+##
+## Allow syslogd the ability to call nagios plugins. It is
+## turned on by omprog rsyslog plugin.
+##
+##
+gen_tunable(logging_syslogd_run_nagios_plugins, false)
+
attribute logfile;
type auditctl_t;
@@ -505,6 +513,12 @@ tunable_policy(`logging_syslogd_can_sendmail',`
corenet_tcp_connect_smtp_port(syslogd_t)
')
+optional_policy(`
+ tunable_policy(`logging_syslogd_run_nagios_plugins',`
+ nagios_domtrans_unconfined_plugins(syslogd_t)
+ ')
+')
+
dev_filetrans(syslogd_t, devlog_t, sock_file)
dev_read_sysfs(syslogd_t)
dev_read_rand(syslogd_t)
diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
index ca1b2bc..b3417f5 100644
--- a/policy/modules/system/sysnetwork.te
+++ b/policy/modules/system/sysnetwork.te
@@ -447,6 +447,7 @@ optional_policy(`
optional_policy(`
ipsec_write_pid(ifconfig_t)
ipsec_setcontext_default_spd(ifconfig_t)
+ ipsec_dontaudit_write_log(ifconfig_t)
')
optional_policy(`
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
index db531dc..7c2a68e 100644
--- a/policy/modules/system/systemd.te
+++ b/policy/modules/system/systemd.te
@@ -96,6 +96,7 @@ allow systemd_logind_t self:unix_dgram_socket create_socket_perms;
mls_file_read_all_levels(systemd_logind_t)
mls_file_write_all_levels(systemd_logind_t)
+mls_dbus_send_all_levels(systemd_logind_t)
files_delete_tmpfs_files(systemd_logind_t)
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index 05274ae..29b37bc 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -169,6 +169,7 @@ template(`userdom_base_user_template',`
optional_policy(`
ssh_rw_stream_sockets($1_usertype)
+ ssh_rw_dgram_sockets($1_usertype)
ssh_delete_tmp($1_t)
ssh_signal($1_t)
')
@@ -718,8 +719,8 @@ template(`userdom_common_user_template',`
application_getattr_socket($1_usertype)
- ifdef(`enabled_mls',`
- init_rw_tcp_sockets($1_usertype)
+ ifdef(`enable_mls',`
+ init_rw_tcp_sockets($1_t)
')
logging_send_syslog_msg($1_t)