+## Execute telepathy executable
+## in the specified domain.
@@ -10335,6 +9258,7 @@ index 0000000..1d0f110
+##
+#
+interface(`telepathy_command_domtrans', `
++
+ gen_require(`
+ attribute telepathy_executable;
+ ')
@@ -10344,402 +9268,119 @@ index 0000000..1d0f110
+ type_transition $1 telepathy_executable:process $2;
+
+ # needs to dbus chat with unconfined_t and unconfined_dbusd_t
-+ optional_policy(`
++ optional_policy(`
+ telepathy_dbus_chat($1)
+ telepathy_dbus_chat($2)
+ ')
+')
diff --git a/policy/modules/apps/telepathy.te b/policy/modules/apps/telepathy.te
-new file mode 100644
-index 0000000..aaaf4e0
---- /dev/null
+index 2533ea0..f41eb44 100644
+--- a/policy/modules/apps/telepathy.te
+++ b/policy/modules/apps/telepathy.te
-@@ -0,0 +1,385 @@
-+
-+policy_module(telepathy, 1.0.0)
-+
-+########################################
-+#
-+# Declarations.
-+#
-+
-+##
-+##
-+## Allow the Telepathy connection managers
-+## to connect to any generic TCP port.
-+##
-+##
-+gen_tunable(telepathy_tcp_connect_generic_network_ports, false)
-+
-+##
-+##
-+## Allow the Telepathy connection managers
-+## to connect to any network port.
-+##
-+##
-+gen_tunable(telepathy_connect_all_ports, true)
-+
-+attribute telepathy_domain;
-+attribute telepathy_executable;
-+
-+telepathy_domain_template(gabble)
-+
-+type telepathy_gabble_cache_home_t;
-+userdom_user_home_content(telepathy_gabble_cache_home_t)
-+
-+telepathy_domain_template(idle)
-+telepathy_domain_template(mission_control)
-+
-+type telepathy_mission_control_home_t;
-+userdom_user_home_content(telepathy_mission_control_home_t)
-+
-+type telepathy_mission_control_cache_home_t;
-+userdom_user_home_content(telepathy_mission_control_cache_home_t)
-+
-+type telepathy_sunshine_home_t;
-+userdom_user_home_content(telepathy_sunshine_home_t)
-+
-+type telepathy_logger_cache_home_t;
-+userdom_user_home_content(telepathy_logger_cache_home_t)
-+
-+type telepathy_logger_data_home_t;
-+userdom_user_home_content(telepathy_logger_data_home_t)
-+
-+telepathy_domain_template(msn)
-+telepathy_domain_template(salut)
-+telepathy_domain_template(sofiasip)
-+telepathy_domain_template(stream_engine)
-+telepathy_domain_template(sunshine)
-+telepathy_domain_template(logger)
-+# New in F16
+@@ -32,6 +32,8 @@ userdom_user_home_content(telepathy_gabble_cache_home_t)
+ telepathy_domain_template(idle)
+ telepathy_domain_template(logger)
+
+permissive telepathy_logger_t;
+
-+#######################################
-+#
-+# Telepathy Butterfly and Haze local policy.
-+#
-+
-+allow telepathy_msn_t self:process setsched;
-+allow telepathy_msn_t self:unix_dgram_socket { write create connect };
-+
-+manage_dirs_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t)
-+manage_files_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t)
-+manage_sock_files_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t)
-+exec_files_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t)
-+files_tmp_filetrans(telepathy_msn_t, telepathy_msn_tmp_t, { dir file sock_file })
-+userdom_user_tmp_filetrans(telepathy_msn_t, telepathy_msn_tmp_t, { dir file sock_file })
-+userdom_dontaudit_setattr_user_tmp(telepathy_msn_t)
-+can_exec(telepathy_msn_t, telepathy_msn_tmp_t)
-+
-+corenet_sendrecv_http_client_packets(telepathy_msn_t)
-+corenet_sendrecv_mmcc_client_packets(telepathy_msn_t)
-+corenet_sendrecv_msnp_client_packets(telepathy_msn_t)
-+corenet_tcp_connect_http_port(telepathy_msn_t)
-+corenet_tcp_connect_mmcc_port(telepathy_msn_t)
-+corenet_tcp_connect_msnp_port(telepathy_msn_t)
-+corenet_tcp_connect_sametime_port(telepathy_msn_t)
-+corenet_tcp_connect_ssdp_port(telepathy_msn_t)
-+corenet_tcp_connect_sip_port(telepathy_msn_t)
-+
-+corecmd_exec_bin(telepathy_msn_t)
-+corecmd_exec_shell(telepathy_msn_t)
-+corecmd_read_bin_symlinks(telepathy_msn_t)
-+
-+files_read_etc_files(telepathy_msn_t)
-+files_read_usr_files(telepathy_msn_t)
-+
-+init_read_state(telepathy_msn_t)
-+
-+libs_exec_ldconfig(telepathy_msn_t)
-+
-+logging_send_syslog_msg(telepathy_msn_t)
-+
-+miscfiles_read_all_certs(telepathy_msn_t)
-+
-+userdom_read_all_users_state(telepathy_msn_t)
-+
-+optional_policy(`
-+ dbus_system_bus_client(telepathy_msn_t)
-+ optional_policy(`
-+ networkmanager_dbus_chat(telepathy_msn_t)
-+ ')
-+')
-+
-+optional_policy(`
-+ gnome_read_gconf_home_files(telepathy_msn_t)
-+')
-+
-+#######################################
-+#
-+# Telepathy Gabble local policy.
-+#
-+
-+allow telepathy_gabble_t self:tcp_socket { listen accept };
-+allow telepathy_gabble_t self:unix_dgram_socket { write read create getattr sendto };
-+
-+manage_dirs_pattern(telepathy_gabble_t, telepathy_gabble_tmp_t, telepathy_gabble_tmp_t)
-+manage_sock_files_pattern(telepathy_gabble_t, telepathy_gabble_tmp_t, telepathy_gabble_tmp_t)
-+files_tmp_filetrans(telepathy_gabble_t, telepathy_gabble_tmp_t, { dir sock_file })
-+
+ type telepathy_logger_cache_home_t;
+ userdom_user_home_content(telepathy_logger_cache_home_t)
+
+@@ -67,6 +69,14 @@ manage_dirs_pattern(telepathy_gabble_t, telepathy_gabble_tmp_t, telepathy_gabble
+ manage_sock_files_pattern(telepathy_gabble_t, telepathy_gabble_tmp_t, telepathy_gabble_tmp_t)
+ files_tmp_filetrans(telepathy_gabble_t, telepathy_gabble_tmp_t, { dir sock_file })
+
+# ~/.cache/gabble/caps-cache.db-journal
++# optional_policy(`
+optional_policy(`
+ manage_dirs_pattern(telepathy_gabble_t, telepathy_gabble_cache_home_t, telepathy_gabble_cache_home_t)
+ manage_files_pattern(telepathy_gabble_t, telepathy_gabble_cache_home_t, telepathy_gabble_cache_home_t)
+ gnome_cache_filetrans(telepathy_gabble_t, telepathy_gabble_cache_home_t, { dir file })
-+')
-+
-+corenet_sendrecv_commplex_client_packets(telepathy_gabble_t)
-+corenet_sendrecv_http_client_packets(telepathy_gabble_t)
-+corenet_sendrecv_jabber_client_client_packets(telepathy_gabble_t)
-+corenet_sendrecv_vnc_client_packets(telepathy_gabble_t)
-+
-+corenet_tcp_connect_commplex_port(telepathy_gabble_t)
-+corenet_tcp_connect_http_port(telepathy_gabble_t)
-+corenet_tcp_connect_jabber_client_port(telepathy_gabble_t)
-+corenet_tcp_connect_vnc_port(telepathy_gabble_t)
-+
-+dev_read_rand(telepathy_gabble_t)
-+
-+files_read_config_files(telepathy_gabble_t)
-+files_read_usr_files(telepathy_gabble_t)
-+
-+miscfiles_read_all_certs(telepathy_gabble_t)
-+
-+optional_policy(`
-+ dbus_system_bus_client(telepathy_gabble_t)
-+')
-+
-+tunable_policy(`use_nfs_home_dirs', `
-+ fs_manage_nfs_dirs(telepathy_gabble_t)
-+ fs_manage_nfs_files(telepathy_gabble_t)
-+')
-+
-+tunable_policy(`use_samba_home_dirs', `
-+ fs_manage_cifs_dirs(telepathy_gabble_t)
-+ fs_manage_cifs_files(telepathy_gabble_t)
-+')
++')
+
+ corenet_all_recvfrom_netlabel(telepathy_gabble_t)
+ corenet_all_recvfrom_unlabeled(telepathy_gabble_t)
+ corenet_tcp_sendrecv_generic_if(telepathy_gabble_t)
+@@ -168,6 +178,11 @@ tunable_policy(`use_samba_home_dirs',`
+ fs_manage_cifs_files(telepathy_logger_t)
+ ')
+
+optional_policy(`
-+ gnome_read_home_config(telepathy_gabble_t)
++# ~/.config/dconf/user
++ gnome_read_home_config(telepathy_logger_t)
+')
+
-+#######################################
-+#
-+# Telepathy Idle local policy.
-+#
-+
-+corenet_sendrecv_ircd_client_packets(telepathy_idle_t)
-+corenet_tcp_connect_gatekeeper_port(telepathy_idle_t)
-+corenet_tcp_connect_ircd_port(telepathy_idle_t)
-+
-+dev_read_rand(telepathy_idle_t)
-+
-+files_read_etc_files(telepathy_idle_t)
-+
-+#######################################
-+#
-+# Telepathy Mission-Control local policy.
-+#
-+
-+manage_dirs_pattern(telepathy_mission_control_t, telepathy_mission_control_home_t, telepathy_mission_control_home_t)
-+manage_files_pattern(telepathy_mission_control_t, telepathy_mission_control_home_t, telepathy_mission_control_home_t)
-+userdom_user_home_dir_filetrans(telepathy_mission_control_t, telepathy_mission_control_home_t, { dir file })
+ #######################################
+ #
+ # Telepathy Mission-Control local policy.
+@@ -176,6 +191,7 @@ tunable_policy(`use_samba_home_dirs',`
+ manage_dirs_pattern(telepathy_mission_control_t, telepathy_mission_control_home_t, telepathy_mission_control_home_t)
+ manage_files_pattern(telepathy_mission_control_t, telepathy_mission_control_home_t, telepathy_mission_control_home_t)
+ userdom_user_home_dir_filetrans(telepathy_mission_control_t, telepathy_mission_control_home_t, { dir file })
+userdom_search_user_home_dirs(telepathy_mission_control_t)
-+
-+dev_read_rand(telepathy_mission_control_t)
-+
-+files_read_etc_files(telepathy_mission_control_t)
-+files_read_usr_files(telepathy_mission_control_t)
-+
-+tunable_policy(`use_nfs_home_dirs', `
-+ fs_manage_nfs_dirs(telepathy_mission_control_t)
-+ fs_manage_nfs_files(telepathy_mission_control_t)
-+')
-+
-+tunable_policy(`use_samba_home_dirs', `
-+ fs_manage_cifs_dirs(telepathy_mission_control_t)
-+ fs_manage_cifs_files(telepathy_mission_control_t)
-+')
-+
+
+ dev_read_rand(telepathy_mission_control_t)
+
+@@ -194,6 +210,12 @@ tunable_policy(`use_samba_home_dirs',`
+ fs_manage_cifs_files(telepathy_mission_control_t)
+ ')
+
+# ~/.cache/.mc_connections.
+optional_policy(`
+ manage_files_pattern(telepathy_mission_control_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_cache_home_t)
+ gnome_cache_filetrans(telepathy_mission_control_t, telepathy_mission_control_cache_home_t, file)
+')
+
-+optional_policy(`
-+ gnome_read_gconf_home_files(telepathy_mission_control_t)
-+ gnome_setattr_cache_home_dir(telepathy_mission_control_t)
-+ gnome_read_generic_cache_files(telepathy_mission_control_t)
-+ gnome_dbus_chat_gkeyringd(telepathy_mission_control_t)
-+')
-+
-+#######################################
-+#
-+# Telepathy Salut local policy.
-+#
-+allow telepathy_salut_t self:tcp_socket { accept listen };
-+
-+manage_sock_files_pattern(telepathy_salut_t, telepathy_salut_tmp_t, telepathy_salut_tmp_t)
-+files_tmp_filetrans(telepathy_salut_t, telepathy_salut_tmp_t, sock_file)
-+
-+corenet_sendrecv_presence_server_packets(telepathy_salut_t)
-+corenet_tcp_bind_presence_port(telepathy_salut_t)
-+corenet_tcp_connect_presence_port(telepathy_salut_t)
-+
-+files_read_etc_files(telepathy_salut_t)
-+
-+optional_policy(`
-+ dbus_system_bus_client(telepathy_salut_t)
-+
-+ optional_policy(`
-+ avahi_dbus_chat(telepathy_salut_t)
-+ ')
-+')
-+
-+#######################################
-+#
-+# Telepathy Sofiasip local policy.
-+#
-+allow telepathy_sofiasip_t self:rawip_socket { create_socket_perms listen };
-+allow telepathy_sofiasip_t self:tcp_socket { listen };
-+
-+corenet_sendrecv_sip_client_packets(telepathy_sofiasip_t)
-+corenet_tcp_connect_sip_port(telepathy_sofiasip_t)
-+corenet_udp_bind_all_ports(telepathy_sofiasip_t)
-+corenet_tcp_bind_all_unreserved_ports(telepathy_sofiasip_t)
-+corenet_dontaudit_tcp_bind_all_ports(telepathy_sofiasip_t)
-+
-+kernel_request_load_module(telepathy_sofiasip_t)
-+
-+#######################################
-+#
-+# Telepathy Sunshine local policy.
-+#
-+manage_dirs_pattern(telepathy_sunshine_t, telepathy_sunshine_home_t, telepathy_sunshine_home_t)
-+manage_files_pattern(telepathy_sunshine_t, telepathy_sunshine_home_t, telepathy_sunshine_home_t)
-+userdom_user_home_dir_filetrans(telepathy_sunshine_t, telepathy_sunshine_home_t, { dir file })
-+userdom_search_user_home_dirs(telepathy_sunshine_t)
-+
-+manage_files_pattern(telepathy_sunshine_t, telepathy_sunshine_tmp_t, telepathy_sunshine_tmp_t)
-+exec_files_pattern(telepathy_sunshine_t, telepathy_sunshine_tmp_t, telepathy_sunshine_tmp_t)
-+files_tmp_filetrans(telepathy_sunshine_t, telepathy_sunshine_tmp_t, file)
-+
-+corecmd_exec_bin(telepathy_sunshine_t)
-+
-+files_read_etc_files(telepathy_sunshine_t)
-+files_read_usr_files(telepathy_sunshine_t)
-+
-+optional_policy(`
-+ xserver_read_xdm_pid(telepathy_sunshine_t)
-+ xserver_stream_connect(telepathy_sunshine_t)
-+')
-+
-+#######################################
-+#
-+# Telepathy Logger local policy.
-+#
-+
-+allow telepathy_logger_t self:unix_stream_socket create_socket_perms;
-+
-+manage_files_pattern(telepathy_logger_t, telepathy_logger_cache_home_t, telepathy_logger_cache_home_t)
-+gnome_cache_filetrans(telepathy_logger_t, telepathy_logger_cache_home_t, file)
-+
-+manage_dirs_pattern(telepathy_logger_t, telepathy_logger_data_home_t, telepathy_logger_data_home_t)
-+manage_files_pattern(telepathy_logger_t, telepathy_logger_data_home_t, telepathy_logger_data_home_t)
-+gnome_data_filetrans(telepathy_logger_t, telepathy_logger_data_home_t, dir)
-+
-+files_read_etc_files(telepathy_logger_t)
-+files_read_usr_files(telepathy_logger_t)
-+files_search_pids(telepathy_logger_t)
-+
-+tunable_policy(`use_nfs_home_dirs',`
-+ fs_manage_nfs_dirs(telepathy_logger_t)
-+ fs_manage_nfs_files(telepathy_logger_t)
-+')
-+
-+tunable_policy(`use_samba_home_dirs',`
-+ fs_manage_cifs_dirs(telepathy_logger_t)
-+ fs_manage_cifs_files(telepathy_logger_t)
-+')
-+
-+optional_policy(`
-+ # ~/.config/dconf/user
-+ gnome_read_home_config(telepathy_logger_t)
-+')
-+
-+#######################################
-+#
-+# telepathy domains common policy
-+#
-+
-+allow telepathy_domain self:process { getsched signal sigkill };
-+allow telepathy_domain self:fifo_file rw_fifo_file_perms;
-+allow telepathy_domain self:tcp_socket create_socket_perms;
-+allow telepathy_domain self:udp_socket create_socket_perms;
-+
-+corenet_all_recvfrom_netlabel(telepathy_domain)
-+corenet_all_recvfrom_unlabeled(telepathy_domain)
-+corenet_raw_bind_generic_node(telepathy_domain)
-+corenet_raw_sendrecv_generic_if(telepathy_domain)
-+corenet_raw_sendrecv_generic_node(telepathy_domain)
-+corenet_tcp_bind_generic_node(telepathy_domain)
-+corenet_tcp_sendrecv_generic_if(telepathy_domain)
-+corenet_tcp_sendrecv_generic_node(telepathy_domain)
-+corenet_udp_bind_generic_node(telepathy_domain)
-+
-+dev_read_urand(telepathy_domain)
-+
-+kernel_read_system_state(telepathy_domain)
-+
-+fs_getattr_all_fs(telepathy_domain)
-+fs_search_auto_mountpoints(telepathy_domain)
-+
-+auth_use_nsswitch(telepathy_domain)
-+
-+miscfiles_read_localization(telepathy_domain)
-+
-+# This interface does not facilitate files_search_tmp which appears to be a bug.
-+userdom_stream_connect(telepathy_domain)
-+userdom_use_inherited_user_terminals(telepathy_domain)
-+
-+tunable_policy(`telepathy_tcp_connect_generic_network_ports', `
-+ corenet_tcp_connect_generic_port(telepathy_domain)
-+ corenet_sendrecv_generic_client_packets(telepathy_domain)
-+')
-+
-+tunable_policy(`telepathy_connect_all_ports', `
-+ corenet_tcp_connect_all_ports(telepathy_domain)
-+ corenet_tcp_sendrecv_all_ports(telepathy_domain)
-+ corenet_udp_sendrecv_all_ports(telepathy_domain)
-+')
-+
-+optional_policy(`
-+ automount_dontaudit_getattr_tmp_dirs(telepathy_domain)
+ #######################################
+ #
+ # Telepathy Butterfly and Haze local policy.
+@@ -205,8 +227,11 @@ allow telepathy_msn_t self:unix_dgram_socket { write create connect };
+ manage_dirs_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t)
+ manage_files_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t)
+ manage_sock_files_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t)
++exec_files_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t)
+ files_tmp_filetrans(telepathy_msn_t, telepathy_msn_tmp_t, { dir file sock_file })
+ userdom_user_tmp_filetrans(telepathy_msn_t, telepathy_msn_tmp_t, { dir file sock_file })
++userdom_dontaudit_setattr_user_tmp(telepathy_msn_t)
++can_exec(telepathy_msn_t, telepathy_msn_tmp_t)
+
+ corenet_all_recvfrom_netlabel(telepathy_msn_t)
+ corenet_all_recvfrom_unlabeled(telepathy_msn_t)
+@@ -246,6 +271,10 @@ tunable_policy(`telepathy_tcp_connect_generic_network_ports',`
+ ')
+
+ optional_policy(`
++ gnome_read_gconf_home_files(telepathy_msn_t)
+')
+
+optional_policy(`
-+ gnome_read_generic_cache_files(telepathy_domain)
-+ gnome_write_generic_cache_files(telepathy_domain)
+ dbus_system_bus_client(telepathy_msn_t)
+
+ optional_policy(`
+@@ -376,5 +405,23 @@ optional_policy(`
+ ')
+
+ optional_policy(`
++ gnome_read_generic_cache_files(telepathy_domain)
++ gnome_write_generic_cache_files(telepathy_domain)
+')
+
+optional_policy(`
-+ telepathy_dbus_chat(telepathy_domain)
++ telepathy_dbus_chat(telepathy_domain)
+')
+
+optional_policy(`
-+ xserver_rw_xdm_pipes(telepathy_domain)
-+')
-+
+ xserver_rw_xdm_pipes(telepathy_domain)
+ ')
+
+# Just for F15
-+optional_policy(`
-+ gen_require(`
-+ role unconfined_r;
-+ ')
-+
-+ role unconfined_r types telepathy_domain;
-+')
++#optional_policy(`
++# gen_require(`
++# role unconfined_r;
++# ')
++#
++# role unconfined_r types telepathy_domain;
++#')
diff --git a/policy/modules/apps/tvtime.te b/policy/modules/apps/tvtime.te
index 11fe4f2..98bfbf3 100644
--- a/policy/modules/apps/tvtime.te
@@ -10947,7 +9588,7 @@ index 03fc701..f58654e 100644
-userdom_use_user_terminals(vlock_t)
+userdom_use_inherited_user_terminals(vlock_t)
diff --git a/policy/modules/apps/vmware.fc b/policy/modules/apps/vmware.fc
-index 5872ea2..179960c 100644
+index f647c7e..252468a 100644
--- a/policy/modules/apps/vmware.fc
+++ b/policy/modules/apps/vmware.fc
@@ -39,12 +39,6 @@ ifdef(`distro_redhat',`
@@ -10963,15 +9604,8 @@ index 5872ea2..179960c 100644
/usr/sbin/vmware-guest.* -- gen_context(system_u:object_r:vmware_host_exec_t,s0)
/usr/sbin/vmware-serverd -- gen_context(system_u:object_r:vmware_exec_t,s0)
-@@ -66,5 +60,6 @@ ifdef(`distro_gentoo',`
- /var/log/vmware.* -- gen_context(system_u:object_r:vmware_log_t,s0)
- /var/log/vnetlib.* -- gen_context(system_u:object_r:vmware_log_t,s0)
-
-+/var/run/vmnet.* gen_context(system_u:object_r:vmware_var_run_t,s0)
- /var/run/vmnat.* -s gen_context(system_u:object_r:vmware_var_run_t,s0)
- /var/run/vmware.* gen_context(system_u:object_r:vmware_var_run_t,s0)
diff --git a/policy/modules/apps/vmware.te b/policy/modules/apps/vmware.te
-index c76ceb2..e174a83 100644
+index 23066a1..6aff330 100644
--- a/policy/modules/apps/vmware.te
+++ b/policy/modules/apps/vmware.te
@@ -126,6 +126,7 @@ dev_getattr_all_blk_files(vmware_host_t)
@@ -10982,31 +9616,33 @@ index c76ceb2..e174a83 100644
domain_use_interactive_fds(vmware_host_t)
domain_dontaudit_read_all_domains_state(vmware_host_t)
-@@ -133,6 +134,7 @@ domain_dontaudit_read_all_domains_state(vmware_host_t)
+@@ -133,7 +134,7 @@ domain_dontaudit_read_all_domains_state(vmware_host_t)
files_list_tmp(vmware_host_t)
files_read_etc_files(vmware_host_t)
files_read_etc_runtime_files(vmware_host_t)
+-files_read_usr_files(vmware_host_t)
+files_read_usr_files(vmware_host_t)
fs_getattr_all_fs(vmware_host_t)
fs_search_auto_mountpoints(vmware_host_t)
-@@ -151,6 +153,7 @@ logging_send_syslog_msg(vmware_host_t)
+@@ -152,7 +153,7 @@ logging_send_syslog_msg(vmware_host_t)
miscfiles_read_localization(vmware_host_t)
sysnet_dns_name_resolve(vmware_host_t)
+-sysnet_domtrans_ifconfig(vmware_host_t)
+sysnet_domtrans_ifconfig(vmware_host_t)
userdom_dontaudit_use_unpriv_user_fds(vmware_host_t)
userdom_dontaudit_search_user_home_dirs(vmware_host_t)
-@@ -158,8 +161,23 @@ userdom_dontaudit_search_user_home_dirs(vmware_host_t)
- netutils_domtrans_ping(vmware_host_t)
+@@ -161,10 +162,22 @@ netutils_domtrans_ping(vmware_host_t)
optional_policy(`
-+ hostname_exec(vmware_host_t)
+ hostname_exec(vmware_host_t)
+-')
+')
-+
-+optional_policy(`
-+ modutils_domtrans_insmod(vmware_host_t)
+
+ optional_policy(`
+ modutils_domtrans_insmod(vmware_host_t)
+')
+
+optional_policy(`
@@ -11014,15 +9650,15 @@ index c76ceb2..e174a83 100644
+')
+
+optional_policy(`
- seutil_sigchld_newrole(vmware_host_t)
++ seutil_sigchld_newrole(vmware_host_t)
+')
-
++
+optional_policy(`
+ shutdown_domtrans(vmware_host_t)
')
optional_policy(`
-@@ -270,7 +288,7 @@ libs_read_lib_files(vmware_t)
+@@ -275,7 +288,7 @@ libs_read_lib_files(vmware_t)
miscfiles_read_localization(vmware_t)
@@ -11032,7 +9668,7 @@ index c76ceb2..e174a83 100644
# cjp: why?
userdom_read_user_home_content_files(vmware_t)
diff --git a/policy/modules/apps/webalizer.te b/policy/modules/apps/webalizer.te
-index f79314b..381d5eb 100644
+index b11941a..dc37e57 100644
--- a/policy/modules/apps/webalizer.te
+++ b/policy/modules/apps/webalizer.te
@@ -81,7 +81,7 @@ miscfiles_read_public_files(webalizer_t)
@@ -11044,14 +9680,6 @@ index f79314b..381d5eb 100644
userdom_use_unpriv_users_fds(webalizer_t)
userdom_dontaudit_search_user_home_content(webalizer_t)
-@@ -103,3 +103,7 @@ optional_policy(`
- optional_policy(`
- nscd_socket_use(webalizer_t)
- ')
-+
-+optional_policy(`
-+ squid_manage_logs(webalizer_t)
-+')
diff --git a/policy/modules/apps/wine.fc b/policy/modules/apps/wine.fc
index 9d24449..2666317 100644
--- a/policy/modules/apps/wine.fc
@@ -11073,7 +9701,7 @@ index 9d24449..2666317 100644
/opt/picasa/wine/bin/wine.* -- gen_context(system_u:object_r:wine_exec_t,s0)
diff --git a/policy/modules/apps/wine.if b/policy/modules/apps/wine.if
-index 0440b4c..4b055c1 100644
+index f9a73d0..4b055c1 100644
--- a/policy/modules/apps/wine.if
+++ b/policy/modules/apps/wine.if
@@ -29,12 +29,16 @@
@@ -11136,31 +9764,8 @@ index 0440b4c..4b055c1 100644
optional_policy(`
xserver_role($1_r, $1_wine_t)
')
-@@ -157,3 +168,22 @@ interface(`wine_run',`
- wine_domtrans($1)
- role $2 types wine_t;
- ')
-+
-+########################################
-+##
-+## Read and write wine Shared
-+## memory segments.
-+##
-+##
-+##
-+## Domain allowed access.
-+##
-+##
-+#
-+interface(`wine_rw_shm',`
-+ gen_require(`
-+ type wine_t;
-+ ')
-+
-+ allow $1 wine_t:shm rw_shm_perms;
-+')
diff --git a/policy/modules/apps/wine.te b/policy/modules/apps/wine.te
-index 953cb28..bf6c62e 100644
+index be9246b..e3de8fa 100644
--- a/policy/modules/apps/wine.te
+++ b/policy/modules/apps/wine.te
@@ -40,7 +40,7 @@ domain_mmap_low(wine_t)
@@ -11172,19 +9777,6 @@ index 953cb28..bf6c62e 100644
tunable_policy(`wine_mmap_zero_ignore',`
dontaudit wine_t self:memprotect mmap_zero;
-@@ -51,7 +51,11 @@ optional_policy(`
- ')
-
- optional_policy(`
-- unconfined_domain_noaudit(wine_t)
-+ policykit_dbus_chat(wine_t)
-+')
-+
-+optional_policy(`
-+ unconfined_domain(wine_t)
- ')
-
- optional_policy(`
diff --git a/policy/modules/apps/wireshark.te b/policy/modules/apps/wireshark.te
index 8bfe97d..6bba1a8 100644
--- a/policy/modules/apps/wireshark.te
@@ -11197,34 +9789,11 @@ index 8bfe97d..6bba1a8 100644
userdom_user_home_content(wireshark_home_t)
type wireshark_tmp_t;
-diff --git a/policy/modules/apps/wm.fc b/policy/modules/apps/wm.fc
-index be30d55..93d128c 100644
---- a/policy/modules/apps/wm.fc
-+++ b/policy/modules/apps/wm.fc
-@@ -1,3 +1,4 @@
- /usr/bin/twm -- gen_context(system_u:object_r:wm_exec_t,s0)
- /usr/bin/openbox -- gen_context(system_u:object_r:wm_exec_t,s0)
- /usr/bin/metacity -- gen_context(system_u:object_r:wm_exec_t,s0)
-+/usr/bin/gnome-shell -- gen_context(system_u:object_r:wm_exec_t,s0)
diff --git a/policy/modules/apps/wm.if b/policy/modules/apps/wm.if
-index 82842a0..50c1a74 100644
+index b3efef7..50c1a74 100644
--- a/policy/modules/apps/wm.if
+++ b/policy/modules/apps/wm.if
-@@ -44,7 +44,7 @@ template(`wm_role_template',`
-
- allow $1_wm_t $3:unix_stream_socket connectto;
- allow $3 $1_wm_t:unix_stream_socket connectto;
-- allow $3 $1_wm_t:process { signal sigchld };
-+ allow $3 $1_wm_t:process { signal sigchld signull };
- allow $1_wm_t $3:process { signull sigkill };
-
- allow $1_wm_t $3:dbus send_msg;
-@@ -72,9 +72,16 @@ template(`wm_role_template',`
-
- auth_use_nsswitch($1_wm_t)
-
-+ application_signull($1_wm_t)
-+
+@@ -77,6 +77,11 @@ template(`wm_role_template',`
miscfiles_read_fonts($1_wm_t)
miscfiles_read_localization($1_wm_t)
@@ -11263,21 +9832,10 @@ index 223ad43..d400ef6 100644
# Reading dotfiles...
# cjp: ?
diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
-index 34c9d01..ddb1528 100644
+index 3fae11a..c8607de 100644
--- a/policy/modules/kernel/corecommands.fc
+++ b/policy/modules/kernel/corecommands.fc
-@@ -72,7 +72,9 @@ ifdef(`distro_redhat',`
- /etc/kde/shutdown(/.*)? gen_context(system_u:object_r:bin_t,s0)
-
- /etc/mail/make -- gen_context(system_u:object_r:bin_t,s0)
--/etc/mgetty\+sendfax/new_fax -- gen_context(system_u:object_r:bin_t,s0)
-+/etc/mcelog/cache-error-trigger -- gen_context(system_u:object_r:bin_t,s0)
-+/etc/mcelog/triggers(/.*)? gen_context(system_u:object_r:bin_t,s0)
-+etc/mgetty\+sendfax/new_fax -- gen_context(system_u:object_r:bin_t,s0)
-
- /etc/netplug\.d(/.*)? gen_context(system_u:object_r:bin_t,s0)
-
-@@ -95,8 +97,6 @@ ifdef(`distro_redhat',`
+@@ -97,8 +97,6 @@ ifdef(`distro_redhat',`
/etc/rc\.d/init\.d/functions -- gen_context(system_u:object_r:bin_t,s0)
@@ -11286,7 +9844,7 @@ index 34c9d01..ddb1528 100644
/etc/sysconfig/crond -- gen_context(system_u:object_r:bin_t,s0)
/etc/sysconfig/init -- gen_context(system_u:object_r:bin_t,s0)
/etc/sysconfig/libvirtd -- gen_context(system_u:object_r:bin_t,s0)
-@@ -128,18 +128,15 @@ ifdef(`distro_debian',`
+@@ -130,18 +128,15 @@ ifdef(`distro_debian',`
/lib/readahead(/.*)? gen_context(system_u:object_r:bin_t,s0)
/lib/security/pam_krb5/pam_krb5_storetmp -- gen_context(system_u:object_r:bin_t,s0)
@@ -11307,7 +9865,7 @@ index 34c9d01..ddb1528 100644
/lib/rcscripts/addons(/.*)? gen_context(system_u:object_r:bin_t,s0)
/lib/rcscripts/sh(/.*)? gen_context(system_u:object_r:bin_t,s0)
-@@ -177,6 +174,8 @@ ifdef(`distro_gentoo',`
+@@ -179,6 +174,8 @@ ifdef(`distro_gentoo',`
/opt/vmware/workstation/lib/lib/wrapper-gtk24\.sh -- gen_context(system_u:object_r:bin_t,s0)
')
@@ -11316,7 +9874,7 @@ index 34c9d01..ddb1528 100644
#
# /usr
#
-@@ -196,47 +195,51 @@ ifdef(`distro_gentoo',`
+@@ -198,48 +195,51 @@ ifdef(`distro_gentoo',`
/usr/lib/pgsql/test/regress/.*\.sh -- gen_context(system_u:object_r:bin_t,s0)
/usr/lib/qt.*/bin(/.*)? gen_context(system_u:object_r:bin_t,s0)
/usr/lib/wicd/monitor\.py -- gen_context(system_u:object_r:bin_t, s0)
@@ -11326,6 +9884,7 @@ index 34c9d01..ddb1528 100644
-/usr/lib(64)?/ConsoleKit/run-session.d(/.*)? gen_context(system_u:object_r:bin_t,s0)
-/usr/lib(64)?/courier(/.*)? gen_context(system_u:object_r:bin_t,s0)
-/usr/lib(64)?/cups(/.*)? gen_context(system_u:object_r:bin_t,s0)
+-/usr/lib(64)?/cyrus/.* -- gen_context(system_u:object_r:bin_t,s0)
-/usr/lib(64)?/cyrus-imapd/.* -- gen_context(system_u:object_r:bin_t,s0)
-/usr/lib(64)?/dpkg/.+ -- gen_context(system_u:object_r:bin_t,s0)
-/usr/lib(64)?/emacsen-common/.* gen_context(system_u:object_r:bin_t,s0)
@@ -11409,7 +9968,7 @@ index 34c9d01..ddb1528 100644
/usr/libexec(/.*)? gen_context(system_u:object_r:bin_t,s0)
/usr/libexec/git-core/git-shell -- gen_context(system_u:object_r:shell_exec_t,s0)
-@@ -244,9 +247,13 @@ ifdef(`distro_gentoo',`
+@@ -247,9 +247,13 @@ ifdef(`distro_gentoo',`
/usr/libexec/openssh/sftp-server -- gen_context(system_u:object_r:bin_t,s0)
@@ -11424,7 +9983,7 @@ index 34c9d01..ddb1528 100644
/usr/local/linuxprinter/filters(/.*)? gen_context(system_u:object_r:bin_t,s0)
/usr/sbin/scponlyc -- gen_context(system_u:object_r:shell_exec_t,s0)
-@@ -283,6 +290,7 @@ ifdef(`distro_gentoo',`
+@@ -286,6 +290,7 @@ ifdef(`distro_gentoo',`
/usr/share/smolt/client(/.*)? gen_context(system_u:object_r:bin_t,s0)
/usr/share/shorewall/compiler\.pl -- gen_context(system_u:object_r:bin_t,s0)
/usr/share/shorewall/configpath -- gen_context(system_u:object_r:bin_t,s0)
@@ -11432,7 +9991,7 @@ index 34c9d01..ddb1528 100644
/usr/share/shorewall-perl(/.*)? gen_context(system_u:object_r:bin_t,s0)
/usr/share/shorewall-shell(/.*)? gen_context(system_u:object_r:bin_t,s0)
/usr/share/shorewall-lite(/.*)? gen_context(system_u:object_r:bin_t,s0)
-@@ -291,7 +299,7 @@ ifdef(`distro_gentoo',`
+@@ -294,7 +299,7 @@ ifdef(`distro_gentoo',`
/usr/share/turboprint/lib(/.*)? -- gen_context(system_u:object_r:bin_t,s0)
/usr/share/vhostmd/scripts(/.*)? gen_context(system_u:object_r:bin_t,s0)
@@ -11441,7 +10000,7 @@ index 34c9d01..ddb1528 100644
ifdef(`distro_gentoo', `
/usr/.*-.*-linux-gnu/gcc-bin/.*(/.*)? gen_context(system_u:object_r:bin_t,s0)
-@@ -304,9 +312,8 @@ ifdef(`distro_redhat', `
+@@ -307,9 +312,8 @@ ifdef(`distro_redhat', `
/etc/gdm/[^/]+/.* gen_context(system_u:object_r:bin_t,s0)
/usr/lib/.*/program(/.*)? gen_context(system_u:object_r:bin_t,s0)
@@ -11452,7 +10011,7 @@ index 34c9d01..ddb1528 100644
/usr/lib/vmware-tools/(s)?bin32(/.*)? gen_context(system_u:object_r:bin_t,s0)
/usr/lib/vmware-tools/(s)?bin64(/.*)? gen_context(system_u:object_r:bin_t,s0)
/usr/share/authconfig/authconfig-gtk\.py -- gen_context(system_u:object_r:bin_t,s0)
-@@ -316,9 +323,11 @@ ifdef(`distro_redhat', `
+@@ -319,9 +323,11 @@ ifdef(`distro_redhat', `
/usr/share/clamav/clamd-gen -- gen_context(system_u:object_r:bin_t,s0)
/usr/share/clamav/freshclam-sleep -- gen_context(system_u:object_r:bin_t,s0)
/usr/share/createrepo(/.*)? gen_context(system_u:object_r:bin_t,s0)
@@ -11464,7 +10023,7 @@ index 34c9d01..ddb1528 100644
/usr/share/pwlib/make/ptlib-config -- gen_context(system_u:object_r:bin_t,s0)
/usr/share/pydict/pydict\.py -- gen_context(system_u:object_r:bin_t,s0)
/usr/share/rhn/rhn_applet/applet\.py -- gen_context(system_u:object_r:bin_t,s0)
-@@ -360,7 +369,7 @@ ifdef(`distro_redhat', `
+@@ -363,7 +369,7 @@ ifdef(`distro_redhat', `
ifdef(`distro_suse', `
/usr/lib/cron/run-crons -- gen_context(system_u:object_r:bin_t,s0)
/usr/lib/samba/classic/.* -- gen_context(system_u:object_r:bin_t,s0)
@@ -11473,7 +10032,7 @@ index 34c9d01..ddb1528 100644
/usr/share/apache2/[^/]* -- gen_context(system_u:object_r:bin_t,s0)
')
-@@ -372,8 +381,9 @@ ifdef(`distro_suse', `
+@@ -375,8 +381,9 @@ ifdef(`distro_suse', `
/var/ftp/bin(/.*)? gen_context(system_u:object_r:bin_t,s0)
/var/lib/asterisk/agi-bin(/.*)? gen_context(system_u:object_r:bin_t,s0)
@@ -11530,90 +10089,11 @@ index 9e9263a..59c2125 100644
manage_files_pattern($1, bin_t, exec_type)
manage_lnk_files_pattern($1, bin_t, bin_t)
')
-diff --git a/policy/modules/kernel/corenetwork.fc b/policy/modules/kernel/corenetwork.fc
-index 9e5c83e..953e0e8 100644
---- a/policy/modules/kernel/corenetwork.fc
-+++ b/policy/modules/kernel/corenetwork.fc
-@@ -5,3 +5,6 @@
- /dev/tap.* -c gen_context(system_u:object_r:tun_tap_device_t,s0)
-
- /dev/net/.* -c gen_context(system_u:object_r:tun_tap_device_t,s0)
-+
-+/lib/udev/devices/ppp -c gen_context(system_u:object_r:ppp_device_t,s0)
-+/lib/udev/devices/net/.* -c gen_context(system_u:object_r:tun_tap_device_t,s0)
diff --git a/policy/modules/kernel/corenetwork.if.in b/policy/modules/kernel/corenetwork.if.in
-index 5a07a43..eb5f76e 100644
+index 4f3b542..4581434 100644
--- a/policy/modules/kernel/corenetwork.if.in
+++ b/policy/modules/kernel/corenetwork.if.in
-@@ -32,6 +32,33 @@ interface(`corenet_port',`
-
- ########################################
- ##
-+## Define type to be a network node type
-+##
-+##
-+##
-+## Define type to be a network node type
-+##
-+##
-+## This is for supporting third party modules and its
-+## use is not allowed in upstream reference policy.
-+##
-+##
-+##
-+##
-+## Type to be used for network nodes.
-+##
-+##
-+#
-+interface(`corenet_node',`
-+ gen_require(`
-+ attribute node_type;
-+ ')
-+
-+ typeattribute $1 node_type;
-+')
-+
-+########################################
-+##
- ## Define network type to be a reserved port (lt 1024)
- ##
- ##
-@@ -86,6 +113,33 @@ interface(`corenet_rpc_port',`
-
- ########################################
- ##
-+## Define type to be a network packet type
-+##
-+##
-+##
-+## Define type to be a network packet type
-+##
-+##
-+## This is for supporting third party modules and its
-+## use is not allowed in upstream reference policy.
-+##
-+##
-+##
-+##
-+## Type to be used for a network packet.
-+##
-+##
-+#
-+interface(`corenet_packet',`
-+ gen_require(`
-+ attribute packet_type;
-+ ')
-+
-+ typeattribute $1 packet_type;
-+')
-+
-+########################################
-+##
- ## Define type to be a network client packet type
- ##
- ##
-@@ -561,6 +615,24 @@ interface(`corenet_raw_sendrecv_all_if',`
+@@ -615,6 +615,24 @@ interface(`corenet_raw_sendrecv_all_if',`
########################################
##
@@ -11638,7 +10118,7 @@ index 5a07a43..eb5f76e 100644
## Send and receive TCP network traffic on generic nodes.
##
##
-@@ -735,6 +807,24 @@ interface(`corenet_raw_sendrecv_generic_node',`
+@@ -789,6 +807,24 @@ interface(`corenet_raw_sendrecv_generic_node',`
########################################
##
@@ -11663,7 +10143,7 @@ index 5a07a43..eb5f76e 100644
## Bind TCP sockets to generic nodes.
##
##
-@@ -874,6 +964,24 @@ interface(`corenet_inout_generic_node',`
+@@ -928,6 +964,24 @@ interface(`corenet_inout_generic_node',`
########################################
##
@@ -11688,7 +10168,7 @@ index 5a07a43..eb5f76e 100644
## Send and receive TCP network traffic on all nodes.
##
##
-@@ -1048,6 +1156,24 @@ interface(`corenet_raw_sendrecv_all_nodes',`
+@@ -1102,6 +1156,24 @@ interface(`corenet_raw_sendrecv_all_nodes',`
########################################
##
@@ -11713,7 +10193,7 @@ index 5a07a43..eb5f76e 100644
## Bind TCP sockets to all nodes.
##
##
-@@ -1103,6 +1229,24 @@ interface(`corenet_raw_bind_all_nodes',`
+@@ -1157,6 +1229,24 @@ interface(`corenet_raw_bind_all_nodes',`
########################################
##
@@ -11738,7 +10218,7 @@ index 5a07a43..eb5f76e 100644
## Send and receive TCP network traffic on generic ports.
##
##
-@@ -1121,6 +1265,26 @@ interface(`corenet_tcp_sendrecv_generic_port',`
+@@ -1175,6 +1265,26 @@ interface(`corenet_tcp_sendrecv_generic_port',`
########################################
##
@@ -11765,7 +10245,7 @@ index 5a07a43..eb5f76e 100644
## Do not audit send and receive TCP network traffic on generic ports.
##
##
-@@ -1190,6 +1354,26 @@ interface(`corenet_udp_sendrecv_generic_port',`
+@@ -1244,6 +1354,26 @@ interface(`corenet_udp_sendrecv_generic_port',`
########################################
##
@@ -11792,7 +10272,7 @@ index 5a07a43..eb5f76e 100644
## Bind TCP sockets to generic ports.
##
##
-@@ -1210,6 +1394,25 @@ interface(`corenet_tcp_bind_generic_port',`
+@@ -1264,6 +1394,25 @@ interface(`corenet_tcp_bind_generic_port',`
########################################
##
@@ -11818,7 +10298,7 @@ index 5a07a43..eb5f76e 100644
## Do not audit bind TCP sockets to generic ports.
##
##
-@@ -1248,6 +1451,24 @@ interface(`corenet_udp_bind_generic_port',`
+@@ -1302,6 +1451,24 @@ interface(`corenet_udp_bind_generic_port',`
########################################
##
@@ -11843,7 +10323,7 @@ index 5a07a43..eb5f76e 100644
## Connect TCP sockets to generic ports.
##
##
-@@ -1266,6 +1487,24 @@ interface(`corenet_tcp_connect_generic_port',`
+@@ -1320,6 +1487,24 @@ interface(`corenet_tcp_connect_generic_port',`
########################################
##
@@ -11868,7 +10348,7 @@ index 5a07a43..eb5f76e 100644
## Send and receive TCP network traffic on all ports.
##
##
-@@ -1385,6 +1624,25 @@ interface(`corenet_udp_sendrecv_all_ports',`
+@@ -1439,6 +1624,25 @@ interface(`corenet_udp_sendrecv_all_ports',`
########################################
##
@@ -11894,7 +10374,7 @@ index 5a07a43..eb5f76e 100644
## Bind TCP sockets to all ports.
##
##
-@@ -1404,6 +1662,24 @@ interface(`corenet_tcp_bind_all_ports',`
+@@ -1458,6 +1662,24 @@ interface(`corenet_tcp_bind_all_ports',`
########################################
##
@@ -11919,7 +10399,7 @@ index 5a07a43..eb5f76e 100644
## Do not audit attepts to bind TCP sockets to any ports.
##
##
-@@ -1459,6 +1735,24 @@ interface(`corenet_dontaudit_udp_bind_all_ports',`
+@@ -1513,6 +1735,24 @@ interface(`corenet_dontaudit_udp_bind_all_ports',`
########################################
##
@@ -11944,75 +10424,37 @@ index 5a07a43..eb5f76e 100644
## Connect TCP sockets to all ports.
##
##
-@@ -1505,7 +1799,7 @@ interface(`corenet_tcp_connect_all_ports',`
+@@ -1559,6 +1799,25 @@ interface(`corenet_tcp_connect_all_ports',`
########################################
##
--## Do not audit attempts to connect TCP sockets
+## Do not audit attempts to connect DCCP sockets
- ## to all ports.
- ##
- ##
-@@ -1514,35 +1808,72 @@ interface(`corenet_tcp_connect_all_ports',`
- ##
- ##
- #
--interface(`corenet_dontaudit_tcp_connect_all_ports',`
-+interface(`corenet_dontaudit_dccp_connect_all_ports',`
- gen_require(`
- attribute port_type;
- ')
-
-- dontaudit $1 port_type:tcp_socket name_connect;
-+ dontaudit $1 port_type:dccp_socket name_connect;
- ')
-
- ########################################
- ##