbxd_t)
diff --git a/cgroup.if b/cgroup.if
-index 85ca63f..1d1c99c 100644
+index 85ca63f9a..1d1c99c8f 100644
--- a/cgroup.if
+++ b/cgroup.if
@@ -171,8 +171,26 @@ interface(`cgroup_admin',`
@@ -13059,7 +13059,7 @@ index 85ca63f..1d1c99c 100644
admin_pattern($1, { cgconfig_etc_t cgrules_etc_t })
files_list_etc($1)
diff --git a/cgroup.te b/cgroup.te
-index 80a88a2..514eb47 100644
+index 80a88a27a..514eb47f2 100644
--- a/cgroup.te
+++ b/cgroup.te
@@ -25,8 +25,8 @@ files_pid_file(cgred_var_run_t)
@@ -13143,7 +13143,7 @@ index 80a88a2..514eb47 100644
+logging_send_syslog_msg(cgred_t)
diff --git a/chrome.fc b/chrome.fc
new file mode 100644
-index 0000000..5c6bdb6
+index 000000000..5c6bdb68d
--- /dev/null
+++ b/chrome.fc
@@ -0,0 +1,11 @@
@@ -13160,7 +13160,7 @@ index 0000000..5c6bdb6
+HOME_DIR/\.cache/chromium(/.*)? gen_context(system_u:object_r:chrome_sandbox_home_t,s0)
diff --git a/chrome.if b/chrome.if
new file mode 100644
-index 0000000..aa308eb
+index 000000000..aa308eba6
--- /dev/null
+++ b/chrome.if
@@ -0,0 +1,137 @@
@@ -13303,7 +13303,7 @@ index 0000000..aa308eb
+')
diff --git a/chrome.te b/chrome.te
new file mode 100644
-index 0000000..435a5cd
+index 000000000..435a5cdc1
--- /dev/null
+++ b/chrome.te
@@ -0,0 +1,256 @@
@@ -13564,7 +13564,7 @@ index 0000000..435a5cd
+ gnome_dontaudit_write_config_files(chrome_sandbox_nacl_t)
+')
diff --git a/chronyd.fc b/chronyd.fc
-index 4e4143e..f03dba0 100644
+index 4e4143ed8..f03dba037 100644
--- a/chronyd.fc
+++ b/chronyd.fc
@@ -1,13 +1,18 @@
@@ -13589,7 +13589,7 @@ index 4e4143e..f03dba0 100644
/var/run/chronyd\.pid -- gen_context(system_u:object_r:chronyd_var_run_t,s0)
/var/run/chronyd\.sock -s gen_context(system_u:object_r:chronyd_var_run_t,s0)
diff --git a/chronyd.if b/chronyd.if
-index 32e8265..ac74503 100644
+index 32e8265c2..ac74503d1 100644
--- a/chronyd.if
+++ b/chronyd.if
@@ -57,6 +57,24 @@ interface(`chronyd_exec',`
@@ -13772,7 +13772,7 @@ index 32e8265..ac74503 100644
+ allow $1 chronyd_unit_file_t:service all_service_perms;
')
diff --git a/chronyd.te b/chronyd.te
-index e5b621c..cfc64f1 100644
+index e5b621c29..cfc64f1b0 100644
--- a/chronyd.te
+++ b/chronyd.te
@@ -18,6 +18,9 @@ files_type(chronyd_keys_t)
@@ -13859,7 +13859,7 @@ index e5b621c..cfc64f1 100644
')
diff --git a/cinder.fc b/cinder.fc
new file mode 100644
-index 0000000..4b318b7
+index 000000000..4b318b783
--- /dev/null
+++ b/cinder.fc
@@ -0,0 +1,16 @@
@@ -13881,7 +13881,7 @@ index 0000000..4b318b7
+/var/run/cinder(/.*)? gen_context(system_u:object_r:cinder_var_run_t,s0)
diff --git a/cinder.if b/cinder.if
new file mode 100644
-index 0000000..fc9cae7
+index 000000000..fc9cae7c7
--- /dev/null
+++ b/cinder.if
@@ -0,0 +1,57 @@
@@ -13944,7 +13944,7 @@ index 0000000..fc9cae7
+')
diff --git a/cinder.te b/cinder.te
new file mode 100644
-index 0000000..488a7a6
+index 000000000..488a7a659
--- /dev/null
+++ b/cinder.te
@@ -0,0 +1,169 @@
@@ -14118,7 +14118,7 @@ index 0000000..488a7a6
+')
+
diff --git a/cipe.te b/cipe.te
-index a0aa693..af571ed 100644
+index a0aa693d1..af571edbb 100644
--- a/cipe.te
+++ b/cipe.te
@@ -29,7 +29,6 @@ kernel_read_system_state(ciped_t)
@@ -14147,7 +14147,7 @@ index a0aa693..af571ed 100644
userdom_dontaudit_use_unpriv_user_fds(ciped_t)
diff --git a/clamav.fc b/clamav.fc
-index d72afcc..c53b80d 100644
+index d72afcc31..c53b80dcd 100644
--- a/clamav.fc
+++ b/clamav.fc
@@ -6,6 +6,8 @@
@@ -14160,7 +14160,7 @@ index d72afcc..c53b80d 100644
/usr/sbin/clamav-milter -- gen_context(system_u:object_r:clamd_exec_t,s0)
diff --git a/clamav.if b/clamav.if
-index 4cc4a5c..a6c6322 100644
+index 4cc4a5cd0..a6c632290 100644
--- a/clamav.if
+++ b/clamav.if
@@ -1,4 +1,4 @@
@@ -14410,7 +14410,7 @@ index 4cc4a5c..a6c6322 100644
+
')
diff --git a/clamav.te b/clamav.te
-index ce3836a..10595e6 100644
+index ce3836acd..10595e6e5 100644
--- a/clamav.te
+++ b/clamav.te
@@ -18,7 +18,7 @@ gen_tunable(clamav_read_all_non_security_files_clamscan, false)
@@ -14582,7 +14582,7 @@ index ce3836a..10595e6 100644
')
diff --git a/clockspeed.te b/clockspeed.te
-index d3e2a67..f5b330c 100644
+index d3e2a67e5..f5b330c08 100644
--- a/clockspeed.te
+++ b/clockspeed.te
@@ -29,7 +29,6 @@ allow clockspeed_cli_t self:udp_socket create_socket_perms;
@@ -14625,7 +14625,7 @@ index d3e2a67..f5b330c 100644
optional_policy(`
daemontools_service_domain(clockspeed_srv_t, clockspeed_srv_exec_t)
diff --git a/clogd.te b/clogd.te
-index 4a5b3d1..cd146bd 100644
+index 4a5b3d1a5..cd146bd5a 100644
--- a/clogd.te
+++ b/clogd.te
@@ -41,9 +41,6 @@ storage_raw_write_fixed_disk(clogd_t)
@@ -14641,7 +14641,7 @@ index 4a5b3d1..cd146bd 100644
')
diff --git a/cloudform.fc b/cloudform.fc
new file mode 100644
-index 0000000..3849f13
+index 000000000..3849f134a
--- /dev/null
+++ b/cloudform.fc
@@ -0,0 +1,21 @@
@@ -14668,7 +14668,7 @@ index 0000000..3849f13
+/var/run/iwhd\.pid -- gen_context(system_u:object_r:iwhd_var_run_t,s0)
diff --git a/cloudform.if b/cloudform.if
new file mode 100644
-index 0000000..55fe0d6
+index 000000000..55fe0d668
--- /dev/null
+++ b/cloudform.if
@@ -0,0 +1,116 @@
@@ -14790,7 +14790,7 @@ index 0000000..55fe0d6
+')
diff --git a/cloudform.te b/cloudform.te
new file mode 100644
-index 0000000..21e6ae7
+index 000000000..21e6ae757
--- /dev/null
+++ b/cloudform.te
@@ -0,0 +1,249 @@
@@ -15044,7 +15044,7 @@ index 0000000..21e6ae7
+userdom_home_manager(iwhd_t)
+
diff --git a/cmirrord.if b/cmirrord.if
-index cc4e7cb..f348d27 100644
+index cc4e7cb96..f348d2746 100644
--- a/cmirrord.if
+++ b/cmirrord.if
@@ -73,10 +73,11 @@ interface(`cmirrord_rw_shm',`
@@ -15076,7 +15076,7 @@ index cc4e7cb..f348d27 100644
domain_system_change_exemption($1)
role_transition $2 cmirrord_initrc_exec_t system_r;
diff --git a/cmirrord.te b/cmirrord.te
-index bbdd396..28b1761 100644
+index bbdd3960e..28b176182 100644
--- a/cmirrord.te
+++ b/cmirrord.te
@@ -23,13 +23,14 @@ files_pid_file(cmirrord_var_run_t)
@@ -15119,7 +15119,7 @@ index bbdd396..28b1761 100644
+ rhcs_rw_cluster_tmpfs(cmirrord_t)
+')
diff --git a/cobbler.fc b/cobbler.fc
-index 973d208..6ce8803 100644
+index 973d208ff..6ce88039f 100644
--- a/cobbler.fc
+++ b/cobbler.fc
@@ -4,11 +4,15 @@
@@ -15139,7 +15139,7 @@ index 973d208..6ce8803 100644
/var/lib/tftpboot/menu\.c32 -- gen_context(system_u:object_r:cobbler_var_lib_t,s0)
/var/lib/tftpboot/ppc(/.*)? gen_context(system_u:object_r:cobbler_var_lib_t,s0)
diff --git a/cobbler.if b/cobbler.if
-index c223f81..8b567c1 100644
+index c223f8132..8b567c191 100644
--- a/cobbler.if
+++ b/cobbler.if
@@ -38,6 +38,28 @@ interface(`cobblerd_initrc_domtrans',`
@@ -15208,7 +15208,7 @@ index c223f81..8b567c1 100644
- admin_pattern($1, { httpd_cobbler_content_t httpd_cobbler_content_ra_t httpd_cobbler_content_rw_t })
')
diff --git a/cobbler.te b/cobbler.te
-index 5f306dd..36fb0e4 100644
+index 5f306dd44..36fb0e4e7 100644
--- a/cobbler.te
+++ b/cobbler.te
@@ -62,11 +62,12 @@ files_tmp_file(cobbler_tmp_t)
@@ -15326,7 +15326,7 @@ index 5f306dd..36fb0e4 100644
')
diff --git a/cockpit.fc b/cockpit.fc
new file mode 100644
-index 0000000..bf80173
+index 000000000..bf801737d
--- /dev/null
+++ b/cockpit.fc
@@ -0,0 +1,13 @@
@@ -15345,7 +15345,7 @@ index 0000000..bf80173
+/var/run/cockpit-ws(/.*)? gen_context(system_u:object_r:cockpit_var_run_t,s0)
diff --git a/cockpit.if b/cockpit.if
new file mode 100644
-index 0000000..d5920c0
+index 000000000..d5920c061
--- /dev/null
+++ b/cockpit.if
@@ -0,0 +1,188 @@
@@ -15539,7 +15539,7 @@ index 0000000..d5920c0
+')
diff --git a/cockpit.te b/cockpit.te
new file mode 100644
-index 0000000..b802a99
+index 000000000..b802a9920
--- /dev/null
+++ b/cockpit.te
@@ -0,0 +1,121 @@
@@ -15665,7 +15665,7 @@ index 0000000..b802a99
+ unconfined_domtrans(cockpit_session_t)
+')
diff --git a/collectd.fc b/collectd.fc
-index 79a3abe..3ee73d1 100644
+index 79a3abe3a..3ee73d17d 100644
--- a/collectd.fc
+++ b/collectd.fc
@@ -1,9 +1,13 @@
@@ -15684,7 +15684,7 @@ index 79a3abe..3ee73d1 100644
-/usr/share/collectd/collection3/bin/.*\.cgi -- gen_context(system_u:object_r:httpd_collectd_script_exec_t,s0)
+/usr/share/collectd/collection3/bin/.*\.cgi -- gen_context(system_u:object_r:collectd_script_exec_t,s0)
diff --git a/collectd.if b/collectd.if
-index 954309e..6780142 100644
+index 954309e64..67801421b 100644
--- a/collectd.if
+++ b/collectd.if
@@ -2,8 +2,145 @@
@@ -15867,7 +15867,7 @@ index 954309e..6780142 100644
')
+
diff --git a/collectd.te b/collectd.te
-index 6471fa8..90a9319 100644
+index 6471fa8c4..90a9319c6 100644
--- a/collectd.te
+++ b/collectd.te
@@ -26,43 +26,61 @@ files_type(collectd_var_lib_t)
@@ -15997,7 +15997,7 @@ index 6471fa8..90a9319 100644
+
+auth_read_passwd(collectd_script_t)
diff --git a/colord.fc b/colord.fc
-index 71639eb..08ab891 100644
+index 71639eb54..08ab89171 100644
--- a/colord.fc
+++ b/colord.fc
@@ -7,5 +7,7 @@
@@ -16009,7 +16009,7 @@ index 71639eb..08ab891 100644
/var/lib/color(/.*)? gen_context(system_u:object_r:colord_var_lib_t,s0)
/var/lib/colord(/.*)? gen_context(system_u:object_r:colord_var_lib_t,s0)
diff --git a/colord.if b/colord.if
-index 8e27a37..c69be28 100644
+index 8e27a37c1..c69be28b9 100644
--- a/colord.if
+++ b/colord.if
@@ -1,4 +1,4 @@
@@ -16063,7 +16063,7 @@ index 8e27a37..c69be28 100644
+ ps_process_pattern($1, colord_t)
+')
diff --git a/colord.te b/colord.te
-index 9f2dfb2..86836f9 100644
+index 9f2dfb233..86836f9cd 100644
--- a/colord.te
+++ b/colord.te
@@ -8,6 +8,7 @@ policy_module(colord, 1.1.0)
@@ -16193,7 +16193,7 @@ index 9f2dfb2..86836f9 100644
+ zoneminder_rw_tmpfs_files(colord_t)
+')
diff --git a/comsat.te b/comsat.te
-index c63cf85..dc6998b 100644
+index c63cf8556..dc6998b60 100644
--- a/comsat.te
+++ b/comsat.te
@@ -37,6 +37,13 @@ kernel_read_kernel_sysctls(comsat_t)
@@ -16220,7 +16220,7 @@ index c63cf85..dc6998b 100644
mta_getattr_spool(comsat_t)
diff --git a/condor.fc b/condor.fc
-index ad2b696..28d1af0 100644
+index ad2b69606..28d1af020 100644
--- a/condor.fc
+++ b/condor.fc
@@ -1,6 +1,7 @@
@@ -16232,7 +16232,7 @@ index ad2b696..28d1af0 100644
/usr/sbin/condor_collector -- gen_context(system_u:object_r:condor_collector_exec_t,s0)
/usr/sbin/condor_master -- gen_context(system_u:object_r:condor_master_exec_t,s0)
diff --git a/condor.if b/condor.if
-index 881d92f..a2d588a 100644
+index 881d92f35..a2d588a51 100644
--- a/condor.if
+++ b/condor.if
@@ -1,75 +1,391 @@
@@ -16691,7 +16691,7 @@ index 881d92f..a2d588a 100644
+ ')
')
diff --git a/condor.te b/condor.te
-index ce9f040..2a52b42 100644
+index ce9f040e2..2a52b429f 100644
--- a/condor.te
+++ b/condor.te
@@ -34,7 +34,7 @@ files_tmp_file(condor_startd_tmp_t)
@@ -16884,7 +16884,7 @@ index ce9f040..2a52b42 100644
+')
diff --git a/conman.fc b/conman.fc
new file mode 100644
-index 0000000..b13a6f6
+index 000000000..b13a6f6db
--- /dev/null
+++ b/conman.fc
@@ -0,0 +1,10 @@
@@ -16900,7 +16900,7 @@ index 0000000..b13a6f6
+/var/run/conmand.* -- gen_context(system_u:object_r:conman_var_run_t,s0)
diff --git a/conman.if b/conman.if
new file mode 100644
-index 0000000..1cc5fa4
+index 000000000..1cc5fa464
--- /dev/null
+++ b/conman.if
@@ -0,0 +1,143 @@
@@ -17049,7 +17049,7 @@ index 0000000..1cc5fa4
+')
diff --git a/conman.te b/conman.te
new file mode 100644
-index 0000000..2357f3b
+index 000000000..2357f3ba8
--- /dev/null
+++ b/conman.te
@@ -0,0 +1,97 @@
@@ -17151,7 +17151,7 @@ index 0000000..2357f3b
+ unconfined_domain(conman_unconfined_script_t)
+')
diff --git a/consolekit.fc b/consolekit.fc
-index 23c9558..29e5fd3 100644
+index 23c95582f..29e5fd38d 100644
--- a/consolekit.fc
+++ b/consolekit.fc
@@ -1,3 +1,5 @@
@@ -17161,7 +17161,7 @@ index 23c9558..29e5fd3 100644
/var/log/ConsoleKit(/.*)? gen_context(system_u:object_r:consolekit_log_t,s0)
diff --git a/consolekit.if b/consolekit.if
-index 5b830ec..78025c5 100644
+index 5b830ec9c..78025c5e7 100644
--- a/consolekit.if
+++ b/consolekit.if
@@ -21,6 +21,27 @@ interface(`consolekit_domtrans',`
@@ -17284,7 +17284,7 @@ index 5b830ec..78025c5 100644
+ ps_process_pattern($1, consolekit_t)
+')
diff --git a/consolekit.te b/consolekit.te
-index bd18063..94407f8 100644
+index bd18063f6..94407f854 100644
--- a/consolekit.te
+++ b/consolekit.te
@@ -19,21 +19,23 @@ type consolekit_var_run_t;
@@ -17381,7 +17381,7 @@ index bd18063..94407f8 100644
optional_policy(`
policykit_domtrans_auth(consolekit_t)
diff --git a/corosync.fc b/corosync.fc
-index da39f0f..b26d3e0 100644
+index da39f0fcc..b26d3e0a4 100644
--- a/corosync.fc
+++ b/corosync.fc
@@ -1,5 +1,7 @@
@@ -17399,7 +17399,7 @@ index da39f0f..b26d3e0 100644
+/var/run/corosync-qdevice(/.*)? gen_context(system_u:object_r:corosync_var_run_t,s0)
+/var/run/corosync-qnetd(/.*)? gen_context(system_u:object_r:corosync_var_run_t,s0)
diff --git a/corosync.if b/corosync.if
-index 694a037..d859681 100644
+index 694a037da..d8596812d 100644
--- a/corosync.if
+++ b/corosync.if
@@ -77,6 +77,25 @@ interface(`corosync_read_log',`
@@ -17520,7 +17520,7 @@ index 694a037..d859681 100644
+ allow $1 corosync_unit_file_t:service all_service_perms;
')
diff --git a/corosync.te b/corosync.te
-index d5aa1e4..9a25701 100644
+index d5aa1e446..9a2570145 100644
--- a/corosync.te
+++ b/corosync.te
@@ -28,12 +28,15 @@ logging_log_file(corosync_var_log_t)
@@ -17599,7 +17599,7 @@ index d5aa1e4..9a25701 100644
+ wdmd_rw_tmpfs(corosync_t)
+')
diff --git a/couchdb.fc b/couchdb.fc
-index c086302..5380ab6 100644
+index c0863022d..5380ab641 100644
--- a/couchdb.fc
+++ b/couchdb.fc
@@ -1,8 +1,10 @@
@@ -17617,7 +17617,7 @@ index c086302..5380ab6 100644
/var/lib/couchdb(/.*)? gen_context(system_u:object_r:couchdb_var_lib_t,s0)
diff --git a/couchdb.if b/couchdb.if
-index 715a826..a1cbdb2 100644
+index 715a826f1..a1cbdb29e 100644
--- a/couchdb.if
+++ b/couchdb.if
@@ -2,7 +2,7 @@
@@ -17847,7 +17847,7 @@ index 715a826..a1cbdb2 100644
+ ')
')
diff --git a/couchdb.te b/couchdb.te
-index ae1c1b1..9b3a328 100644
+index ae1c1b12a..9b3a328c2 100644
--- a/couchdb.te
+++ b/couchdb.te
@@ -27,18 +27,21 @@ files_type(couchdb_var_lib_t)
@@ -17924,7 +17924,7 @@ index ae1c1b1..9b3a328 100644
-miscfiles_read_localization(couchdb_t)
diff --git a/courier.fc b/courier.fc
-index 2f017a0..defdc87 100644
+index 2f017a076..defdc871e 100644
--- a/courier.fc
+++ b/courier.fc
@@ -11,17 +11,18 @@
@@ -17955,7 +17955,7 @@ index 2f017a0..defdc87 100644
/var/lib/courier(/.*)? gen_context(system_u:object_r:courier_var_lib_t,s0)
/var/lib/courier-imap(/.*)? gen_context(system_u:object_r:courier_var_lib_t,s0)
diff --git a/courier.if b/courier.if
-index 10f820f..acdb179 100644
+index 10f820fc7..acdb179e8 100644
--- a/courier.if
+++ b/courier.if
@@ -1,12 +1,12 @@
@@ -18131,7 +18131,7 @@ index 10f820f..acdb179 100644
allow $1 courier_spool_t:fifo_file rw_fifo_file_perms;
')
diff --git a/courier.te b/courier.te
-index ae3bc70..d64452f 100644
+index ae3bc70e9..d64452f77 100644
--- a/courier.te
+++ b/courier.te
@@ -18,7 +18,7 @@ type courier_etc_t;
@@ -18221,7 +18221,7 @@ index ae3bc70..d64452f 100644
########################################
#
diff --git a/cpucontrol.te b/cpucontrol.te
-index af72c4e..afab036 100644
+index af72c4e55..afab0367f 100644
--- a/cpucontrol.te
+++ b/cpucontrol.te
@@ -42,8 +42,6 @@ term_dontaudit_use_console(cpucontrol_domain)
@@ -18258,7 +18258,7 @@ index af72c4e..afab036 100644
-miscfiles_read_localization(cpuspeed_t)
+logging_send_syslog_msg(cpuspeed_t)
diff --git a/cpufreqselector.te b/cpufreqselector.te
-index 6cedb87..530e250 100644
+index 6cedb8724..530e250e5 100644
--- a/cpufreqselector.te
+++ b/cpufreqselector.te
@@ -14,21 +14,17 @@ init_daemon_domain(cpufreqselector_t, cpufreqselector_exec_t)
@@ -18296,7 +18296,7 @@ index 6cedb87..530e250 100644
+')
diff --git a/cpuplug.fc b/cpuplug.fc
new file mode 100644
-index 0000000..be203ff
+index 000000000..be203ff49
--- /dev/null
+++ b/cpuplug.fc
@@ -0,0 +1,3 @@
@@ -18305,7 +18305,7 @@ index 0000000..be203ff
+/usr/sbin/cpuplugd -- gen_context(system_u:object_r:cpuplug_exec_t,s0)
diff --git a/cpuplug.if b/cpuplug.if
new file mode 100644
-index 0000000..c68d1d3
+index 000000000..c68d1d3cf
--- /dev/null
+++ b/cpuplug.if
@@ -0,0 +1,20 @@
@@ -18331,7 +18331,7 @@ index 0000000..c68d1d3
+')
diff --git a/cpuplug.te b/cpuplug.te
new file mode 100644
-index 0000000..074f3e0
+index 000000000..074f3e04d
--- /dev/null
+++ b/cpuplug.te
@@ -0,0 +1,40 @@
@@ -18376,7 +18376,7 @@ index 0000000..074f3e0
+logging_send_syslog_msg(cpuplug_t)
+
diff --git a/cron.fc b/cron.fc
-index ad0bae9..615a947 100644
+index ad0bae948..615a947aa 100644
--- a/cron.fc
+++ b/cron.fc
@@ -1,66 +1,77 @@
@@ -18498,7 +18498,7 @@ index ad0bae9..615a947 100644
+/var/spool/cron/tabs -d gen_context(system_u:object_r:cron_spool_t,s0)
')
diff --git a/cron.if b/cron.if
-index 1303b30..f13c532 100644
+index 1303b3036..f13c53200 100644
--- a/cron.if
+++ b/cron.if
@@ -2,11 +2,12 @@
@@ -19533,7 +19533,7 @@ index 1303b30..f13c532 100644
+ logging_log_filetrans($1, cron_log_t, $2, $3)
')
diff --git a/cron.te b/cron.te
-index 7de3859..61dcff6 100644
+index 7de385956..61dcff6a5 100644
--- a/cron.te
+++ b/cron.te
@@ -11,46 +11,54 @@ gen_require(`
@@ -20523,7 +20523,7 @@ index 7de3859..61dcff6 100644
type unconfined_cronjob_t;
diff --git a/ctdb.fc b/ctdb.fc
-index 8401fe6..84ece3e 100644
+index 8401fe6f3..84ece3e4a 100644
--- a/ctdb.fc
+++ b/ctdb.fc
@@ -1,12 +1,20 @@
@@ -20548,7 +20548,7 @@ index 8401fe6..84ece3e 100644
/var/spool/ctdb(/.*)? gen_context(system_u:object_r:ctdbd_spool_t,s0)
diff --git a/ctdb.if b/ctdb.if
-index b25b01d..06895f3 100644
+index b25b01d12..06895f39a 100644
--- a/ctdb.if
+++ b/ctdb.if
@@ -1,9 +1,178 @@
@@ -20853,7 +20853,7 @@ index b25b01d..06895f3 100644
')
+
diff --git a/ctdb.te b/ctdb.te
-index 001b502..73da04a 100644
+index 001b502e6..73da04ae1 100644
--- a/ctdb.te
+++ b/ctdb.te
@@ -24,6 +24,9 @@ files_tmp_file(ctdbd_tmp_t)
@@ -20974,7 +20974,7 @@ index 001b502..73da04a 100644
optional_policy(`
diff --git a/cups.fc b/cups.fc
-index 949011e..8f8bc20 100644
+index 949011ec8..8f8bc200a 100644
--- a/cups.fc
+++ b/cups.fc
@@ -1,77 +1,92 @@
@@ -21120,7 +21120,7 @@ index 949011e..8f8bc20 100644
+/etc/opt/brother/Printers/(.*/)?inf(/.*)? gen_context(system_u:object_r:cupsd_rw_etc_t,s0)
+/opt/brother/Printers(.*/)?inf(/.*)? gen_context(system_u:object_r:cupsd_rw_etc_t,s0)
diff --git a/cups.if b/cups.if
-index 3023be7..5afde80 100644
+index 3023be7f6..5afde8039 100644
--- a/cups.if
+++ b/cups.if
@@ -70,6 +70,7 @@ interface(`cups_stream_connect',`
@@ -21259,7 +21259,7 @@ index 3023be7..5afde80 100644
+ files_var_filetrans($1, cupsd_rw_etc_t, dir, "cups")
')
diff --git a/cups.te b/cups.te
-index c91813c..8c014f7 100644
+index c91813ccb..8c014f781 100644
--- a/cups.te
+++ b/cups.te
@@ -5,19 +5,31 @@ policy_module(cups, 1.16.2)
@@ -21990,7 +21990,7 @@ index c91813c..8c014f7 100644
')
+
diff --git a/cvs.fc b/cvs.fc
-index 75c8be9..4c1a965 100644
+index 75c8be90c..4c1a965c0 100644
--- a/cvs.fc
+++ b/cvs.fc
@@ -1,13 +1,16 @@
@@ -22013,7 +22013,7 @@ index 75c8be9..4c1a965 100644
-/var/www/cgi-bin/cvsweb\.cgi -- gen_context(system_u:object_r:httpd_cvs_script_exec_t,s0)
+/var/www/cgi-bin/cvsweb\.cgi -- gen_context(system_u:object_r:cvs_script_exec_t,s0)
diff --git a/cvs.if b/cvs.if
-index 64775fd..91a6056 100644
+index 64775fd37..91a60569c 100644
--- a/cvs.if
+++ b/cvs.if
@@ -1,5 +1,23 @@
@@ -22093,7 +22093,7 @@ index 64775fd..91a6056 100644
+ admin_pattern($1, cvs_home_t)
')
diff --git a/cvs.te b/cvs.te
-index 0f77550..36e4a38 100644
+index 0f7755005..36e4a38cf 100644
--- a/cvs.te
+++ b/cvs.te
@@ -11,7 +11,7 @@ policy_module(cvs, 1.10.2)
@@ -22185,7 +22185,7 @@ index 0f77550..36e4a38 100644
+ files_tmp_filetrans(cvs_script_t, cvs_tmp_t, { file dir })
')
diff --git a/cyphesis.te b/cyphesis.te
-index 77ffc73..86e11f5 100644
+index 77ffc7355..86e11f5e3 100644
--- a/cyphesis.te
+++ b/cyphesis.te
@@ -48,7 +48,6 @@ kernel_read_kernel_sysctls(cyphesis_t)
@@ -22211,7 +22211,7 @@ index 77ffc73..86e11f5 100644
optional_policy(`
diff --git a/cyrus.if b/cyrus.if
-index 83bfda6..92d9fb2 100644
+index 83bfda6ed..92d9fb2e7 100644
--- a/cyrus.if
+++ b/cyrus.if
@@ -20,6 +20,25 @@ interface(`cyrus_manage_data',`
@@ -22256,7 +22256,7 @@ index 83bfda6..92d9fb2 100644
domain_system_change_exemption($1)
role_transition $2 cyrus_initrc_exec_t system_r;
diff --git a/cyrus.te b/cyrus.te
-index 4283f2d..41de1bd 100644
+index 4283f2de2..41de1bdf6 100644
--- a/cyrus.te
+++ b/cyrus.te
@@ -29,7 +29,7 @@ files_pid_file(cyrus_var_run_t)
@@ -22336,7 +22336,7 @@ index 4283f2d..41de1bd 100644
')
diff --git a/daemontools.if b/daemontools.if
-index 3b3d9a0..6c8106a 100644
+index 3b3d9a0b7..6c8106a87 100644
--- a/daemontools.if
+++ b/daemontools.if
@@ -218,3 +218,4 @@ interface(`daemontools_manage_svc',`
@@ -22345,7 +22345,7 @@ index 3b3d9a0..6c8106a 100644
')
+
diff --git a/daemontools.te b/daemontools.te
-index ee1b4aa..2fd746e 100644
+index ee1b4aa8e..2fd746e05 100644
--- a/daemontools.te
+++ b/daemontools.te
@@ -44,7 +44,10 @@ allow svc_multilog_t svc_start_t:process sigchld;
@@ -22395,7 +22395,7 @@ index ee1b4aa..2fd746e 100644
-
-miscfiles_read_localization(svc_start_t)
diff --git a/dante.te b/dante.te
-index 5a5e290..6321a1d 100644
+index 5a5e2902a..6321a1d0a 100644
--- a/dante.te
+++ b/dante.te
@@ -53,7 +53,6 @@ dev_read_sysfs(dante_t)
@@ -22407,7 +22407,7 @@ index 5a5e290..6321a1d 100644
fs_getattr_all_fs(dante_t)
diff --git a/dbadm.te b/dbadm.te
-index b60c464..3a5246a 100644
+index b60c464f1..3a5246a9b 100644
--- a/dbadm.te
+++ b/dbadm.te
@@ -23,14 +23,14 @@ gen_tunable(dbadm_read_user_files, false)
@@ -22444,7 +22444,7 @@ index b60c464..3a5246a 100644
+ sudo_role_template(dbadm, dbadm_r, dbadm_t)
+')
diff --git a/dbskk.te b/dbskk.te
-index f55c420..e9d64ab 100644
+index f55c42082..e9d64ab5f 100644
--- a/dbskk.te
+++ b/dbskk.te
@@ -36,7 +36,6 @@ kernel_read_kernel_sysctls(dbskkd_t)
@@ -22467,7 +22467,7 @@ index f55c420..e9d64ab 100644
-
-miscfiles_read_localization(dbskkd_t)
diff --git a/dbus.fc b/dbus.fc
-index dda905b..5587295 100644
+index dda905b9c..558729530 100644
--- a/dbus.fc
+++ b/dbus.fc
@@ -1,20 +1,29 @@
@@ -22511,7 +22511,7 @@ index dda905b..5587295 100644
/var/named/chroot/var/run/dbus(/.*)? gen_context(system_u:object_r:system_dbusd_var_run_t,s0)
+')
diff --git a/dbus.if b/dbus.if
-index 62d22cb..01f6380 100644
+index 62d22cb46..01f6380e6 100644
--- a/dbus.if
+++ b/dbus.if
@@ -1,4 +1,4 @@
@@ -23432,7 +23432,7 @@ index 62d22cb..01f6380 100644
+
')
diff --git a/dbus.te b/dbus.te
-index c9998c8..cdf3b2d 100644
+index c9998c80d..cdf3b2dc7 100644
--- a/dbus.te
+++ b/dbus.te
@@ -4,17 +4,15 @@ gen_require(`
@@ -23837,7 +23837,7 @@ index c9998c8..cdf3b2d 100644
+kernel_stream_connect(session_bus_type)
+systemd_login_read_pid_files(session_bus_type)
diff --git a/dcc.fc b/dcc.fc
-index 62d3c4e..cef59a7 100644
+index 62d3c4e66..cef59a752 100644
--- a/dcc.fc
+++ b/dcc.fc
@@ -10,6 +10,8 @@
@@ -23850,7 +23850,7 @@ index 62d3c4e..cef59a7 100644
/usr/sbin/dccd -- gen_context(system_u:object_r:dccd_exec_t,s0)
/usr/sbin/dccifd -- gen_context(system_u:object_r:dccifd_exec_t,s0)
diff --git a/dcc.if b/dcc.if
-index a5c21e0..4639421 100644
+index a5c21e0e8..46394219a 100644
--- a/dcc.if
+++ b/dcc.if
@@ -173,6 +173,6 @@ interface(`dcc_stream_connect_dccifd',`
@@ -23862,7 +23862,7 @@ index a5c21e0..4639421 100644
stream_connect_pattern($1, dcc_var_t, dccifd_var_run_t, dccifd_t)
')
diff --git a/dcc.te b/dcc.te
-index 353fa4a..a5e912f 100644
+index 353fa4a09..a5e912fca 100644
--- a/dcc.te
+++ b/dcc.te
@@ -45,7 +45,7 @@ type dcc_var_t;
@@ -24015,7 +24015,7 @@ index 353fa4a..a5e912f 100644
userdom_dontaudit_search_user_home_dirs(dccm_t)
diff --git a/ddclient.if b/ddclient.if
-index 5606b40..cd18cf2 100644
+index 5606b4069..cd18cf2a7 100644
--- a/ddclient.if
+++ b/ddclient.if
@@ -70,9 +70,13 @@ interface(`ddclient_admin',`
@@ -24034,7 +24034,7 @@ index 5606b40..cd18cf2 100644
domain_system_change_exemption($1)
role_transition $2 ddclient_initrc_exec_t system_r;
diff --git a/ddclient.te b/ddclient.te
-index a4caa1b..42f3066 100644
+index a4caa1b5b..42f30662d 100644
--- a/ddclient.te
+++ b/ddclient.te
@@ -38,9 +38,13 @@ files_pid_file(ddclient_var_run_t)
@@ -24089,7 +24089,7 @@ index a4caa1b..42f3066 100644
sysnet_exec_ifconfig(ddclient_t)
sysnet_dns_name_resolve(ddclient_t)
diff --git a/ddcprobe.te b/ddcprobe.te
-index 8fa4bb9..8f5ffb0 100644
+index 8fa4bb994..8f5ffb00a 100644
--- a/ddcprobe.te
+++ b/ddcprobe.te
@@ -34,9 +34,7 @@ dev_read_urand(ddcprobe_t)
@@ -24103,7 +24103,7 @@ index 8fa4bb9..8f5ffb0 100644
term_use_all_ttys(ddcprobe_t)
term_use_all_ptys(ddcprobe_t)
diff --git a/denyhosts.if b/denyhosts.if
-index a7326da..c87b5b7 100644
+index a7326da62..c87b5b7c6 100644
--- a/denyhosts.if
+++ b/denyhosts.if
@@ -53,6 +53,7 @@ interface(`denyhosts_initrc_domtrans',`
@@ -24144,7 +24144,7 @@ index a7326da..c87b5b7 100644
admin_pattern($1, denyhosts_var_lock_t)
')
diff --git a/denyhosts.te b/denyhosts.te
-index 583a527..91c4104 100644
+index 583a52726..91c4104c7 100644
--- a/denyhosts.te
+++ b/denyhosts.te
@@ -25,6 +25,9 @@ logging_log_file(denyhosts_var_log_t)
@@ -24196,7 +24196,7 @@ index 583a527..91c4104 100644
+ gnome_dontaudit_search_config(denyhosts_t)
+')
diff --git a/devicekit.fc b/devicekit.fc
-index ae49c9d..99a54eb 100644
+index ae49c9d99..99a54eb7f 100644
--- a/devicekit.fc
+++ b/devicekit.fc
@@ -11,6 +11,8 @@
@@ -24214,7 +24214,7 @@ index ae49c9d..99a54eb 100644
/var/run/upower(/.*)? gen_context(system_u:object_r:devicekit_var_run_t,s0)
+
diff --git a/devicekit.if b/devicekit.if
-index 8ce99ff..1bc5d3a 100644
+index 8ce99ff48..1bc5d3aea 100644
--- a/devicekit.if
+++ b/devicekit.if
@@ -1,4 +1,4 @@
@@ -24631,7 +24631,7 @@ index 8ce99ff..1bc5d3a 100644
+ logging_log_filetrans($1, devicekit_var_log_t, file, "pm-suspend.log")
')
diff --git a/devicekit.te b/devicekit.te
-index 77a5003..cb628f9 100644
+index 77a5003c0..cb628f935 100644
--- a/devicekit.te
+++ b/devicekit.te
@@ -7,15 +7,15 @@ policy_module(devicekit, 1.3.1)
@@ -24878,7 +24878,7 @@ index 77a5003..cb628f9 100644
+')
+
diff --git a/dhcp.fc b/dhcp.fc
-index 8182c48..0b9bb97 100644
+index 8182c4806..0b9bb9710 100644
--- a/dhcp.fc
+++ b/dhcp.fc
@@ -1,6 +1,13 @@
@@ -24897,7 +24897,7 @@ index 8182c48..0b9bb97 100644
/var/lib/dhcpd(/.*)? gen_context(system_u:object_r:dhcpd_state_t,s0)
/var/lib/dhcp(3)?/dhcpd\.leases.* -- gen_context(system_u:object_r:dhcpd_state_t,s0)
diff --git a/dhcp.if b/dhcp.if
-index c697edb..954c090 100644
+index c697edbcd..954c090bd 100644
--- a/dhcp.if
+++ b/dhcp.if
@@ -36,7 +36,7 @@ interface(`dhcpd_setattr_state_files',`
@@ -24969,7 +24969,7 @@ index c697edb..954c090 100644
+ allow $1 dhcpd_unit_file_t:service all_service_perms;
')
diff --git a/dhcp.te b/dhcp.te
-index 98a24b9..d6cb9e7 100644
+index 98a24b989..d6cb9e7ba 100644
--- a/dhcp.te
+++ b/dhcp.te
@@ -20,6 +20,9 @@ init_daemon_domain(dhcpd_t, dhcpd_exec_t)
@@ -25056,7 +25056,7 @@ index 98a24b9..d6cb9e7 100644
dbus_connect_system_bus(dhcpd_t)
')
diff --git a/dictd.if b/dictd.if
-index 3cc3494..cb0a1f4 100644
+index 3cc3494bd..cb0a1f4bf 100644
--- a/dictd.if
+++ b/dictd.if
@@ -38,8 +38,11 @@ interface(`dictd_admin',`
@@ -25073,7 +25073,7 @@ index 3cc3494..cb0a1f4 100644
init_labeled_script_domtrans($1, dictd_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/dictd.te b/dictd.te
-index 433d3c5..0dccebf 100644
+index 433d3c5a0..0dccebfd9 100644
--- a/dictd.te
+++ b/dictd.te
@@ -43,7 +43,6 @@ files_pid_filetrans(dictd_t, dictd_var_run_t, file)
@@ -25102,7 +25102,7 @@ index 433d3c5..0dccebf 100644
optional_policy(`
diff --git a/dirmngr.te b/dirmngr.te
-index b3b2188..5f91705 100644
+index b3b218815..5f917054c 100644
--- a/dirmngr.te
+++ b/dirmngr.te
@@ -53,6 +53,5 @@ files_pid_filetrans(dirmngr_t, dirmngr_var_run_t, { dir file })
@@ -25114,7 +25114,7 @@ index b3b2188..5f91705 100644
miscfiles_read_localization(dirmngr_t)
diff --git a/dirsrv-admin.fc b/dirsrv-admin.fc
new file mode 100644
-index 0000000..38b17f8
+index 000000000..38b17f89f
--- /dev/null
+++ b/dirsrv-admin.fc
@@ -0,0 +1,17 @@
@@ -25137,7 +25137,7 @@ index 0000000..38b17f8
+/var/lock/subsys/dirsrv-admin -- gen_context(system_u:object_r:dirsrvadmin_lock_t,s0)
diff --git a/dirsrv-admin.if b/dirsrv-admin.if
new file mode 100644
-index 0000000..0d4e704
+index 000000000..0d4e70492
--- /dev/null
+++ b/dirsrv-admin.if
@@ -0,0 +1,157 @@
@@ -25300,7 +25300,7 @@ index 0000000..0d4e704
+')
diff --git a/dirsrv-admin.te b/dirsrv-admin.te
new file mode 100644
-index 0000000..09223af
+index 000000000..09223afb3
--- /dev/null
+++ b/dirsrv-admin.te
@@ -0,0 +1,167 @@
@@ -25473,7 +25473,7 @@ index 0000000..09223af
+
diff --git a/dirsrv.fc b/dirsrv.fc
new file mode 100644
-index 0000000..5d30dab
+index 000000000..5d30dab95
--- /dev/null
+++ b/dirsrv.fc
@@ -0,0 +1,23 @@
@@ -25502,7 +25502,7 @@ index 0000000..5d30dab
+/var/log/dirsrv/ldap-agent.log.* gen_context(system_u:object_r:dirsrv_snmp_var_log_t,s0)
diff --git a/dirsrv.if b/dirsrv.if
new file mode 100644
-index 0000000..b3784d8
+index 000000000..b3784d85d
--- /dev/null
+++ b/dirsrv.if
@@ -0,0 +1,232 @@
@@ -25740,7 +25740,7 @@ index 0000000..b3784d8
+')
diff --git a/dirsrv.te b/dirsrv.te
new file mode 100644
-index 0000000..03988c9
+index 000000000..03988c910
--- /dev/null
+++ b/dirsrv.te
@@ -0,0 +1,204 @@
@@ -25949,7 +25949,7 @@ index 0000000..03988c9
+ snmp_stream_connect(dirsrv_snmp_t)
+')
diff --git a/distcc.if b/distcc.if
-index 24d8c74..1790ec5 100644
+index 24d8c740c..1790ec5dc 100644
--- a/distcc.if
+++ b/distcc.if
@@ -19,7 +19,7 @@
@@ -25962,7 +25962,7 @@ index 24d8c74..1790ec5 100644
')
diff --git a/distcc.te b/distcc.te
-index 898b2f4..8a1725b 100644
+index 898b2f433..8a1725b62 100644
--- a/distcc.te
+++ b/distcc.te
@@ -47,7 +47,6 @@ files_pid_filetrans(distccd_t, distccd_var_run_t, file)
@@ -25983,7 +25983,7 @@ index 898b2f4..8a1725b 100644
userdom_dontaudit_search_user_home_dirs(distccd_t)
diff --git a/djbdns.if b/djbdns.if
-index 671d3c0..6d36c95 100644
+index 671d3c0a1..6d36c951a 100644
--- a/djbdns.if
+++ b/djbdns.if
@@ -39,6 +39,23 @@ template(`djbdns_daemontools_domain_template',`
@@ -26011,7 +26011,7 @@ index 671d3c0..6d36c95 100644
#####################################
diff --git a/djbdns.te b/djbdns.te
-index 87ca536..ebd327a 100644
+index 87ca536ae..ebd327ad1 100644
--- a/djbdns.te
+++ b/djbdns.te
@@ -48,6 +48,10 @@ corenet_udp_bind_generic_port(djbdns_domain)
@@ -26026,7 +26026,7 @@ index 87ca536..ebd327a 100644
#
# axfrdns local policy
diff --git a/dkim.fc b/dkim.fc
-index 5818418..674367b 100644
+index 5818418af..674367b3a 100644
--- a/dkim.fc
+++ b/dkim.fc
@@ -9,7 +9,6 @@
@@ -26038,7 +26038,7 @@ index 5818418..674367b 100644
/var/run/dkim-milter\.pid -- gen_context(system_u:object_r:dkim_milter_data_t,s0)
diff --git a/dmidecode.if b/dmidecode.if
-index 41c3f67..653a1ec 100644
+index 41c3f6770..653a1ecbb 100644
--- a/dmidecode.if
+++ b/dmidecode.if
@@ -19,6 +19,25 @@ interface(`dmidecode_domtrans',`
@@ -26068,7 +26068,7 @@ index 41c3f67..653a1ec 100644
##
## Execute dmidecode in the dmidecode
diff --git a/dmidecode.te b/dmidecode.te
-index aa0ef6e..02bdb68 100644
+index aa0ef6e94..02bdb681d 100644
--- a/dmidecode.te
+++ b/dmidecode.te
@@ -31,4 +31,8 @@ mls_file_read_all_levels(dmidecode_t)
@@ -26082,7 +26082,7 @@ index aa0ef6e..02bdb68 100644
+ rhsmcertd_rw_inherited_lock_files(dmidecode_t)
+')
diff --git a/dnsmasq.fc b/dnsmasq.fc
-index 23ab808..84735a8 100644
+index 23ab808d8..84735a8cb 100644
--- a/dnsmasq.fc
+++ b/dnsmasq.fc
@@ -1,13 +1,16 @@
@@ -26105,7 +26105,7 @@ index 23ab808..84735a8 100644
+/var/run/dnsmasq.* gen_context(system_u:object_r:dnsmasq_var_run_t,s0)
/var/run/libvirt/network(/.*)? gen_context(system_u:object_r:dnsmasq_var_run_t,s0)
diff --git a/dnsmasq.if b/dnsmasq.if
-index 19aa0b8..a79982c 100644
+index 19aa0b80b..a79982cd6 100644
--- a/dnsmasq.if
+++ b/dnsmasq.if
@@ -10,7 +10,6 @@
@@ -26391,7 +26391,7 @@ index 19aa0b8..a79982c 100644
+
+
diff --git a/dnsmasq.te b/dnsmasq.te
-index 37a3b7b..78c681c 100644
+index 37a3b7b30..78c681ce9 100644
--- a/dnsmasq.te
+++ b/dnsmasq.te
@@ -24,12 +24,15 @@ logging_log_file(dnsmasq_var_log_t)
@@ -26495,7 +26495,7 @@ index 37a3b7b..78c681c 100644
+')
diff --git a/dnssec.fc b/dnssec.fc
new file mode 100644
-index 0000000..1714fa6
+index 000000000..1714fa661
--- /dev/null
+++ b/dnssec.fc
@@ -0,0 +1,6 @@
@@ -26507,7 +26507,7 @@ index 0000000..1714fa6
+/var/run/dnssec.* gen_context(system_u:object_r:dnssec_trigger_var_run_t,s0)
diff --git a/dnssec.if b/dnssec.if
new file mode 100644
-index 0000000..d22ed69
+index 000000000..d22ed691a
--- /dev/null
+++ b/dnssec.if
@@ -0,0 +1,123 @@
@@ -26636,7 +26636,7 @@ index 0000000..d22ed69
+')
diff --git a/dnssec.te b/dnssec.te
new file mode 100644
-index 0000000..2387876
+index 000000000..238787661
--- /dev/null
+++ b/dnssec.te
@@ -0,0 +1,91 @@
@@ -26732,7 +26732,7 @@ index 0000000..2387876
+ networkmanager_read_conf(dnssec_trigger_t)
+')
diff --git a/dnssectrigger.te b/dnssectrigger.te
-index c7bb4e7..e6fe2f40 100644
+index c7bb4e782..e6fe2f402 100644
--- a/dnssectrigger.te
+++ b/dnssectrigger.te
@@ -67,8 +67,6 @@ files_read_etc_runtime_files(dnssec_triggerd_t)
@@ -26745,7 +26745,7 @@ index c7bb4e7..e6fe2f40 100644
sysnet_manage_config(dnssec_triggerd_t)
sysnet_etc_filetrans_config(dnssec_triggerd_t)
diff --git a/dovecot.fc b/dovecot.fc
-index c880070..4448055 100644
+index c88007004..444805588 100644
--- a/dovecot.fc
+++ b/dovecot.fc
@@ -1,36 +1,48 @@
@@ -26820,7 +26820,7 @@ index c880070..4448055 100644
-/var/spool/dovecot(/.*)? gen_context(system_u:object_r:dovecot_spool_t,s0)
+/var/spool/dovecot(/.*)? gen_context(system_u:object_r:dovecot_spool_t,s0)
diff --git a/dovecot.if b/dovecot.if
-index d5badb7..c2431fc 100644
+index d5badb755..c2431fc73 100644
--- a/dovecot.if
+++ b/dovecot.if
@@ -1,29 +1,49 @@
@@ -27037,7 +27037,7 @@ index d5badb7..c2431fc 100644
+ admin_pattern($1, dovecot_passwd_t)
')
diff --git a/dovecot.te b/dovecot.te
-index 0aabc7e..994752c 100644
+index 0aabc7e66..994752cd2 100644
--- a/dovecot.te
+++ b/dovecot.te
@@ -7,12 +7,10 @@ policy_module(dovecot, 1.16.1)
@@ -27480,7 +27480,7 @@ index 0aabc7e..994752c 100644
sendmail_domtrans(dovecot_deliver_t)
')
diff --git a/dpkg.te b/dpkg.te
-index 50af48c..5ab4901 100644
+index 50af48c89..5ab49010f 100644
--- a/dpkg.te
+++ b/dpkg.te
@@ -49,7 +49,7 @@ files_tmpfs_file(dpkg_script_tmpfs_t)
@@ -27493,7 +27493,7 @@ index 50af48c..5ab4901 100644
allow dpkg_t self:fd use;
allow dpkg_t self:fifo_file rw_fifo_file_perms;
diff --git a/drbd.fc b/drbd.fc
-index 671a3fb..47b4958 100644
+index 671a3fb6f..47b4958d0 100644
--- a/drbd.fc
+++ b/drbd.fc
@@ -3,7 +3,7 @@
@@ -27512,7 +27512,7 @@ index 671a3fb..47b4958 100644
+
+/var/run/drbd(/.*)? gen_context(system_u:object_r:drbd_var_run_t,s0)
diff --git a/drbd.if b/drbd.if
-index 9a21639..26c5986 100644
+index 9a2163936..26c59868b 100644
--- a/drbd.if
+++ b/drbd.if
@@ -2,12 +2,11 @@
@@ -27654,7 +27654,7 @@ index 9a21639..26c5986 100644
')
+
diff --git a/drbd.te b/drbd.te
-index f2516cc..af2c2ad 100644
+index f2516cc07..af2c2ad81 100644
--- a/drbd.te
+++ b/drbd.te
@@ -18,38 +18,72 @@ files_type(drbd_var_lib_t)
@@ -27737,7 +27737,7 @@ index f2516cc..af2c2ad 100644
+ rhcs_manage_cluster_lib_files(drbd_t)
+')
diff --git a/dspam.fc b/dspam.fc
-index 5eddac5..b5fcb77 100644
+index 5eddac51c..b5fcb7760 100644
--- a/dspam.fc
+++ b/dspam.fc
@@ -2,11 +2,16 @@
@@ -27760,7 +27760,7 @@ index 5eddac5..b5fcb77 100644
+
+/var/lib/dspam/data(/.*)? gen_context(system_u:object_r:dspam_rw_content_t,s0)
diff --git a/dspam.if b/dspam.if
-index 18f2452..a446210 100644
+index 18f245250..a446210f0 100644
--- a/dspam.if
+++ b/dspam.if
@@ -1,13 +1,15 @@
@@ -28035,7 +28035,7 @@ index 18f2452..a446210 100644
+
')
diff --git a/dspam.te b/dspam.te
-index ef62363..0841716 100644
+index ef6236335..084171673 100644
--- a/dspam.te
+++ b/dspam.te
@@ -28,6 +28,9 @@ files_pid_file(dspam_var_run_t)
@@ -28114,7 +28114,7 @@ index ef62363..0841716 100644
+')
diff --git a/ejabberd.fc b/ejabberd.fc
new file mode 100644
-index 0000000..e797d62
+index 000000000..e797d6209
--- /dev/null
+++ b/ejabberd.fc
@@ -0,0 +1,7 @@
@@ -28127,7 +28127,7 @@ index 0000000..e797d62
+/var/log/ejabberd(/.*)? gen_context(system_u:object_r:ejabberd_var_log_t,s0)
diff --git a/ejabberd.if b/ejabberd.if
new file mode 100644
-index 0000000..91ef4a4
+index 000000000..91ef4a49b
--- /dev/null
+++ b/ejabberd.if
@@ -0,0 +1,34 @@
@@ -28167,7 +28167,7 @@ index 0000000..91ef4a4
+')
diff --git a/ejabberd.te b/ejabberd.te
new file mode 100644
-index 0000000..4498b11
+index 000000000..4498b1110
--- /dev/null
+++ b/ejabberd.te
@@ -0,0 +1,62 @@
@@ -28234,7 +28234,7 @@ index 0000000..4498b11
+
+sysnet_read_config(ejabberd_t)
diff --git a/entropyd.te b/entropyd.te
-index b8b8328..e3dc7c7 100644
+index b8b8328c0..e3dc7c72c 100644
--- a/entropyd.te
+++ b/entropyd.te
@@ -12,7 +12,7 @@ policy_module(entropyd, 1.8.0)
@@ -28276,7 +28276,7 @@ index b8b8328..e3dc7c7 100644
userdom_dontaudit_search_user_home_dirs(entropyd_t)
diff --git a/etcd.fc b/etcd.fc
new file mode 100644
-index 0000000..eac30a3
+index 000000000..eac30a338
--- /dev/null
+++ b/etcd.fc
@@ -0,0 +1,5 @@
@@ -28287,7 +28287,7 @@ index 0000000..eac30a3
+/var/lib/etcd(/.*)? gen_context(system_u:object_r:etcd_var_lib_t,s0)
diff --git a/etcd.if b/etcd.if
new file mode 100644
-index 0000000..d1a05a6
+index 000000000..d1a05a650
--- /dev/null
+++ b/etcd.if
@@ -0,0 +1,161 @@
@@ -28454,7 +28454,7 @@ index 0000000..d1a05a6
+')
diff --git a/etcd.te b/etcd.te
new file mode 100644
-index 0000000..7cee445
+index 000000000..7cee445f6
--- /dev/null
+++ b/etcd.te
@@ -0,0 +1,42 @@
@@ -28501,7 +28501,7 @@ index 0000000..7cee445
+
+logging_send_syslog_msg(etcd_t)
diff --git a/evolution.fc b/evolution.fc
-index 597f305..8520653 100644
+index 597f305da..85206539c 100644
--- a/evolution.fc
+++ b/evolution.fc
@@ -1,5 +1,6 @@
@@ -28512,7 +28512,7 @@ index 597f305..8520653 100644
/tmp/\.exchange-USER(/.*)? gen_context(system_u:object_r:evolution_exchange_tmp_t,s0)
diff --git a/evolution.te b/evolution.te
-index c99e07c..ab9dd9f 100644
+index c99e07c48..ab9dd9f90 100644
--- a/evolution.te
+++ b/evolution.te
@@ -168,7 +168,6 @@ dev_read_urand(evolution_t)
@@ -28557,7 +28557,7 @@ index c99e07c..ab9dd9f 100644
fs_search_auto_mountpoints(evolution_server_t)
diff --git a/exim.if b/exim.if
-index 9bbc690..4a8d053 100644
+index 9bbc6907a..4a8d0536b 100644
--- a/exim.if
+++ b/exim.if
@@ -21,35 +21,51 @@ interface(`exim_domtrans',`
@@ -28708,7 +28708,7 @@ index 9bbc690..4a8d053 100644
role_transition $2 exim_initrc_exec_t system_r;
allow $2 system_r;
diff --git a/exim.te b/exim.te
-index 4086c51..3e7a990 100644
+index 4086c51b9..3e7a99099 100644
--- a/exim.te
+++ b/exim.te
@@ -55,7 +55,7 @@ type exim_log_t;
@@ -28790,7 +28790,7 @@ index 4086c51..3e7a990 100644
optional_policy(`
diff --git a/fail2ban.if b/fail2ban.if
-index 50d0084..94e1936 100644
+index 50d0084d4..94e193606 100644
--- a/fail2ban.if
+++ b/fail2ban.if
@@ -19,57 +19,57 @@ interface(`fail2ban_domtrans',`
@@ -29094,7 +29094,7 @@ index 50d0084..94e1936 100644
fail2ban_run_client($1, $2)
diff --git a/fail2ban.te b/fail2ban.te
-index cf0e567..7bebd26 100644
+index cf0e56772..7bebd2699 100644
--- a/fail2ban.te
+++ b/fail2ban.te
@@ -37,7 +37,7 @@ role fail2ban_client_roles types fail2ban_client_t;
@@ -29219,7 +29219,7 @@ index cf0e567..7bebd26 100644
+ apache_read_log(fail2ban_client_t)
+')
diff --git a/fcoe.te b/fcoe.te
-index ce358fb..cdc11a7 100644
+index ce358fb3f..cdc11a7f9 100644
--- a/fcoe.te
+++ b/fcoe.te
@@ -20,25 +20,32 @@ files_pid_file(fcoemon_var_run_t)
@@ -29260,7 +29260,7 @@ index ce358fb..cdc11a7 100644
+ networkmanager_dgram_send(fcoemon_t)
+')
diff --git a/fetchmail.fc b/fetchmail.fc
-index 133b8ee..a47a12f 100644
+index 133b8ee67..a47a12fe7 100644
--- a/fetchmail.fc
+++ b/fetchmail.fc
@@ -1,4 +1,5 @@
@@ -29270,7 +29270,7 @@ index 133b8ee..a47a12f 100644
/etc/fetchmailrc -- gen_context(system_u:object_r:fetchmail_etc_t,s0)
diff --git a/fetchmail.if b/fetchmail.if
-index c3f7916..cab3954 100644
+index c3f791660..cab3954f3 100644
--- a/fetchmail.if
+++ b/fetchmail.if
@@ -23,14 +23,16 @@ interface(`fetchmail_admin',`
@@ -29294,7 +29294,7 @@ index c3f7916..cab3954 100644
admin_pattern($1, fetchmail_etc_t)
diff --git a/fetchmail.te b/fetchmail.te
-index 742559a..fa51d09 100644
+index 742559a54..fa51d09dd 100644
--- a/fetchmail.te
+++ b/fetchmail.te
@@ -32,14 +32,18 @@ files_type(fetchmail_uidl_cache_t)
@@ -29354,7 +29354,7 @@ index 742559a..fa51d09 100644
optional_policy(`
procmail_domtrans(fetchmail_t)
diff --git a/finger.te b/finger.te
-index 35da09d..85f1e03 100644
+index 35da09d97..85f1e03d4 100644
--- a/finger.te
+++ b/finger.te
@@ -45,7 +45,6 @@ logging_log_filetrans(fingerd_t, fingerd_log_t, file)
@@ -29391,7 +29391,7 @@ index 35da09d..85f1e03 100644
userdom_dontaudit_use_unpriv_user_fds(fingerd_t)
diff --git a/firewalld.fc b/firewalld.fc
-index 21d7b84..0e272bd 100644
+index 21d7b8442..0e272bd0e 100644
--- a/firewalld.fc
+++ b/firewalld.fc
@@ -1,3 +1,5 @@
@@ -29401,7 +29401,7 @@ index 21d7b84..0e272bd 100644
/etc/firewalld(/.*)? gen_context(system_u:object_r:firewalld_etc_rw_t,s0)
diff --git a/firewalld.if b/firewalld.if
-index c62c567..a74f123 100644
+index c62c5670a..a74f123da 100644
--- a/firewalld.if
+++ b/firewalld.if
@@ -2,7 +2,7 @@
@@ -29577,7 +29577,7 @@ index c62c567..a74f123 100644
+ allow $1 firewalld_unit_file_t:service all_service_perms;
')
diff --git a/firewalld.te b/firewalld.te
-index 98072a3..42ee4d3 100644
+index 98072a3a1..42ee4d39c 100644
--- a/firewalld.te
+++ b/firewalld.te
@@ -21,15 +21,21 @@ logging_log_file(firewalld_var_log_t)
@@ -29687,7 +29687,7 @@ index 98072a3..42ee4d3 100644
')
diff --git a/firewallgui.if b/firewallgui.if
-index e6866d1..941f4ef 100644
+index e6866d1fd..941f4ef73 100644
--- a/firewallgui.if
+++ b/firewallgui.if
@@ -37,5 +37,5 @@ interface(`firewallgui_dontaudit_rw_pipes',`
@@ -29698,7 +29698,7 @@ index e6866d1..941f4ef 100644
+ dontaudit $1 firewallgui_t:fifo_file rw_inherited_fifo_file_perms;
')
diff --git a/firewallgui.te b/firewallgui.te
-index 2094546..2481a97 100644
+index 209454664..2481a9704 100644
--- a/firewallgui.te
+++ b/firewallgui.te
@@ -36,8 +36,10 @@ corecmd_exec_shell(firewallgui_t)
@@ -29729,7 +29729,7 @@ index 2094546..2481a97 100644
optional_policy(`
diff --git a/firstboot.fc b/firstboot.fc
-index 12c782c..ba614e4 100644
+index 12c782c89..ba614e457 100644
--- a/firstboot.fc
+++ b/firstboot.fc
@@ -1,5 +1,3 @@
@@ -29741,7 +29741,7 @@ index 12c782c..ba614e4 100644
-/usr/share/firstboot/firstboot\.py -- gen_context(system_u:object_r:firstboot_exec_t,s0)
+/usr/share/firstboot/firstboot\.py -- gen_context(system_u:object_r:firstboot_exec_t,s0)
diff --git a/firstboot.if b/firstboot.if
-index 280f875..f3a67c9 100644
+index 280f875f0..f3a67c911 100644
--- a/firstboot.if
+++ b/firstboot.if
@@ -1,4 +1,7 @@
@@ -29868,7 +29868,7 @@ index 280f875..f3a67c9 100644
##
##
diff --git a/firstboot.te b/firstboot.te
-index 5010f04..0341ae1 100644
+index 5010f04e1..0341ae121 100644
--- a/firstboot.te
+++ b/firstboot.te
@@ -1,7 +1,7 @@
@@ -30008,7 +30008,7 @@ index 5010f04..0341ae1 100644
optional_policy(`
diff --git a/fprintd.te b/fprintd.te
-index 92a6479..f064c94 100644
+index 92a6479a2..f064c940d 100644
--- a/fprintd.te
+++ b/fprintd.te
@@ -18,25 +18,29 @@ files_type(fprintd_var_lib_t)
@@ -30069,7 +30069,7 @@ index 92a6479..f064c94 100644
')
diff --git a/freeipmi.fc b/freeipmi.fc
new file mode 100644
-index 0000000..0942a2e
+index 000000000..0942a2e39
--- /dev/null
+++ b/freeipmi.fc
@@ -0,0 +1,17 @@
@@ -30092,7 +30092,7 @@ index 0000000..0942a2e
+/var/run/bmc-watchdog\.pid -- gen_context(system_u:object_r:freeipmi_bmc_watchdog_var_run_t,s0)
diff --git a/freeipmi.if b/freeipmi.if
new file mode 100644
-index 0000000..dc94853
+index 000000000..dc9485309
--- /dev/null
+++ b/freeipmi.if
@@ -0,0 +1,71 @@
@@ -30169,7 +30169,7 @@ index 0000000..dc94853
+
diff --git a/freeipmi.te b/freeipmi.te
new file mode 100644
-index 0000000..0ca4fc3
+index 000000000..0ca4fc3e8
--- /dev/null
+++ b/freeipmi.te
@@ -0,0 +1,79 @@
@@ -30254,14 +30254,14 @@ index 0000000..0ca4fc3
+files_pid_filetrans(freeipmi_ipmiseld_t, freeipmi_ipmiseld_var_run_t, file, "ipmiseld.pid")
diff --git a/freqset.fc b/freqset.fc
new file mode 100644
-index 0000000..3cd9c38
+index 000000000..3cd9c38fd
--- /dev/null
+++ b/freqset.fc
@@ -0,0 +1 @@
+/usr/lib/enlightenment/modules/cpufreq/linux-gnu-[^/]*/freqset -- gen_context(system_u:object_r:freqset_exec_t,s0)
diff --git a/freqset.if b/freqset.if
new file mode 100644
-index 0000000..190ccc0
+index 000000000..190ccc035
--- /dev/null
+++ b/freqset.if
@@ -0,0 +1,76 @@
@@ -30343,7 +30343,7 @@ index 0000000..190ccc0
+')
diff --git a/freqset.te b/freqset.te
new file mode 100644
-index 0000000..0d09fbd
+index 000000000..0d09fbd62
--- /dev/null
+++ b/freqset.te
@@ -0,0 +1,34 @@
@@ -30382,7 +30382,7 @@ index 0000000..0d09fbd
+
+userdom_use_inherited_user_terminals(freqset_t)
diff --git a/ftp.fc b/ftp.fc
-index ddb75c1..f38075f 100644
+index ddb75c12c..f38075ff8 100644
--- a/ftp.fc
+++ b/ftp.fc
@@ -1,5 +1,8 @@
@@ -30403,7 +30403,7 @@ index ddb75c1..f38075f 100644
/var/log/xferlog.* -- gen_context(system_u:object_r:xferlog_t,s0)
/var/log/xferreport.* -- gen_context(system_u:object_r:xferlog_t,s0)
diff --git a/ftp.if b/ftp.if
-index 4498143..84a4858 100644
+index 44981434b..84a4858b6 100644
--- a/ftp.if
+++ b/ftp.if
@@ -1,5 +1,67 @@
@@ -30498,7 +30498,7 @@ index 4498143..84a4858 100644
ftp_run_ftpdctl($1, $2)
')
diff --git a/ftp.te b/ftp.te
-index 36838c2..34a9ced 100644
+index 36838c202..34a9cedf3 100644
--- a/ftp.te
+++ b/ftp.te
@@ -13,7 +13,7 @@ policy_module(ftp, 1.15.1)
@@ -30892,7 +30892,7 @@ index 36838c2..34a9ced 100644
-')
diff --git a/fwupd.fc b/fwupd.fc
new file mode 100644
-index 0000000..859dc40
+index 000000000..859dc40ed
--- /dev/null
+++ b/fwupd.fc
@@ -0,0 +1,10 @@
@@ -30908,7 +30908,7 @@ index 0000000..859dc40
+/var/lib/fwupd(/.*)? gen_context(system_u:object_r:fwupd_var_lib_t,s0)
diff --git a/fwupd.if b/fwupd.if
new file mode 100644
-index 0000000..daef190
+index 000000000..daef19015
--- /dev/null
+++ b/fwupd.if
@@ -0,0 +1,281 @@
@@ -31195,7 +31195,7 @@ index 0000000..daef190
+')
diff --git a/fwupd.te b/fwupd.te
new file mode 100644
-index 0000000..7bf263a
+index 000000000..7bf263a6c
--- /dev/null
+++ b/fwupd.te
@@ -0,0 +1,70 @@
@@ -31270,7 +31270,7 @@ index 0000000..7bf263a
+ unconfined_domain(fwupd_t)
+')
diff --git a/games.if b/games.if
-index e2a3e0d..50ebd40 100644
+index e2a3e0dba..50ebd4080 100644
--- a/games.if
+++ b/games.if
@@ -58,3 +58,23 @@ interface(`games_rw_data',`
@@ -31298,7 +31298,7 @@ index e2a3e0d..50ebd40 100644
+ manage_files_pattern($1, games_data_t, games_data_t)
+')
diff --git a/games.te b/games.te
-index e5b15fb..220622e 100644
+index e5b15fb7e..220622e84 100644
--- a/games.te
+++ b/games.te
@@ -76,8 +76,6 @@ init_use_script_ptys(games_srv_t)
@@ -31346,7 +31346,7 @@ index e5b15fb..220622e 100644
diff --git a/ganesha.fc b/ganesha.fc
new file mode 100644
-index 0000000..855f58e
+index 000000000..855f58e55
--- /dev/null
+++ b/ganesha.fc
@@ -0,0 +1,12 @@
@@ -31364,7 +31364,7 @@ index 0000000..855f58e
+/var/run/ganesha(/.*)? gen_context(system_u:object_r:ganesha_var_run_t,s0)
diff --git a/ganesha.if b/ganesha.if
new file mode 100644
-index 0000000..d9ba5fa
+index 000000000..d9ba5fa27
--- /dev/null
+++ b/ganesha.if
@@ -0,0 +1,147 @@
@@ -31517,7 +31517,7 @@ index 0000000..d9ba5fa
+')
diff --git a/ganesha.te b/ganesha.te
new file mode 100644
-index 0000000..3cf186e
+index 000000000..3cf186efc
--- /dev/null
+++ b/ganesha.te
@@ -0,0 +1,109 @@
@@ -31631,7 +31631,7 @@ index 0000000..3cf186e
+ fs_getattr_fusefs(ganesha_t)
+')
diff --git a/gatekeeper.te b/gatekeeper.te
-index 2820368..88c98f4 100644
+index 28203689c..88c98f481 100644
--- a/gatekeeper.te
+++ b/gatekeeper.te
@@ -57,7 +57,6 @@ kernel_read_kernel_sysctls(gatekeeper_t)
@@ -31660,7 +31660,7 @@ index 2820368..88c98f4 100644
userdom_dontaudit_use_unpriv_user_fds(gatekeeper_t)
diff --git a/gear.fc b/gear.fc
new file mode 100644
-index 0000000..98c012c
+index 000000000..98c012c6e
--- /dev/null
+++ b/gear.fc
@@ -0,0 +1,7 @@
@@ -31673,7 +31673,7 @@ index 0000000..98c012c
+/var/lib/gear(/.*)? gen_context(system_u:object_r:gear_var_lib_t,s0)
diff --git a/gear.if b/gear.if
new file mode 100644
-index 0000000..d745c67
+index 000000000..d745c675f
--- /dev/null
+++ b/gear.if
@@ -0,0 +1,289 @@
@@ -31968,7 +31968,7 @@ index 0000000..d745c67
+')
diff --git a/gear.te b/gear.te
new file mode 100644
-index 0000000..33dbdf7
+index 000000000..33dbdf7ec
--- /dev/null
+++ b/gear.te
@@ -0,0 +1,136 @@
@@ -32110,7 +32110,7 @@ index 0000000..33dbdf7
+')
diff --git a/geoclue.fc b/geoclue.fc
new file mode 100644
-index 0000000..a97f14f
+index 000000000..a97f14fd9
--- /dev/null
+++ b/geoclue.fc
@@ -0,0 +1,4 @@
@@ -32120,7 +32120,7 @@ index 0000000..a97f14f
+/var/lib/geoclue(/.*)? gen_context(system_u:object_r:geoclue_var_lib_t,s0)
diff --git a/geoclue.if b/geoclue.if
new file mode 100644
-index 0000000..cf9f7bf
+index 000000000..cf9f7bfca
--- /dev/null
+++ b/geoclue.if
@@ -0,0 +1,153 @@
@@ -32279,7 +32279,7 @@ index 0000000..cf9f7bf
+')
diff --git a/geoclue.te b/geoclue.te
new file mode 100644
-index 0000000..fb8be0d
+index 000000000..fb8be0d88
--- /dev/null
+++ b/geoclue.te
@@ -0,0 +1,72 @@
@@ -32356,7 +32356,7 @@ index 0000000..fb8be0d
+ pcscd_stream_connect(geoclue_t)
+')
diff --git a/gift.te b/gift.te
-index 8a820fa..996b30c 100644
+index 8a820face..996b30c16 100644
--- a/gift.te
+++ b/gift.te
@@ -67,17 +67,7 @@ auth_use_nsswitch(gift_t)
@@ -32404,7 +32404,7 @@ index 8a820fa..996b30c 100644
+userdom_use_inherited_user_terminals(giftd_t)
+userdom_home_manager(gitd_t)
diff --git a/git.fc b/git.fc
-index 24700f8..6561d56 100644
+index 24700f84b..6561d568e 100644
--- a/git.fc
+++ b/git.fc
@@ -2,12 +2,12 @@ HOME_DIR/public_git(/.*)? gen_context(system_u:object_r:git_user_content_t,s0)
@@ -32427,7 +32427,7 @@ index 24700f8..6561d56 100644
+/var/www/git/gitweb\.cgi -- gen_context(system_u:object_r:git_script_exec_t,s0)
+/var/www/gitweb-caching/gitweb\.cgi -- gen_context(system_u:object_r:git_script_exec_t,s0)
diff --git a/git.if b/git.if
-index 1e29af1..6c64f55 100644
+index 1e29af196..6c64f55c3 100644
--- a/git.if
+++ b/git.if
@@ -37,7 +37,10 @@ template(`git_role',`
@@ -32473,7 +32473,7 @@ index 1e29af1..6c64f55 100644
+ userdom_user_home_dir_filetrans($1, git_user_content_t, dir, "public_git")
+')
diff --git a/git.te b/git.te
-index dc49c71..54df5e3 100644
+index dc49c715e..54df5e36e 100644
--- a/git.te
+++ b/git.te
@@ -49,14 +49,6 @@ gen_tunable(git_session_users, false)
@@ -32648,7 +32648,7 @@ index dc49c71..54df5e3 100644
-miscfiles_read_localization(git_daemon)
diff --git a/gitosis.te b/gitosis.te
-index 582db0a..d77a1a5 100644
+index 582db0a2e..d77a1a549 100644
--- a/gitosis.te
+++ b/gitosis.te
@@ -52,12 +52,8 @@ corecmd_exec_shell(gitosis_t)
@@ -32665,7 +32665,7 @@ index 582db0a..d77a1a5 100644
tunable_policy(`gitosis_can_sendmail',`
diff --git a/glance.fc b/glance.fc
-index c21a528..a746a2b 100644
+index c21a528b5..a746a2b16 100644
--- a/glance.fc
+++ b/glance.fc
@@ -1,8 +1,14 @@
@@ -32685,7 +32685,7 @@ index c21a528..a746a2b 100644
/var/lib/glance(/.*)? gen_context(system_u:object_r:glance_var_lib_t,s0)
diff --git a/glance.if b/glance.if
-index 9eacb2c..7b19ad2 100644
+index 9eacb2c9c..7b19ad2db 100644
--- a/glance.if
+++ b/glance.if
@@ -1,5 +1,38 @@
@@ -32756,7 +32756,7 @@ index 9eacb2c..7b19ad2 100644
init_labeled_script_domtrans($1, { glance_api_initrc_exec_t glance_registry_initrc_exec_t })
domain_system_change_exemption($1)
diff --git a/glance.te b/glance.te
-index 5cd0909..bd3c3d2 100644
+index 5cd09096a..bd3c3d21b 100644
--- a/glance.te
+++ b/glance.te
@@ -5,10 +5,31 @@ policy_module(glance, 1.1.0)
@@ -32937,7 +32937,7 @@ index 5cd0909..bd3c3d2 100644
+corenet_tcp_connect_glance_registry_port(glance_scrubber_t)
diff --git a/glusterd.fc b/glusterd.fc
new file mode 100644
-index 0000000..9806f50
+index 000000000..9806f50ae
--- /dev/null
+++ b/glusterd.fc
@@ -0,0 +1,25 @@
@@ -32968,7 +32968,7 @@ index 0000000..9806f50
+/var/run/glusterd.* -s gen_context(system_u:object_r:glusterd_var_run_t,s0)
diff --git a/glusterd.if b/glusterd.if
new file mode 100644
-index 0000000..4501460
+index 000000000..450146018
--- /dev/null
+++ b/glusterd.if
@@ -0,0 +1,302 @@
@@ -33276,7 +33276,7 @@ index 0000000..4501460
+
diff --git a/glusterd.te b/glusterd.te
new file mode 100644
-index 0000000..cbcaf9a
+index 000000000..cbcaf9aed
--- /dev/null
+++ b/glusterd.te
@@ -0,0 +1,324 @@
@@ -33606,7 +33606,7 @@ index 0000000..cbcaf9a
+')
diff --git a/glusterfs.fc b/glusterfs.fc
deleted file mode 100644
-index 4bd6ade..0000000
+index 4bd6ade46..000000000
--- a/glusterfs.fc
+++ /dev/null
@@ -1,16 +0,0 @@
@@ -33628,7 +33628,7 @@ index 4bd6ade..0000000
-/var/run/glusterd\.pid -- gen_context(system_u:object_r:glusterd_var_run_t,s0)
diff --git a/glusterfs.if b/glusterfs.if
deleted file mode 100644
-index 05233c8..0000000
+index 05233c86e..000000000
--- a/glusterfs.if
+++ /dev/null
@@ -1,71 +0,0 @@
@@ -33705,7 +33705,7 @@ index 05233c8..0000000
-')
diff --git a/glusterfs.te b/glusterfs.te
deleted file mode 100644
-index 4e95c7e..0000000
+index 4e95c7e2f..000000000
--- a/glusterfs.te
+++ /dev/null
@@ -1,105 +0,0 @@
@@ -33815,7 +33815,7 @@ index 4e95c7e..0000000
-
-miscfiles_read_localization(glusterd_t)
diff --git a/gnome.fc b/gnome.fc
-index e39de43..5edcb83 100644
+index e39de436a..5edcb8330 100644
--- a/gnome.fc
+++ b/gnome.fc
@@ -1,15 +1,60 @@
@@ -33889,7 +33889,7 @@ index e39de43..5edcb83 100644
+/usr/libexec/gnome-system-monitor-mechanism -- gen_context(system_u:object_r:gnomesystemmm_exec_t,s0)
+/usr/libexec/kde(3|4)/ksysguardprocesslist_helper -- gen_context(system_u:object_r:gnomesystemmm_exec_t,s0)
diff --git a/gnome.if b/gnome.if
-index ab09d61..72d67c2 100644
+index ab09d6195..72d67c2cb 100644
--- a/gnome.if
+++ b/gnome.if
@@ -1,52 +1,76 @@
@@ -35948,7 +35948,7 @@ index ab09d61..72d67c2 100644
+ type_transition $1 gkeyringd_exec_t:process $2;
')
diff --git a/gnome.te b/gnome.te
-index 63893eb..5664744 100644
+index 63893eb2d..566474488 100644
--- a/gnome.te
+++ b/gnome.te
@@ -5,14 +5,33 @@ policy_module(gnome, 2.3.0)
@@ -36265,7 +36265,7 @@ index 63893eb..5664744 100644
+
+userdom_use_inherited_user_terminals(gnomedomain)
diff --git a/gnomeclock.fc b/gnomeclock.fc
-index f9ba8cd..6906301 100644
+index f9ba8cd99..690630113 100644
--- a/gnomeclock.fc
+++ b/gnomeclock.fc
@@ -1,7 +1,10 @@
@@ -36282,7 +36282,7 @@ index f9ba8cd..6906301 100644
/usr/lib/gnome-settings-daemon/gsd-datetime-mechanism -- gen_context(system_u:object_r:gnomeclock_exec_t,s0)
diff --git a/gnomeclock.if b/gnomeclock.if
-index 3f55702..25c7ab8 100644
+index 3f55702fb..25c7ab82c 100644
--- a/gnomeclock.if
+++ b/gnomeclock.if
@@ -2,8 +2,7 @@
@@ -36340,7 +36340,7 @@ index 3f55702..25c7ab8 100644
##
##
diff --git a/gnomeclock.te b/gnomeclock.te
-index 7cd7435..8f26e98 100644
+index 7cd7435e6..8f26e9862 100644
--- a/gnomeclock.te
+++ b/gnomeclock.te
@@ -5,82 +5,95 @@ policy_module(gnomeclock, 1.1.0)
@@ -36469,7 +36469,7 @@ index 7cd7435..8f26e98 100644
policykit_read_lib(gnomeclock_t)
policykit_read_reload(gnomeclock_t)
diff --git a/gpg.fc b/gpg.fc
-index 888cd2c..c02fa56 100644
+index 888cd2c68..c02fa5694 100644
--- a/gpg.fc
+++ b/gpg.fc
@@ -1,10 +1,14 @@
@@ -36492,7 +36492,7 @@ index 888cd2c..c02fa56 100644
-/usr/lib/gnupg/gpgkeys.* -- gen_context(system_u:object_r:gpg_helper_exec_t,s0)
+/usr/lib/gnupg/gpgkeys.* -- gen_context(system_u:object_r:gpg_helper_exec_t,s0)
diff --git a/gpg.if b/gpg.if
-index 180f1b7..3c8757e 100644
+index 180f1b7cc..3c8757e47 100644
--- a/gpg.if
+++ b/gpg.if
@@ -2,57 +2,79 @@
@@ -36788,7 +36788,7 @@ index 180f1b7..3c8757e 100644
+ userdom_user_home_dir_filetrans($1, gpg_secret_t, dir, ".gnupg")
+')
diff --git a/gpg.te b/gpg.te
-index 0e97e82..2569781 100644
+index 0e97e82f1..2569781e9 100644
--- a/gpg.te
+++ b/gpg.te
@@ -4,15 +4,7 @@ policy_module(gpg, 2.8.0)
@@ -37248,7 +37248,7 @@ index 0e97e82..2569781 100644
+ miscfiles_manage_public_files(gpg_web_t)
')
diff --git a/gpm.te b/gpm.te
-index 69734fd..a659808 100644
+index 69734fd15..a659808d0 100644
--- a/gpm.te
+++ b/gpm.te
@@ -13,7 +13,7 @@ type gpm_initrc_exec_t;
@@ -37291,7 +37291,7 @@ index 69734fd..a659808 100644
optional_policy(`
seutil_sigchld_newrole(gpm_t)
diff --git a/gpsd.te b/gpsd.te
-index fe3895e..a820546 100644
+index fe3895ece..a820546e3 100644
--- a/gpsd.te
+++ b/gpsd.te
@@ -28,11 +28,12 @@ files_pid_file(gpsd_var_run_t)
@@ -37326,7 +37326,7 @@ index fe3895e..a820546 100644
chronyd_stream_connect(gpsd_t)
diff --git a/gssproxy.fc b/gssproxy.fc
new file mode 100644
-index 0000000..f4659d1
+index 000000000..f4659d125
--- /dev/null
+++ b/gssproxy.fc
@@ -0,0 +1,8 @@
@@ -37340,7 +37340,7 @@ index 0000000..f4659d1
+/var/run/gssproxy\.sock -s gen_context(system_u:object_r:gssproxy_var_run_t,s0)
diff --git a/gssproxy.if b/gssproxy.if
new file mode 100644
-index 0000000..8a2013a
+index 000000000..8a2013af9
--- /dev/null
+++ b/gssproxy.if
@@ -0,0 +1,217 @@
@@ -37563,7 +37563,7 @@ index 0000000..8a2013a
+')
diff --git a/gssproxy.te b/gssproxy.te
new file mode 100644
-index 0000000..79e22c5
+index 000000000..79e22c58a
--- /dev/null
+++ b/gssproxy.te
@@ -0,0 +1,74 @@
@@ -37642,7 +37642,7 @@ index 0000000..79e22c5
+ kerberos_manage_host_rcache(gssproxy_t)
+')
diff --git a/guest.te b/guest.te
-index 19cdbe1..0605776 100644
+index 19cdbe1d7..060577633 100644
--- a/guest.te
+++ b/guest.te
@@ -20,4 +20,4 @@ optional_policy(`
@@ -37652,7 +37652,7 @@ index 19cdbe1..0605776 100644
-#gen_user(guest_u, user, guest_r, s0, s0)
+gen_user(guest_u, user, guest_r, s0, s0)
diff --git a/hadoop.te b/hadoop.te
-index e151378..04d173d 100644
+index e15137840..04d173d1d 100644
--- a/hadoop.te
+++ b/hadoop.te
@@ -155,7 +155,6 @@ dev_read_urand(hadoop_t)
@@ -37689,7 +37689,7 @@ index e151378..04d173d 100644
fs_getattr_xattr_fs(zookeeper_server_t)
diff --git a/hal.te b/hal.te
-index bbccc79..b027202 100644
+index bbccc79f1..b02720214 100644
--- a/hal.te
+++ b/hal.te
@@ -61,7 +61,6 @@ files_type(hald_var_lib_t)
@@ -37727,7 +37727,7 @@ index bbccc79..b027202 100644
logging_search_logs(hald_keymap_t)
diff --git a/hddtemp.if b/hddtemp.if
-index 1728071..6e2d333 100644
+index 1728071d0..6e2d333d9 100644
--- a/hddtemp.if
+++ b/hddtemp.if
@@ -19,6 +19,32 @@ interface(`hddtemp_domtrans',`
@@ -37779,7 +37779,7 @@ index 1728071..6e2d333 100644
domain_system_change_exemption($1)
role_transition $2 hddtemp_initrc_exec_t system_r;
diff --git a/hddtemp.te b/hddtemp.te
-index 9e11b98..6338ea7 100644
+index 9e11b9822..6338ea761 100644
--- a/hddtemp.te
+++ b/hddtemp.te
@@ -4,10 +4,12 @@ policy_module(hddtemp, 1.2.0)
@@ -37820,7 +37820,7 @@ index 9e11b98..6338ea7 100644
-miscfiles_read_localization(hddtemp_t)
diff --git a/hostapd.fc b/hostapd.fc
new file mode 100644
-index 0000000..0ca97b8
+index 000000000..0ca97b84b
--- /dev/null
+++ b/hostapd.fc
@@ -0,0 +1,5 @@
@@ -37832,7 +37832,7 @@ index 0000000..0ca97b8
\ No newline at end of file
diff --git a/hostapd.if b/hostapd.if
new file mode 100644
-index 0000000..d0016da
+index 000000000..d0016da91
--- /dev/null
+++ b/hostapd.if
@@ -0,0 +1,101 @@
@@ -37939,7 +37939,7 @@ index 0000000..d0016da
+')
diff --git a/hostapd.te b/hostapd.te
new file mode 100644
-index 0000000..438573d
+index 000000000..438573dfa
--- /dev/null
+++ b/hostapd.te
@@ -0,0 +1,53 @@
@@ -37997,7 +37997,7 @@ index 0000000..438573d
+
+miscfiles_read_localization(hostapd_t)
diff --git a/howl.te b/howl.te
-index b9e60ec..0477728 100644
+index b9e60ecfb..0477728a0 100644
--- a/howl.te
+++ b/howl.te
@@ -36,7 +36,6 @@ kernel_request_load_module(howl_t)
@@ -38019,7 +38019,7 @@ index b9e60ec..0477728 100644
diff --git a/hsqldb.fc b/hsqldb.fc
new file mode 100644
-index 0000000..aa92d71
+index 000000000..aa92d7118
--- /dev/null
+++ b/hsqldb.fc
@@ -0,0 +1,7 @@
@@ -38032,7 +38032,7 @@ index 0000000..aa92d71
+/var/lib/hsqldb(/.*)? gen_context(system_u:object_r:hsqldb_var_lib_t,s0)
diff --git a/hsqldb.if b/hsqldb.if
new file mode 100644
-index 0000000..f43f748
+index 000000000..f43f7489f
--- /dev/null
+++ b/hsqldb.if
@@ -0,0 +1,241 @@
@@ -38279,7 +38279,7 @@ index 0000000..f43f748
+')
diff --git a/hsqldb.te b/hsqldb.te
new file mode 100644
-index 0000000..28816b4
+index 000000000..28816b4fd
--- /dev/null
+++ b/hsqldb.te
@@ -0,0 +1,57 @@
@@ -38342,7 +38342,7 @@ index 0000000..28816b4
+sysnet_read_config(hsqldb_t)
diff --git a/hwloc.fc b/hwloc.fc
new file mode 100644
-index 0000000..d0c5a15
+index 000000000..d0c5a1502
--- /dev/null
+++ b/hwloc.fc
@@ -0,0 +1,5 @@
@@ -38353,7 +38353,7 @@ index 0000000..d0c5a15
+/var/run/hwloc(/.*)? gen_context(system_u:object_r:hwloc_var_run_t,s0)
diff --git a/hwloc.if b/hwloc.if
new file mode 100644
-index 0000000..c2349ec
+index 000000000..c2349ecf5
--- /dev/null
+++ b/hwloc.if
@@ -0,0 +1,106 @@
@@ -38465,7 +38465,7 @@ index 0000000..c2349ec
+')
diff --git a/hwloc.te b/hwloc.te
new file mode 100644
-index 0000000..0f45fd5
+index 000000000..0f45fd50e
--- /dev/null
+++ b/hwloc.te
@@ -0,0 +1,31 @@
@@ -38501,7 +38501,7 @@ index 0000000..0f45fd5
+
+dev_read_sysfs(hwloc_dhwd_t)
diff --git a/hypervkvp.fc b/hypervkvp.fc
-index b46130e..e2ae3b2 100644
+index b46130ef5..e2ae3b22b 100644
--- a/hypervkvp.fc
+++ b/hypervkvp.fc
@@ -1,3 +1,10 @@
@@ -38518,7 +38518,7 @@ index b46130e..e2ae3b2 100644
+
+/var/lib/hyperv(/.*)? gen_context(system_u:object_r:hypervkvp_var_lib_t,s0)
diff --git a/hypervkvp.if b/hypervkvp.if
-index 6517fad..f183748 100644
+index 6517fadbb..f1837481b 100644
--- a/hypervkvp.if
+++ b/hypervkvp.if
@@ -1,32 +1,135 @@
@@ -38671,7 +38671,7 @@ index 6517fad..f183748 100644
+ allow $1 hypervkvp_unit_file_t:service all_service_perms;
')
diff --git a/hypervkvp.te b/hypervkvp.te
-index 4eb7041..ea3c933 100644
+index 4eb7041ef..ea3c93385 100644
--- a/hypervkvp.te
+++ b/hypervkvp.te
@@ -5,24 +5,158 @@ policy_module(hypervkvp, 1.0.0)
@@ -38845,7 +38845,7 @@ index 4eb7041..ea3c933 100644
-sysnet_dns_name_resolve(hypervkvpd_t)
+logging_send_syslog_msg(hypervvssd_t)
diff --git a/i18n_input.te b/i18n_input.te
-index 369a056..65fde93 100644
+index 369a0566b..65fde93d9 100644
--- a/i18n_input.te
+++ b/i18n_input.te
@@ -45,7 +45,6 @@ can_exec(i18n_input_t, i18n_input_exec_t)
@@ -38887,7 +38887,7 @@ index 369a056..65fde93 100644
optional_policy(`
canna_stream_connect(i18n_input_t)
diff --git a/icecast.if b/icecast.if
-index 580b533..c267cea 100644
+index 580b533ce..c267cea58 100644
--- a/icecast.if
+++ b/icecast.if
@@ -176,6 +176,14 @@ interface(`icecast_admin',`
@@ -38906,7 +38906,7 @@ index 580b533..c267cea 100644
domain_system_change_exemption($1)
role_transition $2 icecast_initrc_exec_t system_r;
diff --git a/icecast.te b/icecast.te
-index a9e573a..9a9245f 100644
+index a9e573a50..9a9245f49 100644
--- a/icecast.te
+++ b/icecast.te
@@ -32,7 +32,7 @@ files_pid_file(icecast_var_run_t)
@@ -38932,7 +38932,7 @@ index a9e573a..9a9245f 100644
tunable_policy(`icecast_use_any_tcp_ports',`
corenet_tcp_connect_all_ports(icecast_t)
diff --git a/ifplugd.if b/ifplugd.if
-index 8999899..96909ae 100644
+index 899989996..96909ae6a 100644
--- a/ifplugd.if
+++ b/ifplugd.if
@@ -119,7 +119,7 @@ interface(`ifplugd_admin',`
@@ -38945,7 +38945,7 @@ index 8999899..96909ae 100644
init_labeled_script_domtrans($1, ifplugd_initrc_exec_t)
diff --git a/ifplugd.te b/ifplugd.te
-index b0546b4..98d7326 100644
+index b0546b43b..98d7326a8 100644
--- a/ifplugd.te
+++ b/ifplugd.te
@@ -10,7 +10,7 @@ type ifplugd_exec_t;
@@ -38973,7 +38973,7 @@ index b0546b4..98d7326 100644
sysnet_domtrans_ifconfig(ifplugd_t)
diff --git a/imaze.te b/imaze.te
-index 1eb24d8..b320d51 100644
+index 1eb24d8c8..b320d51ae 100644
--- a/imaze.te
+++ b/imaze.te
@@ -45,7 +45,6 @@ kernel_list_proc(imazesrv_t)
@@ -38994,7 +38994,7 @@ index 1eb24d8..b320d51 100644
userdom_dontaudit_search_user_home_dirs(imazesrv_t)
diff --git a/inetd.if b/inetd.if
-index fbb54e7..05c3777 100644
+index fbb54e7d8..05c377768 100644
--- a/inetd.if
+++ b/inetd.if
@@ -37,6 +37,12 @@ interface(`inetd_core_service_domain',`
@@ -39011,7 +39011,7 @@ index fbb54e7..05c3777 100644
########################################
diff --git a/inetd.te b/inetd.te
-index c6450df..ed6af79 100644
+index c6450df8a..ed6af7994 100644
--- a/inetd.te
+++ b/inetd.te
@@ -21,6 +21,7 @@ files_pid_file(inetd_var_run_t)
@@ -39127,7 +39127,7 @@ index c6450df..ed6af79 100644
optional_policy(`
unconfined_domain(inetd_child_t)
diff --git a/inn.fc b/inn.fc
-index 8c0a48b..b9eabf1 100644
+index 8c0a48b1d..b9eabf145 100644
--- a/inn.fc
+++ b/inn.fc
@@ -3,6 +3,8 @@
@@ -39220,7 +39220,7 @@ index 8c0a48b..b9eabf1 100644
/var/run/innd(/.*)? gen_context(system_u:object_r:innd_var_run_t,s0)
/var/run/innd\.pid -- gen_context(system_u:object_r:innd_var_run_t,s0)
diff --git a/inn.if b/inn.if
-index eb87f23..d3d32c3 100644
+index eb87f2341..d3d32c3ad 100644
--- a/inn.if
+++ b/inn.if
@@ -124,6 +124,7 @@ interface(`inn_read_config',`
@@ -39290,7 +39290,7 @@ index eb87f23..d3d32c3 100644
init_labeled_script_domtrans($1, innd_initrc_exec_t)
diff --git a/inn.te b/inn.te
-index d39f0cc..2422996 100644
+index d39f0cc51..2422996ec 100644
--- a/inn.te
+++ b/inn.te
@@ -15,6 +15,9 @@ files_config_file(innd_etc_t)
@@ -39373,7 +39373,7 @@ index d39f0cc..2422996 100644
mta_send_mail(innd_t)
diff --git a/iodine.fc b/iodine.fc
-index ca07a87..6ea129c 100644
+index ca07a8744..6ea129cf6 100644
--- a/iodine.fc
+++ b/iodine.fc
@@ -1,3 +1,5 @@
@@ -39383,7 +39383,7 @@ index ca07a87..6ea129c 100644
+
/usr/sbin/iodined -- gen_context(system_u:object_r:iodined_exec_t,s0)
diff --git a/iodine.if b/iodine.if
-index a0bfbd0..8dc7c3e 100644
+index a0bfbd04f..8dc7c3e31 100644
--- a/iodine.if
+++ b/iodine.if
@@ -2,6 +2,50 @@
@@ -39438,7 +39438,7 @@ index a0bfbd0..8dc7c3e 100644
## administrate an iodined environment
##
diff --git a/iodine.te b/iodine.te
-index d443fee..6cbbf7d 100644
+index d443feee4..6cbbf7d84 100644
--- a/iodine.te
+++ b/iodine.te
@@ -12,6 +12,9 @@ init_daemon_domain(iodined_t, iodined_exec_t)
@@ -39462,14 +39462,14 @@ index d443fee..6cbbf7d 100644
diff --git a/iotop.fc b/iotop.fc
new file mode 100644
-index 0000000..c8d2dea
+index 000000000..c8d2deac2
--- /dev/null
+++ b/iotop.fc
@@ -0,0 +1 @@
+/usr/sbin/iotop -- gen_context(system_u:object_r:iotop_exec_t,s0)
diff --git a/iotop.if b/iotop.if
new file mode 100644
-index 0000000..7fc3464
+index 000000000..7fc3464e6
--- /dev/null
+++ b/iotop.if
@@ -0,0 +1,46 @@
@@ -39521,7 +39521,7 @@ index 0000000..7fc3464
+')
diff --git a/iotop.te b/iotop.te
new file mode 100644
-index 0000000..61f2003
+index 000000000..61f2003c8
--- /dev/null
+++ b/iotop.te
@@ -0,0 +1,39 @@
@@ -39566,7 +39566,7 @@ index 0000000..61f2003
+userdom_use_user_terminals(iotop_t)
diff --git a/ipa.fc b/ipa.fc
new file mode 100644
-index 0000000..74206ed
+index 000000000..74206edcb
--- /dev/null
+++ b/ipa.fc
@@ -0,0 +1,29 @@
@@ -39601,7 +39601,7 @@ index 0000000..74206ed
+
diff --git a/ipa.if b/ipa.if
new file mode 100644
-index 0000000..d611c53
+index 000000000..d611c53d4
--- /dev/null
+++ b/ipa.if
@@ -0,0 +1,309 @@
@@ -39916,7 +39916,7 @@ index 0000000..d611c53
+')
diff --git a/ipa.te b/ipa.te
new file mode 100644
-index 0000000..28955dd
+index 000000000..28955ddc0
--- /dev/null
+++ b/ipa.te
@@ -0,0 +1,273 @@
@@ -40195,7 +40195,7 @@ index 0000000..28955dd
+')
diff --git a/ipmievd.fc b/ipmievd.fc
new file mode 100644
-index 0000000..0f598ca
+index 000000000..0f598ca9f
--- /dev/null
+++ b/ipmievd.fc
@@ -0,0 +1,9 @@
@@ -40210,7 +40210,7 @@ index 0000000..0f598ca
+/var/lock/subsys/ipmi -- gen_context(system_u:object_r:ipmievd_lock_t,s0)
diff --git a/ipmievd.if b/ipmievd.if
new file mode 100644
-index 0000000..e86db54
+index 000000000..e86db5418
--- /dev/null
+++ b/ipmievd.if
@@ -0,0 +1,120 @@
@@ -40336,7 +40336,7 @@ index 0000000..e86db54
+')
diff --git a/ipmievd.te b/ipmievd.te
new file mode 100644
-index 0000000..a2c9648
+index 000000000..a2c964844
--- /dev/null
+++ b/ipmievd.te
@@ -0,0 +1,51 @@
@@ -40392,7 +40392,7 @@ index 0000000..a2c9648
+modutils_read_module_config(ipmievd_t)
+
diff --git a/irc.fc b/irc.fc
-index 48e7739..1bf0326 100644
+index 48e7739f9..1bf0326cd 100644
--- a/irc.fc
+++ b/irc.fc
@@ -1,6 +1,6 @@
@@ -40404,7 +40404,7 @@ index 48e7739..1bf0326 100644
/etc/irssi\.conf -- gen_context(system_u:object_r:irc_conf_t,s0)
diff --git a/irc.if b/irc.if
-index ac00fb0..36ef2e5 100644
+index ac00fb0fb..36ef2e59c 100644
--- a/irc.if
+++ b/irc.if
@@ -20,6 +20,7 @@ interface(`irc_role',`
@@ -40467,7 +40467,7 @@ index ac00fb0..36ef2e5 100644
+ userdom_user_home_dir_filetrans($1, irssi_home_t, dir, "irclogs")
')
diff --git a/irc.te b/irc.te
-index 2636503..5910c59 100644
+index 263650367..5910c5931 100644
--- a/irc.te
+++ b/irc.te
@@ -31,13 +31,35 @@ typealias irc_home_t alias { user_irc_home_t staff_irc_home_t sysadm_irc_home_t
@@ -40646,7 +40646,7 @@ index 2636503..5910c59 100644
seutil_use_newrole_fds(irc_t)
')
diff --git a/ircd.if b/ircd.if
-index ade9803..3620c9a 100644
+index ade980323..3620c9a67 100644
--- a/ircd.if
+++ b/ircd.if
@@ -33,8 +33,8 @@ interface(`ircd_admin',`
@@ -40661,7 +40661,7 @@ index ade9803..3620c9a 100644
files_search_var_lib($1)
diff --git a/ircd.te b/ircd.te
-index efaf4b1..bd1a132 100644
+index efaf4b10a..bd1a132ac 100644
--- a/ircd.te
+++ b/ircd.te
@@ -52,7 +52,6 @@ kernel_read_kernel_sysctls(ircd_t)
@@ -40682,7 +40682,7 @@ index efaf4b1..bd1a132 100644
userdom_dontaudit_search_user_home_dirs(ircd_t)
diff --git a/irqbalance.te b/irqbalance.te
-index e1f302d..1e5418a 100644
+index e1f302ddb..1e5418a2e 100644
--- a/irqbalance.te
+++ b/irqbalance.te
@@ -35,7 +35,6 @@ kernel_rw_irq_sysctls(irqbalance_t)
@@ -40703,7 +40703,7 @@ index e1f302d..1e5418a 100644
userdom_dontaudit_search_user_home_dirs(irqbalance_t)
diff --git a/iscsi.fc b/iscsi.fc
-index 08b7560..417e630 100644
+index 08b756047..417e63004 100644
--- a/iscsi.fc
+++ b/iscsi.fc
@@ -1,19 +1,18 @@
@@ -40731,7 +40731,7 @@ index 08b7560..417e630 100644
+/usr/lib/systemd/system/((iscsi)|(iscsid)|(iscsiuio))\.service -- gen_context(system_u:object_r:iscsi_unit_file_t,s0)
+/usr/lib/systemd/system/((iscsid)|(iscsiuio))\.socket -- gen_context(system_u:object_r:iscsi_unit_file_t,s0)
diff --git a/iscsi.if b/iscsi.if
-index 1a35420..8101022 100644
+index 1a354203e..8101022be 100644
--- a/iscsi.if
+++ b/iscsi.if
@@ -21,6 +21,52 @@ interface(`iscsid_domtrans',`
@@ -40870,7 +40870,7 @@ index 1a35420..8101022 100644
logging_search_logs($1)
admin_pattern($1, iscsi_log_t)
diff --git a/iscsi.te b/iscsi.te
-index ca020fa..9c628b2 100644
+index ca020faa9..9c628b22e 100644
--- a/iscsi.te
+++ b/iscsi.te
@@ -5,12 +5,15 @@ policy_module(iscsi, 1.9.0)
@@ -40978,7 +40978,7 @@ index ca020fa..9c628b2 100644
+ kdump_rw_inherited_kdumpctl_tmp_pipes(iscsid_t)
+')
diff --git a/isns.te b/isns.te
-index bc11034..3cda6e9 100644
+index bc1103493..3cda6e9bd 100644
--- a/isns.te
+++ b/isns.te
@@ -26,6 +26,7 @@ files_pid_file(isnsd_var_run_t)
@@ -41014,7 +41014,7 @@ index bc11034..3cda6e9 100644
-
-sysnet_dns_name_resolve(isnsd_t)
diff --git a/jabber.fc b/jabber.fc
-index 59ad3b3..bd02cc8 100644
+index 59ad3b3c4..bd02cc87d 100644
--- a/jabber.fc
+++ b/jabber.fc
@@ -1,25 +1,18 @@
@@ -41056,7 +41056,7 @@ index 59ad3b3..bd02cc8 100644
+
+/var/spool/pyicq-t(/.*)? gen_context(system_u:object_r:pyicqt_var_spool_t,s0)
diff --git a/jabber.if b/jabber.if
-index 7eb3811..8075ba5 100644
+index 7eb381121..8075ba5f0 100644
--- a/jabber.if
+++ b/jabber.if
@@ -1,29 +1,76 @@
@@ -41267,7 +41267,7 @@ index 7eb3811..8075ba5 100644
- admin_pattern($1, jabberd_var_run_t)
')
diff --git a/jabber.te b/jabber.te
-index af67c36..aa88a0a 100644
+index af67c36ee..aa88a0ac2 100644
--- a/jabber.te
+++ b/jabber.te
@@ -9,129 +9,133 @@ attribute jabberd_domain;
@@ -41481,7 +41481,7 @@ index af67c36..aa88a0a 100644
-auth_use_nsswitch(jabberd_router_t)
+sysnet_read_config(jabberd_domain)
diff --git a/java.te b/java.te
-index a7ae153..6341e31 100644
+index a7ae1531b..6341e3119 100644
--- a/java.te
+++ b/java.te
@@ -11,7 +11,7 @@ policy_module(java, 2.7.0)
@@ -41517,7 +41517,7 @@ index a7ae153..6341e31 100644
libs_legacy_use_shared_libs(java_domain)
diff --git a/jetty.fc b/jetty.fc
new file mode 100644
-index 0000000..c7c4fba
+index 000000000..c7c4fba01
--- /dev/null
+++ b/jetty.fc
@@ -0,0 +1,12 @@
@@ -41535,7 +41535,7 @@ index 0000000..c7c4fba
+/var/run/jetty(/.*)? gen_context(system_u:object_r:jetty_var_run_t,s0)
diff --git a/jetty.if b/jetty.if
new file mode 100644
-index 0000000..6679a02
+index 000000000..6679a02aa
--- /dev/null
+++ b/jetty.if
@@ -0,0 +1,415 @@
@@ -41956,7 +41956,7 @@ index 0000000..6679a02
+')
diff --git a/jetty.te b/jetty.te
new file mode 100644
-index 0000000..71325e5
+index 000000000..71325e5e6
--- /dev/null
+++ b/jetty.te
@@ -0,0 +1,78 @@
@@ -42039,7 +42039,7 @@ index 0000000..71325e5
+ abrt_read_config(jetty_t)
+')
diff --git a/jockey.if b/jockey.if
-index 2fb7a20..c6ba007 100644
+index 2fb7a20fa..c6ba00798 100644
--- a/jockey.if
+++ b/jockey.if
@@ -1 +1,131 @@
@@ -42176,7 +42176,7 @@ index 2fb7a20..c6ba007 100644
+ ')
+')
diff --git a/jockey.te b/jockey.te
-index d59ec10..a46018d 100644
+index d59ec10a2..a46018d04 100644
--- a/jockey.te
+++ b/jockey.te
@@ -15,6 +15,9 @@ files_type(jockey_cache_t)
@@ -42225,14 +42225,14 @@ index d59ec10..a46018d 100644
')
diff --git a/journalctl.fc b/journalctl.fc
new file mode 100644
-index 0000000..f270652
+index 000000000..f27065286
--- /dev/null
+++ b/journalctl.fc
@@ -0,0 +1 @@
+/usr/bin/journalctl -- gen_context(system_u:object_r:journalctl_exec_t,s0)
diff --git a/journalctl.if b/journalctl.if
new file mode 100644
-index 0000000..17126b6
+index 000000000..17126b64c
--- /dev/null
+++ b/journalctl.if
@@ -0,0 +1,95 @@
@@ -42333,7 +42333,7 @@ index 0000000..17126b6
+')
diff --git a/journalctl.te b/journalctl.te
new file mode 100644
-index 0000000..68dd2b7
+index 000000000..68dd2b7d6
--- /dev/null
+++ b/journalctl.te
@@ -0,0 +1,47 @@
@@ -42386,14 +42386,14 @@ index 0000000..68dd2b7
+userdom_rw_inherited_user_home_content_files(journalctl_t)
diff --git a/kde.fc b/kde.fc
new file mode 100644
-index 0000000..25e4b68
+index 000000000..25e4b6817
--- /dev/null
+++ b/kde.fc
@@ -0,0 +1 @@
+#/usr/libexec/kde(3|4)/backlighthelper -- gen_context(system_u:object_r:kdebacklighthelper_exec_t,s0)
diff --git a/kde.if b/kde.if
new file mode 100644
-index 0000000..cf65577
+index 000000000..cf6557769
--- /dev/null
+++ b/kde.if
@@ -0,0 +1,22 @@
@@ -42421,7 +42421,7 @@ index 0000000..cf65577
+')
diff --git a/kde.te b/kde.te
new file mode 100644
-index 0000000..dbe3f03
+index 000000000..dbe3f038d
--- /dev/null
+++ b/kde.te
@@ -0,0 +1,41 @@
@@ -42467,7 +42467,7 @@ index 0000000..dbe3f03
+')
+
diff --git a/kdump.fc b/kdump.fc
-index a49ae4e..0c0e987 100644
+index a49ae4e91..0c0e987a8 100644
--- a/kdump.fc
+++ b/kdump.fc
@@ -1,13 +1,16 @@
@@ -42495,7 +42495,7 @@ index a49ae4e..0c0e987 100644
+
+/var/lock/kdump(/.*)? gen_context(system_u:object_r:kdump_lock_t,s0)
diff --git a/kdump.if b/kdump.if
-index 3a00b3a..92f125f 100644
+index 3a00b3a13..92f125fdf 100644
--- a/kdump.if
+++ b/kdump.if
@@ -1,4 +1,4 @@
@@ -42791,7 +42791,7 @@ index 3a00b3a..92f125f 100644
+')
+
diff --git a/kdump.te b/kdump.te
-index 715fc21..794264a 100644
+index 715fc211c..794264a1d 100644
--- a/kdump.te
+++ b/kdump.te
@@ -12,35 +12,58 @@ init_system_domain(kdump_t, kdump_exec_t)
@@ -42974,7 +42974,7 @@ index 715fc21..794264a 100644
+ unconfined_domain(kdumpctl_t)
')
diff --git a/kdumpgui.if b/kdumpgui.if
-index 182ab8b..8b1d9c2 100644
+index 182ab8b58..8b1d9c23c 100644
--- a/kdumpgui.if
+++ b/kdumpgui.if
@@ -1 +1,23 @@
@@ -43003,7 +43003,7 @@ index 182ab8b..8b1d9c2 100644
+')
+
diff --git a/kdumpgui.te b/kdumpgui.te
-index 2990962..6629aaf 100644
+index 2990962b6..6629aaf27 100644
--- a/kdumpgui.te
+++ b/kdumpgui.te
@@ -5,79 +5,90 @@ policy_module(kdumpgui, 1.2.0)
@@ -43130,7 +43130,7 @@ index 2990962..6629aaf 100644
')
diff --git a/keepalived.fc b/keepalived.fc
new file mode 100644
-index 0000000..9a19f91
+index 000000000..9a19f91f3
--- /dev/null
+++ b/keepalived.fc
@@ -0,0 +1,7 @@
@@ -43143,7 +43143,7 @@ index 0000000..9a19f91
+/var/run/keepalived.* -- gen_context(system_u:object_r:keepalived_var_run_t,s0)
diff --git a/keepalived.if b/keepalived.if
new file mode 100644
-index 0000000..bd7e7fa
+index 000000000..bd7e7fa17
--- /dev/null
+++ b/keepalived.if
@@ -0,0 +1,80 @@
@@ -43229,7 +43229,7 @@ index 0000000..bd7e7fa
+')
diff --git a/keepalived.te b/keepalived.te
new file mode 100644
-index 0000000..04c46e7
+index 000000000..04c46e714
--- /dev/null
+++ b/keepalived.te
@@ -0,0 +1,95 @@
@@ -43329,7 +43329,7 @@ index 0000000..04c46e7
+ ')
+')
diff --git a/kerberos.fc b/kerberos.fc
-index 4fe75fd..3504a9b 100644
+index 4fe75fd63..3504a9bf7 100644
--- a/kerberos.fc
+++ b/kerberos.fc
@@ -1,52 +1,54 @@
@@ -43425,7 +43425,7 @@ index 4fe75fd..3504a9b 100644
+/var/tmp/ldap_487 -- gen_context(system_u:object_r:krb5_host_rcache_t,s0)
+/var/tmp/ldap_55 -- gen_context(system_u:object_r:krb5_host_rcache_t,s0)
diff --git a/kerberos.if b/kerberos.if
-index f6c00d8..79ea4d8 100644
+index f6c00d8e6..79ea4d8d2 100644
--- a/kerberos.if
+++ b/kerberos.if
@@ -1,27 +1,29 @@
@@ -44171,7 +44171,7 @@ index f6c00d8..79ea4d8 100644
+ kerberos_tmp_filetrans_host_rcache($1, "ldap_55")
')
diff --git a/kerberos.te b/kerberos.te
-index 8833d59..9b9eb11 100644
+index 8833d596d..9b9eb11ed 100644
--- a/kerberos.te
+++ b/kerberos.te
@@ -6,11 +6,11 @@ policy_module(kerberos, 1.12.0)
@@ -44542,7 +44542,7 @@ index 8833d59..9b9eb11 100644
seutil_read_file_contexts(kpropd_t)
diff --git a/kerneloops.if b/kerneloops.if
-index 714448f..fa0c994 100644
+index 714448f8d..fa0c994e5 100644
--- a/kerneloops.if
+++ b/kerneloops.if
@@ -101,13 +101,16 @@ interface(`kerneloops_manage_tmp_files',`
@@ -44566,7 +44566,7 @@ index 714448f..fa0c994 100644
domain_system_change_exemption($1)
role_transition $2 kerneloops_initrc_exec_t system_r;
diff --git a/kerneloops.te b/kerneloops.te
-index bcdb295..f6e3736 100644
+index bcdb29599..f6e3736dd 100644
--- a/kerneloops.te
+++ b/kerneloops.te
@@ -31,7 +31,6 @@ kernel_read_ring_buffer(kerneloops_t)
@@ -44587,7 +44587,7 @@ index bcdb295..f6e3736 100644
dbus_system_domain(kerneloops_t, kerneloops_exec_t)
')
diff --git a/keyboardd.if b/keyboardd.if
-index 8982b91..6134ef2 100644
+index 8982b9106..6134ef258 100644
--- a/keyboardd.if
+++ b/keyboardd.if
@@ -1,19 +1,39 @@
@@ -44639,7 +44639,7 @@ index 8982b91..6134ef2 100644
+ allow $1 keyboardd_t:fifo_file read_fifo_file_perms;
')
diff --git a/keyboardd.te b/keyboardd.te
-index 628b78b..fe65617 100644
+index 628b78b4b..fe656175e 100644
--- a/keyboardd.te
+++ b/keyboardd.te
@@ -19,6 +19,3 @@ allow keyboardd_t self:unix_stream_socket create_stream_socket_perms;
@@ -44650,7 +44650,7 @@ index 628b78b..fe65617 100644
-
-miscfiles_read_localization(keyboardd_t)
diff --git a/keystone.fc b/keystone.fc
-index b273d80..6b2b50d 100644
+index b273d803c..6b2b50d69 100644
--- a/keystone.fc
+++ b/keystone.fc
@@ -1,7 +1,13 @@
@@ -44668,7 +44668,7 @@ index b273d80..6b2b50d 100644
+
+/var/run/keystone(/.*)? gen_context(system_u:object_r:keystone_var_run_t,s0)
diff --git a/keystone.if b/keystone.if
-index e88fb16..ec6121a 100644
+index e88fb16e0..ec6121a5c 100644
--- a/keystone.if
+++ b/keystone.if
@@ -1,42 +1,219 @@
@@ -44907,7 +44907,7 @@ index e88fb16..ec6121a 100644
+ ')
')
diff --git a/keystone.te b/keystone.te
-index 9929647..c573d0e 100644
+index 992964774..c573d0ed5 100644
--- a/keystone.te
+++ b/keystone.te
@@ -18,13 +18,20 @@ logging_log_file(keystone_log_t)
@@ -44999,7 +44999,7 @@ index 9929647..c573d0e 100644
+ corenet_tcp_sendrecv_commplex_main_port(keystone_cgi_script_t)
')
diff --git a/kismet.if b/kismet.if
-index aa2a337..7ff229f 100644
+index aa2a3379b..7ff229f32 100644
--- a/kismet.if
+++ b/kismet.if
@@ -283,7 +283,7 @@ interface(`kismet_manage_log',`
@@ -45025,7 +45025,7 @@ index aa2a337..7ff229f 100644
files_search_var_lib($1)
admin_pattern($1, kismet_var_lib_t)
diff --git a/kismet.te b/kismet.te
-index 8ad0d4d..01e5037 100644
+index 8ad0d4d50..01e503790 100644
--- a/kismet.te
+++ b/kismet.te
@@ -38,7 +38,7 @@ files_pid_file(kismet_var_run_t)
@@ -45073,7 +45073,7 @@ index 8ad0d4d..01e5037 100644
dbus_system_bus_client(kismet_t)
diff --git a/kmscon.fc b/kmscon.fc
new file mode 100644
-index 0000000..ccd29c0
+index 000000000..ccd29c079
--- /dev/null
+++ b/kmscon.fc
@@ -0,0 +1,3 @@
@@ -45082,7 +45082,7 @@ index 0000000..ccd29c0
+/etc/kmscon(/.*)? gen_context(system_u:object_r:kmscon_conf_t,s0)
diff --git a/kmscon.if b/kmscon.if
new file mode 100644
-index 0000000..b9347fa
+index 000000000..b9347faa9
--- /dev/null
+++ b/kmscon.if
@@ -0,0 +1,25 @@
@@ -45113,7 +45113,7 @@ index 0000000..b9347fa
+')
diff --git a/kmscon.te b/kmscon.te
new file mode 100644
-index 0000000..32a9e13
+index 000000000..32a9e1356
--- /dev/null
+++ b/kmscon.te
@@ -0,0 +1,88 @@
@@ -45206,7 +45206,7 @@ index 0000000..32a9e13
+ ')
+')
diff --git a/ksmtuned.fc b/ksmtuned.fc
-index e736c45..4b1e1e4 100644
+index e736c450c..4b1e1e453 100644
--- a/ksmtuned.fc
+++ b/ksmtuned.fc
@@ -1,5 +1,7 @@
@@ -45218,7 +45218,7 @@ index e736c45..4b1e1e4 100644
/var/log/ksmtuned.* gen_context(system_u:object_r:ksmtuned_log_t,s0)
diff --git a/ksmtuned.if b/ksmtuned.if
-index 93a64bc..af6d741 100644
+index 93a64bc50..af6d741d6 100644
--- a/ksmtuned.if
+++ b/ksmtuned.if
@@ -38,6 +38,30 @@ interface(`ksmtuned_initrc_domtrans',`
@@ -45295,7 +45295,7 @@ index 93a64bc..af6d741 100644
+ allow $1 ksmtuned_unit_file_t:service all_service_perms;
')
diff --git a/ksmtuned.te b/ksmtuned.te
-index 8eef134..a2ca1a0 100644
+index 8eef134ac..a2ca1a009 100644
--- a/ksmtuned.te
+++ b/ksmtuned.te
@@ -5,10 +5,27 @@ policy_module(ksmtuned, 1.1.1)
@@ -45348,7 +45348,7 @@ index 8eef134..a2ca1a0 100644
+ samba_read_share_files(ksmtuned_t)
+')
diff --git a/ktalk.fc b/ktalk.fc
-index 38ecb07..451067e 100644
+index 38ecb07d1..451067ebd 100644
--- a/ktalk.fc
+++ b/ktalk.fc
@@ -1,3 +1,5 @@
@@ -45358,7 +45358,7 @@ index 38ecb07..451067e 100644
/usr/sbin/in\.talkd -- gen_context(system_u:object_r:ktalkd_exec_t,s0)
diff --git a/ktalk.if b/ktalk.if
-index 19777b8..cd721fd 100644
+index 19777b806..cd721fd6b 100644
--- a/ktalk.if
+++ b/ktalk.if
@@ -1 +1,77 @@
@@ -45441,7 +45441,7 @@ index 19777b8..cd721fd 100644
+ ')
+')
diff --git a/ktalk.te b/ktalk.te
-index c5548c5..1356fcb 100644
+index c5548c5ed..1356fcbd2 100644
--- a/ktalk.te
+++ b/ktalk.te
@@ -13,6 +13,9 @@ inetd_udp_service_domain(ktalkd_t, ktalkd_exec_t)
@@ -45473,7 +45473,7 @@ index c5548c5..1356fcb 100644
+userdom_use_user_ttys(ktalkd_t)
diff --git a/kubernetes.fc b/kubernetes.fc
new file mode 100644
-index 0000000..deda99e
+index 000000000..deda99ed6
--- /dev/null
+++ b/kubernetes.fc
@@ -0,0 +1,11 @@
@@ -45490,7 +45490,7 @@ index 0000000..deda99e
+
diff --git a/kubernetes.if b/kubernetes.if
new file mode 100644
-index 0000000..b2841e5
+index 000000000..b2841e526
--- /dev/null
+++ b/kubernetes.if
@@ -0,0 +1,87 @@
@@ -45583,7 +45583,7 @@ index 0000000..b2841e5
+')
diff --git a/kubernetes.te b/kubernetes.te
new file mode 100644
-index 0000000..b625b53
+index 000000000..b625b5343
--- /dev/null
+++ b/kubernetes.te
@@ -0,0 +1,76 @@
@@ -45664,7 +45664,7 @@ index 0000000..b625b53
+
+allow kube_proxy_t self:capability net_admin;
diff --git a/kudzu.if b/kudzu.if
-index 5297064..6ba8108 100644
+index 52970645f..6ba810834 100644
--- a/kudzu.if
+++ b/kudzu.if
@@ -86,9 +86,13 @@ interface(`kudzu_admin',`
@@ -45683,7 +45683,7 @@ index 5297064..6ba8108 100644
domain_system_change_exemption($1)
role_transition $2 kudzu_initrc_exec_t system_r;
diff --git a/kudzu.te b/kudzu.te
-index 1664036..ee7a9a1 100644
+index 16640364b..ee7a9a1d5 100644
--- a/kudzu.te
+++ b/kudzu.te
@@ -26,7 +26,7 @@ files_pid_file(kudzu_var_run_t)
@@ -45744,7 +45744,7 @@ index 1664036..ee7a9a1 100644
- unconfined_domtrans(kudzu_t)
-')
diff --git a/l2tp.fc b/l2tp.fc
-index d5d1572..ddc6ef2 100644
+index d5d1572b1..ddc6ef210 100644
--- a/l2tp.fc
+++ b/l2tp.fc
@@ -5,7 +5,9 @@
@@ -45758,7 +45758,7 @@ index d5d1572..ddc6ef2 100644
/var/run/.*l2tpd\.pid -- gen_context(system_u:object_r:l2tpd_var_run_t,s0)
+/var/run/*.xl2tpd.* -- gen_context(system_u:object_r:l2tpd_var_run_t,s0)
diff --git a/l2tp.if b/l2tp.if
-index 73e2803..34ca3aa 100644
+index 73e2803ee..34ca3aa22 100644
--- a/l2tp.if
+++ b/l2tp.if
@@ -1,9 +1,45 @@
@@ -45987,7 +45987,7 @@ index 73e2803..34ca3aa 100644
role_transition $2 l2tpd_initrc_exec_t system_r;
allow $2 system_r;
diff --git a/l2tp.te b/l2tp.te
-index bb06a7f..01e784b 100644
+index bb06a7fee..01e784bf5 100644
--- a/l2tp.te
+++ b/l2tp.te
@@ -27,7 +27,7 @@ files_pid_file(l2tpd_var_run_t)
@@ -46057,7 +46057,7 @@ index bb06a7f..01e784b 100644
ppp_signal(l2tpd_t)
ppp_kill(l2tpd_t)
diff --git a/ldap.fc b/ldap.fc
-index b7e5679..c93db33 100644
+index b7e567916..c93db3316 100644
--- a/ldap.fc
+++ b/ldap.fc
@@ -1,8 +1,11 @@
@@ -46088,7 +46088,7 @@ index b7e5679..c93db33 100644
+/var/run/slapd\.args -- gen_context(system_u:object_r:slapd_var_run_t,s0)
+/var/run/slapd\.pid -- gen_context(system_u:object_r:slapd_var_run_t,s0)
diff --git a/ldap.if b/ldap.if
-index 3602712..af83a5b 100644
+index 3602712d0..af83a5b6b 100644
--- a/ldap.if
+++ b/ldap.if
@@ -1,8 +1,69 @@
@@ -46334,7 +46334,7 @@ index 3602712..af83a5b 100644
+ allow $1 slapd_unit_file_t:service all_service_perms;
')
diff --git a/ldap.te b/ldap.te
-index 4c2b111..8fa1510 100644
+index 4c2b1110e..8fa1510d7 100644
--- a/ldap.te
+++ b/ldap.te
@@ -21,6 +21,9 @@ files_config_file(slapd_etc_t)
@@ -46408,7 +46408,7 @@ index 4c2b111..8fa1510 100644
')
diff --git a/lightsquid.fc b/lightsquid.fc
-index 044390c..63e2058 100644
+index 044390c6e..63e205863 100644
--- a/lightsquid.fc
+++ b/lightsquid.fc
@@ -1,11 +1,11 @@
@@ -46429,7 +46429,7 @@ index 044390c..63e2058 100644
+/var/www/html/lightsquid(/.*)? gen_context(system_u:object_r:lightsquid_content_t,s0)
+/var/www/html/lightsquid/report(/.*)? gen_context(system_u:object_r:lightsquid_report_content_t,s0)
diff --git a/lightsquid.if b/lightsquid.if
-index 33a28b9..33ffe24 100644
+index 33a28b9ad..33ffe2484 100644
--- a/lightsquid.if
+++ b/lightsquid.if
@@ -76,5 +76,7 @@ interface(`lightsquid_admin',`
@@ -46442,7 +46442,7 @@ index 33a28b9..33ffe24 100644
+ ')
')
diff --git a/lightsquid.te b/lightsquid.te
-index 09c4f27..6c7855e 100644
+index 09c4f27ba..6c7855e4e 100644
--- a/lightsquid.te
+++ b/lightsquid.te
@@ -13,38 +13,34 @@ type lightsquid_exec_t;
@@ -46495,7 +46495,7 @@ index 09c4f27..6c7855e 100644
optional_policy(`
diff --git a/likewise.if b/likewise.if
-index bd20e8c..3393a01 100644
+index bd20e8cc9..3393a01e6 100644
--- a/likewise.if
+++ b/likewise.if
@@ -1,9 +1,22 @@
@@ -46637,7 +46637,7 @@ index bd20e8c..3393a01 100644
- admin_pattern($1, { lwregd_var_run_t netlogond_var_run_t srvsvcd_var_run_t })
-')
diff --git a/likewise.te b/likewise.te
-index d8c2442..f5dff31 100644
+index d8c2442a8..f5dff3173 100644
--- a/likewise.te
+++ b/likewise.te
@@ -26,7 +26,7 @@ type likewise_var_lib_t;
@@ -46715,7 +46715,7 @@ index d8c2442..f5dff31 100644
corenet_tcp_sendrecv_generic_node(srvsvcd_t)
diff --git a/linuxptp.fc b/linuxptp.fc
new file mode 100644
-index 0000000..d2061a9
+index 000000000..d2061a9e4
--- /dev/null
+++ b/linuxptp.fc
@@ -0,0 +1,11 @@
@@ -46732,7 +46732,7 @@ index 0000000..d2061a9
+/var/run/timemaster(/.*)? gen_context(system_u:object_r:timemaster_var_run_t,s0)
diff --git a/linuxptp.if b/linuxptp.if
new file mode 100644
-index 0000000..7ba5060
+index 000000000..7ba50607c
--- /dev/null
+++ b/linuxptp.if
@@ -0,0 +1,121 @@
@@ -46859,7 +46859,7 @@ index 0000000..7ba5060
+
diff --git a/linuxptp.te b/linuxptp.te
new file mode 100644
-index 0000000..7acdb2d
+index 000000000..7acdb2d40
--- /dev/null
+++ b/linuxptp.te
@@ -0,0 +1,180 @@
@@ -47044,7 +47044,7 @@ index 0000000..7acdb2d
+ gpsd_rw_shm(ptp4l_t)
+')
diff --git a/lircd.if b/lircd.if
-index dff21a7..b6981c8 100644
+index dff21a7c4..b6981c846 100644
--- a/lircd.if
+++ b/lircd.if
@@ -81,8 +81,11 @@ interface(`lircd_admin',`
@@ -47061,7 +47061,7 @@ index dff21a7..b6981c8 100644
init_labeled_script_domtrans($1, lircd_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/lircd.te b/lircd.te
-index 483c87b..eecd4c1 100644
+index 483c87bb6..eecd4c158 100644
--- a/lircd.te
+++ b/lircd.te
@@ -13,7 +13,7 @@ type lircd_initrc_exec_t;
@@ -47118,7 +47118,7 @@ index 483c87b..eecd4c1 100644
sysnet_dns_name_resolve(lircd_t)
diff --git a/livecd.if b/livecd.if
-index e354181..fc614ba 100644
+index e3541811a..fc614bac2 100644
--- a/livecd.if
+++ b/livecd.if
@@ -38,11 +38,36 @@ interface(`livecd_domtrans',`
@@ -47159,7 +47159,7 @@ index e354181..fc614ba 100644
########################################
diff --git a/livecd.te b/livecd.te
-index 2f974bf..f6e97fa 100644
+index 2f974bf83..f6e97faaf 100644
--- a/livecd.te
+++ b/livecd.te
@@ -21,9 +21,11 @@ files_tmp_file(livecd_tmp_t)
@@ -47193,7 +47193,7 @@ index 2f974bf..f6e97fa 100644
optional_policy(`
diff --git a/lldpad.fc b/lldpad.fc
-index 8031a78..72e56ac 100644
+index 8031a78eb..72e56acc3 100644
--- a/lldpad.fc
+++ b/lldpad.fc
@@ -5,3 +5,5 @@
@@ -47203,7 +47203,7 @@ index 8031a78..72e56ac 100644
+
+/dev/shm/lldpad.* -- gen_context(system_u:object_r:lldpad_tmpfs_t,s0)
diff --git a/lldpad.if b/lldpad.if
-index d18c960..b7bd752 100644
+index d18c96023..b7bd75245 100644
--- a/lldpad.if
+++ b/lldpad.if
@@ -2,6 +2,25 @@
@@ -47271,7 +47271,7 @@ index d18c960..b7bd752 100644
+ allow $1 lldpad_tmpfs_t:file relabelto;
+')
diff --git a/lldpad.te b/lldpad.te
-index 2a491d9..3399d59 100644
+index 2a491d96c..3399d597a 100644
--- a/lldpad.te
+++ b/lldpad.te
@@ -26,7 +26,7 @@ files_pid_file(lldpad_var_run_t)
@@ -47307,7 +47307,7 @@ index 2a491d9..3399d59 100644
+ virt_dgram_send(lldpad_t)
+')
diff --git a/loadkeys.te b/loadkeys.te
-index d2f4643..c8e6b37 100644
+index d2f464375..c8e6b37b0 100644
--- a/loadkeys.te
+++ b/loadkeys.te
@@ -25,20 +25,19 @@ kernel_read_system_state(loadkeys_t)
@@ -47335,7 +47335,7 @@ index d2f4643..c8e6b37 100644
ifdef(`hide_broken_symptoms',`
diff --git a/lockdev.if b/lockdev.if
-index 4313b8b..cd1435c 100644
+index 4313b8bc0..cd1435cdf 100644
--- a/lockdev.if
+++ b/lockdev.if
@@ -1,5 +1,25 @@
@@ -47365,7 +47365,7 @@ index 4313b8b..cd1435c 100644
##
## Role access for lockdev.
diff --git a/lockdev.te b/lockdev.te
-index 61db5a0..9d5d255 100644
+index 61db5a0a7..9d5d25524 100644
--- a/lockdev.te
+++ b/lockdev.te
@@ -36,4 +36,5 @@ fs_getattr_xattr_fs(lockdev_t)
@@ -47376,7 +47376,7 @@ index 61db5a0..9d5d255 100644
+userdom_use_inherited_user_terminals(lockdev_t)
+
diff --git a/logrotate.fc b/logrotate.fc
-index a11d5be..60f83c5 100644
+index a11d5be99..60f83c5db 100644
--- a/logrotate.fc
+++ b/logrotate.fc
@@ -1,6 +1,6 @@
@@ -47389,7 +47389,7 @@ index a11d5be..60f83c5 100644
-/var/lib/logrotate\.status -- gen_context(system_u:object_r:logrotate_var_lib_t,s0)
+/var/lib/logrotate\.status.* -- gen_context(system_u:object_r:logrotate_var_lib_t,s0)
diff --git a/logrotate.if b/logrotate.if
-index dd8e01a..9cd6b0b 100644
+index dd8e01af3..9cd6b0b8e 100644
--- a/logrotate.if
+++ b/logrotate.if
@@ -1,4 +1,4 @@
@@ -47444,7 +47444,7 @@ index dd8e01a..9cd6b0b 100644
##
##
diff --git a/logrotate.te b/logrotate.te
-index be0ab84..6180bdb 100644
+index be0ab84b3..6180bdbdc 100644
--- a/logrotate.te
+++ b/logrotate.te
@@ -5,16 +5,29 @@ policy_module(logrotate, 1.15.0)
@@ -47779,7 +47779,7 @@ index be0ab84..6180bdb 100644
logging_read_all_logs(logrotate_mail_t)
+manage_files_pattern(logrotate_mail_t, logrotate_tmp_t, logrotate_tmp_t)
diff --git a/logwatch.te b/logwatch.te
-index ab65034..dd17cb0 100644
+index ab650340c..dd17cb0c5 100644
--- a/logwatch.te
+++ b/logwatch.te
@@ -15,7 +15,8 @@ gen_tunable(logwatch_can_network_connect_mail, false)
@@ -47886,7 +47886,7 @@ index ab65034..dd17cb0 100644
+ qmail_domtrans_queue(logwatch_mail_t)
+')
diff --git a/lpd.fc b/lpd.fc
-index 2fb9b2e..08974e3 100644
+index 2fb9b2ec2..08974e376 100644
--- a/lpd.fc
+++ b/lpd.fc
@@ -19,6 +19,7 @@
@@ -47898,7 +47898,7 @@ index 2fb9b2e..08974e3 100644
/usr/share/printconf/.* -- gen_context(system_u:object_r:printconf_t,s0)
diff --git a/lpd.if b/lpd.if
-index 6256371..ce2acb8 100644
+index 62563717b..ce2acb881 100644
--- a/lpd.if
+++ b/lpd.if
@@ -1,44 +1,49 @@
@@ -48078,7 +48078,7 @@ index 6256371..ce2acb8 100644
can_exec($1, lpr_exec_t)
')
diff --git a/lpd.te b/lpd.te
-index 39d3164..1ec2cd2 100644
+index 39d31640e..1ec2cd26e 100644
--- a/lpd.te
+++ b/lpd.te
@@ -48,7 +48,7 @@ userdom_user_tmp_file(lpr_tmp_t)
@@ -48250,7 +48250,7 @@ index 39d3164..1ec2cd2 100644
+ mozilla_plugin_dontaudit_rw_tmp_files(lpr_t)
')
diff --git a/lsm.fc b/lsm.fc
-index c455730..6e14667 100644
+index c45573053..6e1466794 100644
--- a/lsm.fc
+++ b/lsm.fc
@@ -1,3 +1,7 @@
@@ -48262,7 +48262,7 @@ index c455730..6e14667 100644
+
/var/run/lsm(/.*)? gen_context(system_u:object_r:lsmd_var_run_t,s0)
diff --git a/lsm.if b/lsm.if
-index d314333..27ede09 100644
+index d3143334d..27ede090c 100644
--- a/lsm.if
+++ b/lsm.if
@@ -1,25 +1,86 @@
@@ -48373,7 +48373,7 @@ index d314333..27ede09 100644
+ ')
')
diff --git a/lsm.te b/lsm.te
-index 4ec0eea..1400ca8 100644
+index 4ec0eea30..1400ca864 100644
--- a/lsm.te
+++ b/lsm.te
@@ -4,6 +4,13 @@ policy_module(lsm, 1.0.0)
@@ -48490,7 +48490,7 @@ index 4ec0eea..1400ca8 100644
+storage_dev_filetrans_named_fixed_disk(lsmd_plugin_t)
diff --git a/lttng-tools.fc b/lttng-tools.fc
new file mode 100644
-index 0000000..bdd17ca
+index 000000000..bdd17ca85
--- /dev/null
+++ b/lttng-tools.fc
@@ -0,0 +1,5 @@
@@ -48501,7 +48501,7 @@ index 0000000..bdd17ca
+/var/run/lttng(/.*)? gen_context(system_u:object_r:lttng_sessiond_var_run_t,s0)
diff --git a/lttng-tools.if b/lttng-tools.if
new file mode 100644
-index 0000000..e86897d
+index 000000000..e86897d29
--- /dev/null
+++ b/lttng-tools.if
@@ -0,0 +1,117 @@
@@ -48624,7 +48624,7 @@ index 0000000..e86897d
+')
diff --git a/lttng-tools.te b/lttng-tools.te
new file mode 100644
-index 0000000..1d2ca22
+index 000000000..1d2ca2224
--- /dev/null
+++ b/lttng-tools.te
@@ -0,0 +1,60 @@
@@ -48689,7 +48689,7 @@ index 0000000..1d2ca22
+modutils_read_module_config(lttng_sessiond_t)
+files_read_kernel_modules(lttng_sessiond_t)
diff --git a/mailman.fc b/mailman.fc
-index 995d0a5..3d40d59 100644
+index 995d0a5d3..3d40d59d2 100644
--- a/mailman.fc
+++ b/mailman.fc
@@ -2,10 +2,12 @@
@@ -48707,7 +48707,7 @@ index 995d0a5..3d40d59 100644
/var/lock/mailman.* gen_context(system_u:object_r:mailman_lock_t,s0)
diff --git a/mailman.if b/mailman.if
-index 108c0f1..a248501 100644
+index 108c0f1f5..a2485018e 100644
--- a/mailman.if
+++ b/mailman.if
@@ -1,44 +1,70 @@
@@ -49017,7 +49017,7 @@ index 108c0f1..a248501 100644
domtrans_pattern($1, mailman_queue_exec_t, mailman_queue_t)
')
diff --git a/mailman.te b/mailman.te
-index ac81c7f..a9faca9 100644
+index ac81c7fa9..a9faca989 100644
--- a/mailman.te
+++ b/mailman.te
@@ -4,6 +4,12 @@ policy_module(mailman, 1.10.0)
@@ -49120,7 +49120,7 @@ index ac81c7f..a9faca9 100644
+ fs_manage_fusefs_symlinks(mailman_domain)
+')
diff --git a/mailscanner.if b/mailscanner.if
-index 214cb44..bd1d48e 100644
+index 214cb4498..bd1d48e4f 100644
--- a/mailscanner.if
+++ b/mailscanner.if
@@ -2,29 +2,27 @@
@@ -49201,7 +49201,7 @@ index 214cb44..bd1d48e 100644
+ files_list_pids($1)
')
diff --git a/mailscanner.te b/mailscanner.te
-index 6b6e2e1..3fb3393 100644
+index 6b6e2e130..3fb3393ba 100644
--- a/mailscanner.te
+++ b/mailscanner.te
@@ -29,11 +29,12 @@ files_pid_file(mscan_var_run_t)
@@ -49247,7 +49247,7 @@ index 6b6e2e1..3fb3393 100644
spamassassin_read_lib_files(mscan_t)
')
diff --git a/man2html.fc b/man2html.fc
-index 82f6255..3686732 100644
+index 82f625551..368673237 100644
--- a/man2html.fc
+++ b/man2html.fc
@@ -1,5 +1,5 @@
@@ -49261,7 +49261,7 @@ index 82f6255..3686732 100644
-/var/cache/man2html(/.*)? gen_context(system_u:object_r:httpd_man2html_script_cache_t,s0)
+/var/cache/man2html(/.*)? gen_context(system_u:object_r:man2html_rw_content_t,s0)
diff --git a/man2html.if b/man2html.if
-index 54ec04d..53eaf61 100644
+index 54ec04d3b..53eaf61d6 100644
--- a/man2html.if
+++ b/man2html.if
@@ -1 +1,137 @@
@@ -49403,7 +49403,7 @@ index 54ec04d..53eaf61 100644
+ ')
+')
diff --git a/man2html.te b/man2html.te
-index e08c55d..24b56e9 100644
+index e08c55d43..24b56e9ee 100644
--- a/man2html.te
+++ b/man2html.te
@@ -5,22 +5,18 @@ policy_module(man2html, 1.0.0)
@@ -49438,7 +49438,7 @@ index e08c55d..24b56e9 100644
+ files_var_filetrans(man2html_script_t, man2html_rw_content_t, { dir file })
+')
diff --git a/mandb.fc b/mandb.fc
-index 8ae78b5..b365cdd 100644
+index 8ae78b5bf..b365cddec 100644
--- a/mandb.fc
+++ b/mandb.fc
@@ -1 +1,12 @@
@@ -49455,7 +49455,7 @@ index 8ae78b5..b365cdd 100644
+
+/root/.manpath -- gen_context(system_u:object_r:mandb_home_t,s0)
diff --git a/mandb.if b/mandb.if
-index 327f3f7..4f61561 100644
+index 327f3f726..4f6156138 100644
--- a/mandb.if
+++ b/mandb.if
@@ -1,14 +1,14 @@
@@ -49693,7 +49693,7 @@ index 327f3f7..4f61561 100644
+ ')
')
diff --git a/mandb.te b/mandb.te
-index e6136fd..56fa2cf 100644
+index e6136fd37..56fa2cfc1 100644
--- a/mandb.te
+++ b/mandb.te
@@ -10,19 +10,40 @@ roleattribute system_r mandb_roles;
@@ -49757,7 +49757,7 @@ index e6136fd..56fa2cf 100644
ifdef(`distro_debian',`
optional_policy(`
diff --git a/mcelog.if b/mcelog.if
-index f89651e..c73214d 100644
+index f89651e75..c73214d81 100644
--- a/mcelog.if
+++ b/mcelog.if
@@ -19,6 +19,25 @@ interface(`mcelog_domtrans',`
@@ -49787,7 +49787,7 @@ index f89651e..c73214d 100644
##
## All of the rules required to
diff --git a/mcelog.te b/mcelog.te
-index 59b3b3d..494c4f3 100644
+index 59b3b3dd6..494c4f3a4 100644
--- a/mcelog.te
+++ b/mcelog.te
@@ -36,13 +36,6 @@ gen_tunable(mcelog_foreground, false)
@@ -49841,7 +49841,7 @@ index 59b3b3d..494c4f3 100644
cron_system_entry(mcelog_t, mcelog_exec_t)
diff --git a/mcollective.fc b/mcollective.fc
new file mode 100644
-index 0000000..821bf88
+index 000000000..821bf8822
--- /dev/null
+++ b/mcollective.fc
@@ -0,0 +1,3 @@
@@ -49850,7 +49850,7 @@ index 0000000..821bf88
+/usr/libexec/mcollective/update_yaml\.rb -- gen_context(system_u:object_r:mcollective_exec_t,s0)
diff --git a/mcollective.if b/mcollective.if
new file mode 100644
-index 0000000..3f433f1
+index 000000000..3f433f1e2
--- /dev/null
+++ b/mcollective.if
@@ -0,0 +1,109 @@
@@ -49965,7 +49965,7 @@ index 0000000..3f433f1
+')
diff --git a/mcollective.te b/mcollective.te
new file mode 100644
-index 0000000..8bc27f4
+index 000000000..8bc27f4c5
--- /dev/null
+++ b/mcollective.te
@@ -0,0 +1,27 @@
@@ -49997,7 +49997,7 @@ index 0000000..8bc27f4
+domain_use_interactive_fds(mcollective_t)
+
diff --git a/mediawiki.fc b/mediawiki.fc
-index 99f7c41..1745603 100644
+index 99f7c4187..174560318 100644
--- a/mediawiki.fc
+++ b/mediawiki.fc
@@ -1,8 +1,8 @@
@@ -50016,7 +50016,7 @@ index 99f7c41..1745603 100644
+/var/www/wiki[0-9]?(/.*)? gen_context(system_u:object_r:mediawiki_rw_content_t,s0)
+/var/www/wiki[0-9]?\.php -- gen_context(system_u:object_r:mediawiki_content_t,s0)
diff --git a/mediawiki.if b/mediawiki.if
-index 9771b4b..9b183e6 100644
+index 9771b4ba3..9b183e62b 100644
--- a/mediawiki.if
+++ b/mediawiki.if
@@ -1 +1,40 @@
@@ -50062,7 +50062,7 @@ index 9771b4b..9b183e6 100644
+ delete_files_pattern($1, mediawiki_tmp_t, mediawiki_tmp_t)
+')
diff --git a/mediawiki.te b/mediawiki.te
-index c528b9f..fcbc191 100644
+index c528b9fa7..fcbc1911c 100644
--- a/mediawiki.te
+++ b/mediawiki.te
@@ -5,13 +5,26 @@ policy_module(mediawiki, 1.0.0)
@@ -50096,7 +50096,7 @@ index c528b9f..fcbc191 100644
+ miscfiles_read_tetex_data(mediawiki_script_t)
+')
diff --git a/memcached.if b/memcached.if
-index 1d4eb19..650014e 100644
+index 1d4eb19b8..650014e0f 100644
--- a/memcached.if
+++ b/memcached.if
@@ -1,4 +1,4 @@
@@ -50233,7 +50233,7 @@ index 1d4eb19..650014e 100644
admin_pattern($1, memcached_var_run_t)
')
diff --git a/memcached.te b/memcached.te
-index 29b7521..68ec663 100644
+index 29b752160..68ec663c2 100644
--- a/memcached.te
+++ b/memcached.te
@@ -20,7 +20,7 @@ files_pid_file(memcached_var_run_t)
@@ -50251,7 +50251,7 @@ index 29b7521..68ec663 100644
-miscfiles_read_localization(memcached_t)
diff --git a/milter.fc b/milter.fc
-index 89409eb..67e42f6 100644
+index 89409ebbc..67e42f6a9 100644
--- a/milter.fc
+++ b/milter.fc
@@ -1,18 +1,29 @@
@@ -50295,7 +50295,7 @@ index 89409eb..67e42f6 100644
+/var/spool/opendkim(/.*)? gen_context(system_u:object_r:dkim_milter_data_t,s0)
+/var/spool/opendmarc(/.*)? gen_context(system_u:object_r:dkim_milter_data_t,s0)
diff --git a/milter.if b/milter.if
-index cba62db..562833a 100644
+index cba62db12..562833a81 100644
--- a/milter.if
+++ b/milter.if
@@ -1,47 +1,43 @@
@@ -50433,7 +50433,7 @@ index cba62db..562833a 100644
+ delete_files_pattern($1, dkim_milter_data_t, dkim_milter_data_t)
+')
diff --git a/milter.te b/milter.te
-index 4dc99f4..48e3f38 100644
+index 4dc99f464..48e3f3813 100644
--- a/milter.te
+++ b/milter.te
@@ -5,73 +5,117 @@ policy_module(milter, 1.5.0)
@@ -50634,7 +50634,7 @@ index 4dc99f4..48e3f38 100644
spamassassin_domtrans_client(spamass_milter_t)
')
diff --git a/minissdpd.if b/minissdpd.if
-index b330161..5450937 100644
+index b3301610f..54509375e 100644
--- a/minissdpd.if
+++ b/minissdpd.if
@@ -39,10 +39,10 @@ interface(`minissdpd_read_config',`
@@ -50652,7 +50652,7 @@ index b330161..5450937 100644
init_labeled_script_domtrans($1, minissdpd_initrc_exec_t)
diff --git a/mip6d.fc b/mip6d.fc
new file mode 100644
-index 0000000..767bbad
+index 000000000..767bbad7b
--- /dev/null
+++ b/mip6d.fc
@@ -0,0 +1,3 @@
@@ -50661,7 +50661,7 @@ index 0000000..767bbad
+/usr/sbin/mip6d -- gen_context(system_u:object_r:mip6d_exec_t,s0)
diff --git a/mip6d.if b/mip6d.if
new file mode 100644
-index 0000000..861b486
+index 000000000..861b486dc
--- /dev/null
+++ b/mip6d.if
@@ -0,0 +1,80 @@
@@ -50747,7 +50747,7 @@ index 0000000..861b486
+')
diff --git a/mip6d.te b/mip6d.te
new file mode 100644
-index 0000000..0f290e9
+index 000000000..0f290e9d4
--- /dev/null
+++ b/mip6d.te
@@ -0,0 +1,33 @@
@@ -50786,7 +50786,7 @@ index 0000000..0f290e9
+
diff --git a/mirrormanager.fc b/mirrormanager.fc
new file mode 100644
-index 0000000..abd53a4
+index 000000000..abd53a4c7
--- /dev/null
+++ b/mirrormanager.fc
@@ -0,0 +1,7 @@
@@ -50799,7 +50799,7 @@ index 0000000..abd53a4
+/var/run/mirrormanager(/.*)? gen_context(system_u:object_r:mirrormanager_var_run_t,s0)
diff --git a/mirrormanager.if b/mirrormanager.if
new file mode 100644
-index 0000000..86467cf
+index 000000000..86467cffb
--- /dev/null
+++ b/mirrormanager.if
@@ -0,0 +1,256 @@
@@ -51061,7 +51061,7 @@ index 0000000..86467cf
+')
diff --git a/mirrormanager.te b/mirrormanager.te
new file mode 100644
-index 0000000..f59af1b
+index 000000000..f59af1b98
--- /dev/null
+++ b/mirrormanager.te
@@ -0,0 +1,46 @@
@@ -51113,7 +51113,7 @@ index 0000000..f59af1b
+')
diff --git a/mock.fc b/mock.fc
new file mode 100644
-index 0000000..394bc46
+index 000000000..394bc4658
--- /dev/null
+++ b/mock.fc
@@ -0,0 +1,7 @@
@@ -51126,7 +51126,7 @@ index 0000000..394bc46
+/var/cache/mock(/.*)? gen_context(system_u:object_r:mock_cache_t,s0)
diff --git a/mock.if b/mock.if
new file mode 100644
-index 0000000..f5b98e6
+index 000000000..f5b98e6de
--- /dev/null
+++ b/mock.if
@@ -0,0 +1,311 @@
@@ -51443,7 +51443,7 @@ index 0000000..f5b98e6
+')
diff --git a/mock.te b/mock.te
new file mode 100644
-index 0000000..f647022
+index 000000000..f647022cb
--- /dev/null
+++ b/mock.te
@@ -0,0 +1,288 @@
@@ -51736,7 +51736,7 @@ index 0000000..f647022
+ userdom_read_user_home_content_files(mock_build_t)
+')
diff --git a/modemmanager.fc b/modemmanager.fc
-index a83894c..481dca3 100644
+index a83894c6e..481dca3ff 100644
--- a/modemmanager.fc
+++ b/modemmanager.fc
@@ -1 +1,4 @@
@@ -51745,7 +51745,7 @@ index a83894c..481dca3 100644
+
+/usr/lib/systemd/system/ModemManager.service -- gen_context(system_u:object_r:modemmanager_unit_file_t,s0)
diff --git a/modemmanager.if b/modemmanager.if
-index b1ac8b5..24782b3 100644
+index b1ac8b5d8..24782b35f 100644
--- a/modemmanager.if
+++ b/modemmanager.if
@@ -21,6 +21,31 @@ interface(`modemmanager_domtrans',`
@@ -51815,7 +51815,7 @@ index b1ac8b5..24782b3 100644
+ ')
+')
diff --git a/modemmanager.te b/modemmanager.te
-index d15eb5b..ad481ce 100644
+index d15eb5b64..ad481cee4 100644
--- a/modemmanager.te
+++ b/modemmanager.te
@@ -11,6 +11,9 @@ init_daemon_domain(modemmanager_t, modemmanager_exec_t)
@@ -51871,7 +51871,7 @@ index d15eb5b..ad481ce 100644
optional_policy(`
diff --git a/mojomojo.fc b/mojomojo.fc
-index 7b827ca..5ee8a0f 100644
+index 7b827ca7f..5ee8a0f2b 100644
--- a/mojomojo.fc
+++ b/mojomojo.fc
@@ -1,5 +1,5 @@
@@ -51884,7 +51884,7 @@ index 7b827ca..5ee8a0f 100644
-/var/lib/mojomojo(/.*)? gen_context(system_u:object_r:httpd_mojomojo_rw_content_t,s0)
+/var/lib/mojomojo(/.*)? gen_context(system_u:object_r:mojomojo_rw_content_t,s0)
diff --git a/mojomojo.if b/mojomojo.if
-index 73952f4..b19a6ee 100644
+index 73952f4c9..b19a6ee2d 100644
--- a/mojomojo.if
+++ b/mojomojo.if
@@ -15,7 +15,6 @@
@@ -51896,7 +51896,7 @@ index 73952f4..b19a6ee 100644
interface(`mojomojo_admin',`
refpolicywarn(`$0($*) has been deprecated, use apache_admin() instead.')
diff --git a/mojomojo.te b/mojomojo.te
-index b94102e..25d1d33 100644
+index b94102efd..25d1d33a1 100644
--- a/mojomojo.te
+++ b/mojomojo.te
@@ -5,21 +5,40 @@ policy_module(mojomojo, 1.1.0)
@@ -51950,7 +51950,7 @@ index b94102e..25d1d33 100644
+')
diff --git a/mon_statd.fc b/mon_statd.fc
new file mode 100644
-index 0000000..60c11c0
+index 000000000..60c11c060
--- /dev/null
+++ b/mon_statd.fc
@@ -0,0 +1,7 @@
@@ -51963,7 +51963,7 @@ index 0000000..60c11c0
+/var/run/fstatd.* -- gen_context(system_u:object_r:mon_statd_var_run_t,s0)
diff --git a/mon_statd.if b/mon_statd.if
new file mode 100644
-index 0000000..1ce3e44
+index 000000000..1ce3e4428
--- /dev/null
+++ b/mon_statd.if
@@ -0,0 +1,39 @@
@@ -52008,7 +52008,7 @@ index 0000000..1ce3e44
+')
diff --git a/mon_statd.te b/mon_statd.te
new file mode 100644
-index 0000000..e7220a5
+index 000000000..e7220a5a8
--- /dev/null
+++ b/mon_statd.te
@@ -0,0 +1,76 @@
@@ -52089,7 +52089,7 @@ index 0000000..e7220a5
+logging_send_syslog_msg(mon_procd_t)
+
diff --git a/mongodb.fc b/mongodb.fc
-index 6fcfc31..e9e6bc5 100644
+index 6fcfc31b4..e9e6bc51c 100644
--- a/mongodb.fc
+++ b/mongodb.fc
@@ -1,9 +1,19 @@
@@ -52116,7 +52116,7 @@ index 6fcfc31..e9e6bc5 100644
+/var/run/mongo.* gen_context(system_u:object_r:mongod_var_run_t,s0)
+/var/run/aeolus/dbomatic\.pid -- gen_context(system_u:object_r:mongod_var_run_t,s0)
diff --git a/mongodb.te b/mongodb.te
-index 169f236..eaaeb0d 100644
+index 169f236e8..eaaeb0d8b 100644
--- a/mongodb.te
+++ b/mongodb.te
@@ -12,6 +12,9 @@ init_daemon_domain(mongod_t, mongod_exec_t)
@@ -52214,7 +52214,7 @@ index 169f236..eaaeb0d 100644
+')
+
diff --git a/mono.te b/mono.te
-index a6a8643..c0f6cf5 100644
+index a6a86439f..c0f6cf503 100644
--- a/mono.te
+++ b/mono.te
@@ -28,7 +28,7 @@ allow mono_domain self:process { signal getsched execheap execmem execstack };
@@ -52227,7 +52227,7 @@ index a6a8643..c0f6cf5 100644
init_dbus_chat_script(mono_t)
diff --git a/monop.if b/monop.if
-index 8fdaece..5440757 100644
+index 8fdaecea2..544075765 100644
--- a/monop.if
+++ b/monop.if
@@ -31,7 +31,7 @@ interface(`monop_admin',`
@@ -52240,7 +52240,7 @@ index 8fdaece..5440757 100644
files_search_pids($1)
diff --git a/monop.te b/monop.te
-index 5f93763..8596763 100644
+index 5f9376384..8596763e7 100644
--- a/monop.te
+++ b/monop.te
@@ -43,7 +43,6 @@ kernel_read_kernel_sysctls(monopd_t)
@@ -52269,7 +52269,7 @@ index 5f93763..8596763 100644
userdom_dontaudit_use_unpriv_user_fds(monopd_t)
diff --git a/motion.fc b/motion.fc
new file mode 100644
-index 0000000..7415106
+index 000000000..74151069b
--- /dev/null
+++ b/motion.fc
@@ -0,0 +1,9 @@
@@ -52284,7 +52284,7 @@ index 0000000..7415106
+/var/motion(/.*)? gen_context(system_u:object_r:motion_data_t,s0)
diff --git a/motion.if b/motion.if
new file mode 100644
-index 0000000..edfd267
+index 000000000..edfd26777
--- /dev/null
+++ b/motion.if
@@ -0,0 +1,198 @@
@@ -52488,7 +52488,7 @@ index 0000000..edfd267
+')
diff --git a/motion.te b/motion.te
new file mode 100644
-index 0000000..c7f4eb5
+index 000000000..c7f4eb583
--- /dev/null
+++ b/motion.te
@@ -0,0 +1,65 @@
@@ -52558,7 +52558,7 @@ index 0000000..c7f4eb5
+')
+
diff --git a/mozilla.fc b/mozilla.fc
-index 6ffaba2..549fb8c 100644
+index 6ffaba2e4..549fb8cdd 100644
--- a/mozilla.fc
+++ b/mozilla.fc
@@ -1,38 +1,72 @@
@@ -52669,7 +52669,7 @@ index 6ffaba2..549fb8c 100644
+/usr/lib/nspluginwrapper/plugin-config -- gen_context(system_u:object_r:mozilla_plugin_config_exec_t,s0)
+')
diff --git a/mozilla.if b/mozilla.if
-index 6194b80..e27c53d 100644
+index 6194b806b..e27c53d6e 100644
--- a/mozilla.if
+++ b/mozilla.if
@@ -1,146 +1,75 @@
@@ -53497,7 +53497,7 @@ index 6194b80..e27c53d 100644
')
+
diff --git a/mozilla.te b/mozilla.te
-index 11ac8e4..7d5d385 100644
+index 11ac8e4fc..7d5d385a2 100644
--- a/mozilla.te
+++ b/mozilla.te
@@ -6,17 +6,56 @@ policy_module(mozilla, 2.8.0)
@@ -54573,7 +54573,7 @@ index 11ac8e4..7d5d385 100644
+ corenet_udp_bind_all_unreserved_ports(mozilla_plugin_t)
')
diff --git a/mpd.fc b/mpd.fc
-index 313ce52..ae93e07 100644
+index 313ce521c..ae93e07eb 100644
--- a/mpd.fc
+++ b/mpd.fc
@@ -1,3 +1,5 @@
@@ -54589,7 +54589,7 @@ index 313ce52..ae93e07 100644
+
+/var/run/mpd(/.*)? gen_context(system_u:object_r:mpd_var_run_t,s0)
diff --git a/mpd.if b/mpd.if
-index 5fa77c7..2e01c7d 100644
+index 5fa77c7e6..2e01c7d0a 100644
--- a/mpd.if
+++ b/mpd.if
@@ -322,6 +322,25 @@ interface(`mpd_manage_lib_dirs',`
@@ -54634,7 +54634,7 @@ index 5fa77c7..2e01c7d 100644
domain_system_change_exemption($1)
role_transition $2 mpd_initrc_exec_t system_r;
diff --git a/mpd.te b/mpd.te
-index fe72523..062ad64 100644
+index fe7252355..062ad640a 100644
--- a/mpd.te
+++ b/mpd.te
@@ -62,18 +62,25 @@ files_type(mpd_var_lib_t)
@@ -54755,7 +54755,7 @@ index fe72523..062ad64 100644
')
diff --git a/mplayer.if b/mplayer.if
-index 861d5e9..1c3d5a5 100644
+index 861d5e974..1c3d5a538 100644
--- a/mplayer.if
+++ b/mplayer.if
@@ -161,3 +161,23 @@ interface(`mplayer_home_filetrans_mplayer_home',`
@@ -54783,7 +54783,7 @@ index 861d5e9..1c3d5a5 100644
+ userdom_user_home_dir_filetrans($1, mplayer_home_t, dir, ".mplayer")
+')
diff --git a/mplayer.te b/mplayer.te
-index 0f03cd9..e3ed393 100644
+index 0f03cd937..e3ed3933d 100644
--- a/mplayer.te
+++ b/mplayer.te
@@ -11,7 +11,7 @@ policy_module(mplayer, 2.5.0)
@@ -54879,7 +54879,7 @@ index 0f03cd9..e3ed393 100644
')
diff --git a/mrtg.if b/mrtg.if
-index c595094..2346458 100644
+index c595094a6..23464583b 100644
--- a/mrtg.if
+++ b/mrtg.if
@@ -2,6 +2,25 @@
@@ -54909,7 +54909,7 @@ index c595094..2346458 100644
##
##
diff --git a/mrtg.te b/mrtg.te
-index 65a246a..fa86320 100644
+index 65a246a52..fa8632064 100644
--- a/mrtg.te
+++ b/mrtg.te
@@ -65,7 +65,6 @@ kernel_read_kernel_sysctls(mrtg_t)
@@ -54945,7 +54945,7 @@ index 65a246a..fa86320 100644
netutils_domtrans_ping(mrtg_t)
diff --git a/mta.fc b/mta.fc
-index f42896c..fce39c1 100644
+index f42896cbf..fce39c1ce 100644
--- a/mta.fc
+++ b/mta.fc
@@ -1,34 +1,39 @@
@@ -55007,7 +55007,7 @@ index f42896c..fce39c1 100644
+/var/spool/mail(/.*)? gen_context(system_u:object_r:mail_spool_t,s0)
+/var/spool/smtpd(/.*)? gen_context(system_u:object_r:mail_spool_t,s0)
diff --git a/mta.if b/mta.if
-index ed81cac..cd52baf 100644
+index ed81cac5a..cd52baf59 100644
--- a/mta.if
+++ b/mta.if
@@ -1,4 +1,4 @@
@@ -56174,7 +56174,7 @@ index ed81cac..cd52baf 100644
+ mta_filetrans_admin_home_content($1)
+')
diff --git a/mta.te b/mta.te
-index ff1d68c..94b1dfc 100644
+index ff1d68c6a..94b1dfca7 100644
--- a/mta.te
+++ b/mta.te
@@ -14,8 +14,6 @@ attribute mailserver_sender;
@@ -56639,7 +56639,7 @@ index ff1d68c..94b1dfc 100644
+
+
diff --git a/munin.fc b/munin.fc
-index eb4b72a..4ea6ce7 100644
+index eb4b72a92..4ea6ce7e2 100644
--- a/munin.fc
+++ b/munin.fc
@@ -1,77 +1,78 @@
@@ -56768,7 +56768,7 @@ index eb4b72a..4ea6ce7 100644
+/var/www/html/cgi/munin.* gen_context(system_u:object_r:munin_script_exec_t,s0)
+/var/www/cgi-bin/munin.* gen_context(system_u:object_r:munin_script_exec_t,s0)
diff --git a/munin.if b/munin.if
-index b744fe3..cb0e2af 100644
+index b744fe35e..cb0e2af61 100644
--- a/munin.if
+++ b/munin.if
@@ -1,12 +1,13 @@
@@ -56981,7 +56981,7 @@ index b744fe3..cb0e2af 100644
+ admin_pattern($1, munin_content_t)
')
diff --git a/munin.te b/munin.te
-index b708708..1ea095c 100644
+index b70870816..1ea095ce8 100644
--- a/munin.te
+++ b/munin.te
@@ -44,41 +44,40 @@ files_tmpfs_file(services_munin_plugin_tmpfs_t)
@@ -57259,7 +57259,7 @@ index b708708..1ea095c 100644
+ apache_search_sys_content(munin_t)
+')
diff --git a/mysql.fc b/mysql.fc
-index 06f8666..2accd90 100644
+index 06f8666df..2accd90d2 100644
--- a/mysql.fc
+++ b/mysql.fc
@@ -1,27 +1,46 @@
@@ -57326,7 +57326,7 @@ index 06f8666..2accd90 100644
+/var/run/mysqld(/.*)? gen_context(system_u:object_r:mysqld_var_run_t,s0)
+/var/run/mysqld/mysqlmanager.* -- gen_context(system_u:object_r:mysqlmanagerd_var_run_t,s0)
diff --git a/mysql.if b/mysql.if
-index 687af38..5381f1b 100644
+index 687af38bb..5381f1b39 100644
--- a/mysql.if
+++ b/mysql.if
@@ -1,23 +1,4 @@
@@ -57879,7 +57879,7 @@ index 687af38..5381f1b 100644
+ mysql_stream_connect($1)
')
diff --git a/mysql.te b/mysql.te
-index 7584bbe..a89f6d6 100644
+index 7584bbe7c..a89f6d665 100644
--- a/mysql.te
+++ b/mysql.te
@@ -6,20 +6,22 @@ policy_module(mysql, 1.14.1)
@@ -58205,7 +58205,7 @@ index 7584bbe..a89f6d6 100644
+userdom_getattr_user_home_dirs(mysqlmanagerd_t)
diff --git a/mythtv.fc b/mythtv.fc
new file mode 100644
-index 0000000..d62cf88
+index 000000000..d62cf886e
--- /dev/null
+++ b/mythtv.fc
@@ -0,0 +1,9 @@
@@ -58220,7 +58220,7 @@ index 0000000..d62cf88
+/usr/share/mythtv/mythweather/scripts(/.*)? gen_context(system_u:object_r:mythtv_script_exec_t,s0)
diff --git a/mythtv.if b/mythtv.if
new file mode 100644
-index 0000000..e2403dd
+index 000000000..e2403dd50
--- /dev/null
+++ b/mythtv.if
@@ -0,0 +1,152 @@
@@ -58378,7 +58378,7 @@ index 0000000..e2403dd
+')
diff --git a/mythtv.te b/mythtv.te
new file mode 100644
-index 0000000..0e585e3
+index 000000000..0e585e3c5
--- /dev/null
+++ b/mythtv.te
@@ -0,0 +1,47 @@
@@ -58431,7 +58431,7 @@ index 0000000..0e585e3
+')
diff --git a/naemon.fc b/naemon.fc
new file mode 100644
-index 0000000..85407d3
+index 000000000..85407d337
--- /dev/null
+++ b/naemon.fc
@@ -0,0 +1,11 @@
@@ -58448,7 +58448,7 @@ index 0000000..85407d3
+/var/run/naemon(/.*)? gen_context(system_u:object_r:naemon_var_run_t,s0)
diff --git a/naemon.if b/naemon.if
new file mode 100644
-index 0000000..e904df0
+index 000000000..e904df027
--- /dev/null
+++ b/naemon.if
@@ -0,0 +1,305 @@
@@ -58759,7 +58759,7 @@ index 0000000..e904df0
+')
diff --git a/naemon.te b/naemon.te
new file mode 100644
-index 0000000..79f1250
+index 000000000..79f1250eb
--- /dev/null
+++ b/naemon.te
@@ -0,0 +1,59 @@
@@ -58823,7 +58823,7 @@ index 0000000..79f1250
+
+fs_getattr_xattr_fs(naemon_t)
diff --git a/nagios.fc b/nagios.fc
-index d78dfc3..c781b72 100644
+index d78dfc38d..c781b72bb 100644
--- a/nagios.fc
+++ b/nagios.fc
@@ -1,88 +1,113 @@
@@ -59016,7 +59016,7 @@ index d78dfc3..c781b72 100644
+/usr/lib/icinga/plugins/eventhandlers(/.*) gen_context(system_u:object_r:nagios_eventhandler_plugin_exec_t,s0)
+
diff --git a/nagios.if b/nagios.if
-index 0641e97..f3b1111 100644
+index 0641e970f..f3b111172 100644
--- a/nagios.if
+++ b/nagios.if
@@ -1,12 +1,13 @@
@@ -59331,7 +59331,7 @@ index 0641e97..f3b1111 100644
+ admin_pattern($1, nrpe_etc_t)
')
diff --git a/nagios.te b/nagios.te
-index 7b3e682..00af8b3 100644
+index 7b3e682e6..00af8b3b9 100644
--- a/nagios.te
+++ b/nagios.te
@@ -5,6 +5,25 @@ policy_module(nagios, 1.13.0)
@@ -59807,7 +59807,7 @@ index 7b3e682..00af8b3 100644
optional_policy(`
diff --git a/namespace.fc b/namespace.fc
new file mode 100644
-index 0000000..ce51c8d
+index 000000000..ce51c8d4f
--- /dev/null
+++ b/namespace.fc
@@ -0,0 +1,3 @@
@@ -59816,7 +59816,7 @@ index 0000000..ce51c8d
+
diff --git a/namespace.if b/namespace.if
new file mode 100644
-index 0000000..8d7c751
+index 000000000..8d7c75157
--- /dev/null
+++ b/namespace.if
@@ -0,0 +1,48 @@
@@ -59870,7 +59870,7 @@ index 0000000..8d7c751
+')
diff --git a/namespace.te b/namespace.te
new file mode 100644
-index 0000000..814e62e
+index 000000000..814e62e4f
--- /dev/null
+++ b/namespace.te
@@ -0,0 +1,41 @@
@@ -59916,7 +59916,7 @@ index 0000000..814e62e
+userdom_relabelto_user_home_files(namespace_init_t)
+userdom_filetrans_home_content(namespace_init_t)
diff --git a/ncftool.if b/ncftool.if
-index db9578f..4309e3d 100644
+index db9578f4e..4309e3da5 100644
--- a/ncftool.if
+++ b/ncftool.if
@@ -38,9 +38,11 @@ interface(`ncftool_domtrans',`
@@ -59932,7 +59932,7 @@ index db9578f..4309e3d 100644
')
+
diff --git a/ncftool.te b/ncftool.te
-index 71f30ba..d616860 100644
+index 71f30ba60..d61686078 100644
--- a/ncftool.te
+++ b/ncftool.te
@@ -22,13 +22,14 @@ role ncftool_roles types ncftool_t;
@@ -59991,7 +59991,7 @@ index 71f30ba..d616860 100644
optional_policy(`
diff --git a/nessus.te b/nessus.te
-index fe1068b..98166ee 100644
+index fe1068ba5..98166ee0b 100644
--- a/nessus.te
+++ b/nessus.te
@@ -58,7 +58,6 @@ kernel_read_kernel_sysctls(nessusd_t)
@@ -60020,7 +60020,7 @@ index fe1068b..98166ee 100644
userdom_dontaudit_use_unpriv_user_fds(nessusd_t)
diff --git a/networkmanager.fc b/networkmanager.fc
-index 94b9734..448a7e8 100644
+index 94b973407..448a7e836 100644
--- a/networkmanager.fc
+++ b/networkmanager.fc
@@ -1,44 +1,46 @@
@@ -60092,7 +60092,7 @@ index 94b9734..448a7e8 100644
+/var/run/wpa_supplicant(/.*)? gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
/var/run/wpa_supplicant-global -s gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
diff --git a/networkmanager.if b/networkmanager.if
-index 86dc29d..c7d9376 100644
+index 86dc29dfa..c7d9376d5 100644
--- a/networkmanager.if
+++ b/networkmanager.if
@@ -2,7 +2,7 @@
@@ -60635,7 +60635,7 @@ index 86dc29d..c7d9376 100644
+ logging_log_filetrans($1, NetworkManager_var_lib_t, file, "wpa_supplicant.log")
')
diff --git a/networkmanager.te b/networkmanager.te
-index 55f2009..4419e35 100644
+index 55f20095e..4419e3531 100644
--- a/networkmanager.te
+++ b/networkmanager.te
@@ -9,15 +9,18 @@ type NetworkManager_t;
@@ -61092,7 +61092,7 @@ index 55f2009..4419e35 100644
term_dontaudit_use_console(wpa_cli_t)
diff --git a/ninfod.fc b/ninfod.fc
new file mode 100644
-index 0000000..cc31b9f
+index 000000000..cc31b9f27
--- /dev/null
+++ b/ninfod.fc
@@ -0,0 +1,6 @@
@@ -61104,7 +61104,7 @@ index 0000000..cc31b9f
+
diff --git a/ninfod.if b/ninfod.if
new file mode 100644
-index 0000000..409de8c
+index 000000000..409de8c3e
--- /dev/null
+++ b/ninfod.if
@@ -0,0 +1,80 @@
@@ -61190,7 +61190,7 @@ index 0000000..409de8c
+')
diff --git a/ninfod.te b/ninfod.te
new file mode 100644
-index 0000000..b3aa3ce
+index 000000000..b3aa3ce13
--- /dev/null
+++ b/ninfod.te
@@ -0,0 +1,36 @@
@@ -61231,7 +61231,7 @@ index 0000000..b3aa3ce
+
+sysnet_dns_name_resolve(ninfod_t)
diff --git a/nis.fc b/nis.fc
-index 8aa1bfa..cd0e015 100644
+index 8aa1bfa28..cd0e015f8 100644
--- a/nis.fc
+++ b/nis.fc
@@ -2,21 +2,26 @@
@@ -61266,7 +61266,7 @@ index 8aa1bfa..cd0e015 100644
+/usr/lib/systemd/system/yppasswdd.* -- gen_context(system_u:object_r:nis_unit_file_t,s0)
+/usr/lib/systemd/system/ypxfrd.* -- gen_context(system_u:object_r:nis_unit_file_t,s0)
diff --git a/nis.if b/nis.if
-index 46e55c3..afe399a 100644
+index 46e55c3ff..afe399a0e 100644
--- a/nis.if
+++ b/nis.if
@@ -1,4 +1,4 @@
@@ -61536,7 +61536,7 @@ index 46e55c3..afe399a 100644
+ allow $1 nis_unit_file_t:service all_service_perms;
')
diff --git a/nis.te b/nis.te
-index 3a6b035..5145db5 100644
+index 3a6b0352e..5145db555 100644
--- a/nis.te
+++ b/nis.te
@@ -5,8 +5,6 @@ policy_module(nis, 1.12.0)
@@ -61848,7 +61848,7 @@ index 3a6b035..5145db5 100644
sysnet_read_config(ypxfr_t)
diff --git a/nova.fc b/nova.fc
new file mode 100644
-index 0000000..b5fab0e
+index 000000000..b5fab0e6a
--- /dev/null
+++ b/nova.fc
@@ -0,0 +1,25 @@
@@ -61879,7 +61879,7 @@ index 0000000..b5fab0e
+/var/run/nova(/.*)? gen_context(system_u:object_r:nova_var_run_t,s0)
diff --git a/nova.if b/nova.if
new file mode 100644
-index 0000000..e328327
+index 000000000..e32832705
--- /dev/null
+++ b/nova.if
@@ -0,0 +1,47 @@
@@ -61932,7 +61932,7 @@ index 0000000..e328327
+')
diff --git a/nova.te b/nova.te
new file mode 100644
-index 0000000..2259a51
+index 000000000..2259a5192
--- /dev/null
+++ b/nova.te
@@ -0,0 +1,203 @@
@@ -62140,7 +62140,7 @@ index 0000000..2259a51
+')
+
diff --git a/nscd.fc b/nscd.fc
-index ba64485..429bd79 100644
+index ba6448507..429bd799c 100644
--- a/nscd.fc
+++ b/nscd.fc
@@ -1,13 +1,15 @@
@@ -62165,7 +62165,7 @@ index ba64485..429bd79 100644
+
+/usr/lib/systemd/system/nscd\.service -- gen_context(system_u:object_r:nscd_unit_file_t,s0)
diff --git a/nscd.if b/nscd.if
-index 8f2ab09..8ca8a6f 100644
+index 8f2ab09f5..8ca8a6f26 100644
--- a/nscd.if
+++ b/nscd.if
@@ -1,8 +1,8 @@
@@ -62482,7 +62482,7 @@ index 8f2ab09..8ca8a6f 100644
+ allow $1 nscd_unit_file_t:service all_service_perms;
')
diff --git a/nscd.te b/nscd.te
-index bcd7d0a..0188086 100644
+index bcd7d0a7d..0188086f9 100644
--- a/nscd.te
+++ b/nscd.te
@@ -4,33 +4,34 @@ gen_require(`
@@ -62672,7 +62672,7 @@ index bcd7d0a..0188086 100644
+ unconfined_dontaudit_rw_packet_sockets(nscd_t)
+')
diff --git a/nsd.fc b/nsd.fc
-index 4f2b1b6..6b300d5 100644
+index 4f2b1b663..6b300d54f 100644
--- a/nsd.fc
+++ b/nsd.fc
@@ -1,16 +1,19 @@
@@ -62706,7 +62706,7 @@ index 4f2b1b6..6b300d5 100644
+
+/var/log/nsd\.log -- gen_context(system_u:object_r:nsd_log_t,s0)
diff --git a/nsd.if b/nsd.if
-index a9c60ff..ad4f14a 100644
+index a9c60ff87..ad4f14ad6 100644
--- a/nsd.if
+++ b/nsd.if
@@ -1,8 +1,8 @@
@@ -62795,7 +62795,7 @@ index a9c60ff..ad4f14a 100644
+ refpolicywarn(`$0($*) has been deprecated.')
')
diff --git a/nsd.te b/nsd.te
-index 47bb1d2..1e55673 100644
+index 47bb1d204..1e5567367 100644
--- a/nsd.te
+++ b/nsd.te
@@ -9,9 +9,7 @@ type nsd_t;
@@ -62987,7 +62987,7 @@ index 47bb1d2..1e55673 100644
cron_system_entry(nsd_crond_t, nsd_exec_t)
')
diff --git a/nslcd.fc b/nslcd.fc
-index 402100e..ce913b2 100644
+index 402100e40..ce913b244 100644
--- a/nslcd.fc
+++ b/nslcd.fc
@@ -1,7 +1,4 @@
@@ -63003,7 +63003,7 @@ index 402100e..ce913b2 100644
+/usr/sbin/nslcd -- gen_context(system_u:object_r:nslcd_exec_t,s0)
+/var/run/nslcd(/.*)? gen_context(system_u:object_r:nslcd_var_run_t,s0)
diff --git a/nslcd.if b/nslcd.if
-index 97df768..852d1c6 100644
+index 97df768d9..852d1c6c7 100644
--- a/nslcd.if
+++ b/nslcd.if
@@ -1,4 +1,4 @@
@@ -63121,7 +63121,7 @@ index 97df768..852d1c6 100644
+ admin_pattern($1, nslcd_var_run_t, nslcd_var_run_t)
')
diff --git a/nslcd.te b/nslcd.te
-index 421bf1a..1be3b6b 100644
+index 421bf1a56..1be3b6b30 100644
--- a/nslcd.te
+++ b/nslcd.te
@@ -20,12 +20,12 @@ files_config_file(nslcd_conf_t)
@@ -63182,7 +63182,7 @@ index 421bf1a..1be3b6b 100644
+
diff --git a/nsplugin.fc b/nsplugin.fc
new file mode 100644
-index 0000000..22e6c96
+index 000000000..22e6c963c
--- /dev/null
+++ b/nsplugin.fc
@@ -0,0 +1,11 @@
@@ -63199,7 +63199,7 @@ index 0000000..22e6c96
+/usr/lib/mozilla/plugins-wrapped(/.*)? gen_context(system_u:object_r:nsplugin_rw_t,s0)
diff --git a/nsplugin.if b/nsplugin.if
new file mode 100644
-index 0000000..bceb527
+index 000000000..bceb5271e
--- /dev/null
+++ b/nsplugin.if
@@ -0,0 +1,474 @@
@@ -63679,7 +63679,7 @@ index 0000000..bceb527
+')
diff --git a/nsplugin.te b/nsplugin.te
new file mode 100644
-index 0000000..7d839fe
+index 000000000..7d839fe6e
--- /dev/null
+++ b/nsplugin.te
@@ -0,0 +1,318 @@
@@ -64002,7 +64002,7 @@ index 0000000..7d839fe
+ pulseaudio_setattr_home_dir(nsplugin_t)
+')
diff --git a/ntop.te b/ntop.te
-index 8ec7859..c696f67 100644
+index 8ec78595b..c696f6765 100644
--- a/ntop.te
+++ b/ntop.te
@@ -29,10 +29,11 @@ files_pid_file(ntop_var_run_t)
@@ -64051,7 +64051,7 @@ index 8ec7859..c696f67 100644
')
diff --git a/ntp.fc b/ntp.fc
-index af3c91e..3e5f9cf 100644
+index af3c91e70..3e5f9cfa6 100644
--- a/ntp.fc
+++ b/ntp.fc
@@ -11,9 +11,13 @@
@@ -64069,7 +64069,7 @@ index af3c91e..3e5f9cf 100644
/var/log/ntp.* -- gen_context(system_u:object_r:ntpd_log_t,s0)
diff --git a/ntp.if b/ntp.if
-index e96a309..4245308 100644
+index e96a309a5..42453089c 100644
--- a/ntp.if
+++ b/ntp.if
@@ -1,4 +1,4 @@
@@ -64311,7 +64311,7 @@ index e96a309..4245308 100644
+')
+
diff --git a/ntp.te b/ntp.te
-index f81b113..4e9e52e 100644
+index f81b113c7..4e9e52e1c 100644
--- a/ntp.te
+++ b/ntp.te
@@ -18,6 +18,9 @@ role ntpd_roles types ntpd_t;
@@ -64440,7 +64440,7 @@ index f81b113..4e9e52e 100644
udev_read_db(ntpd_t)
')
diff --git a/numad.fc b/numad.fc
-index 3488bb0..1f97624 100644
+index 3488bb0d3..1f9762420 100644
--- a/numad.fc
+++ b/numad.fc
@@ -1,7 +1,7 @@
@@ -64456,7 +64456,7 @@ index 3488bb0..1f97624 100644
-/var/run/numad\.pid -- gen_context(system_u:object_r:numad_var_run_t,s0)
+/var/run/numad\.pid -- gen_context(system_u:object_r:numad_var_run_t,s0)
diff --git a/numad.if b/numad.if
-index 0d3c270..f307835 100644
+index 0d3c270b9..f307835ce 100644
--- a/numad.if
+++ b/numad.if
@@ -1,39 +1,93 @@
@@ -64572,7 +64572,7 @@ index 0d3c270..f307835 100644
+ ')
')
diff --git a/numad.te b/numad.te
-index b0a1be4..303a927 100644
+index b0a1be482..303a9279f 100644
--- a/numad.te
+++ b/numad.te
@@ -8,37 +8,44 @@ policy_module(numad, 1.1.0)
@@ -64633,7 +64633,7 @@ index b0a1be4..303a927 100644
+ virt_ptrace(numad_t)
+')
diff --git a/nut.fc b/nut.fc
-index 379af96..fac7d7b 100644
+index 379af962c..fac7d7bc9 100644
--- a/nut.fc
+++ b/nut.fc
@@ -1,23 +1,16 @@
@@ -64668,7 +64668,7 @@ index 379af96..fac7d7b 100644
+/var/www/nut-cgi-bin/upsset\.cgi -- gen_context(system_u:object_r:nutups_cgi_script_exec_t,s0)
+/var/www/nut-cgi-bin/upsstats\.cgi -- gen_context(system_u:object_r:nutups_cgi_script_exec_t,s0)
diff --git a/nut.if b/nut.if
-index 57c0161..c554eb6 100644
+index 57c0161ed..c554eb6e1 100644
--- a/nut.if
+++ b/nut.if
@@ -1,39 +1,60 @@
@@ -64759,7 +64759,7 @@ index 57c0161..c554eb6 100644
+ ps_process_pattern($1, nut_t)
')
diff --git a/nut.te b/nut.te
-index 5b2cb0d..605b54b 100644
+index 5b2cb0d59..605b54b72 100644
--- a/nut.te
+++ b/nut.te
@@ -7,154 +7,155 @@ policy_module(nut, 1.3.0)
@@ -64993,7 +64993,7 @@ index 5b2cb0d..605b54b 100644
+ sysnet_dns_name_resolve(nutups_cgi_script_t)
')
diff --git a/nx.if b/nx.if
-index 251d681..50ae2a9 100644
+index 251d6816a..50ae2a94b 100644
--- a/nx.if
+++ b/nx.if
@@ -35,7 +35,9 @@ interface(`nx_read_home_files',`
@@ -65030,7 +65030,7 @@ index 251d681..50ae2a9 100644
+ filetrans_pattern($1, nx_server_var_lib_t, nx_server_home_ssh_t, dir, ".ssh")
+')
diff --git a/nx.te b/nx.te
-index 091f872..62a0b12 100644
+index 091f87272..62a0b1229 100644
--- a/nx.te
+++ b/nx.te
@@ -27,6 +27,9 @@ files_type(nx_server_var_lib_t)
@@ -65075,7 +65075,7 @@ index 091f872..62a0b12 100644
sysnet_read_config(nx_server_t)
diff --git a/oav.te b/oav.te
-index b09c4c4..995c3f6 100644
+index b09c4c412..995c3f6a6 100644
--- a/oav.te
+++ b/oav.te
@@ -95,7 +95,6 @@ dev_read_sysfs(scannerdaemon_t)
@@ -65087,14 +65087,14 @@ index b09c4c4..995c3f6 100644
files_search_var_lib(scannerdaemon_t)
diff --git a/obex.fc b/obex.fc
-index 03fa560..000c5fe 100644
+index 03fa56040..000c5fe7b 100644
--- a/obex.fc
+++ b/obex.fc
@@ -1 +1 @@
-/usr/bin/obex-data-server -- gen_context(system_u:object_r:obex_exec_t,s0)
+/usr/bin/obex-data-server -- gen_context(system_u:object_r:obex_exec_t,s0)
diff --git a/obex.if b/obex.if
-index 8635ea2..eec20b4 100644
+index 8635ea205..eec20b413 100644
--- a/obex.if
+++ b/obex.if
@@ -1,15 +1,50 @@
@@ -65241,7 +65241,7 @@ index 8635ea2..eec20b4 100644
+ obex_dbus_chat($2)
')
diff --git a/obex.te b/obex.te
-index cd29ea8..d01d2c8 100644
+index cd29ea899..d01d2c8e6 100644
--- a/obex.te
+++ b/obex.te
@@ -1,4 +1,4 @@
@@ -65287,7 +65287,7 @@ index cd29ea8..d01d2c8 100644
')
')
diff --git a/oddjob.fc b/oddjob.fc
-index dd1d9ef..c48733a 100644
+index dd1d9ef5a..c48733aa4 100644
--- a/oddjob.fc
+++ b/oddjob.fc
@@ -1,10 +1,12 @@
@@ -65309,7 +65309,7 @@ index dd1d9ef..c48733a 100644
-/var/run/oddjobd\.pid gen_context(system_u:object_r:oddjob_var_run_t,s0)
+/var/run/oddjobd\.pid gen_context(system_u:object_r:oddjob_var_run_t,s0)
diff --git a/oddjob.if b/oddjob.if
-index c87bd2a..6180fba 100644
+index c87bd2a30..6180fba1f 100644
--- a/oddjob.if
+++ b/oddjob.if
@@ -1,4 +1,8 @@
@@ -65550,7 +65550,7 @@ index c87bd2a..6180fba 100644
+ allow $1 oddjob_mkhomedir_exec_t:file entrypoint;
')
diff --git a/oddjob.te b/oddjob.te
-index e403097..c60887d 100644
+index e403097c6..c60887de2 100644
--- a/oddjob.te
+++ b/oddjob.te
@@ -5,8 +5,6 @@ policy_module(oddjob, 1.10.0)
@@ -65659,7 +65659,7 @@ index e403097..c60887d 100644
+userdom_stream_connect(oddjob_mkhomedir_t)
+
diff --git a/openct.te b/openct.te
-index 3b6920e..577c90b 100644
+index 3b6920e31..577c90b03 100644
--- a/openct.te
+++ b/openct.te
@@ -21,6 +21,7 @@ files_pid_file(openct_var_run_t)
@@ -65703,7 +65703,7 @@ index 3b6920e..577c90b 100644
diff --git a/opendnssec.fc b/opendnssec.fc
new file mode 100644
-index 0000000..08d0e79
+index 000000000..08d0e793d
--- /dev/null
+++ b/opendnssec.fc
@@ -0,0 +1,14 @@
@@ -65723,7 +65723,7 @@ index 0000000..08d0e79
+/var/opendnssec(/.*)? gen_context(system_u:object_r:opendnssec_var_t,s0)
diff --git a/opendnssec.if b/opendnssec.if
new file mode 100644
-index 0000000..7c08157
+index 000000000..7c081576b
--- /dev/null
+++ b/opendnssec.if
@@ -0,0 +1,228 @@
@@ -65957,7 +65957,7 @@ index 0000000..7c08157
+')
diff --git a/opendnssec.te b/opendnssec.te
new file mode 100644
-index 0000000..3a760d7
+index 000000000..3a760d741
--- /dev/null
+++ b/opendnssec.te
@@ -0,0 +1,69 @@
@@ -66032,7 +66032,7 @@ index 0000000..3a760d7
+
diff --git a/openfortivpn.fc b/openfortivpn.fc
new file mode 100644
-index 0000000..2e4dd3f
+index 000000000..2e4dd3ffe
--- /dev/null
+++ b/openfortivpn.fc
@@ -0,0 +1,4 @@
@@ -66042,7 +66042,7 @@ index 0000000..2e4dd3f
+/var/lib/NetworkManager-fortisslvpn(/.*)? gen_context(system_u:object_r:openfortivpn_var_lib_t,s0)
diff --git a/openfortivpn.if b/openfortivpn.if
new file mode 100644
-index 0000000..7581b52
+index 000000000..7581b52a0
--- /dev/null
+++ b/openfortivpn.if
@@ -0,0 +1,113 @@
@@ -66161,7 +66161,7 @@ index 0000000..7581b52
+')
diff --git a/openfortivpn.te b/openfortivpn.te
new file mode 100644
-index 0000000..5a3c62b
+index 000000000..5a3c62b83
--- /dev/null
+++ b/openfortivpn.te
@@ -0,0 +1,67 @@
@@ -66233,7 +66233,7 @@ index 0000000..5a3c62b
+ ppp_kill(openfortivpn_t)
+')
diff --git a/openhpi.te b/openhpi.te
-index 8de6191..1a01e99 100644
+index 8de619112..1a01e99f2 100644
--- a/openhpi.te
+++ b/openhpi.te
@@ -38,6 +38,8 @@ files_var_lib_filetrans(openhpid_t, openhpid_var_lib_t, dir)
@@ -66260,7 +66260,7 @@ index 8de6191..1a01e99 100644
+')
diff --git a/openhpid.fc b/openhpid.fc
new file mode 100644
-index 0000000..df219e6
+index 000000000..df219e6ef
--- /dev/null
+++ b/openhpid.fc
@@ -0,0 +1,10 @@
@@ -66276,7 +66276,7 @@ index 0000000..df219e6
+/var/run/openhpid\.pid -- gen_context(system_u:object_r:openhpid_var_run_t,s0)
diff --git a/openhpid.if b/openhpid.if
new file mode 100644
-index 0000000..598789a
+index 000000000..598789a3b
--- /dev/null
+++ b/openhpid.if
@@ -0,0 +1,159 @@
@@ -66441,7 +66441,7 @@ index 0000000..598789a
+
diff --git a/openhpid.te b/openhpid.te
new file mode 100644
-index 0000000..a0e0eaf
+index 000000000..a0e0eafce
--- /dev/null
+++ b/openhpid.te
@@ -0,0 +1,67 @@
@@ -66514,21 +66514,21 @@ index 0000000..a0e0eaf
+')
diff --git a/openshift-origin.fc b/openshift-origin.fc
new file mode 100644
-index 0000000..30ca148
+index 000000000..30ca148ee
--- /dev/null
+++ b/openshift-origin.fc
@@ -0,0 +1 @@
+# Left Blank
diff --git a/openshift-origin.if b/openshift-origin.if
new file mode 100644
-index 0000000..3eb6a30
+index 000000000..3eb6a3057
--- /dev/null
+++ b/openshift-origin.if
@@ -0,0 +1 @@
+##
diff --git a/openshift-origin.te b/openshift-origin.te
new file mode 100644
-index 0000000..a437f80
+index 000000000..a437f80ca
--- /dev/null
+++ b/openshift-origin.te
@@ -0,0 +1,13 @@
@@ -66547,7 +66547,7 @@ index 0000000..a437f80
+files_read_config_files(openshift_domain)
diff --git a/openshift.fc b/openshift.fc
new file mode 100644
-index 0000000..5a2f97e
+index 000000000..5a2f97ef6
--- /dev/null
+++ b/openshift.fc
@@ -0,0 +1,30 @@
@@ -66583,7 +66583,7 @@ index 0000000..5a2f97e
+/var/run/openshift(/.*)? gen_context(system_u:object_r:openshift_var_run_t,s0)
diff --git a/openshift.if b/openshift.if
new file mode 100644
-index 0000000..c20cac3
+index 000000000..c20cac397
--- /dev/null
+++ b/openshift.if
@@ -0,0 +1,697 @@
@@ -67286,7 +67286,7 @@ index 0000000..c20cac3
+')
diff --git a/openshift.te b/openshift.te
new file mode 100644
-index 0000000..a98990f
+index 000000000..a98990f3a
--- /dev/null
+++ b/openshift.te
@@ -0,0 +1,634 @@
@@ -67926,7 +67926,7 @@ index 0000000..a98990f
+')
diff --git a/opensm.fc b/opensm.fc
new file mode 100644
-index 0000000..51650fa
+index 000000000..51650fa65
--- /dev/null
+++ b/opensm.fc
@@ -0,0 +1,7 @@
@@ -67939,7 +67939,7 @@ index 0000000..51650fa
+/var/log/opensm\.log.* -- gen_context(system_u:object_r:opensm_log_t,s0)
diff --git a/opensm.if b/opensm.if
new file mode 100644
-index 0000000..45de664
+index 000000000..45de66477
--- /dev/null
+++ b/opensm.if
@@ -0,0 +1,224 @@
@@ -68169,7 +68169,7 @@ index 0000000..45de664
+')
diff --git a/opensm.te b/opensm.te
new file mode 100644
-index 0000000..87c86ed
+index 000000000..87c86edb9
--- /dev/null
+++ b/opensm.te
@@ -0,0 +1,46 @@
@@ -68220,7 +68220,7 @@ index 0000000..87c86ed
+
+logging_send_syslog_msg(opensm_t)
diff --git a/openvpn.fc b/openvpn.fc
-index 300213f..4cdfe09 100644
+index 300213f83..4cdfe097c 100644
--- a/openvpn.fc
+++ b/openvpn.fc
@@ -1,10 +1,13 @@
@@ -68238,7 +68238,7 @@ index 300213f..4cdfe09 100644
/var/log/openvpn.* gen_context(system_u:object_r:openvpn_var_log_t,s0)
diff --git a/openvpn.if b/openvpn.if
-index 6837e9a..8d6e33b 100644
+index 6837e9a2b..8d6e33b00 100644
--- a/openvpn.if
+++ b/openvpn.if
@@ -23,6 +23,25 @@ interface(`openvpn_domtrans',`
@@ -68328,7 +68328,7 @@ index 6837e9a..8d6e33b 100644
domain_system_change_exemption($1)
role_transition $2 openvpn_initrc_exec_t system_r;
diff --git a/openvpn.te b/openvpn.te
-index 63957a3..91dead6 100644
+index 63957a362..91dead6e7 100644
--- a/openvpn.te
+++ b/openvpn.te
@@ -6,6 +6,13 @@ policy_module(openvpn, 1.12.2)
@@ -68520,7 +68520,7 @@ index 63957a3..91dead6 100644
+ can_exec(openvpn_t, openvpn_unconfined_script_exec_t)
+')
diff --git a/openvswitch.fc b/openvswitch.fc
-index 45d7cc5..c5b9607 100644
+index 45d7cc508..c5b9607c1 100644
--- a/openvswitch.fc
+++ b/openvswitch.fc
@@ -1,12 +1,16 @@
@@ -68548,7 +68548,7 @@ index 45d7cc5..c5b9607 100644
-/var/run/openvswitch(/.*)? gen_context(system_u:object_r:openvswitch_var_run_t,s0)
+/etc/openvswitch(/.*)? gen_context(system_u:object_r:openvswitch_rw_t,s0)
diff --git a/openvswitch.if b/openvswitch.if
-index 9b15730..cb00f20 100644
+index 9b157305b..cb00f200a 100644
--- a/openvswitch.if
+++ b/openvswitch.if
@@ -1,13 +1,14 @@
@@ -68821,7 +68821,7 @@ index 9b15730..cb00f20 100644
+ ')
')
diff --git a/openvswitch.te b/openvswitch.te
-index 44dbc99..9e70db7 100644
+index 44dbc99ab..9e70db7ef 100644
--- a/openvswitch.te
+++ b/openvswitch.te
@@ -9,11 +9,8 @@ type openvswitch_t;
@@ -68958,7 +68958,7 @@ index 44dbc99..9e70db7 100644
+')
diff --git a/openwsman.fc b/openwsman.fc
new file mode 100644
-index 0000000..00d0643
+index 000000000..00d0643d9
--- /dev/null
+++ b/openwsman.fc
@@ -0,0 +1,7 @@
@@ -68971,7 +68971,7 @@ index 0000000..00d0643
+/var/run/wsmand.* -- gen_context(system_u:object_r:openwsman_run_t,s0)
diff --git a/openwsman.if b/openwsman.if
new file mode 100644
-index 0000000..747853a
+index 000000000..747853a1a
--- /dev/null
+++ b/openwsman.if
@@ -0,0 +1,79 @@
@@ -69056,7 +69056,7 @@ index 0000000..747853a
+')
diff --git a/openwsman.te b/openwsman.te
new file mode 100644
-index 0000000..3bcd32c
+index 000000000..3bcd32cdf
--- /dev/null
+++ b/openwsman.te
@@ -0,0 +1,74 @@
@@ -69136,7 +69136,7 @@ index 0000000..3bcd32c
+
diff --git a/oracleasm.fc b/oracleasm.fc
new file mode 100644
-index 0000000..5655fac
+index 000000000..5655facf0
--- /dev/null
+++ b/oracleasm.fc
@@ -0,0 +1,8 @@
@@ -69150,7 +69150,7 @@ index 0000000..5655fac
+/usr/sbin/oracleasm -- gen_context(system_u:object_r:oracleasm_exec_t,s0)
diff --git a/oracleasm.if b/oracleasm.if
new file mode 100644
-index 0000000..6ae382c
+index 000000000..6ae382cb9
--- /dev/null
+++ b/oracleasm.if
@@ -0,0 +1,75 @@
@@ -69231,7 +69231,7 @@ index 0000000..6ae382c
+
diff --git a/oracleasm.te b/oracleasm.te
new file mode 100644
-index 0000000..41f3e07
+index 000000000..41f3e07b1
--- /dev/null
+++ b/oracleasm.te
@@ -0,0 +1,66 @@
@@ -69303,7 +69303,7 @@ index 0000000..41f3e07
+')
diff --git a/osad.fc b/osad.fc
new file mode 100644
-index 0000000..cf911d5
+index 000000000..cf911d54e
--- /dev/null
+++ b/osad.fc
@@ -0,0 +1,7 @@
@@ -69316,7 +69316,7 @@ index 0000000..cf911d5
+/var/run/osad.* -- gen_context(system_u:object_r:osad_var_run_t,s0)
diff --git a/osad.if b/osad.if
new file mode 100644
-index 0000000..05648bd
+index 000000000..05648bd2a
--- /dev/null
+++ b/osad.if
@@ -0,0 +1,165 @@
@@ -69487,7 +69487,7 @@ index 0000000..05648bd
+')
diff --git a/osad.te b/osad.te
new file mode 100644
-index 0000000..b372f68
+index 000000000..b372f683a
--- /dev/null
+++ b/osad.te
@@ -0,0 +1,56 @@
@@ -69548,7 +69548,7 @@ index 0000000..b372f68
+ rpm_domtrans(osad_t)
+')
diff --git a/pacemaker.fc b/pacemaker.fc
-index 2f0ad56..d4da0b8 100644
+index 2f0ad56d6..d4da0b8d0 100644
--- a/pacemaker.fc
+++ b/pacemaker.fc
@@ -1,5 +1,7 @@
@@ -69560,7 +69560,7 @@ index 2f0ad56..d4da0b8 100644
/var/lib/heartbeat/crm(/.*)? gen_context(system_u:object_r:pacemaker_var_lib_t,s0)
diff --git a/pacemaker.if b/pacemaker.if
-index 9682d9a..f1f421f 100644
+index 9682d9af8..f1f421f9e 100644
--- a/pacemaker.if
+++ b/pacemaker.if
@@ -1,9 +1,167 @@
@@ -69769,7 +69769,7 @@ index 9682d9a..f1f421f 100644
+ ')
')
diff --git a/pacemaker.te b/pacemaker.te
-index 6e6efb6..d56c049 100644
+index 6e6efb642..d56c04963 100644
--- a/pacemaker.te
+++ b/pacemaker.te
@@ -5,6 +5,13 @@ policy_module(pacemaker, 1.1.0)
@@ -69870,7 +69870,7 @@ index 6e6efb6..d56c049 100644
+ rgmanager_execute_lib(pacemaker_t)
')
diff --git a/pads.if b/pads.if
-index 6e097c9..503c97a 100644
+index 6e097c919..503c97a2d 100644
--- a/pads.if
+++ b/pads.if
@@ -17,15 +17,19 @@
@@ -69896,7 +69896,7 @@ index 6e097c9..503c97a 100644
domain_system_change_exemption($1)
role_transition $2 pads_initrc_exec_t system_r;
diff --git a/pads.te b/pads.te
-index 078adc4..f0c65e5 100644
+index 078adc478..f0c65e5de 100644
--- a/pads.te
+++ b/pads.te
@@ -24,9 +24,12 @@ files_pid_file(pads_var_run_t)
@@ -69934,7 +69934,7 @@ index 078adc4..f0c65e5 100644
sysnet_dns_name_resolve(pads_t)
diff --git a/passenger.fc b/passenger.fc
-index 2c389ea..9155bd0 100644
+index 2c389ea7c..9155bd0dd 100644
--- a/passenger.fc
+++ b/passenger.fc
@@ -1,10 +1,12 @@
@@ -69958,7 +69958,7 @@ index 2c389ea..9155bd0 100644
+
+/var/run/passenger(/.*)? gen_context(system_u:object_r:passenger_var_run_t,s0)
diff --git a/passenger.if b/passenger.if
-index bf59ef7..0e33327 100644
+index bf59ef731..0e333279c 100644
--- a/passenger.if
+++ b/passenger.if
@@ -15,17 +15,17 @@ interface(`passenger_domtrans',`
@@ -70130,7 +70130,7 @@ index bf59ef7..0e33327 100644
+')
+
diff --git a/passenger.te b/passenger.te
-index 08ec33b..e73b8a6 100644
+index 08ec33bf2..e73b8a63d 100644
--- a/passenger.te
+++ b/passenger.te
@@ -1,4 +1,4 @@
@@ -70261,7 +70261,7 @@ index 08ec33b..e73b8a6 100644
+ rpm_read_db(passenger_t)
')
diff --git a/pcmcia.te b/pcmcia.te
-index 8176e4a..2df1789 100644
+index 8176e4aa4..2df178919 100644
--- a/pcmcia.te
+++ b/pcmcia.te
@@ -88,20 +88,17 @@ libs_exec_lib_files(cardmgr_t)
@@ -70288,7 +70288,7 @@ index 8176e4a..2df1789 100644
diff --git a/pcp.fc b/pcp.fc
new file mode 100644
-index 0000000..de7c78c
+index 000000000..de7c78ca0
--- /dev/null
+++ b/pcp.fc
@@ -0,0 +1,33 @@
@@ -70327,7 +70327,7 @@ index 0000000..de7c78c
+/var/run/pmlogger\.primary\.socket -l gen_context(system_u:object_r:pcp_var_run_t,s0)
diff --git a/pcp.if b/pcp.if
new file mode 100644
-index 0000000..abb250d
+index 000000000..abb250dba
--- /dev/null
+++ b/pcp.if
@@ -0,0 +1,160 @@
@@ -70493,7 +70493,7 @@ index 0000000..abb250d
+')
diff --git a/pcp.te b/pcp.te
new file mode 100644
-index 0000000..3729152
+index 000000000..372915272
--- /dev/null
+++ b/pcp.te
@@ -0,0 +1,313 @@
@@ -70811,7 +70811,7 @@ index 0000000..3729152
+')
+
diff --git a/pcscd.if b/pcscd.if
-index 43d50f9..6b1544f 100644
+index 43d50f95b..6b1544f62 100644
--- a/pcscd.if
+++ b/pcscd.if
@@ -17,6 +17,8 @@ interface(`pcscd_domtrans',`
@@ -70833,7 +70833,7 @@ index 43d50f9..6b1544f 100644
########################################
diff --git a/pcscd.te b/pcscd.te
-index 1fb1964..a8026bd 100644
+index 1fb196410..a8026bdbf 100644
--- a/pcscd.te
+++ b/pcscd.te
@@ -22,10 +22,12 @@ init_daemon_run_dir(pcscd_var_run_t, "pcscd")
@@ -70915,7 +70915,7 @@ index 1fb1964..a8026bd 100644
+
diff --git a/pdns.fc b/pdns.fc
new file mode 100644
-index 0000000..22bc51b
+index 000000000..22bc51be6
--- /dev/null
+++ b/pdns.fc
@@ -0,0 +1,6 @@
@@ -70927,7 +70927,7 @@ index 0000000..22bc51b
+/etc/pdns(/.*)? gen_context(system_u:object_r:pdns_conf_t,s0)
diff --git a/pdns.if b/pdns.if
new file mode 100644
-index 0000000..02df03a
+index 000000000..02df03ad6
--- /dev/null
+++ b/pdns.if
@@ -0,0 +1,81 @@
@@ -71014,7 +71014,7 @@ index 0000000..02df03a
+')
diff --git a/pdns.te b/pdns.te
new file mode 100644
-index 0000000..509d898
+index 000000000..509d89837
--- /dev/null
+++ b/pdns.te
@@ -0,0 +1,82 @@
@@ -71101,7 +71101,7 @@ index 0000000..509d898
+ ')
+')
diff --git a/pegasus.fc b/pegasus.fc
-index dfd46e4..feaa8e1 100644
+index dfd46e412..feaa8e174 100644
--- a/pegasus.fc
+++ b/pegasus.fc
@@ -1,15 +1,33 @@
@@ -71147,7 +71147,7 @@ index dfd46e4..feaa8e1 100644
+/usr/libexec/pegasus/pycmpiLMI_Storage-cimprovagt -- gen_context(system_u:object_r:pegasus_openlmi_storage_exec_t,s0)
+/usr/libexec/pegasus/cmpiLMI_Hardware-cimprovagt -- gen_context(system_u:object_r:pegasus_openlmi_storage_exec_t,s0)
diff --git a/pegasus.if b/pegasus.if
-index d2fc677..86dce34 100644
+index d2fc677c1..86dce34a2 100644
--- a/pegasus.if
+++ b/pegasus.if
@@ -1,52 +1,60 @@
@@ -71248,7 +71248,7 @@ index d2fc677..86dce34 100644
')
+
diff --git a/pegasus.te b/pegasus.te
-index 608f454..8cccfd7 100644
+index 608f454d8..8cccfd762 100644
--- a/pegasus.te
+++ b/pegasus.te
@@ -5,13 +5,12 @@ policy_module(pegasus, 1.9.0)
@@ -71783,7 +71783,7 @@ index 608f454..8cccfd7 100644
')
diff --git a/pesign.fc b/pesign.fc
new file mode 100644
-index 0000000..7b54c39
+index 000000000..7b54c3926
--- /dev/null
+++ b/pesign.fc
@@ -0,0 +1,6 @@
@@ -71795,7 +71795,7 @@ index 0000000..7b54c39
+/var/run/pesign\.pid -- gen_context(system_u:object_r:pesign_var_run_t,s0)
diff --git a/pesign.if b/pesign.if
new file mode 100644
-index 0000000..4d531cb
+index 000000000..4d531cb9d
--- /dev/null
+++ b/pesign.if
@@ -0,0 +1,99 @@
@@ -71900,7 +71900,7 @@ index 0000000..4d531cb
+')
diff --git a/pesign.te b/pesign.te
new file mode 100644
-index 0000000..513887d
+index 000000000..513887d18
--- /dev/null
+++ b/pesign.te
@@ -0,0 +1,43 @@
@@ -71948,7 +71948,7 @@ index 0000000..513887d
+miscfiles_read_certs(pesign_t)
+miscfiles_read_localization(pesign_t)
diff --git a/pingd.if b/pingd.if
-index 21a6ecb..b99e4cb 100644
+index 21a6ecbe7..b99e4cb0b 100644
--- a/pingd.if
+++ b/pingd.if
@@ -55,7 +55,8 @@ interface(`pingd_manage_config',`
@@ -71977,7 +71977,7 @@ index 21a6ecb..b99e4cb 100644
domain_system_change_exemption($1)
role_transition $2 pingd_initrc_exec_t system_r;
diff --git a/pingd.te b/pingd.te
-index ab01060..778c8eb 100644
+index ab0106027..778c8eb12 100644
--- a/pingd.te
+++ b/pingd.te
@@ -10,7 +10,7 @@ type pingd_exec_t;
@@ -72004,7 +72004,7 @@ index ab01060..778c8eb 100644
-miscfiles_read_localization(pingd_t)
diff --git a/piranha.fc b/piranha.fc
new file mode 100644
-index 0000000..20ea9f5
+index 000000000..20ea9f54b
--- /dev/null
+++ b/piranha.fc
@@ -0,0 +1,24 @@
@@ -72034,7 +72034,7 @@ index 0000000..20ea9f5
+
diff --git a/piranha.if b/piranha.if
new file mode 100644
-index 0000000..cf54103
+index 000000000..cf54103b6
--- /dev/null
+++ b/piranha.if
@@ -0,0 +1,187 @@
@@ -72227,7 +72227,7 @@ index 0000000..cf54103
+')
diff --git a/piranha.te b/piranha.te
new file mode 100644
-index 0000000..a989aea
+index 000000000..a989aea2e
--- /dev/null
+++ b/piranha.te
@@ -0,0 +1,292 @@
@@ -72524,7 +72524,7 @@ index 0000000..a989aea
+
+sysnet_read_config(piranha_domain)
diff --git a/pkcs.fc b/pkcs.fc
-index 9a72226..b296894 100644
+index 9a72226e3..b2968942f 100644
--- a/pkcs.fc
+++ b/pkcs.fc
@@ -4,4 +4,8 @@
@@ -72537,7 +72537,7 @@ index 9a72226..b296894 100644
+
/var/run/pkcsslotd.* gen_context(system_u:object_r:pkcs_slotd_var_run_t,s0)
diff --git a/pkcs.if b/pkcs.if
-index 69be2aa..2d7b3f6 100644
+index 69be2aaf2..2d7b3f656 100644
--- a/pkcs.if
+++ b/pkcs.if
@@ -19,7 +19,7 @@
@@ -72560,7 +72560,7 @@ index 69be2aa..2d7b3f6 100644
admin_pattern($1, pkcs_slotd_var_run_t)
diff --git a/pkcs.te b/pkcs.te
-index 8eb3f7b..81ee57d 100644
+index 8eb3f7bc1..81ee57df4 100644
--- a/pkcs.te
+++ b/pkcs.te
@@ -7,21 +7,34 @@ policy_module(pkcs, 1.0.1)
@@ -72631,7 +72631,7 @@ index 8eb3f7b..81ee57d 100644
+userdom_read_all_users_state(pkcs_slotd_t)
diff --git a/pkcs11proxyd.fc b/pkcs11proxyd.fc
new file mode 100644
-index 0000000..ca1160a
+index 000000000..ca1160af2
--- /dev/null
+++ b/pkcs11proxyd.fc
@@ -0,0 +1,7 @@
@@ -72644,7 +72644,7 @@ index 0000000..ca1160a
+/var/run/pkcs11proxyd\.socket -s gen_context(system_u:object_r:pkcs11proxyd_var_run_t,s0)
diff --git a/pkcs11proxyd.if b/pkcs11proxyd.if
new file mode 100644
-index 0000000..1fa6db2
+index 000000000..1fa6db2ea
--- /dev/null
+++ b/pkcs11proxyd.if
@@ -0,0 +1,175 @@
@@ -72825,7 +72825,7 @@ index 0000000..1fa6db2
+')
diff --git a/pkcs11proxyd.te b/pkcs11proxyd.te
new file mode 100644
-index 0000000..a2cb118
+index 000000000..a2cb118ba
--- /dev/null
+++ b/pkcs11proxyd.te
@@ -0,0 +1,42 @@
@@ -72873,7 +72873,7 @@ index 0000000..a2cb118
+
diff --git a/pki.fc b/pki.fc
new file mode 100644
-index 0000000..47cd0f8
+index 000000000..47cd0f8ba
--- /dev/null
+++ b/pki.fc
@@ -0,0 +1,57 @@
@@ -72936,7 +72936,7 @@ index 0000000..47cd0f8
+/usr/lib/systemd/system/pki-tomcat.* gen_context(system_u:object_r:pki_tomcat_unit_file_t,s0)
diff --git a/pki.if b/pki.if
new file mode 100644
-index 0000000..f18fcc6
+index 000000000..f18fcc68f
--- /dev/null
+++ b/pki.if
@@ -0,0 +1,479 @@
@@ -73421,7 +73421,7 @@ index 0000000..f18fcc6
+')
diff --git a/pki.te b/pki.te
new file mode 100644
-index 0000000..cde75a2
+index 000000000..cde75a219
--- /dev/null
+++ b/pki.te
@@ -0,0 +1,285 @@
@@ -73711,7 +73711,7 @@ index 0000000..cde75a2
+')
+
diff --git a/plymouthd.fc b/plymouthd.fc
-index 735500f..2ba6832 100644
+index 735500fd1..2ba6832cc 100644
--- a/plymouthd.fc
+++ b/plymouthd.fc
@@ -1,15 +1,14 @@
@@ -73739,7 +73739,7 @@ index 735500f..2ba6832 100644
-/var/spool/plymouth(/.*)? gen_context(system_u:object_r:plymouthd_spool_t,s0)
+/var/spool/plymouth(/.*)? gen_context(system_u:object_r:plymouthd_spool_t,s0)
diff --git a/plymouthd.if b/plymouthd.if
-index 30e751f..61feb3a 100644
+index 30e751f18..61feb3a81 100644
--- a/plymouthd.if
+++ b/plymouthd.if
@@ -1,4 +1,4 @@
@@ -74052,7 +74052,7 @@ index 30e751f..61feb3a 100644
admin_pattern($1, plymouthd_var_run_t)
')
diff --git a/plymouthd.te b/plymouthd.te
-index 3078ce9..ac0b7a5 100644
+index 3078ce905..ac0b7a546 100644
--- a/plymouthd.te
+++ b/plymouthd.te
@@ -15,7 +15,7 @@ type plymouthd_exec_t;
@@ -74173,7 +74173,7 @@ index 3078ce9..ac0b7a5 100644
hal_dontaudit_write_log(plymouth_t)
hal_dontaudit_rw_pipes(plymouth_t)
diff --git a/podsleuth.te b/podsleuth.te
-index 9123f71..232e28a 100644
+index 9123f7152..232e28a75 100644
--- a/podsleuth.te
+++ b/podsleuth.te
@@ -28,8 +28,9 @@ userdom_user_tmpfs_file(podsleuth_tmpfs_t)
@@ -74212,7 +74212,7 @@ index 9123f71..232e28a 100644
optional_policy(`
dbus_system_bus_client(podsleuth_t)
diff --git a/policykit.fc b/policykit.fc
-index 1d76c72..93d09d9 100644
+index 1d76c7288..93d09d92f 100644
--- a/policykit.fc
+++ b/policykit.fc
@@ -1,23 +1,22 @@
@@ -74257,7 +74257,7 @@ index 1d76c72..93d09d9 100644
-/var/run/PolicyKit(/.*)? gen_context(system_u:object_r:policykit_var_run_t,s0)
diff --git a/policykit.if b/policykit.if
-index 032a84d..be00a65 100644
+index 032a84d1c..be00a65f1 100644
--- a/policykit.if
+++ b/policykit.if
@@ -17,6 +17,8 @@ interface(`policykit_dbus_chat',`
@@ -74497,7 +74497,7 @@ index 032a84d..be00a65 100644
+ allow $1 policykit_auth_t:process signal;
')
diff --git a/policykit.te b/policykit.te
-index ee91778..fb9b69a 100644
+index ee91778f7..fb9b69ae9 100644
--- a/policykit.te
+++ b/policykit.te
@@ -7,9 +7,6 @@ policy_module(policykit, 1.3.0)
@@ -74836,7 +74836,7 @@ index ee91778..fb9b69a 100644
')
-
diff --git a/polipo.fc b/polipo.fc
-index d35614b..11f77ee 100644
+index d35614b78..11f77ee32 100644
--- a/polipo.fc
+++ b/polipo.fc
@@ -1,15 +1,16 @@
@@ -74860,7 +74860,7 @@ index d35614b..11f77ee 100644
-/var/run/polipo(/.*)? gen_context(system_u:object_r:polipo_var_run_t,s0)
+/var/run/polipo(/.*)? gen_context(system_u:object_r:polipo_pid_t,s0)
diff --git a/polipo.if b/polipo.if
-index ae27bb7..10a7787 100644
+index ae27bb7fe..10a778780 100644
--- a/polipo.if
+++ b/polipo.if
@@ -1,8 +1,8 @@
@@ -75109,7 +75109,7 @@ index ae27bb7..10a7787 100644
+ allow $1 polipo_unit_file_t:service all_service_perms;
')
diff --git a/polipo.te b/polipo.te
-index 9764bfe..8870de7 100644
+index 9764bfef8..8870de713 100644
--- a/polipo.te
+++ b/polipo.te
@@ -7,19 +7,27 @@ policy_module(polipo, 1.1.1)
@@ -75353,7 +75353,7 @@ index 9764bfe..8870de7 100644
-miscfiles_read_localization(polipo_daemon)
diff --git a/portage.if b/portage.if
-index 67e8c12..058c994 100644
+index 67e8c12c4..058c99481 100644
--- a/portage.if
+++ b/portage.if
@@ -67,9 +67,10 @@ interface(`portage_compile_domain',`
@@ -75369,7 +75369,7 @@ index 67e8c12..058c994 100644
allow $1 self:process { setpgid setsched setrlimit signal_perms execmem setfscreate };
allow $1 self:process ~{ ptrace setcurrent setexec setrlimit execmem execstack execheap };
diff --git a/portage.te b/portage.te
-index b410c67..f1ec41d 100644
+index b410c67c1..f1ec41d39 100644
--- a/portage.te
+++ b/portage.te
@@ -108,7 +108,6 @@ domain_use_interactive_fds(gcc_config_t)
@@ -75398,7 +75398,7 @@ index b410c67..f1ec41d 100644
fs_search_auto_mountpoints(portage_fetch_t)
diff --git a/portmap.fc b/portmap.fc
-index cd45831..69406ee 100644
+index cd45831ca..69406ee17 100644
--- a/portmap.fc
+++ b/portmap.fc
@@ -4,9 +4,14 @@
@@ -75417,7 +75417,7 @@ index cd45831..69406ee 100644
/var/run/portmap\.upgrade-state -- gen_context(system_u:object_r:portmap_var_run_t,s0)
/var/run/portmap_mapping -- gen_context(system_u:object_r:portmap_var_run_t,s0)
diff --git a/portmap.te b/portmap.te
-index 18b255e..e75c4ec 100644
+index 18b255e7a..e75c4ec24 100644
--- a/portmap.te
+++ b/portmap.te
@@ -45,7 +45,6 @@ files_pid_filetrans(portmap_t, portmap_var_run_t, file)
@@ -75459,7 +75459,7 @@ index 18b255e..e75c4ec 100644
+userdom_use_inherited_user_terminals(portmap_helper_t)
userdom_dontaudit_use_all_users_fds(portmap_helper_t)
diff --git a/portreserve.fc b/portreserve.fc
-index 1b2b4f9..575b7d6 100644
+index 1b2b4f908..575b7d69b 100644
--- a/portreserve.fc
+++ b/portreserve.fc
@@ -1,6 +1,6 @@
@@ -75471,7 +75471,7 @@ index 1b2b4f9..575b7d6 100644
/sbin/portreserve -- gen_context(system_u:object_r:portreserve_exec_t,s0)
diff --git a/portreserve.if b/portreserve.if
-index 5ad5291..7f1ae2a 100644
+index 5ad529154..7f1ae2a78 100644
--- a/portreserve.if
+++ b/portreserve.if
@@ -105,8 +105,11 @@ interface(`portreserve_admin',`
@@ -75488,7 +75488,7 @@ index 5ad5291..7f1ae2a 100644
portreserve_initrc_domtrans($1)
domain_system_change_exemption($1)
diff --git a/portreserve.te b/portreserve.te
-index 00b01e2..10b4512 100644
+index 00b01e2ea..10b45127a 100644
--- a/portreserve.te
+++ b/portreserve.te
@@ -41,7 +41,6 @@ files_pid_filetrans(portreserve_t, portreserve_var_run_t, { file sock_file dir }
@@ -75510,7 +75510,7 @@ index 00b01e2..10b4512 100644
+auth_use_nsswitch(portreserve_t)
+
diff --git a/portslave.te b/portslave.te
-index cbe36c1..8ebeb87 100644
+index cbe36c1d0..8ebeb87d2 100644
--- a/portslave.te
+++ b/portslave.te
@@ -48,7 +48,6 @@ kernel_read_kernel_sysctls(portslave_t)
@@ -75531,7 +75531,7 @@ index cbe36c1..8ebeb87 100644
auth_domtrans_chk_passwd(portslave_t)
diff --git a/postfix.fc b/postfix.fc
-index c0e8785..3070aa0 100644
+index c0e878537..3070aa066 100644
--- a/postfix.fc
+++ b/postfix.fc
@@ -1,38 +1,38 @@
@@ -75624,7 +75624,7 @@ index c0e8785..3070aa0 100644
+/var/spool/postfix/bounce(/.*)? gen_context(system_u:object_r:postfix_spool_bounce_t,s0)
+/var/spool/postfix/flush(/.*)? gen_context(system_u:object_r:postfix_spool_t,s0)
diff --git a/postfix.if b/postfix.if
-index ded95ec..db49c57 100644
+index ded95ec3a..db49c5774 100644
--- a/postfix.if
+++ b/postfix.if
@@ -1,4 +1,4 @@
@@ -76509,7 +76509,7 @@ index ded95ec..db49c57 100644
+ postfix_config_filetrans($1, postfix_prng_t, file, "prng_exch")
')
diff --git a/postfix.te b/postfix.te
-index 5cfb83e..87a1d85 100644
+index 5cfb83eca..87a1d852a 100644
--- a/postfix.te
+++ b/postfix.te
@@ -6,27 +6,23 @@ policy_module(postfix, 1.15.1)
@@ -77476,7 +77476,7 @@ index 5cfb83e..87a1d85 100644
+ udev_read_db(postfix_domain)
+')
diff --git a/postfixpolicyd.if b/postfixpolicyd.if
-index 5de8173..985b877 100644
+index 5de817368..985b877ab 100644
--- a/postfixpolicyd.if
+++ b/postfixpolicyd.if
@@ -23,8 +23,11 @@ interface(`postfixpolicyd_admin',`
@@ -77493,7 +77493,7 @@ index 5de8173..985b877 100644
init_labeled_script_domtrans($1, postfix_policyd_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/postfixpolicyd.te b/postfixpolicyd.te
-index ea1582a..0c1a059 100644
+index ea1582a3a..0c1a05983 100644
--- a/postfixpolicyd.te
+++ b/postfixpolicyd.te
@@ -34,7 +34,6 @@ allow postfix_policyd_t postfix_policyd_conf_t:lnk_file read_lnk_file_perms;
@@ -77517,7 +77517,7 @@ index ea1582a..0c1a059 100644
-
sysnet_dns_name_resolve(postfix_policyd_t)
diff --git a/postgrey.if b/postgrey.if
-index b9e71b5..a7502cd 100644
+index b9e71b537..a7502cd0e 100644
--- a/postgrey.if
+++ b/postgrey.if
@@ -16,9 +16,9 @@ interface(`postgrey_stream_connect',`
@@ -77554,7 +77554,7 @@ index b9e71b5..a7502cd 100644
domain_system_change_exemption($1)
role_transition $2 postgrey_initrc_exec_t system_r;
diff --git a/postgrey.te b/postgrey.te
-index fd58805..2ff8a1e 100644
+index fd58805e5..2ff8a1e4c 100644
--- a/postgrey.te
+++ b/postgrey.te
@@ -16,7 +16,7 @@ type postgrey_initrc_exec_t;
@@ -77604,7 +77604,7 @@ index fd58805..2ff8a1e 100644
sysnet_read_config(postgrey_t)
diff --git a/ppp.fc b/ppp.fc
-index efcb653..ff2c96a 100644
+index efcb6532d..ff2c96adb 100644
--- a/ppp.fc
+++ b/ppp.fc
@@ -1,30 +1,45 @@
@@ -77676,7 +77676,7 @@ index efcb653..ff2c96a 100644
+/var/log/ppp-connect-errors.* -- gen_context(system_u:object_r:pppd_log_t,s0)
+/var/log/ppp(/.*)? gen_context(system_u:object_r:pppd_log_t,s0)
diff --git a/ppp.if b/ppp.if
-index cd8b8b9..2cfa88a 100644
+index cd8b8b9cb..2cfa88a2d 100644
--- a/ppp.if
+++ b/ppp.if
@@ -1,110 +1,91 @@
@@ -78167,7 +78167,7 @@ index cd8b8b9..2cfa88a 100644
+ allow $1 pppd_unit_file_t:service all_service_perms;
')
diff --git a/ppp.te b/ppp.te
-index d616ca3..0b38ca5 100644
+index d616ca3e3..0b38ca5d6 100644
--- a/ppp.te
+++ b/ppp.te
@@ -6,41 +6,47 @@ policy_module(ppp, 1.14.0)
@@ -78529,7 +78529,7 @@ index d616ca3..0b38ca5 100644
optional_policy(`
diff --git a/prelink.fc b/prelink.fc
-index a90d623..62af9a4 100644
+index a90d6231f..62af9a4a0 100644
--- a/prelink.fc
+++ b/prelink.fc
@@ -1,11 +1,11 @@
@@ -78550,7 +78550,7 @@ index a90d623..62af9a4 100644
+/var/lib/misc/prelink.* -- gen_context(system_u:object_r:prelink_var_lib_t,s0)
+/var/lib/prelink(/.*)? gen_context(system_u:object_r:prelink_var_lib_t,s0)
diff --git a/prelink.if b/prelink.if
-index 20d4697..e6605c1 100644
+index 20d469793..e6605c100 100644
--- a/prelink.if
+++ b/prelink.if
@@ -2,7 +2,7 @@
@@ -78691,7 +78691,7 @@ index 20d4697..e6605c1 100644
+ files_etc_filetrans($1, prelink_cache_t, file, "prelink.cache")
+')
diff --git a/prelink.te b/prelink.te
-index 8e26216..c1d33ac 100644
+index 8e262163b..c1d33acdf 100644
--- a/prelink.te
+++ b/prelink.te
@@ -6,13 +6,10 @@ policy_module(prelink, 1.11.0)
@@ -78907,7 +78907,7 @@ index 8e26216..c1d33ac 100644
+ ')
+')
diff --git a/prelude.fc b/prelude.fc
-index 8dbc763..b580f85 100644
+index 8dbc76372..b580f852b 100644
--- a/prelude.fc
+++ b/prelude.fc
@@ -12,7 +12,7 @@
@@ -78920,7 +78920,7 @@ index 8dbc763..b580f85 100644
/var/lib/prelude-lml(/.*)? gen_context(system_u:object_r:prelude_var_lib_t,s0)
diff --git a/prelude.if b/prelude.if
-index c83a838..f41a4f7 100644
+index c83a838d7..f41a4f7dd 100644
--- a/prelude.if
+++ b/prelude.if
@@ -1,13 +1,13 @@
@@ -79081,7 +79081,7 @@ index c83a838..f41a4f7 100644
admin_pattern($1, prelude_lml_tmp_t)
')
diff --git a/prelude.te b/prelude.te
-index 8f44609..dd70653 100644
+index 8f4460928..dd7065356 100644
--- a/prelude.te
+++ b/prelude.te
@@ -13,7 +13,7 @@ type prelude_initrc_exec_t;
@@ -79253,7 +79253,7 @@ index 8f44609..dd70653 100644
')
')
diff --git a/privoxy.if b/privoxy.if
-index bdcee30..34f3143 100644
+index bdcee30f5..34f314344 100644
--- a/privoxy.if
+++ b/privoxy.if
@@ -23,8 +23,11 @@ interface(`privoxy_admin',`
@@ -79270,7 +79270,7 @@ index bdcee30..34f3143 100644
init_labeled_script_domtrans($1, privoxy_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/privoxy.te b/privoxy.te
-index ec21f80..a9f650a 100644
+index ec21f80d7..a9f650a1f 100644
--- a/privoxy.te
+++ b/privoxy.te
@@ -85,6 +85,7 @@ corenet_sendrecv_tor_client_packets(privoxy_t)
@@ -79291,7 +79291,7 @@ index ec21f80..a9f650a 100644
userdom_dontaudit_search_user_home_dirs(privoxy_t)
diff --git a/procmail.fc b/procmail.fc
-index bdff6c9..4b36a13 100644
+index bdff6c931..4b36a13de 100644
--- a/procmail.fc
+++ b/procmail.fc
@@ -1,6 +1,7 @@
@@ -79306,7 +79306,7 @@ index bdff6c9..4b36a13 100644
+/var/log/procmail\.log.* -- gen_context(system_u:object_r:procmail_log_t,s0)
+/var/log/procmail(/.*)? gen_context(system_u:object_r:procmail_log_t,s0)
diff --git a/procmail.if b/procmail.if
-index 00edeab..166e9c3 100644
+index 00edeab17..166e9c333 100644
--- a/procmail.if
+++ b/procmail.if
@@ -1,4 +1,4 @@
@@ -79471,7 +79471,7 @@ index 00edeab..166e9c3 100644
+ read_files_pattern($1, procmail_home_t, procmail_home_t)
')
diff --git a/procmail.te b/procmail.te
-index cc426e6..91a1f53 100644
+index cc426e62a..91a1f537e 100644
--- a/procmail.te
+++ b/procmail.te
@@ -14,7 +14,7 @@ type procmail_home_t;
@@ -79669,7 +79669,7 @@ index cc426e6..91a1f53 100644
+')
diff --git a/prosody.fc b/prosody.fc
new file mode 100644
-index 0000000..c056a2f
+index 000000000..c056a2fb3
--- /dev/null
+++ b/prosody.fc
@@ -0,0 +1,10 @@
@@ -79685,7 +79685,7 @@ index 0000000..c056a2f
+/var/log/prosody(/.*)? gen_context(system_u:object_r:prosody_log_t,s0)
diff --git a/prosody.if b/prosody.if
new file mode 100644
-index 0000000..8231f4f
+index 000000000..8231f4ff5
--- /dev/null
+++ b/prosody.if
@@ -0,0 +1,255 @@
@@ -79946,7 +79946,7 @@ index 0000000..8231f4f
+')
diff --git a/prosody.te b/prosody.te
new file mode 100644
-index 0000000..5a9f1d4
+index 000000000..5a9f1d42c
--- /dev/null
+++ b/prosody.te
@@ -0,0 +1,99 @@
@@ -80050,7 +80050,7 @@ index 0000000..5a9f1d4
+ sasl_connect(prosody_t)
+')
diff --git a/psad.if b/psad.if
-index d4dcf78..3cce82e 100644
+index d4dcf782c..3cce82e50 100644
--- a/psad.if
+++ b/psad.if
@@ -93,9 +93,8 @@ interface(`psad_manage_config',`
@@ -80209,7 +80209,7 @@ index d4dcf78..3cce82e 100644
admin_pattern($1, psad_tmp_t)
')
diff --git a/psad.te b/psad.te
-index b5d717b..9fd153b 100644
+index b5d717b09..9fd153b1c 100644
--- a/psad.te
+++ b/psad.te
@@ -32,7 +32,7 @@ files_tmp_file(psad_tmp_t)
@@ -80247,7 +80247,7 @@ index b5d717b..9fd153b 100644
optional_policy(`
diff --git a/ptchown.te b/ptchown.te
-index 28d2abc..c2cfb5e 100644
+index 28d2abc03..c2cfb5eaa 100644
--- a/ptchown.te
+++ b/ptchown.te
@@ -21,7 +21,6 @@ role ptchown_roles types ptchown_t;
@@ -80265,7 +80265,7 @@ index 28d2abc..c2cfb5e 100644
-miscfiles_read_localization(ptchown_t)
+auth_read_passwd(ptchown_t)
diff --git a/publicfile.te b/publicfile.te
-index 3246bef..dd66a21 100644
+index 3246befff..dd66a21cb 100644
--- a/publicfile.te
+++ b/publicfile.te
@@ -17,7 +17,7 @@ files_type(publicfile_content_t)
@@ -80278,7 +80278,7 @@ index 3246bef..dd66a21 100644
allow publicfile_t publicfile_content_t:dir list_dir_perms;
allow publicfile_t publicfile_content_t:file read_file_perms;
diff --git a/pulseaudio.fc b/pulseaudio.fc
-index 6864479..0e7d875 100644
+index 6864479a7..0e7d87513 100644
--- a/pulseaudio.fc
+++ b/pulseaudio.fc
@@ -1,9 +1,14 @@
@@ -80301,7 +80301,7 @@ index 6864479..0e7d875 100644
+/var/lib/pulse(/.*)? gen_context(system_u:object_r:pulseaudio_var_lib_t,s0)
+/var/run/pulse(/.*)? gen_context(system_u:object_r:pulseaudio_var_run_t,s0)
diff --git a/pulseaudio.if b/pulseaudio.if
-index 45843b5..4d1adac 100644
+index 45843b55c..4d1adace5 100644
--- a/pulseaudio.if
+++ b/pulseaudio.if
@@ -2,43 +2,47 @@
@@ -80703,7 +80703,7 @@ index 45843b5..4d1adac 100644
+ ps_process_pattern($1, pulseaudio_t)
')
diff --git a/pulseaudio.te b/pulseaudio.te
-index 6643b49..dd0c3d3 100644
+index 6643b49c2..dd0c3d371 100644
--- a/pulseaudio.te
+++ b/pulseaudio.te
@@ -8,61 +8,49 @@ policy_module(pulseaudio, 1.6.0)
@@ -81004,7 +81004,7 @@ index 6643b49..dd0c3d3 100644
optional_policy(`
diff --git a/puppet.fc b/puppet.fc
-index d68e26d..3b08cfd 100644
+index d68e26d1f..3b08cfd9d 100644
--- a/puppet.fc
+++ b/puppet.fc
@@ -1,18 +1,23 @@
@@ -81045,7 +81045,7 @@ index d68e26d..3b08cfd 100644
+/var/log/puppet(/.*)? gen_context(system_u:object_r:puppet_log_t,s0)
+/var/run/puppet(/.*)? gen_context(system_u:object_r:puppet_var_run_t,s0)
diff --git a/puppet.if b/puppet.if
-index 7cb8b1f..bef7217 100644
+index 7cb8b1f9c..bef72173b 100644
--- a/puppet.if
+++ b/puppet.if
@@ -1,4 +1,32 @@
@@ -81387,7 +81387,7 @@ index 7cb8b1f..bef7217 100644
+ allow $1 puppet_var_run_t:dir search_dir_perms;
')
diff --git a/puppet.te b/puppet.te
-index 618dcfe..d5d0cfc 100644
+index 618dcfeed..d5d0cfcb8 100644
--- a/puppet.te
+++ b/puppet.te
@@ -6,25 +6,32 @@ policy_module(puppet, 1.4.0)
@@ -81910,7 +81910,7 @@ index 618dcfe..d5d0cfc 100644
+ usermanage_access_check_useradd(puppetmaster_t)
+')
diff --git a/pwauth.fc b/pwauth.fc
-index 7e7b444..e2f8687 100644
+index 7e7b44434..e2f8687db 100644
--- a/pwauth.fc
+++ b/pwauth.fc
@@ -1,3 +1,3 @@
@@ -81920,7 +81920,7 @@ index 7e7b444..e2f8687 100644
-/var/run/pwauth\.lock -- gen_context(system_u:object_r:pwauth_var_run_t,s0)
+/var/run/pwauth.lock -- gen_context(system_u:object_r:pwauth_var_run_t,s0)
diff --git a/pwauth.if b/pwauth.if
-index 1148dce..86d25ea 100644
+index 1148dce1a..86d25ea26 100644
--- a/pwauth.if
+++ b/pwauth.if
@@ -1,72 +1,74 @@
@@ -82032,7 +82032,7 @@ index 1148dce..86d25ea 100644
+ allow $2 pwauth_t:process signal;
')
diff --git a/pwauth.te b/pwauth.te
-index 3078e34..215df88 100644
+index 3078e349e..215df880c 100644
--- a/pwauth.te
+++ b/pwauth.te
@@ -5,26 +5,23 @@ policy_module(pwauth, 1.0.0)
@@ -82080,7 +82080,7 @@ index 3078e34..215df88 100644
-
-miscfiles_read_localization(pwauth_t)
diff --git a/pxe.te b/pxe.te
-index 06bec9b..1b32632 100644
+index 06bec9ba9..1b32632dc 100644
--- a/pxe.te
+++ b/pxe.te
@@ -50,15 +50,12 @@ dev_read_sysfs(pxe_t)
@@ -82101,7 +82101,7 @@ index 06bec9b..1b32632 100644
diff --git a/pyicqt.fc b/pyicqt.fc
deleted file mode 100644
-index 0c143e3..0000000
+index 0c143e3e8..000000000
--- a/pyicqt.fc
+++ /dev/null
@@ -1,11 +0,0 @@
@@ -82118,7 +82118,7 @@ index 0c143e3..0000000
-/var/spool/pyicq-t(/.*)? gen_context(system_u:object_r:pyicqt_spool_t,s0)
diff --git a/pyicqt.if b/pyicqt.if
deleted file mode 100644
-index 0ccea82..0000000
+index 0ccea828a..000000000
--- a/pyicqt.if
+++ /dev/null
@@ -1,45 +0,0 @@
@@ -82169,7 +82169,7 @@ index 0ccea82..0000000
-')
diff --git a/pyicqt.te b/pyicqt.te
deleted file mode 100644
-index f2863de..0000000
+index f2863ded4..000000000
--- a/pyicqt.te
+++ /dev/null
@@ -1,92 +0,0 @@
@@ -82266,7 +82266,7 @@ index f2863de..0000000
- seutil_sigchld_newrole(pyicqt_t)
-')
diff --git a/pyzor.fc b/pyzor.fc
-index af13139..a927c5a 100644
+index af13139a1..a927c5a15 100644
--- a/pyzor.fc
+++ b/pyzor.fc
@@ -1,12 +1,13 @@
@@ -82291,7 +82291,7 @@ index af13139..a927c5a 100644
+/var/lib/pyzord(/.*)? gen_context(system_u:object_r:pyzor_var_lib_t,s0)
/var/log/pyzord\.log.* -- gen_context(system_u:object_r:pyzord_log_t,s0)
diff --git a/pyzor.if b/pyzor.if
-index 593c03d..2c411af 100644
+index 593c03d09..2c411af3e 100644
--- a/pyzor.if
+++ b/pyzor.if
@@ -2,7 +2,7 @@
@@ -82421,7 +82421,7 @@ index 593c03d..2c411af 100644
+ admin_pattern($1, pyzor_var_lib_t)
')
diff --git a/pyzor.te b/pyzor.te
-index 2439d13..d7bd6e9 100644
+index 2439d1304..d7bd6e9a1 100644
--- a/pyzor.te
+++ b/pyzor.te
@@ -5,57 +5,78 @@ policy_module(pyzor, 2.3.0)
@@ -82661,7 +82661,7 @@ index 2439d13..d7bd6e9 100644
+ logging_send_syslog_msg(pyzord_t)
+')
diff --git a/qemu.fc b/qemu.fc
-index 86ea53c..a2dcf7b 100644
+index 86ea53ce1..a2dcf7bb2 100644
--- a/qemu.fc
+++ b/qemu.fc
@@ -1,4 +1,4 @@
@@ -82671,7 +82671,7 @@ index 86ea53c..a2dcf7b 100644
/usr/bin/qemu-kvm -- gen_context(system_u:object_r:qemu_exec_t,s0)
/usr/bin/kvm -- gen_context(system_u:object_r:qemu_exec_t,s0)
diff --git a/qemu.if b/qemu.if
-index eaf56b8..8894726 100644
+index eaf56b8b0..889472688 100644
--- a/qemu.if
+++ b/qemu.if
@@ -1,19 +1,21 @@
@@ -83070,7 +83070,7 @@ index eaf56b8..8894726 100644
+ allow $1 qemu_exec_t:file getattr;
')
diff --git a/qemu.te b/qemu.te
-index 4f90743..958c0ef 100644
+index 4f9074343..958c0ef1e 100644
--- a/qemu.te
+++ b/qemu.te
@@ -6,28 +6,58 @@ policy_module(qemu, 1.8.0)
@@ -83212,7 +83212,7 @@ index 4f90743..958c0ef 100644
+ xserver_stream_connect(qemu_t)
')
diff --git a/qmail.fc b/qmail.fc
-index e53fe5a..edee505 100644
+index e53fe5a97..edee505d7 100644
--- a/qmail.fc
+++ b/qmail.fc
@@ -1,22 +1,6 @@
@@ -83283,7 +83283,7 @@ index e53fe5a..edee505 100644
-/var/spool/qmail(/.*)? gen_context(system_u:object_r:qmail_spool_t,s0)
diff --git a/qmail.if b/qmail.if
-index e4f0000..05e219e 100644
+index e4f0000e5..05e219e13 100644
--- a/qmail.if
+++ b/qmail.if
@@ -1,12 +1,12 @@
@@ -83482,7 +83482,7 @@ index e4f0000..05e219e 100644
+ allow $1 qmail_spool_t:fifo_file rw_fifo_file_perms;
+')
diff --git a/qmail.te b/qmail.te
-index 8742944..53a2fe5 100644
+index 87429441c..53a2fe597 100644
--- a/qmail.te
+++ b/qmail.te
@@ -5,7 +5,7 @@ policy_module(qmail, 1.6.1)
@@ -83754,7 +83754,7 @@ index 8742944..53a2fe5 100644
allow qmail_tcp_env_t qmail_smtpd_exec_t:file read_file_perms;
diff --git a/qpid.if b/qpid.if
-index fe2adf8..f7e9c70 100644
+index fe2adf8ae..f7e9c70b0 100644
--- a/qpid.if
+++ b/qpid.if
@@ -1,4 +1,4 @@
@@ -84038,7 +84038,7 @@ index fe2adf8..f7e9c70 100644
+ admin_pattern($1, qpidd_var_run_t)
')
diff --git a/qpid.te b/qpid.te
-index 83eb09e..8f641fc 100644
+index 83eb09ef6..8f641fc92 100644
--- a/qpid.te
+++ b/qpid.te
@@ -12,6 +12,9 @@ init_daemon_domain(qpidd_t, qpidd_exec_t)
@@ -84121,7 +84121,7 @@ index 83eb09e..8f641fc 100644
+')
+
diff --git a/quantum.fc b/quantum.fc
-index 70ab68b..b985b65 100644
+index 70ab68b02..b985b6570 100644
--- a/quantum.fc
+++ b/quantum.fc
@@ -1,10 +1,34 @@
@@ -84167,7 +84167,7 @@ index 70ab68b..b985b65 100644
+/var/run/neutron(/.*)? gen_context(system_u:object_r:neutron_var_run_t,s0)
+/var/run/quantum(/.*)? gen_context(system_u:object_r:neutron_var_run_t,s0)
diff --git a/quantum.if b/quantum.if
-index afc0068..589a7fd 100644
+index afc00688d..589a7fdde 100644
--- a/quantum.if
+++ b/quantum.if
@@ -2,41 +2,295 @@
@@ -84484,7 +84484,7 @@ index afc0068..589a7fd 100644
+ ')
')
diff --git a/quantum.te b/quantum.te
-index 8644d8b..97a9b7e 100644
+index 8644d8b3f..97a9b7e76 100644
--- a/quantum.te
+++ b/quantum.te
@@ -5,92 +5,183 @@ policy_module(quantum, 1.1.0)
@@ -84734,7 +84734,7 @@ index 8644d8b..97a9b7e 100644
+ udev_domtrans(neutron_t)
+')
diff --git a/quota.fc b/quota.fc
-index cadabe3..54ba01d 100644
+index cadabe360..54ba01d0d 100644
--- a/quota.fc
+++ b/quota.fc
@@ -1,6 +1,5 @@
@@ -84784,7 +84784,7 @@ index cadabe3..54ba01d 100644
-/var/spool/mail/a?quota\.(user|group) -- gen_context(system_u:object_r:quota_db_t,s0)
+/var/run/quota_nld\.pid -- gen_context(system_u:object_r:quota_nld_var_run_t,s0)
diff --git a/quota.if b/quota.if
-index da64218..3fb8575 100644
+index da6421861..3fb8575ca 100644
--- a/quota.if
+++ b/quota.if
@@ -1,4 +1,4 @@
@@ -85017,7 +85017,7 @@ index da64218..3fb8575 100644
+ domtrans_pattern($1, quota_nld_exec_t, quota_nld_t)
')
diff --git a/quota.te b/quota.te
-index f47c8e8..ba74734 100644
+index f47c8e81f..ba74734da 100644
--- a/quota.te
+++ b/quota.te
@@ -5,12 +5,10 @@ policy_module(quota, 1.6.0)
@@ -85148,7 +85148,7 @@ index f47c8e8..ba74734 100644
+ dbus_connect_system_bus(quota_nld_t)
')
diff --git a/rabbitmq.fc b/rabbitmq.fc
-index c5ad6de..44135d4 100644
+index c5ad6de76..44135d4d0 100644
--- a/rabbitmq.fc
+++ b/rabbitmq.fc
@@ -1,7 +1,8 @@
@@ -85163,7 +85163,7 @@ index c5ad6de..44135d4 100644
/var/lib/rabbitmq(/.*)? gen_context(system_u:object_r:rabbitmq_var_lib_t,s0)
diff --git a/rabbitmq.if b/rabbitmq.if
-index 2c3d338..7d49554 100644
+index 2c3d33896..7d49554eb 100644
--- a/rabbitmq.if
+++ b/rabbitmq.if
@@ -38,12 +38,12 @@ interface(`rabbitmq_domtrans',`
@@ -85183,7 +85183,7 @@ index 2c3d338..7d49554 100644
init_labeled_script_domtrans($1, rabbitmq_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/rabbitmq.te b/rabbitmq.te
-index dc3b0ed..37aa9a7 100644
+index dc3b0ed87..37aa9a784 100644
--- a/rabbitmq.te
+++ b/rabbitmq.te
@@ -5,13 +5,14 @@ policy_module(rabbitmq, 1.0.2)
@@ -85407,7 +85407,7 @@ index dc3b0ed..37aa9a7 100644
-miscfiles_read_localization(rabbitmq_epmd_t)
diff --git a/radius.fc b/radius.fc
-index d447e85..76ed794 100644
+index d447e8548..76ed794ce 100644
--- a/radius.fc
+++ b/radius.fc
@@ -9,7 +9,9 @@
@@ -85422,7 +85422,7 @@ index d447e85..76ed794 100644
/var/log/freeradius(/.*)? gen_context(system_u:object_r:radiusd_log_t,s0)
/var/log/radacct(/.*)? gen_context(system_u:object_r:radiusd_log_t,s0)
diff --git a/radius.if b/radius.if
-index 4460582..4c66c25 100644
+index 44605825c..4c66c2502 100644
--- a/radius.if
+++ b/radius.if
@@ -14,6 +14,30 @@ interface(`radius_use',`
@@ -85484,7 +85484,7 @@ index 4460582..4c66c25 100644
+
')
diff --git a/radius.te b/radius.te
-index 403a4fe..193195e 100644
+index 403a4fed1..193195e3c 100644
--- a/radius.te
+++ b/radius.te
@@ -5,6 +5,13 @@ policy_module(radius, 1.13.0)
@@ -85631,7 +85631,7 @@ index 403a4fe..193195e 100644
udev_read_db(radiusd_t)
')
diff --git a/radvd.if b/radvd.if
-index ac7058d..48739ac 100644
+index ac7058d1e..48739ac1b 100644
--- a/radvd.if
+++ b/radvd.if
@@ -1,5 +1,24 @@
@@ -85673,7 +85673,7 @@ index ac7058d..48739ac 100644
init_labeled_script_domtrans($1, radvd_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/radvd.te b/radvd.te
-index 6d162e4..502ca16 100644
+index 6d162e4e6..502ca16ba 100644
--- a/radvd.te
+++ b/radvd.te
@@ -22,7 +22,7 @@ files_pid_file(radvd_var_run_t)
@@ -85695,7 +85695,7 @@ index 6d162e4..502ca16 100644
userdom_dontaudit_search_user_home_dirs(radvd_t)
diff --git a/raid.fc b/raid.fc
-index 5806046..2a4769f 100644
+index 5806046b1..2a4769ff4 100644
--- a/raid.fc
+++ b/raid.fc
@@ -3,6 +3,12 @@
@@ -85723,7 +85723,7 @@ index 5806046..2a4769f 100644
+
/var/run/mdadm(/.*)? gen_context(system_u:object_r:mdadm_var_run_t,s0)
diff --git a/raid.if b/raid.if
-index 951db7f..00e699d 100644
+index 951db7f1b..00e699da4 100644
--- a/raid.if
+++ b/raid.if
@@ -1,9 +1,8 @@
@@ -85939,7 +85939,7 @@ index 951db7f..00e699d 100644
+ files_etc_filetrans($1, mdadm_conf_t, file, "mdadm.conf.anacbak")
')
diff --git a/raid.te b/raid.te
-index c99753f..55294ac 100644
+index c99753f2c..55294acec 100644
--- a/raid.te
+++ b/raid.te
@@ -15,54 +15,104 @@ role mdadm_roles types mdadm_t;
@@ -86125,7 +86125,7 @@ index c99753f..55294ac 100644
+')
diff --git a/rasdaemon.fc b/rasdaemon.fc
new file mode 100644
-index 0000000..8e31dd0
+index 000000000..8e31dd042
--- /dev/null
+++ b/rasdaemon.fc
@@ -0,0 +1,9 @@
@@ -86140,7 +86140,7 @@ index 0000000..8e31dd0
+/var/lib/rasdaemon(/.*)? gen_context(system_u:object_r:rasdaemon_var_lib_t,s0)
diff --git a/rasdaemon.if b/rasdaemon.if
new file mode 100644
-index 0000000..d57006d
+index 000000000..d57006d9c
--- /dev/null
+++ b/rasdaemon.if
@@ -0,0 +1,157 @@
@@ -86303,7 +86303,7 @@ index 0000000..d57006d
+')
diff --git a/rasdaemon.te b/rasdaemon.te
new file mode 100644
-index 0000000..dcdca44
+index 000000000..dcdca4448
--- /dev/null
+++ b/rasdaemon.te
@@ -0,0 +1,51 @@
@@ -86359,7 +86359,7 @@ index 0000000..dcdca44
+')
+
diff --git a/razor.fc b/razor.fc
-index 6723f4d..6e26673 100644
+index 6723f4d3b..6e2667392 100644
--- a/razor.fc
+++ b/razor.fc
@@ -1,9 +1,9 @@
@@ -86379,7 +86379,7 @@ index 6723f4d..6e26673 100644
+#/var/lib/razor(/.*)? gen_context(system_u:object_r:razor_var_lib_t,s0)
+#/var/log/razor-agent\.log.* -- gen_context(system_u:object_r:razor_log_t,s0)
diff --git a/razor.if b/razor.if
-index 1e4b523..fee3b7c 100644
+index 1e4b523bf..fee3b7cd1 100644
--- a/razor.if
+++ b/razor.if
@@ -1,72 +1,147 @@
@@ -86607,7 +86607,7 @@ index 1e4b523..fee3b7c 100644
##
##
diff --git a/razor.te b/razor.te
-index 68455f9..38f6968 100644
+index 68455f909..38f69685c 100644
--- a/razor.te
+++ b/razor.te
@@ -5,135 +5,124 @@ policy_module(razor, 2.4.0)
@@ -86863,7 +86863,7 @@ index 68455f9..38f6968 100644
+ ')
')
diff --git a/rdisc.fc b/rdisc.fc
-index e9765c0..ea21331 100644
+index e9765c0f2..ea21331d8 100644
--- a/rdisc.fc
+++ b/rdisc.fc
@@ -1,3 +1,3 @@
@@ -86872,7 +86872,7 @@ index e9765c0..ea21331 100644
/usr/sbin/rdisc -- gen_context(system_u:object_r:rdisc_exec_t,s0)
diff --git a/rdisc.if b/rdisc.if
-index 170ef52..28ccc4a 100644
+index 170ef52fb..28ccc4a75 100644
--- a/rdisc.if
+++ b/rdisc.if
@@ -18,3 +18,58 @@ interface(`rdisc_exec',`
@@ -86935,7 +86935,7 @@ index 170ef52..28ccc4a 100644
+ ')
+')
diff --git a/rdisc.te b/rdisc.te
-index 9196c1d..b775931 100644
+index 9196c1dbb..b7759316f 100644
--- a/rdisc.te
+++ b/rdisc.te
@@ -9,6 +9,9 @@ type rdisc_t;
@@ -86970,7 +86970,7 @@ index 9196c1d..b775931 100644
userdom_dontaudit_use_unpriv_user_fds(rdisc_t)
diff --git a/readahead.fc b/readahead.fc
-index f01b32f..46279e8 100644
+index f01b32fe2..46279e853 100644
--- a/readahead.fc
+++ b/readahead.fc
@@ -1,7 +1,11 @@
@@ -86987,7 +86987,7 @@ index f01b32f..46279e8 100644
+/var/run/systemd/readahead(/.*)? gen_context(system_u:object_r:readahead_var_run_t,s0)
/var/run/readahead.* gen_context(system_u:object_r:readahead_var_run_t,s0)
diff --git a/readahead.if b/readahead.if
-index 661bb88..06f69c4 100644
+index 661bb88fd..06f69c4ad 100644
--- a/readahead.if
+++ b/readahead.if
@@ -19,3 +19,27 @@ interface(`readahead_domtrans',`
@@ -87019,7 +87019,7 @@ index 661bb88..06f69c4 100644
+')
+
diff --git a/readahead.te b/readahead.te
-index c0b02c9..af81d71 100644
+index c0b02c91c..af81d71a7 100644
--- a/readahead.te
+++ b/readahead.te
@@ -15,6 +15,7 @@ typealias readahead_var_lib_t alias readahead_etc_rw_t;
@@ -87107,7 +87107,7 @@ index c0b02c9..af81d71 100644
userdom_dontaudit_search_user_home_dirs(readahead_t)
diff --git a/realmd.fc b/realmd.fc
-index 04babe3..3b92679 100644
+index 04babe3d5..3b92679bb 100644
--- a/realmd.fc
+++ b/realmd.fc
@@ -1 +1,5 @@
@@ -87118,7 +87118,7 @@ index 04babe3..3b92679 100644
+
+/var/lib/ipa-client(/.*)? gen_context(system_u:object_r:realmd_var_lib_t,s0)
diff --git a/realmd.if b/realmd.if
-index bff31df..1663054 100644
+index bff31dfd2..1663054d9 100644
--- a/realmd.if
+++ b/realmd.if
@@ -1,8 +1,9 @@
@@ -87255,7 +87255,7 @@ index bff31df..1663054 100644
+
+')
diff --git a/realmd.te b/realmd.te
-index 5bc878b..5736203 100644
+index 5bc878b29..573620309 100644
--- a/realmd.te
+++ b/realmd.te
@@ -7,47 +7,89 @@ policy_module(realmd, 1.1.0)
@@ -87434,7 +87434,7 @@ index 5bc878b..5736203 100644
+ unconfined_domain_noaudit(realmd_consolehelper_t)
')
diff --git a/redis.fc b/redis.fc
-index e240ac9..b9707aa 100644
+index e240ac99c..b9707aaf8 100644
--- a/redis.fc
+++ b/redis.fc
@@ -1,9 +1,13 @@
@@ -87456,7 +87456,7 @@ index e240ac9..b9707aa 100644
+
+/var/run/redis(/.*)? gen_context(system_u:object_r:redis_var_run_t,s0)
diff --git a/redis.if b/redis.if
-index 16c8ecb..4e021ec 100644
+index 16c8ecbe3..4e021eca7 100644
--- a/redis.if
+++ b/redis.if
@@ -1,9 +1,225 @@
@@ -87720,7 +87720,7 @@ index 16c8ecb..4e021ec 100644
+ ')
')
diff --git a/redis.te b/redis.te
-index 25cd417..61de827 100644
+index 25cd4175f..61de8277a 100644
--- a/redis.te
+++ b/redis.te
@@ -12,6 +12,9 @@ init_daemon_domain(redis_t, redis_exec_t)
@@ -87778,14 +87778,14 @@ index 25cd417..61de827 100644
-
sysnet_dns_name_resolve(redis_t)
diff --git a/remotelogin.fc b/remotelogin.fc
-index 327baf0..d8691bd 100644
+index 327baf059..d8691bd14 100644
--- a/remotelogin.fc
+++ b/remotelogin.fc
@@ -1 +1,2 @@
+
# Remote login currently has no file contexts.
diff --git a/remotelogin.if b/remotelogin.if
-index a9ce68e..92520aa 100644
+index a9ce68e33..92520aa92 100644
--- a/remotelogin.if
+++ b/remotelogin.if
@@ -1,4 +1,4 @@
@@ -87856,7 +87856,7 @@ index a9ce68e..92520aa 100644
+ allow $1 remote_login_t:process signull;
')
diff --git a/remotelogin.te b/remotelogin.te
-index ae30871..15a669c 100644
+index ae308717f..15a669cd4 100644
--- a/remotelogin.te
+++ b/remotelogin.te
@@ -10,81 +10,89 @@ domain_interactive_fd(remote_login_t)
@@ -87972,7 +87972,7 @@ index ae30871..15a669c 100644
')
diff --git a/resmgr.te b/resmgr.te
-index f6eb358..b631919 100644
+index f6eb358ad..b6319191c 100644
--- a/resmgr.te
+++ b/resmgr.te
@@ -23,7 +23,7 @@ files_pid_file(resmgrd_var_run_t)
@@ -88002,7 +88002,7 @@ index f6eb358..b631919 100644
optional_policy(`
diff --git a/rgmanager.fc b/rgmanager.fc
-index 5421af0..91e69b8 100644
+index 5421af0b6..91e69b869 100644
--- a/rgmanager.fc
+++ b/rgmanager.fc
@@ -1,12 +1,22 @@
@@ -88036,7 +88036,7 @@ index 5421af0..91e69b8 100644
+/var/run/heartbeat(/.*)? gen_context(system_u:object_r:rgmanager_var_run_t,s0)
+/var/run/rgmanager\.pid -- gen_context(system_u:object_r:rgmanager_var_run_t,s0)
diff --git a/rgmanager.if b/rgmanager.if
-index 1c2f9aa..a4133dc 100644
+index 1c2f9aa12..a4133dc92 100644
--- a/rgmanager.if
+++ b/rgmanager.if
@@ -1,13 +1,13 @@
@@ -88228,7 +88228,7 @@ index 1c2f9aa..a4133dc 100644
+ allow $1 rgmanager_var_lib_t:dir search_dir_perms;
+')
diff --git a/rgmanager.te b/rgmanager.te
-index c8a1e16..f9d6fb3 100644
+index c8a1e16e4..f9d6fb341 100644
--- a/rgmanager.te
+++ b/rgmanager.te
@@ -6,10 +6,9 @@ policy_module(rgmanager, 1.3.0)
@@ -88447,7 +88447,7 @@ index c8a1e16..f9d6fb3 100644
xen_domtrans_xm(rgmanager_t)
')
diff --git a/rhcs.fc b/rhcs.fc
-index 47de2d6..6baf5cd 100644
+index 47de2d681..6baf5cdae 100644
--- a/rhcs.fc
+++ b/rhcs.fc
@@ -1,31 +1,104 @@
@@ -88579,7 +88579,7 @@ index 47de2d6..6baf5cd 100644
+/var/log/pacemaker\.log.* -- gen_context(system_u:object_r:cluster_var_log_t,s0)
+/var/log/pcsd(/.*)? gen_context(system_u:object_r:cluster_var_log_t,s0)
diff --git a/rhcs.if b/rhcs.if
-index c8bdea2..beb2872 100644
+index c8bdea28d..beb2872e3 100644
--- a/rhcs.if
+++ b/rhcs.if
@@ -1,19 +1,19 @@
@@ -89464,7 +89464,7 @@ index c8bdea2..beb2872 100644
+ allow $1 haproxy_unit_file_t:service {status start};
')
diff --git a/rhcs.te b/rhcs.te
-index 6cf79c4..0dbfae6 100644
+index 6cf79c449..0dbfae6d5 100644
--- a/rhcs.te
+++ b/rhcs.te
@@ -20,6 +20,35 @@ gen_tunable(fenced_can_network_connect, false)
@@ -90069,7 +90069,7 @@ index 6cf79c4..0dbfae6 100644
')
diff --git a/rhev.fc b/rhev.fc
new file mode 100644
-index 0000000..013d1d9
+index 000000000..013d1d964
--- /dev/null
+++ b/rhev.fc
@@ -0,0 +1,14 @@
@@ -90089,7 +90089,7 @@ index 0000000..013d1d9
+/var/log/ovirt-guest-agent(/.*)? gen_context(system_u:object_r:rhev_agentd_log_t,s0)
diff --git a/rhev.if b/rhev.if
new file mode 100644
-index 0000000..bf11e25
+index 000000000..bf11e2563
--- /dev/null
+++ b/rhev.if
@@ -0,0 +1,76 @@
@@ -90171,7 +90171,7 @@ index 0000000..bf11e25
+')
diff --git a/rhev.te b/rhev.te
new file mode 100644
-index 0000000..8b7aa12
+index 000000000..8b7aa12d8
--- /dev/null
+++ b/rhev.te
@@ -0,0 +1,128 @@
@@ -90304,7 +90304,7 @@ index 0000000..8b7aa12
+ ')
+')
diff --git a/rhgb.if b/rhgb.if
-index 1a134a7..793a29f 100644
+index 1a134a72e..793a29f88 100644
--- a/rhgb.if
+++ b/rhgb.if
@@ -1,4 +1,4 @@
@@ -90408,7 +90408,7 @@ index 1a134a7..793a29f 100644
allow $1 rhgb_tmpfs_t:file rw_file_perms;
')
diff --git a/rhgb.te b/rhgb.te
-index 3f32e4b..f97ea42 100644
+index 3f32e4bb3..f97ea42f8 100644
--- a/rhgb.te
+++ b/rhgb.te
@@ -43,7 +43,6 @@ kernel_read_system_state(rhgb_t)
@@ -90441,7 +90441,7 @@ index 3f32e4b..f97ea42 100644
diff --git a/rhnsd.fc b/rhnsd.fc
new file mode 100644
-index 0000000..860a91d
+index 000000000..860a91df8
--- /dev/null
+++ b/rhnsd.fc
@@ -0,0 +1,9 @@
@@ -90456,7 +90456,7 @@ index 0000000..860a91d
+/etc/sysconfig/rhn(/.*)? gen_context(system_u:object_r:rhnsd_conf_t,s0)
diff --git a/rhnsd.if b/rhnsd.if
new file mode 100644
-index 0000000..a161c70
+index 000000000..a161c70f9
--- /dev/null
+++ b/rhnsd.if
@@ -0,0 +1,120 @@
@@ -90582,7 +90582,7 @@ index 0000000..a161c70
+')
diff --git a/rhnsd.te b/rhnsd.te
new file mode 100644
-index 0000000..b947f09
+index 000000000..b947f092a
--- /dev/null
+++ b/rhnsd.te
@@ -0,0 +1,48 @@
@@ -90635,7 +90635,7 @@ index 0000000..b947f09
+ rpm_domtrans(rhnsd_t)
+')
diff --git a/rhsmcertd.fc b/rhsmcertd.fc
-index 8c02804..896c8c6 100644
+index 8c0280418..896c8c67f 100644
--- a/rhsmcertd.fc
+++ b/rhsmcertd.fc
@@ -2,6 +2,8 @@
@@ -90648,7 +90648,7 @@ index 8c02804..896c8c6 100644
/var/lock/subsys/rhsmcertd -- gen_context(system_u:object_r:rhsmcertd_lock_t,s0)
diff --git a/rhsmcertd.if b/rhsmcertd.if
-index 6dbc905..4b17c93 100644
+index 6dbc905b3..4b17c933e 100644
--- a/rhsmcertd.if
+++ b/rhsmcertd.if
@@ -1,8 +1,8 @@
@@ -90907,7 +90907,7 @@ index 6dbc905..4b17c93 100644
- admin_pattern($1, rhsmcertd_lock_t)
')
diff --git a/rhsmcertd.te b/rhsmcertd.te
-index d32e1a2..75b615f 100644
+index d32e1a279..75b615f81 100644
--- a/rhsmcertd.te
+++ b/rhsmcertd.te
@@ -18,6 +18,9 @@ logging_log_file(rhsmcertd_log_t)
@@ -91047,7 +91047,7 @@ index d32e1a2..75b615f 100644
+ unconfined_server_signull(rhsmcertd_t)
')
diff --git a/ricci.if b/ricci.if
-index 2ab3ed1..23d579c 100644
+index 2ab3ed1d4..23d579cde 100644
--- a/ricci.if
+++ b/ricci.if
@@ -1,13 +1,13 @@
@@ -91280,7 +91280,7 @@ index 2ab3ed1..23d579c 100644
role_transition $2 ricci_initrc_exec_t system_r;
allow $2 system_r;
diff --git a/ricci.te b/ricci.te
-index 0ba2569..161850d 100644
+index 0ba2569a5..161850d41 100644
--- a/ricci.te
+++ b/ricci.te
@@ -115,7 +115,6 @@ kernel_read_system_state(ricci_t)
@@ -91446,14 +91446,14 @@ index 0ba2569..161850d 100644
ccs_stream_connect(ricci_modstorage_t)
diff --git a/rkhunter.fc b/rkhunter.fc
new file mode 100644
-index 0000000..645a9cc
+index 000000000..645a9cc1a
--- /dev/null
+++ b/rkhunter.fc
@@ -0,0 +1 @@
+/var/lib/rkhunter(/.*)? gen_context(system_u:object_r:rkhunter_var_lib_t,s0)
diff --git a/rkhunter.if b/rkhunter.if
new file mode 100644
-index 0000000..0be4cee
+index 000000000..0be4ceec0
--- /dev/null
+++ b/rkhunter.if
@@ -0,0 +1,39 @@
@@ -91498,7 +91498,7 @@ index 0000000..0be4cee
+')
diff --git a/rkhunter.te b/rkhunter.te
new file mode 100644
-index 0000000..44de480
+index 000000000..44de48092
--- /dev/null
+++ b/rkhunter.te
@@ -0,0 +1,4 @@
@@ -91508,7 +91508,7 @@ index 0000000..44de480
+files_type(rkhunter_var_lib_t)
diff --git a/rkt.fc b/rkt.fc
new file mode 100644
-index 0000000..1941457
+index 000000000..19414579e
--- /dev/null
+++ b/rkt.fc
@@ -0,0 +1,11 @@
@@ -91525,7 +91525,7 @@ index 0000000..1941457
+/var/lib/rkt(/.*)? gen_context(system_u:object_r:rkt_var_lib_t,s0)
diff --git a/rkt.if b/rkt.if
new file mode 100644
-index 0000000..8f367ed
+index 000000000..8f367ed44
--- /dev/null
+++ b/rkt.if
@@ -0,0 +1,177 @@
@@ -91708,7 +91708,7 @@ index 0000000..8f367ed
+')
diff --git a/rkt.te b/rkt.te
new file mode 100644
-index 0000000..4e962a7
+index 000000000..4e962a7bf
--- /dev/null
+++ b/rkt.te
@@ -0,0 +1,38 @@
@@ -91751,7 +91751,7 @@ index 0000000..4e962a7
+
+sysnet_dns_name_resolve(rkt_t)
diff --git a/rlogin.fc b/rlogin.fc
-index f111877..e361ee9 100644
+index f11187720..e361ee9e2 100644
--- a/rlogin.fc
+++ b/rlogin.fc
@@ -1,5 +1,7 @@
@@ -91765,7 +91765,7 @@ index f111877..e361ee9 100644
/usr/kerberos/sbin/klogind -- gen_context(system_u:object_r:rlogind_exec_t,s0)
diff --git a/rlogin.if b/rlogin.if
-index 050479d..0e1b364 100644
+index 050479dea..0e1b364fb 100644
--- a/rlogin.if
+++ b/rlogin.if
@@ -29,7 +29,7 @@ interface(`rlogin_domtrans',`
@@ -91778,7 +91778,7 @@ index 050479d..0e1b364 100644
type rlogind_home_t;
')
diff --git a/rlogin.te b/rlogin.te
-index ee27948..34d2ee9 100644
+index ee2794858..34d2ee96f 100644
--- a/rlogin.te
+++ b/rlogin.te
@@ -31,10 +31,12 @@ files_pid_file(rlogind_var_run_t)
@@ -91870,7 +91870,7 @@ index ee27948..34d2ee9 100644
kerberos_use(rlogind_t)
')
diff --git a/rngd.fc b/rngd.fc
-index fa19aa8..90eb481 100644
+index fa19aa8de..90eb481c1 100644
--- a/rngd.fc
+++ b/rngd.fc
@@ -1,5 +1,7 @@
@@ -91882,7 +91882,7 @@ index fa19aa8..90eb481 100644
/var/run/rngd\.pid -- gen_context(system_u:object_r:rngd_var_run_t,s0)
diff --git a/rngd.if b/rngd.if
-index 13f788f..10e2033 100644
+index 13f788fd5..10e203301 100644
--- a/rngd.if
+++ b/rngd.if
@@ -2,6 +2,29 @@
@@ -91947,7 +91947,7 @@ index 13f788f..10e2033 100644
+ allow $1 rngd_unit_file_t:service all_service_perms;
')
diff --git a/rngd.te b/rngd.te
-index a7b7717..41bca3b 100644
+index a7b7717b7..41bca3bb8 100644
--- a/rngd.te
+++ b/rngd.te
@@ -12,6 +12,9 @@ init_daemon_domain(rngd_t, rngd_exec_t)
@@ -91973,7 +91973,7 @@ index a7b7717..41bca3b 100644
-miscfiles_read_localization(rngd_t)
diff --git a/rolekit.fc b/rolekit.fc
new file mode 100644
-index 0000000..504b6e1
+index 000000000..504b6e13e
--- /dev/null
+++ b/rolekit.fc
@@ -0,0 +1,3 @@
@@ -91982,7 +91982,7 @@ index 0000000..504b6e1
+/usr/sbin/roled -- gen_context(system_u:object_r:rolekit_exec_t,s0)
diff --git a/rolekit.if b/rolekit.if
new file mode 100644
-index 0000000..b11fb8f
+index 000000000..b11fb8f6d
--- /dev/null
+++ b/rolekit.if
@@ -0,0 +1,120 @@
@@ -92108,7 +92108,7 @@ index 0000000..b11fb8f
+')
diff --git a/rolekit.te b/rolekit.te
new file mode 100644
-index 0000000..da94453
+index 000000000..da944537b
--- /dev/null
+++ b/rolekit.te
@@ -0,0 +1,47 @@
@@ -92160,7 +92160,7 @@ index 0000000..da94453
+ domain_named_filetrans(rolekit_t)
+')
diff --git a/roundup.fc b/roundup.fc
-index 6f05cd0..dc2a9aa 100644
+index 6f05cd06a..dc2a9aaee 100644
--- a/roundup.fc
+++ b/roundup.fc
@@ -2,4 +2,4 @@
@@ -92170,7 +92170,7 @@ index 6f05cd0..dc2a9aa 100644
-/var/lib/roundup(/.*)? -- gen_context(system_u:object_r:roundup_var_lib_t,s0)
+/var/lib/roundup(/.*)? gen_context(system_u:object_r:roundup_var_lib_t,s0)
diff --git a/roundup.if b/roundup.if
-index 975bb6a..ce4f5ea 100644
+index 975bb6a45..ce4f5ead8 100644
--- a/roundup.if
+++ b/roundup.if
@@ -23,8 +23,11 @@ interface(`roundup_admin',`
@@ -92187,7 +92187,7 @@ index 975bb6a..ce4f5ea 100644
init_labeled_script_domtrans($1, roundup_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/roundup.te b/roundup.te
-index ccb5991..fa10c5a 100644
+index ccb5991ed..fa10c5a2d 100644
--- a/roundup.te
+++ b/roundup.te
@@ -38,10 +38,10 @@ files_pid_filetrans(roundup_t, roundup_var_run_t, file)
@@ -92228,7 +92228,7 @@ index ccb5991..fa10c5a 100644
optional_policy(`
diff --git a/rpc.fc b/rpc.fc
-index a6fb30c..97ef313 100644
+index a6fb30cb3..97ef313df 100644
--- a/rpc.fc
+++ b/rpc.fc
@@ -1,12 +1,25 @@
@@ -92280,7 +92280,7 @@ index a6fb30c..97ef313 100644
+/var/run/rpc\.statd\.lock -- gen_context(system_u:object_r:rpcd_lock_t,s0)
+
diff --git a/rpc.if b/rpc.if
-index 0bf13c2..79a2a9c 100644
+index 0bf13c220..79a2a9c48 100644
--- a/rpc.if
+++ b/rpc.if
@@ -1,4 +1,4 @@
@@ -92766,7 +92766,7 @@ index 0bf13c2..79a2a9c 100644
+ allow $1 gssd_t:process { noatsecure rlimitinh };
+')
diff --git a/rpc.te b/rpc.te
-index 2da9fca..49c37e8 100644
+index 2da9fca2f..49c37e8ea 100644
--- a/rpc.te
+++ b/rpc.te
@@ -6,22 +6,27 @@ policy_module(rpc, 1.15.1)
@@ -93135,7 +93135,7 @@ index 2da9fca..49c37e8 100644
')
diff --git a/rpcbind.fc b/rpcbind.fc
-index d31220e..0b6894a 100644
+index d31220e08..0b6894a67 100644
--- a/rpcbind.fc
+++ b/rpcbind.fc
@@ -1,8 +1,12 @@
@@ -93152,7 +93152,7 @@ index d31220e..0b6894a 100644
/var/cache/rpcbind(/.*)? gen_context(system_u:object_r:rpcbind_var_lib_t,s0)
diff --git a/rpcbind.if b/rpcbind.if
-index 3b5e9ee..ff1163f 100644
+index 3b5e9eed6..ff1163ff6 100644
--- a/rpcbind.if
+++ b/rpcbind.if
@@ -1,4 +1,4 @@
@@ -93306,7 +93306,7 @@ index 3b5e9ee..ff1163f 100644
+ admin_pattern($1, rpcbind_var_run_t)
')
diff --git a/rpcbind.te b/rpcbind.te
-index 54de77c..db13fcf 100644
+index 54de77ccd..db13fcff8 100644
--- a/rpcbind.te
+++ b/rpcbind.te
@@ -12,6 +12,9 @@ init_daemon_domain(rpcbind_t, rpcbind_exec_t)
@@ -93370,7 +93370,7 @@ index 54de77c..db13fcf 100644
ifdef(`distro_debian',`
term_dontaudit_use_unallocated_ttys(rpcbind_t)
diff --git a/rpm.fc b/rpm.fc
-index ebe91fc..6ba4338 100644
+index ebe91fc70..6ba4338cb 100644
--- a/rpm.fc
+++ b/rpm.fc
@@ -1,61 +1,80 @@
@@ -93498,7 +93498,7 @@ index ebe91fc..6ba4338 100644
+/sbin/cpio -- gen_context(system_u:object_r:rpm_exec_t,s0)
')
diff --git a/rpm.if b/rpm.if
-index ef3b225..b15d901 100644
+index ef3b22507..b15d901a4 100644
--- a/rpm.if
+++ b/rpm.if
@@ -1,8 +1,8 @@
@@ -94138,7 +94138,7 @@ index ef3b225..b15d901 100644
admin_pattern($1, { rpm_tmp_t rpm_script_tmp_t })
diff --git a/rpm.te b/rpm.te
-index 6fc360e..2f24b1e 100644
+index 6fc360e60..2f24b1e0c 100644
--- a/rpm.te
+++ b/rpm.te
@@ -1,15 +1,13 @@
@@ -94641,7 +94641,7 @@ index 6fc360e..2f24b1e 100644
+ usermanage_run_useradd(rpm_script_t, rpm_script_roles)
')
diff --git a/rshd.fc b/rshd.fc
-index 9ad0d58..6a4db03 100644
+index 9ad0d58dc..6a4db031f 100644
--- a/rshd.fc
+++ b/rshd.fc
@@ -1,3 +1,4 @@
@@ -94650,7 +94650,7 @@ index 9ad0d58..6a4db03 100644
/usr/sbin/in\.rexecd -- gen_context(system_u:object_r:rshd_exec_t,s0)
diff --git a/rshd.if b/rshd.if
-index 7ad29c0..2e87d76 100644
+index 7ad29c046..2e87d76b4 100644
--- a/rshd.if
+++ b/rshd.if
@@ -2,7 +2,7 @@
@@ -94671,7 +94671,7 @@ index 7ad29c0..2e87d76 100644
domtrans_pattern($1, rshd_exec_t, rshd_t)
')
diff --git a/rshd.te b/rshd.te
-index 864e089..a28dccd 100644
+index 864e089a0..a28dccd64 100644
--- a/rshd.te
+++ b/rshd.te
@@ -4,11 +4,12 @@ policy_module(rshd, 1.8.1)
@@ -94772,7 +94772,7 @@ index 864e089..a28dccd 100644
')
diff --git a/rssh.te b/rssh.te
-index 5c5465f..6005932 100644
+index 5c5465feb..60059323f 100644
--- a/rssh.te
+++ b/rssh.te
@@ -60,18 +60,14 @@ manage_files_pattern(rssh_t, rssh_rw_t, rssh_rw_t)
@@ -94801,7 +94801,7 @@ index 5c5465f..6005932 100644
-
-miscfiles_read_localization(rssh_chroot_helper_t)
diff --git a/rsync.fc b/rsync.fc
-index d25301b..f3eeec7 100644
+index d25301b85..f3eeec7b6 100644
--- a/rsync.fc
+++ b/rsync.fc
@@ -1,7 +1,8 @@
@@ -94816,7 +94816,7 @@ index d25301b..f3eeec7 100644
/var/run/rsyncd\.lock -- gen_context(system_u:object_r:rsync_var_run_t,s0)
+/var/run/swift_server\.lock -- gen_context(system_u:object_r:rsync_var_run_t,s0)
diff --git a/rsync.if b/rsync.if
-index f1140ef..642e062 100644
+index f1140efe4..642e062f4 100644
--- a/rsync.if
+++ b/rsync.if
@@ -1,16 +1,32 @@
@@ -95094,7 +95094,7 @@ index f1140ef..642e062 100644
+ files_pid_filetrans($1, rsync_var_run_t, file, "rsyncd.lock")
')
diff --git a/rsync.te b/rsync.te
-index abeb302..b27a479 100644
+index abeb302a7..b27a47979 100644
--- a/rsync.te
+++ b/rsync.te
@@ -6,67 +6,46 @@ policy_module(rsync, 1.13.0)
@@ -95341,7 +95341,7 @@ index abeb302..b27a479 100644
')
diff --git a/rtas.fc b/rtas.fc
new file mode 100644
-index 0000000..8d12521
+index 000000000..8d12521d2
--- /dev/null
+++ b/rtas.fc
@@ -0,0 +1,14 @@
@@ -95361,7 +95361,7 @@ index 0000000..8d12521
+
diff --git a/rtas.if b/rtas.if
new file mode 100644
-index 0000000..92cc49d
+index 000000000..92cc49d7f
--- /dev/null
+++ b/rtas.if
@@ -0,0 +1,163 @@
@@ -95530,7 +95530,7 @@ index 0000000..92cc49d
+')
diff --git a/rtas.te b/rtas.te
new file mode 100644
-index 0000000..9a5164c
+index 000000000..9a5164c7e
--- /dev/null
+++ b/rtas.te
@@ -0,0 +1,95 @@
@@ -95630,7 +95630,7 @@ index 0000000..9a5164c
+ unconfined_domain(rtas_errd_t)
+')
diff --git a/rtkit.if b/rtkit.if
-index e904ec4..e0dd20e 100644
+index e904ec472..e0dd20eeb 100644
--- a/rtkit.if
+++ b/rtkit.if
@@ -15,7 +15,6 @@ interface(`rtkit_daemon_domtrans',`
@@ -95717,7 +95717,7 @@ index e904ec4..e0dd20e 100644
+ ')
')
diff --git a/rtkit.te b/rtkit.te
-index 7eea21f..7140646 100644
+index 7eea21f3f..714064633 100644
--- a/rtkit.te
+++ b/rtkit.te
@@ -31,8 +31,6 @@ auth_use_nsswitch(rtkit_daemon_t)
@@ -95730,7 +95730,7 @@ index 7eea21f..7140646 100644
dbus_system_domain(rtkit_daemon_t, rtkit_daemon_exec_t)
diff --git a/rwho.if b/rwho.if
-index 0360ff0..e6cb34f 100644
+index 0360ff013..e6cb34f71 100644
--- a/rwho.if
+++ b/rwho.if
@@ -139,8 +139,11 @@ interface(`rwho_admin',`
@@ -95747,7 +95747,7 @@ index 0360ff0..e6cb34f 100644
init_labeled_script_domtrans($1, rwho_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/rwho.te b/rwho.te
-index 7fb75f4..9ccbd95 100644
+index 7fb75f457..9ccbd95c2 100644
--- a/rwho.te
+++ b/rwho.te
@@ -16,7 +16,7 @@ type rwho_log_t;
@@ -95789,7 +95789,7 @@ index 7fb75f4..9ccbd95 100644
+userdom_getattr_user_terminals(rwho_t)
+
diff --git a/samba.fc b/samba.fc
-index b8b66ff..a93346e 100644
+index b8b66ff4d..a93346efe 100644
--- a/samba.fc
+++ b/samba.fc
@@ -1,42 +1,55 @@
@@ -95890,7 +95890,7 @@ index b8b66ff..a93346e 100644
+/var/lib/samba/scripts(/.*)? gen_context(system_u:object_r:samba_unconfined_script_exec_t,s0)
+')
diff --git a/samba.if b/samba.if
-index 50d07fb..a34db48 100644
+index 50d07fb2e..a34db489c 100644
--- a/samba.if
+++ b/samba.if
@@ -1,8 +1,12 @@
@@ -96750,7 +96750,7 @@ index 50d07fb..a34db48 100644
+ allow $1 samba_unit_file_t:service all_service_perms;
')
diff --git a/samba.te b/samba.te
-index 2b7c441..c7a4751 100644
+index 2b7c441e7..c7a475130 100644
--- a/samba.te
+++ b/samba.te
@@ -6,99 +6,86 @@ policy_module(samba, 1.16.3)
@@ -98098,7 +98098,7 @@ index 2b7c441..c7a4751 100644
+ can_exec(smbd_t, samba_unconfined_script_exec_t)
')
diff --git a/sambagui.te b/sambagui.te
-index e18b0a2..1b1db01 100644
+index e18b0a284..1b1db014d 100644
--- a/sambagui.te
+++ b/sambagui.te
@@ -18,7 +18,7 @@ role sambagui_roles types sambagui_t;
@@ -98140,7 +98140,7 @@ index e18b0a2..1b1db01 100644
samba_domtrans_nmbd(sambagui_t)
')
diff --git a/samhain.if b/samhain.if
-index f0236d6..37665a1 100644
+index f0236d67d..37665a1b6 100644
--- a/samhain.if
+++ b/samhain.if
@@ -23,6 +23,8 @@ template(`samhain_service_template',`
@@ -98153,7 +98153,7 @@ index f0236d6..37665a1 100644
########################################
diff --git a/samhain.te b/samhain.te
-index c41ce4b..8837e4c 100644
+index c41ce4bff..8837e4c41 100644
--- a/samhain.te
+++ b/samhain.te
@@ -88,8 +88,6 @@ auth_read_login_records(samhain_domain)
@@ -98176,14 +98176,14 @@ index c41ce4b..8837e4c 100644
#
diff --git a/sandbox.fc b/sandbox.fc
new file mode 100644
-index 0000000..b7db254
+index 000000000..b7db25411
--- /dev/null
+++ b/sandbox.fc
@@ -0,0 +1 @@
+# Empty
diff --git a/sandbox.if b/sandbox.if
new file mode 100644
-index 0000000..cc29a06
+index 000000000..cc29a063b
--- /dev/null
+++ b/sandbox.if
@@ -0,0 +1,96 @@
@@ -98285,7 +98285,7 @@ index 0000000..cc29a06
+')
diff --git a/sandbox.te b/sandbox.te
new file mode 100644
-index 0000000..402257c
+index 000000000..402257c49
--- /dev/null
+++ b/sandbox.te
@@ -0,0 +1,66 @@
@@ -98357,7 +98357,7 @@ index 0000000..402257c
+
diff --git a/sandboxX.fc b/sandboxX.fc
new file mode 100644
-index 0000000..6caef63
+index 000000000..6caef6326
--- /dev/null
+++ b/sandboxX.fc
@@ -0,0 +1,2 @@
@@ -98365,7 +98365,7 @@ index 0000000..6caef63
+/usr/share/sandbox/start -- gen_context(system_u:object_r:sandbox_exec_t,s0)
diff --git a/sandboxX.if b/sandboxX.if
new file mode 100644
-index 0000000..98dc14e
+index 000000000..98dc14ef6
--- /dev/null
+++ b/sandboxX.if
@@ -0,0 +1,401 @@
@@ -98772,7 +98772,7 @@ index 0000000..98dc14e
+')
diff --git a/sandboxX.te b/sandboxX.te
new file mode 100644
-index 0000000..22e956f
+index 000000000..22e956fe3
--- /dev/null
+++ b/sandboxX.te
@@ -0,0 +1,512 @@
@@ -99289,7 +99289,7 @@ index 0000000..22e956f
+userdom_dontaudit_open_user_ptys(sandbox_x_domain)
+
diff --git a/sanlock.fc b/sanlock.fc
-index 3df2a0f..7264d8a 100644
+index 3df2a0f14..7264d8ae1 100644
--- a/sanlock.fc
+++ b/sanlock.fc
@@ -1,7 +1,18 @@
@@ -99315,7 +99315,7 @@ index 3df2a0f..7264d8a 100644
-/var/log/sanlock\.log.* -- gen_context(system_u:object_r:sanlock_log_t,s0)
+/usr/lib/systemd/system/sanlk-resetd\.service -- gen_context(system_u:object_r:sanlk_resetd_unit_file_t,s0)
diff --git a/sanlock.if b/sanlock.if
-index cd6c213..6d3cdc4 100644
+index cd6c213d2..6d3cdc4d9 100644
--- a/sanlock.if
+++ b/sanlock.if
@@ -1,4 +1,6 @@
@@ -99548,7 +99548,7 @@ index cd6c213..6d3cdc4 100644
+ ')
')
diff --git a/sanlock.te b/sanlock.te
-index 0045465..ee3b993 100644
+index 0045465a0..ee3b9930a 100644
--- a/sanlock.te
+++ b/sanlock.te
@@ -6,25 +6,44 @@ policy_module(sanlock, 1.1.0)
@@ -99747,7 +99747,7 @@ index 0045465..ee3b993 100644
+ wdmd_stream_connect(sanlk_resetd_t)
')
diff --git a/sasl.fc b/sasl.fc
-index 54f41c2..7e58679 100644
+index 54f41c2b7..7e5867968 100644
--- a/sasl.fc
+++ b/sasl.fc
@@ -1,7 +1,12 @@
@@ -99766,7 +99766,7 @@ index 54f41c2..7e58679 100644
+/var/lib/sasl2(/.*)? gen_context(system_u:object_r:saslauthd_var_run_t,s0)
/var/run/saslauthd(/.*)? gen_context(system_u:object_r:saslauthd_var_run_t,s0)
diff --git a/sasl.if b/sasl.if
-index 8c3c151..93b7227 100644
+index 8c3c151cb..93b722789 100644
--- a/sasl.if
+++ b/sasl.if
@@ -1,4 +1,4 @@
@@ -99802,7 +99802,7 @@ index 8c3c151..93b7227 100644
domain_system_change_exemption($1)
role_transition $2 saslauthd_initrc_exec_t system_r;
diff --git a/sasl.te b/sasl.te
-index 6c3bc20..eb05a49 100644
+index 6c3bc2059..eb05a4920 100644
--- a/sasl.te
+++ b/sasl.te
@@ -6,12 +6,11 @@ policy_module(sasl, 1.15.1)
@@ -99918,7 +99918,7 @@ index 6c3bc20..eb05a49 100644
optional_policy(`
diff --git a/sbd.fc b/sbd.fc
new file mode 100644
-index 0000000..41768ee
+index 000000000..41768eed0
--- /dev/null
+++ b/sbd.fc
@@ -0,0 +1,7 @@
@@ -99931,7 +99931,7 @@ index 0000000..41768ee
+/var/run/sbd.* -- gen_context(system_u:object_r:sbd_var_run_t,s0)
diff --git a/sbd.if b/sbd.if
new file mode 100644
-index 0000000..7a058a8
+index 000000000..7a058a82a
--- /dev/null
+++ b/sbd.if
@@ -0,0 +1,126 @@
@@ -100063,7 +100063,7 @@ index 0000000..7a058a8
+')
diff --git a/sbd.te b/sbd.te
new file mode 100644
-index 0000000..55576aa
+index 000000000..55576aaf6
--- /dev/null
+++ b/sbd.te
@@ -0,0 +1,55 @@
@@ -100123,7 +100123,7 @@ index 0000000..55576aa
+
+')
diff --git a/sblim.fc b/sblim.fc
-index 68a550d..e976fc6 100644
+index 68a550d54..e976fc62e 100644
--- a/sblim.fc
+++ b/sblim.fc
@@ -1,6 +1,10 @@
@@ -100138,7 +100138,7 @@ index 68a550d..e976fc6 100644
/var/run/gather(/.*)? gen_context(system_u:object_r:sblim_var_run_t,s0)
diff --git a/sblim.if b/sblim.if
-index 98c9e0a..562666e 100644
+index 98c9e0a88..562666e06 100644
--- a/sblim.if
+++ b/sblim.if
@@ -1,8 +1,36 @@
@@ -100332,7 +100332,7 @@ index 98c9e0a..562666e 100644
files_search_pids($1)
admin_pattern($1, sblim_var_run_t)
diff --git a/sblim.te b/sblim.te
-index 299756b..5719ae9 100644
+index 299756bc8..5719ae912 100644
--- a/sblim.te
+++ b/sblim.te
@@ -7,13 +7,11 @@ policy_module(sblim, 1.1.0)
@@ -100507,7 +100507,7 @@ index 299756b..5719ae9 100644
+ virt_getattr_images(sblim_sfcbd_t)
+')
diff --git a/screen.fc b/screen.fc
-index e7c2cf7..435aaa6 100644
+index e7c2cf74f..435aaa61c 100644
--- a/screen.fc
+++ b/screen.fc
@@ -2,8 +2,10 @@ HOME_DIR/\.screen(/.*)? gen_context(system_u:object_r:screen_home_t,s0)
@@ -100526,7 +100526,7 @@ index e7c2cf7..435aaa6 100644
+/var/run/screen(/.*)? gen_context(system_u:object_r:screen_var_run_t,s0)
+/var/run/tmux(/.*)? gen_context(system_u:object_r:screen_var_run_t,s0)
diff --git a/screen.if b/screen.if
-index be5cce2..b81f5df 100644
+index be5cce2d3..b81f5dfef 100644
--- a/screen.if
+++ b/screen.if
@@ -1,4 +1,4 @@
@@ -100666,7 +100666,7 @@ index be5cce2..b81f5df 100644
+')
+
diff --git a/screen.te b/screen.te
-index 5466a73..33598f3 100644
+index 5466a7327..33598f3b3 100644
--- a/screen.te
+++ b/screen.te
@@ -5,9 +5,7 @@ policy_module(screen, 2.6.0)
@@ -100808,7 +100808,7 @@ index 5466a73..33598f3 100644
- fs_read_nfs_symlinks(screen_domain)
-')
diff --git a/sectoolm.fc b/sectoolm.fc
-index 64a2394..3f1dac5 100644
+index 64a239453..3f1dac59a 100644
--- a/sectoolm.fc
+++ b/sectoolm.fc
@@ -1,5 +1,4 @@
@@ -100820,7 +100820,7 @@ index 64a2394..3f1dac5 100644
+/var/lib/sectool(/.*)? gen_context(system_u:object_r:sectool_var_lib_t,s0)
+/var/log/sectool\.log.* -- gen_context(system_u:object_r:sectool_var_log_t,s0)
diff --git a/sectoolm.if b/sectoolm.if
-index c78a569..9007451 100644
+index c78a569c3..900745118 100644
--- a/sectoolm.if
+++ b/sectoolm.if
@@ -1,24 +1,2 @@
@@ -100850,7 +100850,7 @@ index c78a569..9007451 100644
- allow sectoolm_t $2:unix_dgram_socket sendto;
-')
diff --git a/sectoolm.te b/sectoolm.te
-index 4bc8c13..e05d74d 100644
+index 4bc8c13ea..e05d74d48 100644
--- a/sectoolm.te
+++ b/sectoolm.te
@@ -7,7 +7,7 @@ policy_module(sectoolm, 1.1.0)
@@ -100943,7 +100943,7 @@ index 4bc8c13..e05d74d 100644
prelink_domtrans(sectoolm_t)
')
diff --git a/sendmail.fc b/sendmail.fc
-index d14b6bf..da5d41d 100644
+index d14b6bfc7..da5d41d5c 100644
--- a/sendmail.fc
+++ b/sendmail.fc
@@ -1,7 +1,8 @@
@@ -100961,7 +100961,7 @@ index d14b6bf..da5d41d 100644
+/var/run/sendmail\.pid -- gen_context(system_u:object_r:sendmail_var_run_t,s0)
+/var/run/sm-client\.pid -- gen_context(system_u:object_r:sendmail_var_run_t,s0)
diff --git a/sendmail.if b/sendmail.if
-index 35ad2a7..afdc7da 100644
+index 35ad2a733..afdc7da29 100644
--- a/sendmail.if
+++ b/sendmail.if
@@ -1,4 +1,4 @@
@@ -101254,7 +101254,7 @@ index 35ad2a7..afdc7da 100644
+ admin_pattern($1, mail_spool_t)
')
diff --git a/sendmail.te b/sendmail.te
-index 12700b4..8ba2995 100644
+index 12700b413..8ba299515 100644
--- a/sendmail.te
+++ b/sendmail.te
@@ -37,21 +37,23 @@ role sendmail_unconfined_roles types unconfined_sendmail_t;
@@ -101442,7 +101442,7 @@ index 12700b4..8ba2995 100644
unconfined_domain(unconfined_sendmail_t)
')
diff --git a/sensord.fc b/sensord.fc
-index 8185d5a..9be989a 100644
+index 8185d5a6b..9be989a08 100644
--- a/sensord.fc
+++ b/sensord.fc
@@ -1,5 +1,9 @@
@@ -101456,7 +101456,7 @@ index 8185d5a..9be989a 100644
+
/var/run/sensord\.pid -- gen_context(system_u:object_r:sensord_var_run_t,s0)
diff --git a/sensord.if b/sensord.if
-index d204752..85631b3 100644
+index d204752b3..85631b346 100644
--- a/sensord.if
+++ b/sensord.if
@@ -1,35 +1,81 @@
@@ -101554,7 +101554,7 @@ index d204752..85631b3 100644
+ ')
')
diff --git a/sensord.te b/sensord.te
-index 5e82fd6..ddb249d 100644
+index 5e82fd616..ddb249dfb 100644
--- a/sensord.te
+++ b/sensord.te
@@ -9,27 +9,38 @@ type sensord_t;
@@ -101600,7 +101600,7 @@ index 5e82fd6..ddb249d 100644
-miscfiles_read_localization(sensord_t)
diff --git a/setroubleshoot.fc b/setroubleshoot.fc
-index 0b3a971..397a522 100644
+index 0b3a971f4..397a5225b 100644
--- a/setroubleshoot.fc
+++ b/setroubleshoot.fc
@@ -1,9 +1,9 @@
@@ -101618,7 +101618,7 @@ index 0b3a971..397a522 100644
-/var/lib/setroubleshoot(/.*)? gen_context(system_u:object_r:setroubleshoot_var_lib_t,s0)
+/var/lib/setroubleshoot(/.*)? gen_context(system_u:object_r:setroubleshoot_var_lib_t,s0)
diff --git a/setroubleshoot.if b/setroubleshoot.if
-index 3a9a70b..903109c 100644
+index 3a9a70bef..903109c98 100644
--- a/setroubleshoot.if
+++ b/setroubleshoot.if
@@ -1,9 +1,8 @@
@@ -101721,7 +101721,7 @@ index 3a9a70b..903109c 100644
logging_list_logs($1)
admin_pattern($1, setroubleshoot_var_log_t)
diff --git a/setroubleshoot.te b/setroubleshoot.te
-index ce67935..4985c02 100644
+index ce6793506..4985c026f 100644
--- a/setroubleshoot.te
+++ b/setroubleshoot.te
@@ -7,68 +7,111 @@ policy_module(setroubleshoot, 1.12.1)
@@ -101991,7 +101991,7 @@ index ce67935..4985c02 100644
+')
diff --git a/sge.fc b/sge.fc
new file mode 100644
-index 0000000..160ddc2
+index 000000000..160ddc2b8
--- /dev/null
+++ b/sge.fc
@@ -0,0 +1,6 @@
@@ -102003,7 +102003,7 @@ index 0000000..160ddc2
+
diff --git a/sge.if b/sge.if
new file mode 100644
-index 0000000..c9d2d9c
+index 000000000..c9d2d9c42
--- /dev/null
+++ b/sge.if
@@ -0,0 +1,24 @@
@@ -102033,7 +102033,7 @@ index 0000000..c9d2d9c
+
diff --git a/sge.te b/sge.te
new file mode 100644
-index 0000000..1c1ec06
+index 000000000..1c1ec06e5
--- /dev/null
+++ b/sge.te
@@ -0,0 +1,196 @@
@@ -102234,7 +102234,7 @@ index 0000000..1c1ec06
+ nslcd_stream_connect(sge_domain)
+')
diff --git a/shorewall.if b/shorewall.if
-index 1aeef8a..d5ce40a 100644
+index 1aeef8ac3..d5ce40a96 100644
--- a/shorewall.if
+++ b/shorewall.if
@@ -1,4 +1,4 @@
@@ -102417,7 +102417,7 @@ index 1aeef8a..d5ce40a 100644
admin_pattern($1, shorewall_etc_t)
diff --git a/shorewall.te b/shorewall.te
-index 7710b9f..04af4ec 100644
+index 7710b9f76..04af4ec4d 100644
--- a/shorewall.te
+++ b/shorewall.te
@@ -32,8 +32,9 @@ logging_log_file(shorewall_log_t)
@@ -102487,7 +102487,7 @@ index 7710b9f..04af4ec 100644
ulogd_search_log(shorewall_t)
')
diff --git a/shutdown.fc b/shutdown.fc
-index a91f33b..631dbc1 100644
+index a91f33b0f..631dbc1dc 100644
--- a/shutdown.fc
+++ b/shutdown.fc
@@ -8,4 +8,4 @@
@@ -102497,7 +102497,7 @@ index a91f33b..631dbc1 100644
-/var/run/shutdown\.pid -- gen_context(system_u:object_r:shutdown_var_run_t,s0)
+/var/run/shutdown\.pid -- gen_context(system_u:object_r:shutdown_var_run_t,s0)
diff --git a/shutdown.if b/shutdown.if
-index d1706bf..3aa7c9f 100644
+index d1706bf87..3aa7c9fd1 100644
--- a/shutdown.if
+++ b/shutdown.if
@@ -1,30 +1,4 @@
@@ -102653,7 +102653,7 @@ index d1706bf..3aa7c9f 100644
##
##
diff --git a/shutdown.te b/shutdown.te
-index e2544e1..2196974 100644
+index e2544e147..2196974f5 100644
--- a/shutdown.te
+++ b/shutdown.te
@@ -24,7 +24,7 @@ files_pid_file(shutdown_var_run_t)
@@ -102702,7 +102702,7 @@ index e2544e1..2196974 100644
+ xserver_xdm_append_log(shutdown_t)
')
diff --git a/slocate.te b/slocate.te
-index 7292dc0..26fc8f4 100644
+index 7292dc064..26fc8f4bc 100644
--- a/slocate.te
+++ b/slocate.te
@@ -44,8 +44,12 @@ dev_getattr_all_blk_files(locate_t)
@@ -102736,7 +102736,7 @@ index 7292dc0..26fc8f4 100644
+')
+
diff --git a/slpd.if b/slpd.if
-index ca32e89..98278dd 100644
+index ca32e8946..98278dd2c 100644
--- a/slpd.if
+++ b/slpd.if
@@ -2,6 +2,43 @@
@@ -102804,7 +102804,7 @@ index ca32e89..98278dd 100644
+
')
diff --git a/slpd.te b/slpd.te
-index 731512a..4ce76cd 100644
+index 731512a66..4ce76cd9c 100644
--- a/slpd.te
+++ b/slpd.te
@@ -23,7 +23,7 @@ files_pid_file(slpd_var_run_t)
@@ -102841,7 +102841,7 @@ index 731512a..4ce76cd 100644
+
+sysnet_dns_name_resolve(slpd_t)
diff --git a/slrnpull.te b/slrnpull.te
-index 59eb07f..4626942 100644
+index 59eb07fa9..4626942ae 100644
--- a/slrnpull.te
+++ b/slrnpull.te
@@ -13,7 +13,7 @@ type slrnpull_var_run_t;
@@ -102871,7 +102871,7 @@ index 59eb07f..4626942 100644
userdom_dontaudit_search_user_home_dirs(slrnpull_t)
diff --git a/smartmon.if b/smartmon.if
-index e0644b5..ea347cc 100644
+index e0644b5cf..ea347ccd5 100644
--- a/smartmon.if
+++ b/smartmon.if
@@ -42,9 +42,13 @@ interface(`smartmon_admin',`
@@ -102890,7 +102890,7 @@ index e0644b5..ea347cc 100644
domain_system_change_exemption($1)
role_transition $2 fsdaemon_initrc_exec_t system_r;
diff --git a/smartmon.te b/smartmon.te
-index 9cf6582..052179c 100644
+index 9cf6582d2..052179c3f 100644
--- a/smartmon.te
+++ b/smartmon.te
@@ -38,7 +38,7 @@ ifdef(`enable_mls',`
@@ -102971,7 +102971,7 @@ index 9cf6582..052179c 100644
+ virt_read_images(fsdaemon_t)
')
diff --git a/smokeping.fc b/smokeping.fc
-index 3359819..a231ecb 100644
+index 335981945..a231ecb56 100644
--- a/smokeping.fc
+++ b/smokeping.fc
@@ -2,7 +2,7 @@
@@ -102984,7 +102984,7 @@ index 3359819..a231ecb 100644
/var/lib/smokeping(/.*)? gen_context(system_u:object_r:smokeping_var_lib_t,s0)
diff --git a/smokeping.if b/smokeping.if
-index 1fa51c1..82e111c 100644
+index 1fa51c11f..82e111c80 100644
--- a/smokeping.if
+++ b/smokeping.if
@@ -158,8 +158,11 @@ interface(`smokeping_admin',`
@@ -103001,7 +103001,7 @@ index 1fa51c1..82e111c 100644
smokeping_initrc_domtrans($1)
domain_system_change_exemption($1)
diff --git a/smokeping.te b/smokeping.te
-index ec031a0..61a9f8c 100644
+index ec031a031..61a9f8c08 100644
--- a/smokeping.te
+++ b/smokeping.te
@@ -24,6 +24,7 @@ files_type(smokeping_var_lib_t)
@@ -103061,7 +103061,7 @@ index ec031a0..61a9f8c 100644
+ netutils_domtrans_ping(smokeping_cgi_script_t)
')
diff --git a/smoltclient.te b/smoltclient.te
-index b3f2c6f..4e629a1 100644
+index b3f2c6f26..4e629a10b 100644
--- a/smoltclient.te
+++ b/smoltclient.te
@@ -40,6 +40,7 @@ corenet_tcp_sendrecv_generic_node(smoltclient_t)
@@ -103100,7 +103100,7 @@ index b3f2c6f..4e629a1 100644
')
diff --git a/smsd.fc b/smsd.fc
new file mode 100644
-index 0000000..4c3fcec
+index 000000000..4c3fcec7d
--- /dev/null
+++ b/smsd.fc
@@ -0,0 +1,11 @@
@@ -103117,7 +103117,7 @@ index 0000000..4c3fcec
+/var/spool/sms(/.*)? gen_context(system_u:object_r:smsd_spool_t,s0)
diff --git a/smsd.if b/smsd.if
new file mode 100644
-index 0000000..52450c7
+index 000000000..52450c700
--- /dev/null
+++ b/smsd.if
@@ -0,0 +1,240 @@
@@ -103363,7 +103363,7 @@ index 0000000..52450c7
+')
diff --git a/smsd.te b/smsd.te
new file mode 100644
-index 0000000..d971935
+index 000000000..d971935b4
--- /dev/null
+++ b/smsd.te
@@ -0,0 +1,75 @@
@@ -103443,7 +103443,7 @@ index 0000000..d971935
+
+term_use_usb_ttys(smsd_t)
diff --git a/smstools.if b/smstools.if
-index cbfe369..6594af3 100644
+index cbfe369a6..6594af373 100644
--- a/smstools.if
+++ b/smstools.if
@@ -1,5 +1,81 @@
@@ -103539,7 +103539,7 @@ index cbfe369..6594af3 100644
files_search_var_lib($1)
diff --git a/snapper.fc b/snapper.fc
new file mode 100644
-index 0000000..34f7846
+index 000000000..34f7846b3
--- /dev/null
+++ b/snapper.fc
@@ -0,0 +1,16 @@
@@ -103561,7 +103561,7 @@ index 0000000..34f7846
+/home/(.*/)?\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
diff --git a/snapper.if b/snapper.if
new file mode 100644
-index 0000000..88490d5
+index 000000000..88490d5c6
--- /dev/null
+++ b/snapper.if
@@ -0,0 +1,99 @@
@@ -103666,7 +103666,7 @@ index 0000000..88490d5
+
diff --git a/snapper.te b/snapper.te
new file mode 100644
-index 0000000..5c2cbe0
+index 000000000..5c2cbe02d
--- /dev/null
+++ b/snapper.te
@@ -0,0 +1,83 @@
@@ -103754,7 +103754,7 @@ index 0000000..5c2cbe0
+ snapper_relabel_snapshots(snapperd_t)
+')
diff --git a/snmp.fc b/snmp.fc
-index 2f0a2f2..1569e33 100644
+index 2f0a2f205..1569e3369 100644
--- a/snmp.fc
+++ b/snmp.fc
@@ -1,6 +1,6 @@
@@ -103781,7 +103781,7 @@ index 2f0a2f2..1569e33 100644
+/var/run/snmpd(/.*)? gen_context(system_u:object_r:snmpd_var_run_t,s0)
/var/run/snmpd\.pid -- gen_context(system_u:object_r:snmpd_var_run_t,s0)
diff --git a/snmp.if b/snmp.if
-index 7a9cc9d..23cb658 100644
+index 7a9cc9df7..23cb6589e 100644
--- a/snmp.if
+++ b/snmp.if
@@ -57,8 +57,7 @@ interface(`snmp_udp_chat',`
@@ -103918,7 +103918,7 @@ index 7a9cc9d..23cb658 100644
init_labeled_script_domtrans($1, snmpd_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/snmp.te b/snmp.te
-index 9dcaeb8..e8446db 100644
+index 9dcaeb875..e8446db05 100644
--- a/snmp.te
+++ b/snmp.te
@@ -26,15 +26,17 @@ files_type(snmpd_var_lib_t)
@@ -104019,7 +104019,7 @@ index 9dcaeb8..e8446db 100644
')
diff --git a/snort.if b/snort.if
-index 7d86b34..5f58180 100644
+index 7d86b3485..5f581804e 100644
--- a/snort.if
+++ b/snort.if
@@ -42,8 +42,11 @@ interface(`snort_admin',`
@@ -104051,7 +104051,7 @@ index 7d86b34..5f58180 100644
+ files_list_pids($1)
')
diff --git a/snort.te b/snort.te
-index 1af72df..d545f2a 100644
+index 1af72df55..d545f2aea 100644
--- a/snort.te
+++ b/snort.te
@@ -29,13 +29,16 @@ files_pid_file(snort_var_run_t)
@@ -104116,7 +104116,7 @@ index 1af72df..d545f2a 100644
userdom_dontaudit_use_unpriv_user_fds(snort_t)
diff --git a/sosreport.if b/sosreport.if
-index 634c6b4..f6db7a7 100644
+index 634c6b4fa..f6db7a796 100644
--- a/sosreport.if
+++ b/sosreport.if
@@ -42,7 +42,7 @@ interface(`sosreport_run',`
@@ -104152,7 +104152,7 @@ index 634c6b4..f6db7a7 100644
+')
+
diff --git a/sosreport.te b/sosreport.te
-index f2f507d..0ac6752 100644
+index f2f507dae..0ac6752b4 100644
--- a/sosreport.te
+++ b/sosreport.te
@@ -13,15 +13,15 @@ type sosreport_exec_t;
@@ -104371,7 +104371,7 @@ index f2f507d..0ac6752 100644
optional_policy(`
diff --git a/soundserver.if b/soundserver.if
-index a5abc5a..b9eff74 100644
+index a5abc5a8d..b9eff74cb 100644
--- a/soundserver.if
+++ b/soundserver.if
@@ -38,9 +38,13 @@ interface(`soundserver_admin',`
@@ -104390,7 +104390,7 @@ index a5abc5a..b9eff74 100644
domain_system_change_exemption($1)
role_transition $2 soundd_initrc_exec_t system_r;
diff --git a/soundserver.te b/soundserver.te
-index 0919e0c..df28aad 100644
+index 0919e0c86..df28aadba 100644
--- a/soundserver.te
+++ b/soundserver.te
@@ -32,7 +32,7 @@ files_pid_file(soundd_var_run_t)
@@ -104428,7 +104428,7 @@ index 0919e0c..df28aad 100644
userdom_dontaudit_use_unpriv_user_fds(soundd_t)
diff --git a/spamassassin.fc b/spamassassin.fc
-index e9bd097..5724bcf 100644
+index e9bd097b7..5724bcf0f 100644
--- a/spamassassin.fc
+++ b/spamassassin.fc
@@ -1,20 +1,27 @@
@@ -104493,7 +104493,7 @@ index e9bd097..5724bcf 100644
+/usr/bin/pyzor -- gen_context(system_u:object_r:spamc_exec_t,s0)
+/usr/bin/pyzord -- gen_context(system_u:object_r:spamd_exec_t,s0)
diff --git a/spamassassin.if b/spamassassin.if
-index 1499b0b..e695a62 100644
+index 1499b0bbf..e695a62f3 100644
--- a/spamassassin.if
+++ b/spamassassin.if
@@ -2,39 +2,45 @@
@@ -104948,7 +104948,7 @@ index 1499b0b..e695a62 100644
- spamassassin_role($2, $1)
')
diff --git a/spamassassin.te b/spamassassin.te
-index cc58e35..85e9f59 100644
+index cc58e3578..85e9f5961 100644
--- a/spamassassin.te
+++ b/spamassassin.te
@@ -7,50 +7,30 @@ policy_module(spamassassin, 2.6.1)
@@ -105756,7 +105756,7 @@ index cc58e35..85e9f59 100644
')
diff --git a/speech-dispatcher.fc b/speech-dispatcher.fc
new file mode 100644
-index 0000000..545f682
+index 000000000..545f68233
--- /dev/null
+++ b/speech-dispatcher.fc
@@ -0,0 +1,5 @@
@@ -105767,7 +105767,7 @@ index 0000000..545f682
+/var/log/speech-dispatcher(/.*)? gen_context(system_u:object_r:speech-dispatcher_log_t,s0)
diff --git a/speech-dispatcher.if b/speech-dispatcher.if
new file mode 100644
-index 0000000..4cb9104
+index 000000000..4cb910462
--- /dev/null
+++ b/speech-dispatcher.if
@@ -0,0 +1,143 @@
@@ -105916,7 +105916,7 @@ index 0000000..4cb9104
+')
diff --git a/speech-dispatcher.te b/speech-dispatcher.te
new file mode 100644
-index 0000000..4739473
+index 000000000..473947312
--- /dev/null
+++ b/speech-dispatcher.te
@@ -0,0 +1,61 @@
@@ -105982,7 +105982,7 @@ index 0000000..4739473
+dev_read_urand(speech-dispatcher_t)
+
diff --git a/speedtouch.te b/speedtouch.te
-index b38b8b1..eb36653 100644
+index b38b8b180..eb36653b8 100644
--- a/speedtouch.te
+++ b/speedtouch.te
@@ -39,16 +39,12 @@ dev_read_usbfs(speedmgmt_t)
@@ -106003,7 +106003,7 @@ index b38b8b1..eb36653 100644
userdom_dontaudit_search_user_home_dirs(speedmgmt_t)
diff --git a/squid.fc b/squid.fc
-index 0a8b0f7..80c1d57 100644
+index 0a8b0f7c0..80c1d5756 100644
--- a/squid.fc
+++ b/squid.fc
@@ -1,20 +1,31 @@
@@ -106045,7 +106045,7 @@ index 0a8b0f7..80c1d57 100644
-/var/squidGuard(/.*)? gen_context(system_u:object_r:squid_cache_t,s0)
+/var/lightsquid(/.*)? gen_context(system_u:object_r:squid_cache_t,s0)
diff --git a/squid.if b/squid.if
-index 5e1f053..e7820bc 100644
+index 5e1f0534c..e7820bce3 100644
--- a/squid.if
+++ b/squid.if
@@ -72,7 +72,7 @@ interface(`squid_rw_stream_sockets',`
@@ -106081,7 +106081,7 @@ index 5e1f053..e7820bc 100644
domain_system_change_exemption($1)
role_transition $2 squid_initrc_exec_t system_r;
diff --git a/squid.te b/squid.te
-index 03472ed..9148ef5 100644
+index 03472ed9b..9148ef5ae 100644
--- a/squid.te
+++ b/squid.te
@@ -29,7 +29,7 @@ type squid_cache_t;
@@ -106261,7 +106261,7 @@ index 03472ed..9148ef5 100644
+')
diff --git a/sslh.fc b/sslh.fc
new file mode 100644
-index 0000000..1a217f5
+index 000000000..1a217f5ed
--- /dev/null
+++ b/sslh.fc
@@ -0,0 +1,9 @@
@@ -106276,7 +106276,7 @@ index 0000000..1a217f5
+/var/run/sslh.* gen_context(system_u:object_r:sslh_var_run_t,s0)
diff --git a/sslh.if b/sslh.if
new file mode 100644
-index 0000000..218360d
+index 000000000..218360da8
--- /dev/null
+++ b/sslh.if
@@ -0,0 +1,127 @@
@@ -106409,7 +106409,7 @@ index 0000000..218360d
+')
diff --git a/sslh.te b/sslh.te
new file mode 100644
-index 0000000..821e158
+index 000000000..821e158a5
--- /dev/null
+++ b/sslh.te
@@ -0,0 +1,100 @@
@@ -106514,7 +106514,7 @@ index 0000000..821e158
+')
+
diff --git a/sssd.fc b/sssd.fc
-index dbb005a..2655c75 100644
+index dbb005aca..2655c75ab 100644
--- a/sssd.fc
+++ b/sssd.fc
@@ -1,15 +1,30 @@
@@ -106555,7 +106555,7 @@ index dbb005a..2655c75 100644
+/var/run/secrets\.socket -s gen_context(system_u:object_r:sssd_var_run_t,s0)
+/var/run/\.heim_org\.h5l\.kcm-socket -s gen_context(system_u:object_r:sssd_var_run_t,s0)
diff --git a/sssd.if b/sssd.if
-index a240455..aac2584 100644
+index a24045518..aac25848d 100644
--- a/sssd.if
+++ b/sssd.if
@@ -1,21 +1,21 @@
@@ -107052,7 +107052,7 @@ index a240455..aac2584 100644
- admin_pattern($1, sssd_log_t)
')
diff --git a/sssd.te b/sssd.te
-index 2d8db1f..9b13b30 100644
+index 2d8db1fa3..9b13b3058 100644
--- a/sssd.te
+++ b/sssd.te
@@ -28,19 +28,31 @@ logging_log_file(sssd_var_log_t)
@@ -107250,7 +107250,7 @@ index 2d8db1f..9b13b30 100644
+
diff --git a/stapserver.fc b/stapserver.fc
new file mode 100644
-index 0000000..0ccce59
+index 000000000..0ccce5918
--- /dev/null
+++ b/stapserver.fc
@@ -0,0 +1,7 @@
@@ -107263,7 +107263,7 @@ index 0000000..0ccce59
+/var/run/stap-server(/.*)? gen_context(system_u:object_r:stapserver_var_run_t,s0)
diff --git a/stapserver.if b/stapserver.if
new file mode 100644
-index 0000000..80c6480
+index 000000000..80c648055
--- /dev/null
+++ b/stapserver.if
@@ -0,0 +1,151 @@
@@ -107422,7 +107422,7 @@ diff --git a/systemtap.te b/stapserver.te
similarity index 63%
rename from systemtap.te
rename to stapserver.te
-index ffde368..f33142f 100644
+index ffde36864..f33142fd5 100644
--- a/systemtap.te
+++ b/stapserver.te
@@ -1,4 +1,4 @@
@@ -107547,7 +107547,7 @@ index ffde368..f33142f 100644
')
+
diff --git a/stunnel.fc b/stunnel.fc
-index 49dd63c..ae2e798 100644
+index 49dd63ca1..ae2e798f5 100644
--- a/stunnel.fc
+++ b/stunnel.fc
@@ -5,3 +5,5 @@
@@ -107557,7 +107557,7 @@ index 49dd63c..ae2e798 100644
+
+/var/log/stunnel.* -- gen_context(system_u:object_r:stunnel_log_t,s0)
diff --git a/stunnel.te b/stunnel.te
-index 27a8480..5482c75 100644
+index 27a8480bc..5482c7549 100644
--- a/stunnel.te
+++ b/stunnel.te
@@ -12,6 +12,9 @@ init_daemon_domain(stunnel_t, stunnel_exec_t)
@@ -107612,7 +107612,7 @@ index 27a8480..5482c75 100644
+
allow stunnel_t stunnel_port_t:tcp_socket name_bind;
diff --git a/svnserve.fc b/svnserve.fc
-index effffd0..12ca090 100644
+index effffd028..12ca090e1 100644
--- a/svnserve.fc
+++ b/svnserve.fc
@@ -1,8 +1,13 @@
@@ -107635,7 +107635,7 @@ index effffd0..12ca090 100644
+/var/subversion/repo(/.*)? gen_context(system_u:object_r:svnserve_content_t,s0)
+/var/lib/subversion/repo(/.*)? gen_context(system_u:object_r:svnserve_content_t,s0)
diff --git a/svnserve.if b/svnserve.if
-index 2ac91b6..a97033d 100644
+index 2ac91b6e0..a97033d2b 100644
--- a/svnserve.if
+++ b/svnserve.if
@@ -1,35 +1,119 @@
@@ -107772,7 +107772,7 @@ index 2ac91b6..a97033d 100644
')
+
diff --git a/svnserve.te b/svnserve.te
-index 49d688d..451a647 100644
+index 49d688d66..451a64768 100644
--- a/svnserve.te
+++ b/svnserve.te
@@ -12,12 +12,18 @@ init_daemon_domain(svnserve_t, svnserve_exec_t)
@@ -107830,7 +107830,7 @@ index 49d688d..451a647 100644
sysnet_dns_name_resolve(svnserve_t)
diff --git a/swift.fc b/swift.fc
new file mode 100644
-index 0000000..6d897bc
+index 000000000..6d897bc25
--- /dev/null
+++ b/swift.fc
@@ -0,0 +1,36 @@
@@ -107872,7 +107872,7 @@ index 0000000..6d897bc
+')
diff --git a/swift.if b/swift.if
new file mode 100644
-index 0000000..af26807
+index 000000000..af26807a7
--- /dev/null
+++ b/swift.if
@@ -0,0 +1,156 @@
@@ -108034,7 +108034,7 @@ index 0000000..af26807
+')
diff --git a/swift.te b/swift.te
new file mode 100644
-index 0000000..c2f086f
+index 000000000..c2f086fe7
--- /dev/null
+++ b/swift.te
@@ -0,0 +1,129 @@
@@ -108169,14 +108169,14 @@ index 0000000..c2f086f
+')
diff --git a/swift_alias.fc b/swift_alias.fc
new file mode 100644
-index 0000000..b7db254
+index 000000000..b7db25411
--- /dev/null
+++ b/swift_alias.fc
@@ -0,0 +1 @@
+# Empty
diff --git a/swift_alias.if b/swift_alias.if
new file mode 100644
-index 0000000..3fed1a3
+index 000000000..3fed1a374
--- /dev/null
+++ b/swift_alias.if
@@ -0,0 +1,2 @@
@@ -108184,7 +108184,7 @@ index 0000000..3fed1a3
+## swift_alias policy module
diff --git a/swift_alias.te b/swift_alias.te
new file mode 100644
-index 0000000..6e39c4f
+index 000000000..6e39c4fff
--- /dev/null
+++ b/swift_alias.te
@@ -0,0 +1,26 @@
@@ -108215,7 +108215,7 @@ index 0000000..6e39c4f
+
+
diff --git a/sxid.te b/sxid.te
-index 01a9d0a..154872e 100644
+index 01a9d0acd..154872e4b 100644
--- a/sxid.te
+++ b/sxid.te
@@ -40,7 +40,6 @@ kernel_read_kernel_sysctls(sxid_t)
@@ -108245,7 +108245,7 @@ index 01a9d0a..154872e 100644
userdom_dontaudit_use_unpriv_user_fds(sxid_t)
diff --git a/sysstat.te b/sysstat.te
-index b92f677..a2690e3 100644
+index b92f6775a..a2690e315 100644
--- a/sysstat.te
+++ b/sysstat.te
@@ -20,13 +20,11 @@ logging_log_file(sysstat_log_t)
@@ -108302,7 +108302,7 @@ index b92f677..a2690e3 100644
+
diff --git a/systemtap.fc b/systemtap.fc
deleted file mode 100644
-index 1710cbb..0000000
+index 1710cbbe8..000000000
--- a/systemtap.fc
+++ /dev/null
@@ -1,11 +0,0 @@
@@ -108319,7 +108319,7 @@ index 1710cbb..0000000
-/var/run/stap-server(/.*)? gen_context(system_u:object_r:stapserver_var_run_t,s0)
diff --git a/systemtap.if b/systemtap.if
deleted file mode 100644
-index c755e2d..0000000
+index c755e2d93..000000000
--- a/systemtap.if
+++ /dev/null
@@ -1,45 +0,0 @@
@@ -108370,7 +108370,7 @@ index c755e2d..0000000
-')
diff --git a/targetd.fc b/targetd.fc
new file mode 100644
-index 0000000..c1ef053
+index 000000000..c1ef0535f
--- /dev/null
+++ b/targetd.fc
@@ -0,0 +1,5 @@
@@ -108381,7 +108381,7 @@ index 0000000..c1ef053
+/usr/lib/systemd/system/targetd.* -- gen_context(system_u:object_r:targetd_unit_file_t,s0)
diff --git a/targetd.if b/targetd.if
new file mode 100644
-index 0000000..a6e216c
+index 000000000..a6e216c73
--- /dev/null
+++ b/targetd.if
@@ -0,0 +1,167 @@
@@ -108554,7 +108554,7 @@ index 0000000..a6e216c
+
diff --git a/targetd.te b/targetd.te
new file mode 100644
-index 0000000..4cc8557
+index 000000000..4cc8557fc
--- /dev/null
+++ b/targetd.te
@@ -0,0 +1,91 @@
@@ -108650,7 +108650,7 @@ index 0000000..4cc8557
+')
+
diff --git a/tcpd.te b/tcpd.te
-index 2d6d2c2..db18a80 100644
+index 2d6d2c23d..db18a804b 100644
--- a/tcpd.te
+++ b/tcpd.te
@@ -23,7 +23,6 @@ manage_dirs_pattern(tcpd_t, tcpd_tmp_t, tcpd_tmp_t)
@@ -108679,7 +108679,7 @@ index 2d6d2c2..db18a80 100644
inetd_domtrans_child(tcpd_t)
diff --git a/tcsd.if b/tcsd.if
-index b42ec1d..91b8f71 100644
+index b42ec1d83..91b8f71dc 100644
--- a/tcsd.if
+++ b/tcsd.if
@@ -138,8 +138,11 @@ interface(`tcsd_admin',`
@@ -108696,7 +108696,7 @@ index b42ec1d..91b8f71 100644
tcsd_initrc_domtrans($1)
domain_system_change_exemption($1)
diff --git a/tcsd.te b/tcsd.te
-index b26d44a..5a79afd 100644
+index b26d44a8c..5a79afdb5 100644
--- a/tcsd.te
+++ b/tcsd.te
@@ -20,7 +20,7 @@ files_type(tcsd_var_lib_t)
@@ -108722,7 +108722,7 @@ index b26d44a..5a79afd 100644
-
-miscfiles_read_localization(tcsd_t)
diff --git a/telepathy.fc b/telepathy.fc
-index 6c7f8f8..03fc880 100644
+index 6c7f8f8a3..03fc88079 100644
--- a/telepathy.fc
+++ b/telepathy.fc
@@ -1,35 +1,23 @@
@@ -108781,7 +108781,7 @@ index 6c7f8f8..03fc880 100644
+/usr/libexec/telepathy-stream-engine -- gen_context(system_u:object_r:telepathy_stream_engine_exec_t, s0)
+/usr/libexec/telepathy-sunshine -- gen_context(system_u:object_r:telepathy_sunshine_exec_t, s0)
diff --git a/telepathy.if b/telepathy.if
-index 42946bc..9f70e4c 100644
+index 42946bc10..9f70e4cf1 100644
--- a/telepathy.if
+++ b/telepathy.if
@@ -2,45 +2,39 @@
@@ -109198,7 +109198,7 @@ index 42946bc..9f70e4c 100644
+ can_exec($1, telepathy_executable)
')
diff --git a/telepathy.te b/telepathy.te
-index 9afcbc9..7b8ddb4 100644
+index 9afcbc95c..7b8ddb489 100644
--- a/telepathy.te
+++ b/telepathy.te
@@ -2,28 +2,27 @@ policy_module(telepathy, 1.4.2)
@@ -109769,7 +109769,7 @@ index 9afcbc9..7b8ddb4 100644
xserver_rw_xdm_pipes(telepathy_domain)
')
diff --git a/telnet.te b/telnet.te
-index d7c8633..0d3d439 100644
+index d7c863369..0d3d4392a 100644
--- a/telnet.te
+++ b/telnet.te
@@ -27,19 +27,22 @@ files_pid_file(telnetd_var_run_t)
@@ -109839,7 +109839,7 @@ index d7c8633..0d3d439 100644
kerberos_use(telnetd_t)
')
diff --git a/tftp.fc b/tftp.fc
-index 3dd87da..0d13384 100644
+index 3dd87daf5..0d13384b0 100644
--- a/tftp.fc
+++ b/tftp.fc
@@ -1,9 +1,9 @@
@@ -109857,7 +109857,7 @@ index 3dd87da..0d13384 100644
-/var/lib/tftpboot(/.*)? gen_context(system_u:object_r:tftpdir_rw_t,s0)
+/var/lib/tftpboot(/.*)? gen_context(system_u:object_r:tftpdir_rw_t,s0)
diff --git a/tftp.if b/tftp.if
-index 9957e30..51af586 100644
+index 9957e300d..51af58690 100644
--- a/tftp.if
+++ b/tftp.if
@@ -1,8 +1,8 @@
@@ -110143,7 +110143,7 @@ index 9957e30..51af586 100644
+ tftp_manage_config($1)
')
diff --git a/tftp.te b/tftp.te
-index cfaa2a1..a9bc6f1 100644
+index cfaa2a19c..a9bc6f1ff 100644
--- a/tftp.te
+++ b/tftp.te
@@ -6,30 +6,24 @@ policy_module(tftp, 1.13.0)
@@ -110311,7 +110311,7 @@ index cfaa2a1..a9bc6f1 100644
optional_policy(`
diff --git a/tgtd.fc b/tgtd.fc
-index 38389e6..ae0f9ab 100644
+index 38389e675..ae0f9ab51 100644
--- a/tgtd.fc
+++ b/tgtd.fc
@@ -1,7 +1,4 @@
@@ -110327,7 +110327,7 @@ index 38389e6..ae0f9ab 100644
+/var/lib/tgtd(/.*)? gen_context(system_u:object_r:tgtd_var_lib_t,s0)
+/var/run/tgtd.* gen_context(system_u:object_r:tgtd_var_run_t,s0)
diff --git a/tgtd.if b/tgtd.if
-index 5406b6e..dc5b46e 100644
+index 5406b6ee8..dc5b46e28 100644
--- a/tgtd.if
+++ b/tgtd.if
@@ -97,6 +97,6 @@ interface(`tgtd_admin',`
@@ -110339,7 +110339,7 @@ index 5406b6e..dc5b46e 100644
admin_pattern($1, tgtd_tmpfs_t)
')
diff --git a/tgtd.te b/tgtd.te
-index d010963..7308fa9 100644
+index d01096386..7308fa94b 100644
--- a/tgtd.te
+++ b/tgtd.te
@@ -29,8 +29,8 @@ files_pid_file(tgtd_var_run_t)
@@ -110393,7 +110393,7 @@ index d010963..7308fa9 100644
')
diff --git a/thin.fc b/thin.fc
new file mode 100644
-index 0000000..1f8a908
+index 000000000..1f8a9086c
--- /dev/null
+++ b/thin.fc
@@ -0,0 +1,12 @@
@@ -110411,7 +110411,7 @@ index 0000000..1f8a908
+/var/run/thin(/.*)? gen_context(system_u:object_r:thin_var_run_t,s0)
diff --git a/thin.if b/thin.if
new file mode 100644
-index 0000000..5e3637e
+index 000000000..5e3637e63
--- /dev/null
+++ b/thin.if
@@ -0,0 +1,64 @@
@@ -110481,7 +110481,7 @@ index 0000000..5e3637e
+')
diff --git a/thin.te b/thin.te
new file mode 100644
-index 0000000..e66fc8c
+index 000000000..e66fc8c34
--- /dev/null
+++ b/thin.te
@@ -0,0 +1,115 @@
@@ -110602,7 +110602,7 @@ index 0000000..e66fc8c
+files_pid_filetrans(thin_aeolus_configserver_t, thin_aeolus_configserver_var_run_t, { dir file })
diff --git a/thumb.fc b/thumb.fc
new file mode 100644
-index 0000000..115bf6c
+index 000000000..115bf6c42
--- /dev/null
+++ b/thumb.fc
@@ -0,0 +1,17 @@
@@ -110625,7 +110625,7 @@ index 0000000..115bf6c
+/usr/lib/tumbler-?[^/]*/tumblerd -- gen_context(system_u:object_r:thumb_exec_t,s0)
diff --git a/thumb.if b/thumb.if
new file mode 100644
-index 0000000..9524b50
+index 000000000..9524b50aa
--- /dev/null
+++ b/thumb.if
@@ -0,0 +1,134 @@
@@ -110765,7 +110765,7 @@ index 0000000..9524b50
+')
diff --git a/thumb.te b/thumb.te
new file mode 100644
-index 0000000..d366c8b
+index 000000000..d366c8b37
--- /dev/null
+++ b/thumb.te
@@ -0,0 +1,168 @@
@@ -110938,7 +110938,7 @@ index 0000000..d366c8b
+ corenet_dontaudit_udp_bind_generic_node(thumb_t)
+')
diff --git a/thunderbird.te b/thunderbird.te
-index 5e867da..b25ea6e 100644
+index 5e867da56..b25ea6e08 100644
--- a/thunderbird.te
+++ b/thunderbird.te
@@ -53,7 +53,6 @@ kernel_read_system_state(thunderbird_t)
@@ -110993,7 +110993,7 @@ index 5e867da..b25ea6e 100644
ifndef(`enable_mls',`
fs_search_removable(thunderbird_t)
diff --git a/timidity.te b/timidity.te
-index 97cd155..49321a5 100644
+index 97cd15589..49321a5bf 100644
--- a/timidity.te
+++ b/timidity.te
@@ -36,7 +36,6 @@ fs_tmpfs_filetrans(timidity_t, timidity_tmpfs_t, { dir file lnk_file sock_file f
@@ -111015,7 +111015,7 @@ index 97cd155..49321a5 100644
fs_search_auto_mountpoints(timidity_t)
diff --git a/tlp.fc b/tlp.fc
new file mode 100644
-index 0000000..eef708d
+index 000000000..eef708d92
--- /dev/null
+++ b/tlp.fc
@@ -0,0 +1,7 @@
@@ -111028,7 +111028,7 @@ index 0000000..eef708d
+/var/run/tlp(/.*)? gen_context(system_u:object_r:tlp_var_run_t,s0)
diff --git a/tlp.if b/tlp.if
new file mode 100644
-index 0000000..368e188
+index 000000000..368e18842
--- /dev/null
+++ b/tlp.if
@@ -0,0 +1,184 @@
@@ -111218,7 +111218,7 @@ index 0000000..368e188
+')
diff --git a/tlp.te b/tlp.te
new file mode 100644
-index 0000000..f31ed95
+index 000000000..f31ed95d7
--- /dev/null
+++ b/tlp.te
@@ -0,0 +1,74 @@
@@ -111297,7 +111297,7 @@ index 0000000..f31ed95
+ mount_domtrans(tlp_t)
+')
diff --git a/tmpreaper.te b/tmpreaper.te
-index 585a77f..a7cb326 100644
+index 585a77f95..a7cb3263d 100644
--- a/tmpreaper.te
+++ b/tmpreaper.te
@@ -5,9 +5,34 @@ policy_module(tmpreaper, 1.7.1)
@@ -111448,7 +111448,7 @@ index 585a77f..a7cb326 100644
+
diff --git a/tomcat.fc b/tomcat.fc
new file mode 100644
-index 0000000..ae28ea3
+index 000000000..ae28ea326
--- /dev/null
+++ b/tomcat.fc
@@ -0,0 +1,12 @@
@@ -111466,7 +111466,7 @@ index 0000000..ae28ea3
+/var/run/tomcat6?\.pid -- gen_context(system_u:object_r:tomcat_var_run_t,s0)
diff --git a/tomcat.if b/tomcat.if
new file mode 100644
-index 0000000..e5cec8f
+index 000000000..e5cec8fda
--- /dev/null
+++ b/tomcat.if
@@ -0,0 +1,396 @@
@@ -111868,7 +111868,7 @@ index 0000000..e5cec8f
+')
diff --git a/tomcat.te b/tomcat.te
new file mode 100644
-index 0000000..1d0e69b
+index 000000000..1d0e69bf8
--- /dev/null
+++ b/tomcat.te
@@ -0,0 +1,106 @@
@@ -111979,7 +111979,7 @@ index 0000000..1d0e69b
+ rpm_read_db(tomcat_domain)
+')
diff --git a/tor.fc b/tor.fc
-index dce42ec..b6b67bf 100644
+index dce42ecc5..b6b67bffe 100644
--- a/tor.fc
+++ b/tor.fc
@@ -5,6 +5,8 @@
@@ -111992,7 +111992,7 @@ index dce42ec..b6b67bf 100644
/var/lib/tor-data(/.*)? gen_context(system_u:object_r:tor_var_lib_t,s0)
diff --git a/tor.if b/tor.if
-index 61c2e07..3b86095 100644
+index 61c2e07d6..3b860953c 100644
--- a/tor.if
+++ b/tor.if
@@ -19,6 +19,30 @@ interface(`tor_domtrans',`
@@ -112062,7 +112062,7 @@ index 61c2e07..3b86095 100644
+ ')
')
diff --git a/tor.te b/tor.te
-index 5ceacde..a395940 100644
+index 5ceacde8c..a3959403d 100644
--- a/tor.te
+++ b/tor.te
@@ -13,6 +13,20 @@ policy_module(tor, 1.9.0)
@@ -112162,7 +112162,7 @@ index 5ceacde..a395940 100644
seutil_sigchld_newrole(tor_t)
')
diff --git a/transproxy.te b/transproxy.te
-index 34973ee..1c9a4c6 100644
+index 34973ee4c..1c9a4c613 100644
--- a/transproxy.te
+++ b/transproxy.te
@@ -32,7 +32,6 @@ kernel_read_kernel_sysctls(transproxy_t)
@@ -112190,7 +112190,7 @@ index 34973ee..1c9a4c6 100644
userdom_dontaudit_use_unpriv_user_fds(transproxy_t)
diff --git a/tripwire.te b/tripwire.te
-index 03aa6b7..53c0c73 100644
+index 03aa6b7f0..53c0c7366 100644
--- a/tripwire.te
+++ b/tripwire.te
@@ -47,7 +47,7 @@ role twprint_roles types twprint_t;
@@ -112242,7 +112242,7 @@ index 03aa6b7..53c0c73 100644
-userdom_use_user_terminals(siggen_t)
+userdom_use_inherited_user_terminals(siggen_t)
diff --git a/tuned.if b/tuned.if
-index e29db63..061fb98 100644
+index e29db63a2..061fb983c 100644
--- a/tuned.if
+++ b/tuned.if
@@ -119,9 +119,13 @@ interface(`tuned_admin',`
@@ -112261,7 +112261,7 @@ index e29db63..061fb98 100644
domain_system_change_exemption($1)
role_transition $2 tuned_initrc_exec_t system_r;
diff --git a/tuned.te b/tuned.te
-index 393a330..76390e2 100644
+index 393a33073..76390e2f6 100644
--- a/tuned.te
+++ b/tuned.te
@@ -21,6 +21,9 @@ files_config_file(tuned_rw_etc_t)
@@ -112405,7 +112405,7 @@ index 393a330..76390e2 100644
+ unconfined_domain(tuned_t)
+')
diff --git a/tvtime.if b/tvtime.if
-index 1bb0f7c..372be2f 100644
+index 1bb0f7c78..372be2f21 100644
--- a/tvtime.if
+++ b/tvtime.if
@@ -1,5 +1,23 @@
@@ -112433,7 +112433,7 @@ index 1bb0f7c..372be2f 100644
##
## Role access for tvtime
diff --git a/tvtime.te b/tvtime.te
-index afd2d6c..3ce900e 100644
+index afd2d6c3f..3ce900e99 100644
--- a/tvtime.te
+++ b/tvtime.te
@@ -42,7 +42,6 @@ allow tvtime_t self:unix_stream_socket rw_stream_socket_perms;
@@ -112479,7 +112479,7 @@ index afd2d6c..3ce900e 100644
optional_policy(`
xserver_user_x_domain_template(tvtime, tvtime_t, tvtime_tmpfs_t)
diff --git a/tzdata.te b/tzdata.te
-index 221c43b..2b9c49a 100644
+index 221c43b84..2b9c49ac1 100644
--- a/tzdata.te
+++ b/tzdata.te
@@ -27,11 +27,10 @@ term_dontaudit_list_ptys(tzdata_t)
@@ -112496,7 +112496,7 @@ index 221c43b..2b9c49a 100644
optional_policy(`
postfix_search_spool(tzdata_t)
diff --git a/ucspitcp.te b/ucspitcp.te
-index 7745b72..329c3d8 100644
+index 7745b72e6..329c3d899 100644
--- a/ucspitcp.te
+++ b/ucspitcp.te
@@ -33,7 +33,6 @@ corenet_udp_sendrecv_all_ports(rblsmtpd_t)
@@ -112517,7 +112517,7 @@ index 7745b72..329c3d8 100644
sysnet_read_config(ucspitcp_t)
diff --git a/udisks2.fc b/udisks2.fc
new file mode 100644
-index 0000000..c8aa54d
+index 000000000..c8aa54dab
--- /dev/null
+++ b/udisks2.fc
@@ -0,0 +1,8 @@
@@ -112531,7 +112531,7 @@ index 0000000..c8aa54d
+/var/run/udisks2(/.*)? gen_context(system_u:object_r:udisks2_var_run_t,s0)
diff --git a/udisks2.if b/udisks2.if
new file mode 100644
-index 0000000..45304ea
+index 000000000..45304ea1a
--- /dev/null
+++ b/udisks2.if
@@ -0,0 +1,206 @@
@@ -112743,7 +112743,7 @@ index 0000000..45304ea
+')
diff --git a/udisks2.te b/udisks2.te
new file mode 100644
-index 0000000..617ee56
+index 000000000..617ee56f4
--- /dev/null
+++ b/udisks2.te
@@ -0,0 +1,58 @@
@@ -112806,7 +112806,7 @@ index 0000000..617ee56
+ policykit_dbus_chat(udisks2_t)
+')
diff --git a/ulogd.if b/ulogd.if
-index 9b95c3e..a892845 100644
+index 9b95c3ef7..a892845bb 100644
--- a/ulogd.if
+++ b/ulogd.if
@@ -123,8 +123,11 @@ interface(`ulogd_admin',`
@@ -112823,7 +112823,7 @@ index 9b95c3e..a892845 100644
init_labeled_script_domtrans($1, ulogd_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/ulogd.te b/ulogd.te
-index de35e5f..91cac11 100644
+index de35e5f4c..91cac1110 100644
--- a/ulogd.te
+++ b/ulogd.te
@@ -29,8 +29,11 @@ logging_log_file(ulogd_var_log_t)
@@ -112852,7 +112852,7 @@ index de35e5f..91cac11 100644
sysnet_dns_name_resolve(ulogd_t)
diff --git a/uml.if b/uml.if
-index ab5c1d0..d13105e 100644
+index ab5c1d0da..d13105ea7 100644
--- a/uml.if
+++ b/uml.if
@@ -32,7 +32,7 @@ interface(`uml_role',`
@@ -112865,7 +112865,7 @@ index ab5c1d0..d13105e 100644
allow $2 { uml_ro_t uml_rw_t uml_tmp_t uml_exec_t }:dir { manage_dir_perms relabel_dir_perms };
allow $2 { uml_ro_t uml_rw_t uml_tmp_t uml_tmpfs_t uml_exec_t }:file { manage_file_perms relabel_file_perms };
diff --git a/uml.te b/uml.te
-index b68bd49..da0c691 100644
+index b68bd49ff..da0c6912f 100644
--- a/uml.te
+++ b/uml.te
@@ -90,7 +90,6 @@ kernel_write_proc_files(uml_t)
@@ -112912,7 +112912,7 @@ index b68bd49..da0c691 100644
userdom_dontaudit_search_user_home_dirs(uml_switch_t)
diff --git a/updfstab.te b/updfstab.te
-index 5ceb912..232e9ac 100644
+index 5ceb91249..232e9ac93 100644
--- a/updfstab.te
+++ b/updfstab.te
@@ -14,7 +14,7 @@ init_system_domain(updfstab_t, updfstab_exec_t)
@@ -112946,7 +112946,7 @@ index 5ceb912..232e9ac 100644
optional_policy(`
dbus_system_bus_client(updfstab_t)
diff --git a/uptime.if b/uptime.if
-index 01a3234..19f4724 100644
+index 01a3234b6..19f472475 100644
--- a/uptime.if
+++ b/uptime.if
@@ -19,7 +19,7 @@
@@ -112959,7 +112959,7 @@ index 01a3234..19f4724 100644
')
diff --git a/uptime.te b/uptime.te
-index 58397dc..e6b6a34 100644
+index 58397dc31..e6b6a3472 100644
--- a/uptime.te
+++ b/uptime.te
@@ -16,7 +16,7 @@ type uptimed_initrc_exec_t;
@@ -112981,7 +112981,7 @@ index 58397dc..e6b6a34 100644
userdom_dontaudit_search_user_home_dirs(uptimed_t)
diff --git a/usbmodules.te b/usbmodules.te
-index 279e511..4f79ad6 100644
+index 279e511df..4f79ad697 100644
--- a/usbmodules.te
+++ b/usbmodules.te
@@ -24,8 +24,6 @@ files_list_kernel_modules(usbmodules_t)
@@ -113010,7 +113010,7 @@ index 279e511..4f79ad6 100644
+ modutils_read_module_deps(usbmodules_t)
+')
diff --git a/usbmuxd.fc b/usbmuxd.fc
-index 220f6ad..ccbb5da 100644
+index 220f6add1..ccbb5dabc 100644
--- a/usbmuxd.fc
+++ b/usbmuxd.fc
@@ -1,3 +1,6 @@
@@ -113022,7 +113022,7 @@ index 220f6ad..ccbb5da 100644
+
+/var/lib/lockdown(/.*)? gen_context(system_u:object_r:usbmuxd_var_lib_t,s0)
diff --git a/usbmuxd.if b/usbmuxd.if
-index 1ec5e99..5b6c80b 100644
+index 1ec5e996b..5b6c80bba 100644
--- a/usbmuxd.if
+++ b/usbmuxd.if
@@ -38,3 +38,67 @@ interface(`usbmuxd_stream_connect',`
@@ -113094,7 +113094,7 @@ index 1ec5e99..5b6c80b 100644
+ allow $1 usbmuxd_unit_file_t:service all_service_perms;
+')
diff --git a/usbmuxd.te b/usbmuxd.te
-index 34a8917..933baa4 100644
+index 34a891755..933baa42d 100644
--- a/usbmuxd.te
+++ b/usbmuxd.te
@@ -10,34 +10,58 @@ roleattribute system_r usbmuxd_roles;
@@ -113161,7 +113161,7 @@ index 34a8917..933baa4 100644
+ virt_dontaudit_read_chr_dev(usbmuxd_t)
+')
diff --git a/userhelper.fc b/userhelper.fc
-index c416a83..cd83b89 100644
+index c416a833e..cd83b89ee 100644
--- a/userhelper.fc
+++ b/userhelper.fc
@@ -1,5 +1,10 @@
@@ -113181,7 +113181,7 @@ index c416a83..cd83b89 100644
+/usr/sbin/userhelper -- gen_context(system_u:object_r:userhelper_exec_t,s0)
+/usr/bin/consolehelper -- gen_context(system_u:object_r:consolehelper_exec_t,s0)
diff --git a/userhelper.if b/userhelper.if
-index 98b51fd..c7e44ca 100644
+index 98b51fd0b..c7e44cada 100644
--- a/userhelper.if
+++ b/userhelper.if
@@ -1,4 +1,4 @@
@@ -113507,7 +113507,7 @@ index 98b51fd..c7e44ca 100644
##
## Execute the consolehelper program
diff --git a/userhelper.te b/userhelper.te
-index 42cfce0..b7e3e25 100644
+index 42cfce06e..b7e3e2532 100644
--- a/userhelper.te
+++ b/userhelper.te
@@ -5,11 +5,8 @@ policy_module(userhelper, 1.8.1)
@@ -113714,7 +113714,7 @@ index 42cfce0..b7e3e25 100644
+ fs_search_cifs(consolehelper_domain)
')
diff --git a/usernetctl.if b/usernetctl.if
-index 7deec55..c542887 100644
+index 7deec55cf..c542887da 100644
--- a/usernetctl.if
+++ b/usernetctl.if
@@ -39,6 +39,7 @@ interface(`usernetctl_domtrans',`
@@ -113726,7 +113726,7 @@ index 7deec55..c542887 100644
')
diff --git a/usernetctl.te b/usernetctl.te
-index f973af8..8606439 100644
+index f973af82b..860643991 100644
--- a/usernetctl.te
+++ b/usernetctl.te
@@ -6,19 +6,19 @@ policy_module(usernetctl, 1.7.0)
@@ -113792,7 +113792,7 @@ index f973af8..8606439 100644
ppp_run(usernetctl_t, usernetctl_roles)
')
diff --git a/uucp.if b/uucp.if
-index af9acc0..cdaf82e 100644
+index af9acc0d3..cdaf82e21 100644
--- a/uucp.if
+++ b/uucp.if
@@ -90,11 +90,6 @@ interface(`uucp_domtrans_uux',`
@@ -113828,7 +113828,7 @@ index af9acc0..cdaf82e 100644
admin_pattern($1, uucpd_log_t)
diff --git a/uucp.te b/uucp.te
-index 849f607..e01ec6d 100644
+index 849f607b1..e01ec6d2e 100644
--- a/uucp.te
+++ b/uucp.te
@@ -31,7 +31,7 @@ type uucpd_ro_t;
@@ -113901,7 +113901,7 @@ index 849f607..e01ec6d 100644
+ postfix_rw_inherited_master_pipes(uux_t)
+')
diff --git a/uuidd.if b/uuidd.if
-index 6e48653..6abf74a 100644
+index 6e4865333..6abf74a90 100644
--- a/uuidd.if
+++ b/uuidd.if
@@ -148,11 +148,12 @@ interface(`uuidd_read_pid_files',`
@@ -113929,7 +113929,7 @@ index 6e48653..6abf74a 100644
uuidd_initrc_domtrans($1)
domain_system_change_exemption($1)
diff --git a/uuidd.te b/uuidd.te
-index f8e52fc..b283c25 100644
+index f8e52fc97..b283c25f7 100644
--- a/uuidd.te
+++ b/uuidd.te
@@ -42,6 +42,4 @@ dev_read_urand(uuidd_t)
@@ -113940,7 +113940,7 @@ index f8e52fc..b283c25 100644
-miscfiles_read_localization(uuidd_t)
diff --git a/uwimap.te b/uwimap.te
-index acdc78a..9e5ee47 100644
+index acdc78ae7..9e5ee472d 100644
--- a/uwimap.te
+++ b/uwimap.te
@@ -20,7 +20,7 @@ files_pid_file(imapd_var_run_t)
@@ -113979,7 +113979,7 @@ index acdc78a..9e5ee47 100644
userdom_dontaudit_use_unpriv_user_fds(imapd_t)
diff --git a/varnishd.if b/varnishd.if
-index 1c35171..2cba4df 100644
+index 1c35171d8..2cba4dfea 100644
--- a/varnishd.if
+++ b/varnishd.if
@@ -153,12 +153,16 @@ interface(`varnishd_manage_log',`
@@ -114016,7 +114016,7 @@ index 1c35171..2cba4df 100644
domain_system_change_exemption($1)
role_transition $2 varnishd_initrc_exec_t system_r;
diff --git a/varnishd.te b/varnishd.te
-index 9d4d8cb..e73bd98 100644
+index 9d4d8cbb0..e73bd982c 100644
--- a/varnishd.te
+++ b/varnishd.te
@@ -21,7 +21,7 @@ type varnishd_initrc_exec_t;
@@ -114066,7 +114066,7 @@ index 9d4d8cb..e73bd98 100644
tunable_policy(`varnishd_connect_any',`
corenet_sendrecv_all_client_packets(varnishd_t)
diff --git a/vbetool.te b/vbetool.te
-index 2a61f75..fa84e40 100644
+index 2a61f7526..fa84e40b9 100644
--- a/vbetool.te
+++ b/vbetool.te
@@ -26,7 +26,8 @@ role vbetool_roles types vbetool_t;
@@ -114088,7 +114088,7 @@ index 2a61f75..fa84e40 100644
tunable_policy(`vbetool_mmap_zero_ignore',`
dontaudit vbetool_t self:memprotect mmap_zero;
diff --git a/vdagent.if b/vdagent.if
-index 31c752e..ef52235 100644
+index 31c752ea6..ef522355b 100644
--- a/vdagent.if
+++ b/vdagent.if
@@ -24,15 +24,15 @@ interface(`vdagent_domtrans',`
@@ -114185,7 +114185,7 @@ index 31c752e..ef52235 100644
init_labeled_script_domtrans($1, vdagentd_initrc_exec_t)
domain_system_change_exemption($1)
diff --git a/vdagent.te b/vdagent.te
-index 87da8a2..b80a6f4 100644
+index 87da8a24d..b80a6f422 100644
--- a/vdagent.te
+++ b/vdagent.te
@@ -25,6 +25,7 @@ logging_log_file(vdagent_log_t)
@@ -114231,7 +114231,7 @@ index 87da8a2..b80a6f4 100644
dbus_system_bus_client(vdagent_t)
diff --git a/vhostmd.if b/vhostmd.if
-index 22edd58..c3a5364 100644
+index 22edd58f8..c3a536427 100644
--- a/vhostmd.if
+++ b/vhostmd.if
@@ -216,9 +216,13 @@ interface(`vhostmd_admin',`
@@ -114250,7 +114250,7 @@ index 22edd58..c3a5364 100644
domain_system_change_exemption($1)
role_transition $2 vhostmd_initrc_exec_t system_r;
diff --git a/vhostmd.te b/vhostmd.te
-index 3d11c6a..c5d8428 100644
+index 3d11c6a3d..c5d84287e 100644
--- a/vhostmd.te
+++ b/vhostmd.te
@@ -23,7 +23,7 @@ files_pid_file(vhostmd_var_run_t)
@@ -114286,7 +114286,7 @@ index 3d11c6a..c5d8428 100644
optional_policy(`
diff --git a/virt.fc b/virt.fc
-index a4f20bc..9777de2 100644
+index a4f20bcfc..9777de289 100644
--- a/virt.fc
+++ b/virt.fc
@@ -1,51 +1,109 @@
@@ -114438,7 +114438,7 @@ index a4f20bc..9777de2 100644
+/var/log/qemu-ga\.log.* -- gen_context(system_u:object_r:virt_qemu_ga_log_t,s0)
+/var/log/qemu-ga(/.*)? gen_context(system_u:object_r:virt_qemu_ga_log_t,s0)
diff --git a/virt.if b/virt.if
-index facdee8..2a619ba 100644
+index facdee8b3..2a619ba9e 100644
--- a/virt.if
+++ b/virt.if
@@ -1,120 +1,111 @@
@@ -116663,7 +116663,7 @@ index facdee8..2a619ba 100644
+ dgram_send_pattern($1, virt_var_run_t, virt_var_run_t, virtd_t)
')
diff --git a/virt.te b/virt.te
-index f03dcf5..5ce41db 100644
+index f03dcf567..5ce41db0d 100644
--- a/virt.te
+++ b/virt.te
@@ -1,451 +1,422 @@
@@ -119027,7 +119027,7 @@ index f03dcf5..5ce41db 100644
+allow svirt_sandbox_domain container_ro_file_t:file execmod;
+can_exec(svirt_sandbox_domain, container_ro_file_t)
diff --git a/vlock.te b/vlock.te
-index 6b72968..de409cc 100644
+index 6b72968ea..de409cc61 100644
--- a/vlock.te
+++ b/vlock.te
@@ -38,7 +38,7 @@ auth_use_pam(vlock_t)
@@ -119042,7 +119042,7 @@ index 6b72968..de409cc 100644
+userdom_use_inherited_user_terminals(vlock_t)
diff --git a/vmtools.fc b/vmtools.fc
new file mode 100644
-index 0000000..c5deffb
+index 000000000..c5deffb77
--- /dev/null
+++ b/vmtools.fc
@@ -0,0 +1,5 @@
@@ -119053,7 +119053,7 @@ index 0000000..c5deffb
+/usr/lib/systemd/system/vmtoolsd.* -- gen_context(system_u:object_r:vmtools_unit_file_t,s0)
diff --git a/vmtools.if b/vmtools.if
new file mode 100644
-index 0000000..afd0c97
+index 000000000..afd0c9791
--- /dev/null
+++ b/vmtools.if
@@ -0,0 +1,123 @@
@@ -119182,7 +119182,7 @@ index 0000000..afd0c97
+')
diff --git a/vmtools.te b/vmtools.te
new file mode 100644
-index 0000000..f98f288
+index 000000000..f98f2885b
--- /dev/null
+++ b/vmtools.te
@@ -0,0 +1,100 @@
@@ -119287,7 +119287,7 @@ index 0000000..f98f288
+')
+
diff --git a/vmware.if b/vmware.if
-index 20a1fb2..470ea95 100644
+index 20a1fb296..470ea9528 100644
--- a/vmware.if
+++ b/vmware.if
@@ -26,7 +26,11 @@ interface(`vmware_role',`
@@ -119304,7 +119304,7 @@ index 20a1fb2..470ea95 100644
allow $2 { vmware_tmp_t vmware_file_t }:dir { manage_dir_perms relabel_dir_perms };
allow $2 { vmware_conf_t vmware_file_t vmware_tmp_t vmware_tmpfs_t }:file { manage_file_perms relabel_file_perms };
diff --git a/vmware.te b/vmware.te
-index 4ad1894..b589158 100644
+index 4ad18944a..b5891580a 100644
--- a/vmware.te
+++ b/vmware.te
@@ -65,7 +65,8 @@ ifdef(`enable_mcs',`
@@ -119410,7 +119410,7 @@ index 4ad1894..b589158 100644
sysnet_dns_name_resolve(vmware_t)
diff --git a/vnstatd.if b/vnstatd.if
-index 137ac44..b644854 100644
+index 137ac4458..b644854c9 100644
--- a/vnstatd.if
+++ b/vnstatd.if
@@ -157,7 +157,6 @@ interface(`vnstatd_manage_lib_files',`
@@ -119437,7 +119437,7 @@ index 137ac44..b644854 100644
domain_system_change_exemption($1)
role_transition $2 vnstatd_initrc_exec_t system_r;
diff --git a/vnstatd.te b/vnstatd.te
-index e2220ae..85f393b 100644
+index e2220ae7f..85f393b41 100644
--- a/vnstatd.te
+++ b/vnstatd.te
@@ -36,7 +36,7 @@ allow vnstatd_t self:unix_stream_socket { accept listen };
@@ -119494,7 +119494,7 @@ index e2220ae..85f393b 100644
cron_system_entry(vnstat_t, vnstat_exec_t)
')
diff --git a/vpn.fc b/vpn.fc
-index 524ac2f..076dcc3 100644
+index 524ac2f76..076dcc3e6 100644
--- a/vpn.fc
+++ b/vpn.fc
@@ -1,7 +1,13 @@
@@ -119515,7 +119515,7 @@ index 524ac2f..076dcc3 100644
-/var/run/vpnc(/.*)? gen_context(system_u:object_r:vpnc_var_run_t,s0)
+/var/run/vpnc(/.*)? gen_context(system_u:object_r:vpnc_var_run_t,s0)
diff --git a/vpn.if b/vpn.if
-index 7a7f342..afedcba 100644
+index 7a7f34297..afedcba80 100644
--- a/vpn.if
+++ b/vpn.if
@@ -1,8 +1,8 @@
@@ -119592,7 +119592,7 @@ index 7a7f342..afedcba 100644
##
##
diff --git a/vpn.te b/vpn.te
-index 95b26d1..3d74e70 100644
+index 95b26d126..3d74e70cc 100644
--- a/vpn.te
+++ b/vpn.te
@@ -6,6 +6,7 @@ policy_module(vpn, 1.16.0)
@@ -119707,7 +119707,7 @@ index 95b26d1..3d74e70 100644
+ networkmanager_manage_pid_files(vpnc_t)
')
diff --git a/w3c.fc b/w3c.fc
-index 463c799..227feaf 100644
+index 463c799f4..227feaf34 100644
--- a/w3c.fc
+++ b/w3c.fc
@@ -1,4 +1,4 @@
@@ -119719,7 +119719,7 @@ index 463c799..227feaf 100644
+/usr/share/w3c-markup-validator(/.*)? gen_context(system_u:object_r:w3c_validator_content_t,s0)
+/usr/share/w3c-markup-validator/cgi-bin(/.*)? gen_context(system_u:object_r:w3c_validator_script_exec_t,s0)
diff --git a/w3c.te b/w3c.te
-index b14d6a9..d7c7938 100644
+index b14d6a948..d7c79382d 100644
--- a/w3c.te
+++ b/w3c.te
@@ -6,29 +6,37 @@ policy_module(w3c, 1.1.0)
@@ -119776,7 +119776,7 @@ index b14d6a9..d7c7938 100644
-sysnet_dns_name_resolve(httpd_w3c_validator_script_t)
+sysnet_dns_name_resolve(w3c_validator_script_t)
diff --git a/watchdog.fc b/watchdog.fc
-index eecd0e0..8df2e8c 100644
+index eecd0e03b..8df2e8ce7 100644
--- a/watchdog.fc
+++ b/watchdog.fc
@@ -1,7 +1,12 @@
@@ -119793,7 +119793,7 @@ index eecd0e0..8df2e8c 100644
/var/run/watchdog\.pid -- gen_context(system_u:object_r:watchdog_var_run_t,s0)
diff --git a/watchdog.if b/watchdog.if
-index 6461a77..8fda2dd 100644
+index 6461a7746..8fda2dd71 100644
--- a/watchdog.if
+++ b/watchdog.if
@@ -37,3 +37,21 @@ interface(`watchdog_admin',`
@@ -119819,7 +119819,7 @@ index 6461a77..8fda2dd 100644
+ read_lnk_files_pattern($1,watchdog_unconfined_exec_t, watchdog_unconfined_exec_t)
+')
diff --git a/watchdog.te b/watchdog.te
-index 3548317..fc3da17 100644
+index 3548317cf..fc3da17d6 100644
--- a/watchdog.te
+++ b/watchdog.te
@@ -12,34 +12,47 @@ init_daemon_domain(watchdog_t, watchdog_exec_t)
@@ -119948,7 +119948,7 @@ index 3548317..fc3da17 100644
+ ')
+')
diff --git a/wdmd.fc b/wdmd.fc
-index 66f11f7..e051997 100644
+index 66f11f724..e051997a6 100644
--- a/wdmd.fc
+++ b/wdmd.fc
@@ -1,5 +1,7 @@
@@ -119962,7 +119962,7 @@ index 66f11f7..e051997 100644
-/var/run/wdmd(/.*)? gen_context(system_u:object_r:wdmd_var_run_t,s0)
diff --git a/wdmd.if b/wdmd.if
-index 1e3aec0..d17ff39 100644
+index 1e3aec07f..d17ff392f 100644
--- a/wdmd.if
+++ b/wdmd.if
@@ -1,29 +1,47 @@
@@ -120106,7 +120106,7 @@ index 1e3aec0..d17ff39 100644
+
')
diff --git a/wdmd.te b/wdmd.te
-index 4815a93..24dcf51 100644
+index 4815a93f4..24dcf5174 100644
--- a/wdmd.te
+++ b/wdmd.te
@@ -45,16 +45,15 @@ corecmd_exec_shell(wdmd_t)
@@ -120131,7 +120131,7 @@ index 4815a93..24dcf51 100644
+ rhcs_rw_cluster_tmpfs(wdmd_t)
')
diff --git a/webadm.te b/webadm.te
-index 2a6cae7..6d0a2a1 100644
+index 2a6cae773..6d0a2a1c5 100644
--- a/webadm.te
+++ b/webadm.te
@@ -25,6 +25,9 @@ role webadm_r;
@@ -120169,7 +120169,7 @@ index 2a6cae7..6d0a2a1 100644
tunable_policy(`webadm_manage_user_files',`
userdom_manage_user_home_content_files(webadm_t)
diff --git a/webalizer.fc b/webalizer.fc
-index 64baf67..76c753b 100644
+index 64baf679e..76c753b1a 100644
--- a/webalizer.fc
+++ b/webalizer.fc
@@ -6,4 +6,4 @@
@@ -120179,7 +120179,7 @@ index 64baf67..76c753b 100644
-/var/www/usage(/.*)? gen_context(system_u:object_r:httpd_webalizer_content_t,s0)
+/var/www/usage(/.*)? gen_context(system_u:object_r:webalizer_rw_content_t,s0)
diff --git a/webalizer.te b/webalizer.te
-index ae919b9..cdd9359 100644
+index ae919b9a5..cdd9359d1 100644
--- a/webalizer.te
+++ b/webalizer.te
@@ -33,7 +33,7 @@ files_type(webalizer_write_t)
@@ -120235,7 +120235,7 @@ index ae919b9..cdd9359 100644
optional_policy(`
diff --git a/wine.if b/wine.if
-index fd2b6cc..9c4f14b 100644
+index fd2b6cc1e..9c4f14b88 100644
--- a/wine.if
+++ b/wine.if
@@ -1,46 +1,58 @@
@@ -120410,7 +120410,7 @@ index fd2b6cc..9c4f14b 100644
+')
+
diff --git a/wine.te b/wine.te
-index 491b87b..2a79df4 100644
+index 491b87b44..2a79df407 100644
--- a/wine.te
+++ b/wine.te
@@ -14,10 +14,11 @@ policy_module(wine, 1.11.0)
@@ -120512,7 +120512,7 @@ index 491b87b..2a79df4 100644
')
+
diff --git a/wireshark.te b/wireshark.te
-index ff6ef38..436d3bf 100644
+index ff6ef3859..436d3bf5a 100644
--- a/wireshark.te
+++ b/wireshark.te
@@ -34,7 +34,7 @@ userdom_user_tmpfs_file(wireshark_tmpfs_t)
@@ -120567,7 +120567,7 @@ index ff6ef38..436d3bf 100644
optional_policy(`
userhelper_use_fd(wireshark_t)
diff --git a/wm.fc b/wm.fc
-index 304ae09..c1d10a1 100644
+index 304ae09d3..c1d10a11b 100644
--- a/wm.fc
+++ b/wm.fc
@@ -1,4 +1,4 @@
@@ -120577,7 +120577,7 @@ index 304ae09..c1d10a1 100644
-/usr/bin/twm -- gen_context(system_u:object_r:wm_exec_t,s0)
+/usr/bin/twm -- gen_context(system_u:object_r:wm_exec_t,s0)
diff --git a/wm.if b/wm.if
-index 95f888d..48fe249 100644
+index 95f888d16..48fe249e1 100644
--- a/wm.if
+++ b/wm.if
@@ -1,4 +1,4 @@
@@ -120712,7 +120712,7 @@ index 95f888d..48fe249 100644
- allow $1_wm_t $2:dbus send_msg;
-')
diff --git a/wm.te b/wm.te
-index 638d10f..5fb9960 100644
+index 638d10fc6..5fb996008 100644
--- a/wm.te
+++ b/wm.te
@@ -1,12 +1,12 @@
@@ -120826,7 +120826,7 @@ index 638d10f..5fb9960 100644
+ xserver_manage_core_devices(wm_domain)
+')
diff --git a/xen.fc b/xen.fc
-index 42d83b0..651d1cb 100644
+index 42d83b02f..651d1cb61 100644
--- a/xen.fc
+++ b/xen.fc
@@ -1,38 +1,42 @@
@@ -120889,7 +120889,7 @@ index 42d83b0..651d1cb 100644
-/xen(/.*)? gen_context(system_u:object_r:xen_image_t,s0)
+/xen(/.*)? gen_context(system_u:object_r:xen_image_t,s0)
diff --git a/xen.if b/xen.if
-index f93558c..16e29c1 100644
+index f93558c5a..16e29c141 100644
--- a/xen.if
+++ b/xen.if
@@ -1,13 +1,13 @@
@@ -121156,7 +121156,7 @@ index f93558c..16e29c1 100644
files_search_pids($1)
diff --git a/xen.te b/xen.te
-index 6f736a9..c1ba3ba 100644
+index 6f736a993..c1ba3ba4b 100644
--- a/xen.te
+++ b/xen.te
@@ -4,39 +4,31 @@ policy_module(xen, 1.13.0)
@@ -121856,7 +121856,7 @@ index 6f736a9..c1ba3ba 100644
- fs_manage_xenfs_files(xm_ssh_t)
-')
diff --git a/xfs.te b/xfs.te
-index 0928c5d..b9bcf88 100644
+index 0928c5d6a..b9bcf8824 100644
--- a/xfs.te
+++ b/xfs.te
@@ -23,7 +23,7 @@ files_pid_file(xfs_var_run_t)
@@ -121893,7 +121893,7 @@ index 0928c5d..b9bcf88 100644
userdom_dontaudit_use_unpriv_user_fds(xfs_t)
diff --git a/xguest.te b/xguest.te
-index a64aad3..12dc86b 100644
+index a64aad347..12dc86b2f 100644
--- a/xguest.te
+++ b/xguest.te
@@ -6,46 +6,49 @@ policy_module(xguest, 1.2.0)
@@ -122153,7 +122153,7 @@ index a64aad3..12dc86b 100644
-#gen_user(xguest_u,, xguest_r, s0, s0)
+gen_user(xguest_u, user, xguest_r, s0, s0)
diff --git a/xprint.te b/xprint.te
-index 3c44d84..ce5e69d 100644
+index 3c44d8493..ce5e69d69 100644
--- a/xprint.te
+++ b/xprint.te
@@ -32,7 +32,6 @@ kernel_read_kernel_sysctls(xprint_t)
@@ -122183,7 +122183,7 @@ index 3c44d84..ce5e69d 100644
sysnet_read_config(xprint_t)
diff --git a/xscreensaver.te b/xscreensaver.te
-index 04096a0..98a8205 100644
+index 04096a050..98a8205a7 100644
--- a/xscreensaver.te
+++ b/xscreensaver.te
@@ -25,7 +25,6 @@ allow xscreensaver_t self:fifo_file rw_fifo_file_perms;
@@ -122207,7 +122207,7 @@ index 04096a0..98a8205 100644
xserver_user_x_domain_template(xscreensaver, xscreensaver_t, xscreensaver_tmpfs_t)
diff --git a/yam.te b/yam.te
-index 2695db2..c1ec893 100644
+index 2695db25c..c1ec89384 100644
--- a/yam.te
+++ b/yam.te
@@ -26,7 +26,7 @@ files_tmp_file(yam_tmp_t)
@@ -122235,7 +122235,7 @@ index 2695db2..c1ec893 100644
userdom_search_user_home_dirs(yam_t)
diff --git a/zabbix.fc b/zabbix.fc
-index c3b5a81..c384947 100644
+index c3b5a819e..c384947f3 100644
--- a/zabbix.fc
+++ b/zabbix.fc
@@ -4,12 +4,22 @@
@@ -122264,7 +122264,7 @@ index c3b5a81..c384947 100644
/var/run/zabbix(/.*)? gen_context(system_u:object_r:zabbix_var_run_t,s0)
diff --git a/zabbix.if b/zabbix.if
-index dd63de0..38ce620 100644
+index dd63de028..38ce6208e 100644
--- a/zabbix.if
+++ b/zabbix.if
@@ -1,4 +1,4 @@
@@ -122426,7 +122426,7 @@ index dd63de0..38ce620 100644
- admin_pattern($1, zabbix_tmpfs_t)
')
diff --git a/zabbix.te b/zabbix.te
-index 7f496c6..bf2ae51 100644
+index 7f496c617..bf2ae51d0 100644
--- a/zabbix.te
+++ b/zabbix.te
@@ -6,27 +6,32 @@ policy_module(zabbix, 1.6.0)
@@ -122732,7 +122732,7 @@ index 7f496c6..bf2ae51 100644
+ unconfined_domain(zabbix_script_t)
+')
diff --git a/zarafa.fc b/zarafa.fc
-index faf99ed..44e94fa 100644
+index faf99ed51..44e94fad9 100644
--- a/zarafa.fc
+++ b/zarafa.fc
@@ -1,33 +1,34 @@
@@ -122787,7 +122787,7 @@ index faf99ed..44e94fa 100644
+/var/run/zarafa-search\.pid -- gen_context(system_u:object_r:zarafa_indexer_var_run_t,s0)
/var/run/zarafa-spooler\.pid -- gen_context(system_u:object_r:zarafa_spooler_var_run_t,s0)
diff --git a/zarafa.if b/zarafa.if
-index 36e32df..3d08962 100644
+index 36e32df6d..3d089626e 100644
--- a/zarafa.if
+++ b/zarafa.if
@@ -1,55 +1,59 @@
@@ -122974,7 +122974,7 @@ index 36e32df..3d08962 100644
+ manage_dirs_pattern($1, zarafa_var_lib_t, zarafa_var_lib_t)
')
diff --git a/zarafa.te b/zarafa.te
-index 3fded1c..8bea5e8 100644
+index 3fded1c4d..8bea5e820 100644
--- a/zarafa.te
+++ b/zarafa.te
@@ -5,9 +5,14 @@ policy_module(zarafa, 1.2.0)
@@ -123212,7 +123212,7 @@ index 3fded1c..8bea5e8 100644
-miscfiles_read_localization(zarafa_domain)
+dev_read_sysfs(zarafa_domain)
diff --git a/zebra.fc b/zebra.fc
-index 28ee4ca..bc37f76 100644
+index 28ee4cac9..bc37f7691 100644
--- a/zebra.fc
+++ b/zebra.fc
@@ -1,21 +1,34 @@
@@ -123264,7 +123264,7 @@ index 28ee4ca..bc37f76 100644
-/var/run/quagga(/.*)? gen_context(system_u:object_r:zebra_var_run_t,s0)
+/var/run/quagga(/.*)? gen_context(system_u:object_r:zebra_var_run_t,s0)
diff --git a/zebra.if b/zebra.if
-index 3416401..e364caf 100644
+index 34164017b..e364caf4b 100644
--- a/zebra.if
+++ b/zebra.if
@@ -1,8 +1,8 @@
@@ -123372,7 +123372,7 @@ index 3416401..e364caf 100644
+ allow $1 zebra_unit_file_t:service all_service_perms;
')
diff --git a/zebra.te b/zebra.te
-index 2e80d04..5bf04b2 100644
+index 2e80d04fc..5bf04b2d0 100644
--- a/zebra.te
+++ b/zebra.te
@@ -6,23 +6,26 @@ policy_module(zebra, 1.13.0)
@@ -123526,7 +123526,7 @@ index 2e80d04..5bf04b2 100644
+')
diff --git a/zoneminder.fc b/zoneminder.fc
new file mode 100644
-index 0000000..ceaa219
+index 000000000..ceaa219dc
--- /dev/null
+++ b/zoneminder.fc
@@ -0,0 +1,13 @@
@@ -123545,7 +123545,7 @@ index 0000000..ceaa219
+/var/spool/zoneminder-upload(/.*)? gen_context(system_u:object_r:zoneminder_spool_t,s0)
diff --git a/zoneminder.if b/zoneminder.if
new file mode 100644
-index 0000000..fb0519e
+index 000000000..fb0519ebf
--- /dev/null
+++ b/zoneminder.if
@@ -0,0 +1,374 @@
@@ -123925,7 +123925,7 @@ index 0000000..fb0519e
+
diff --git a/zoneminder.te b/zoneminder.te
new file mode 100644
-index 0000000..c9ad1b3
+index 000000000..c9ad1b330
--- /dev/null
+++ b/zoneminder.te
@@ -0,0 +1,187 @@
@@ -124117,7 +124117,7 @@ index 0000000..c9ad1b3
+ ')
+')
diff --git a/zosremote.if b/zosremote.if
-index b14698c..16e1581 100644
+index b14698c4f..16e1581a0 100644
--- a/zosremote.if
+++ b/zosremote.if
@@ -35,6 +35,7 @@ interface(`zosremote_domtrans',`
@@ -124129,7 +124129,7 @@ index b14698c..16e1581 100644
interface(`zosremote_run',`
gen_require(`
diff --git a/zosremote.te b/zosremote.te
-index bc6a5db..0abdceb 100644
+index bc6a5db70..0abdcebcb 100644
--- a/zosremote.te
+++ b/zosremote.te
@@ -24,6 +24,4 @@ allow zos_remote_t self:unix_stream_socket { accept listen };
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 272febf..1b4e09c 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.13.1
-Release: 269%{?dist}
+Release: 270%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -683,6 +683,9 @@ exit 0
%endif
%changelog
+* Thu Aug 10 2017 Lukas Vrabec - 3.13.1-270
+- refpolicy: Infiniband pkeys and endport
+
* Thu Aug 10 2017 Lukas Vrabec - 3.13.1-269
- Allow osad make executable an anonymous mapping or private file mapping that is writable BZ(1425524)
- After fix in kernel where LSM hooks for dac_override and dac_search_read capability was swaped we need to fix it also in policy