diff --git a/policy-F15.patch b/policy-F15.patch
index 63c3a4c..f229f8c 100644
--- a/policy-F15.patch
+++ b/policy-F15.patch
@@ -1985,10 +1985,10 @@ index 0000000..5ef90cd
+
diff --git a/policy/modules/apps/chrome.te b/policy/modules/apps/chrome.te
new file mode 100644
-index 0000000..41a9493
+index 0000000..8dd672a
--- /dev/null
+++ b/policy/modules/apps/chrome.te
-@@ -0,0 +1,93 @@
+@@ -0,0 +1,106 @@
+policy_module(chrome,1.0.0)
+
+########################################
@@ -2035,6 +2035,19 @@ index 0000000..41a9493
+
+corecmd_exec_bin(chrome_sandbox_t)
+
++corenet_all_recvfrom_unlabeled(chrome_sandbox_t)
++corenet_all_recvfrom_netlabel(chrome_sandbox_t)
++corenet_tcp_connect_flash_port(chrome_sandbox_t)
++corenet_tcp_connect_streaming_port(chrome_sandbox_t)
++corenet_tcp_connect_pulseaudio_port(chrome_sandbox_t)
++corenet_tcp_connect_http_port(chrome_sandbox_t)
++corenet_tcp_connect_http_cache_port(chrome_sandbox_t)
++corenet_tcp_connect_squid_port(chrome_sandbox_t)
++corenet_tcp_sendrecv_generic_if(chrome_sandbox_t)
++corenet_tcp_sendrecv_generic_node(chrome_sandbox_t)
++corenet_tcp_connect_ipp_port(chrome_sandbox_t)
++corenet_tcp_connect_speech_port(chrome_sandbox_t)
++
+domain_dontaudit_read_all_domains_state(chrome_sandbox_t)
+
+dev_read_urand(chrome_sandbox_t)
@@ -2055,7 +2068,7 @@ index 0000000..41a9493
+miscfiles_read_localization(chrome_sandbox_t)
+miscfiles_read_fonts(chrome_sandbox_t)
+
-+sysnet_dontaudit_read_config(chrome_sandbox_t)
++sysnet_dns_name_resolve(chrome_sandbox_t)
+
+optional_policy(`
+ execmem_exec(chrome_sandbox_t)
@@ -18968,7 +18981,7 @@ index e182bf4..f80e725 100644
snmp_dontaudit_write_snmp_var_lib_files(cyrus_t)
snmp_stream_connect(cyrus_t)
diff --git a/policy/modules/services/dbus.if b/policy/modules/services/dbus.if
-index 0d5711c..72fe7a8 100644
+index 0d5711c..3874025 100644
--- a/policy/modules/services/dbus.if
+++ b/policy/modules/services/dbus.if
@@ -41,9 +41,9 @@ interface(`dbus_stub',`
@@ -19002,7 +19015,7 @@ index 0d5711c..72fe7a8 100644
allow $3 system_dbusd_t:dbus { send_msg acquire_svc };
allow $1_dbusd_t dbusd_etc_t:dir list_dir_perms;
-@@ -88,14 +87,15 @@ template(`dbus_role_template',`
+@@ -88,14 +87,16 @@ template(`dbus_role_template',`
files_tmp_filetrans($1_dbusd_t, session_dbusd_tmp_t, { file dir })
domtrans_pattern($3, dbusd_exec_t, $1_dbusd_t)
@@ -19014,6 +19027,7 @@ index 0d5711c..72fe7a8 100644
# cjp: this seems very broken
- corecmd_bin_domtrans($1_dbusd_t, $3)
+ corecmd_bin_domtrans($1_dbusd_t, $1_t)
++ corecmd_shell_domtrans($1_dbusd_t, $1_t)
allow $1_dbusd_t $3:process sigkill;
allow $3 $1_dbusd_t:fd use;
allow $3 $1_dbusd_t:fifo_file rw_fifo_file_perms;
@@ -19021,7 +19035,7 @@ index 0d5711c..72fe7a8 100644
kernel_read_system_state($1_dbusd_t)
kernel_read_kernel_sysctls($1_dbusd_t)
-@@ -116,7 +116,7 @@ template(`dbus_role_template',`
+@@ -116,7 +117,7 @@ template(`dbus_role_template',`
dev_read_urand($1_dbusd_t)
@@ -19030,7 +19044,7 @@ index 0d5711c..72fe7a8 100644
domain_read_all_domains_state($1_dbusd_t)
files_read_etc_files($1_dbusd_t)
-@@ -149,17 +149,25 @@ template(`dbus_role_template',`
+@@ -149,17 +150,25 @@ template(`dbus_role_template',`
term_use_all_terms($1_dbusd_t)
@@ -19058,7 +19072,7 @@ index 0d5711c..72fe7a8 100644
xserver_use_xdm_fds($1_dbusd_t)
xserver_rw_xdm_pipes($1_dbusd_t)
')
-@@ -181,10 +189,12 @@ interface(`dbus_system_bus_client',`
+@@ -181,10 +190,12 @@ interface(`dbus_system_bus_client',`
type system_dbusd_t, system_dbusd_t;
type system_dbusd_var_run_t, system_dbusd_var_lib_t;
class dbus send_msg;
@@ -19071,7 +19085,7 @@ index 0d5711c..72fe7a8 100644
read_files_pattern($1, system_dbusd_var_lib_t, system_dbusd_var_lib_t)
files_search_var_lib($1)
-@@ -431,14 +441,28 @@ interface(`dbus_system_domain',`
+@@ -431,14 +442,28 @@ interface(`dbus_system_domain',`
domtrans_pattern(system_dbusd_t, $2, $1)
@@ -19101,7 +19115,7 @@ index 0d5711c..72fe7a8 100644
dontaudit $1 system_dbusd_t:netlink_selinux_socket { read write };
')
')
-@@ -497,3 +521,22 @@ interface(`dbus_unconfined',`
+@@ -497,3 +522,22 @@ interface(`dbus_unconfined',`
typeattribute $1 dbusd_unconfined;
')
@@ -19207,7 +19221,7 @@ index 0a1a61b..da508f4 100644
allow $1 ddclient_t:process { ptrace signal_perms };
diff --git a/policy/modules/services/ddclient.te b/policy/modules/services/ddclient.te
-index 24ba98a..41559cf 100644
+index 24ba98a..b8d064a 100644
--- a/policy/modules/services/ddclient.te
+++ b/policy/modules/services/ddclient.te
@@ -18,6 +18,9 @@ init_script_file(ddclient_initrc_exec_t)
@@ -19239,7 +19253,15 @@ index 24ba98a..41559cf 100644
manage_dirs_pattern(ddclient_t, ddclient_var_t, ddclient_var_t)
manage_files_pattern(ddclient_t, ddclient_var_t, ddclient_var_t)
manage_lnk_files_pattern(ddclient_t, ddclient_var_t, ddclient_var_t)
-@@ -74,6 +82,8 @@ corenet_tcp_sendrecv_generic_node(ddclient_t)
+@@ -62,6 +70,7 @@ kernel_read_software_raid_state(ddclient_t)
+ kernel_getattr_core_if(ddclient_t)
+ kernel_getattr_message_if(ddclient_t)
+ kernel_read_kernel_sysctls(ddclient_t)
++kernel_search_network_sysctl(ddclient_t)
+
+ corecmd_exec_shell(ddclient_t)
+ corecmd_exec_bin(ddclient_t)
+@@ -74,6 +83,8 @@ corenet_tcp_sendrecv_generic_node(ddclient_t)
corenet_udp_sendrecv_generic_node(ddclient_t)
corenet_tcp_sendrecv_all_ports(ddclient_t)
corenet_udp_sendrecv_all_ports(ddclient_t)
@@ -19248,7 +19270,7 @@ index 24ba98a..41559cf 100644
corenet_tcp_connect_all_ports(ddclient_t)
corenet_sendrecv_all_client_packets(ddclient_t)
-@@ -89,6 +99,8 @@ files_read_usr_files(ddclient_t)
+@@ -89,6 +100,8 @@ files_read_usr_files(ddclient_t)
fs_getattr_all_fs(ddclient_t)
fs_search_auto_mountpoints(ddclient_t)
@@ -19445,7 +19467,7 @@ index f706b99..c1ba3f2 100644
')
+
diff --git a/policy/modules/services/devicekit.te b/policy/modules/services/devicekit.te
-index f231f17..3aaa784 100644
+index f231f17..14921ca 100644
--- a/policy/modules/services/devicekit.te
+++ b/policy/modules/services/devicekit.te
@@ -75,10 +75,12 @@ manage_dirs_pattern(devicekit_disk_t, devicekit_var_lib_t, devicekit_var_lib_t)
@@ -19473,7 +19495,7 @@ index f231f17..3aaa784 100644
files_manage_isid_type_dirs(devicekit_disk_t)
files_manage_mnt_dirs(devicekit_disk_t)
files_read_etc_files(devicekit_disk_t)
-@@ -178,25 +182,37 @@ optional_policy(`
+@@ -178,25 +182,41 @@ optional_policy(`
virt_manage_images(devicekit_disk_t)
')
@@ -19503,6 +19525,10 @@ index f231f17..3aaa784 100644
manage_files_pattern(devicekit_power_t, devicekit_var_lib_t, devicekit_var_lib_t)
files_var_lib_filetrans(devicekit_power_t, devicekit_var_lib_t, dir)
++manage_files_pattern(devicekit_power_t, devicekit_var_run_t, devicekit_var_run_t)
++manage_dirs_pattern(devicekit_power_t, devicekit_var_run_t, devicekit_var_run_t)
++files_pid_filetrans(devicekit_power_t, devicekit_var_run_t, dir)
++
+kernel_read_fs_sysctls(devicekit_power_t)
kernel_read_network_state(devicekit_power_t)
kernel_read_system_state(devicekit_power_t)
@@ -19512,7 +19538,7 @@ index f231f17..3aaa784 100644
kernel_search_debugfs(devicekit_power_t)
kernel_write_proc_files(devicekit_power_t)
-@@ -212,12 +228,16 @@ dev_rw_generic_usb_dev(devicekit_power_t)
+@@ -212,12 +232,16 @@ dev_rw_generic_usb_dev(devicekit_power_t)
dev_rw_generic_chr_files(devicekit_power_t)
dev_rw_netcontrol(devicekit_power_t)
dev_rw_sysfs(devicekit_power_t)
@@ -19529,7 +19555,7 @@ index f231f17..3aaa784 100644
term_use_all_terms(devicekit_power_t)
-@@ -225,8 +245,11 @@ auth_use_nsswitch(devicekit_power_t)
+@@ -225,8 +249,11 @@ auth_use_nsswitch(devicekit_power_t)
miscfiles_read_localization(devicekit_power_t)
@@ -19541,7 +19567,7 @@ index f231f17..3aaa784 100644
userdom_read_all_users_state(devicekit_power_t)
-@@ -261,6 +284,10 @@ optional_policy(`
+@@ -261,6 +288,10 @@ optional_policy(`
')
optional_policy(`
@@ -19552,7 +19578,7 @@ index f231f17..3aaa784 100644
hal_domtrans_mac(devicekit_power_t)
hal_manage_log(devicekit_power_t)
hal_manage_pid_dirs(devicekit_power_t)
-@@ -269,6 +296,10 @@ optional_policy(`
+@@ -269,6 +300,10 @@ optional_policy(`
')
optional_policy(`
@@ -19563,7 +19589,7 @@ index f231f17..3aaa784 100644
policykit_dbus_chat(devicekit_power_t)
policykit_domtrans_auth(devicekit_power_t)
policykit_read_lib(devicekit_power_t)
-@@ -276,9 +307,21 @@ optional_policy(`
+@@ -276,9 +311,21 @@ optional_policy(`
')
optional_policy(`
@@ -20327,10 +20353,21 @@ index 9bd812b..c808b31 100644
')
diff --git a/policy/modules/services/dnsmasq.te b/policy/modules/services/dnsmasq.te
-index fdaeeba..1f6f6f3 100644
+index fdaeeba..c516b94 100644
--- a/policy/modules/services/dnsmasq.te
+++ b/policy/modules/services/dnsmasq.te
-@@ -96,10 +96,18 @@ optional_policy(`
+@@ -48,8 +48,9 @@ files_var_lib_filetrans(dnsmasq_t, dnsmasq_lease_t, file)
+ manage_files_pattern(dnsmasq_t, dnsmasq_var_log_t, dnsmasq_var_log_t)
+ logging_log_filetrans(dnsmasq_t, dnsmasq_var_log_t, file)
+
++manage_dirs_pattern(dnsmasq_t, dnsmasq_var_run_t, dnsmasq_var_run_t)
+ manage_files_pattern(dnsmasq_t, dnsmasq_var_run_t, dnsmasq_var_run_t)
+-files_pid_filetrans(dnsmasq_t, dnsmasq_var_run_t, file)
++files_pid_filetrans(dnsmasq_t, dnsmasq_var_run_t, { dir file })
+
+ kernel_read_kernel_sysctls(dnsmasq_t)
+ kernel_read_system_state(dnsmasq_t)
+@@ -96,10 +97,18 @@ optional_policy(`
')
optional_policy(`
@@ -20349,6 +20386,12 @@ index fdaeeba..1f6f6f3 100644
seutil_sigchld_newrole(dnsmasq_t)
')
+@@ -114,4 +123,5 @@ optional_policy(`
+ optional_policy(`
+ virt_manage_lib_files(dnsmasq_t)
+ virt_read_pid_files(dnsmasq_t)
++ virt_pid_filetrans(dnsmasq_t, dnsmasq_var_run_t, { dir file })
+ ')
diff --git a/policy/modules/services/dovecot.fc b/policy/modules/services/dovecot.fc
index bfc880b..9a1dcba 100644
--- a/policy/modules/services/dovecot.fc
@@ -20431,7 +20474,7 @@ index e1d7dc5..ee51a19 100644
admin_pattern($1, dovecot_var_run_t)
diff --git a/policy/modules/services/dovecot.te b/policy/modules/services/dovecot.te
-index cbe14e4..e74c9fe 100644
+index cbe14e4..da1c6bf 100644
--- a/policy/modules/services/dovecot.te
+++ b/policy/modules/services/dovecot.te
@@ -18,7 +18,7 @@ type dovecot_auth_tmp_t;
@@ -20485,7 +20528,16 @@ index cbe14e4..e74c9fe 100644
kernel_read_kernel_sysctls(dovecot_t)
kernel_read_system_state(dovecot_t)
-@@ -159,6 +164,11 @@ optional_policy(`
+@@ -110,6 +115,8 @@ corenet_tcp_sendrecv_all_ports(dovecot_t)
+ corenet_tcp_bind_generic_node(dovecot_t)
+ corenet_tcp_bind_mail_port(dovecot_t)
+ corenet_tcp_bind_pop_port(dovecot_t)
++corenet_tcp_bind_lmtp_port(dovecot_t)
++corenet_tcp_bind_sieve_port(dovecot_t)
+ corenet_tcp_connect_all_ports(dovecot_t)
+ corenet_tcp_connect_postgresql_port(dovecot_t)
+ corenet_sendrecv_pop_server_packets(dovecot_t)
+@@ -159,6 +166,11 @@ optional_policy(`
')
optional_policy(`
@@ -20497,7 +20549,7 @@ index cbe14e4..e74c9fe 100644
postgresql_stream_connect(dovecot_t)
')
-@@ -179,7 +189,7 @@ optional_policy(`
+@@ -179,7 +191,7 @@ optional_policy(`
# dovecot auth local policy
#
@@ -20506,7 +20558,7 @@ index cbe14e4..e74c9fe 100644
allow dovecot_auth_t self:process { signal_perms getcap setcap };
allow dovecot_auth_t self:fifo_file rw_fifo_file_perms;
allow dovecot_auth_t self:unix_dgram_socket create_socket_perms;
-@@ -189,6 +199,8 @@ allow dovecot_auth_t dovecot_t:unix_stream_socket { connectto rw_stream_socket_p
+@@ -189,6 +201,8 @@ allow dovecot_auth_t dovecot_t:unix_stream_socket { connectto rw_stream_socket_p
read_files_pattern(dovecot_auth_t, dovecot_passwd_t, dovecot_passwd_t)
@@ -20515,7 +20567,7 @@ index cbe14e4..e74c9fe 100644
manage_dirs_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
manage_files_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
files_tmp_filetrans(dovecot_auth_t, dovecot_auth_tmp_t, { file dir })
-@@ -242,6 +254,7 @@ optional_policy(`
+@@ -242,6 +256,7 @@ optional_policy(`
')
optional_policy(`
@@ -20523,7 +20575,7 @@ index cbe14e4..e74c9fe 100644
postfix_search_spool(dovecot_auth_t)
')
-@@ -253,19 +266,33 @@ allow dovecot_deliver_t self:unix_dgram_socket create_socket_perms;
+@@ -253,19 +268,33 @@ allow dovecot_deliver_t self:unix_dgram_socket create_socket_perms;
allow dovecot_deliver_t dovecot_t:process signull;
@@ -20559,7 +20611,7 @@ index cbe14e4..e74c9fe 100644
miscfiles_read_localization(dovecot_deliver_t)
-@@ -302,4 +329,5 @@ tunable_policy(`use_samba_home_dirs',`
+@@ -302,4 +331,5 @@ tunable_policy(`use_samba_home_dirs',`
optional_policy(`
mta_manage_spool(dovecot_deliver_t)
@@ -27493,10 +27545,10 @@ index 0000000..6403c17
+')
diff --git a/policy/modules/services/piranha.te b/policy/modules/services/piranha.te
new file mode 100644
-index 0000000..6b69f38
+index 0000000..6716b5e
--- /dev/null
+++ b/policy/modules/services/piranha.te
-@@ -0,0 +1,214 @@
+@@ -0,0 +1,219 @@
+policy_module(piranha, 1.0.0)
+
+########################################
@@ -27620,6 +27672,11 @@ index 0000000..6b69f38
+ sasl_connect(piranha_web_t)
+')
+
++optional_policy(`
++ snmp_dontaudit_read_snmp_var_lib_files(piranha_web_t)
++ snmp_dontaudit_write_snmp_var_lib_files(piranha_web_t)
++')
++
+######################################
+#
+# piranha-lvs local policy
@@ -35874,7 +35931,7 @@ index 2124b6a..6546d6e 100644
/var/vdsm(/.*)? gen_context(system_u:object_r:virt_var_run_t,s0)
diff --git a/policy/modules/services/virt.if b/policy/modules/services/virt.if
-index 7c5d8d8..dbdc0e0 100644
+index 7c5d8d8..2ac9e34 100644
--- a/policy/modules/services/virt.if
+++ b/policy/modules/services/virt.if
@@ -14,13 +14,14 @@
@@ -36005,7 +36062,44 @@ index 7c5d8d8..dbdc0e0 100644
## Read virt PID files.
##
##
-@@ -308,6 +316,24 @@ interface(`virt_read_lib_files',`
+@@ -269,6 +277,36 @@ interface(`virt_manage_pid_files',`
+
+ ########################################
+ ##
++## Create objects in the pid directory
++## with a private type with a type transition.
++##
++##
++##
++## Domain allowed access.
++##
++##
++##
++##
++## Type to which the created node will be transitioned.
++##
++##
++##
++##
++## Object class(es) (single or set including {}) for which this
++## the transition will occur.
++##
++##
++#
++interface(`virt_pid_filetrans',`
++ gen_require(`
++ type virt_vaar_run_t;
++ ')
++
++ filetrans_pattern($1, virt_var_run_t, $2, $3)
++')
++
++########################################
++##
+ ## Search virt lib directories.
+ ##
+ ##
+@@ -308,6 +346,24 @@ interface(`virt_read_lib_files',`
########################################
##
@@ -36030,7 +36124,7 @@ index 7c5d8d8..dbdc0e0 100644
## Create, read, write, and delete
## virt lib files.
##
-@@ -352,9 +378,9 @@ interface(`virt_read_log',`
+@@ -352,9 +408,9 @@ interface(`virt_read_log',`
## virt log files.
##
##
@@ -36042,7 +36136,7 @@ index 7c5d8d8..dbdc0e0 100644
##
#
interface(`virt_append_log',`
-@@ -424,6 +450,24 @@ interface(`virt_read_images',`
+@@ -424,6 +480,24 @@ interface(`virt_read_images',`
########################################
##
@@ -36067,7 +36161,7 @@ index 7c5d8d8..dbdc0e0 100644
## Create, read, write, and delete
## svirt cache files.
##
-@@ -433,15 +477,15 @@ interface(`virt_read_images',`
+@@ -433,15 +507,15 @@ interface(`virt_read_images',`
##
##
#
@@ -36088,7 +36182,7 @@ index 7c5d8d8..dbdc0e0 100644
')
########################################
-@@ -516,3 +560,51 @@ interface(`virt_admin',`
+@@ -516,3 +590,51 @@ interface(`virt_admin',`
virt_manage_log($1)
')
@@ -40736,7 +40830,7 @@ index df3fa64..36da732 100644
+ allow $1 init_t:unix_dgram_socket sendto;
+')
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
-index 8a105fd..2981ece 100644
+index 8a105fd..334ddd0 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -16,6 +16,27 @@ gen_require(`
@@ -40932,7 +41026,7 @@ index 8a105fd..2981ece 100644
+
+ # Permissions for systemd-tmpfiles, needs its own policy.
+ files_relabel_all_lock_dirs(init_t)
-+ files_relabel_all_pid_files(init_t)
++ files_relabel_all_pid_dirs(init_t)
+ files_relabel_all_pid_files(init_t)
+ files_manage_all_pids(init_t)
+ files_manage_all_locks(init_t)
@@ -42748,7 +42842,7 @@ index 58bc27f..b4f0663 100644
+ allow $1 clvmd_tmpfs_t:file rw_file_perms;
+')
diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te
-index 86ef2da..7f649d5 100644
+index 86ef2da..f1fe005 100644
--- a/policy/modules/system/lvm.te
+++ b/policy/modules/system/lvm.te
@@ -12,6 +12,9 @@ init_daemon_domain(clvmd_t, clvmd_exec_t)
@@ -42792,7 +42886,18 @@ index 86ef2da..7f649d5 100644
allow lvm_t self:file rw_file_perms;
allow lvm_t self:fifo_file manage_fifo_file_perms;
allow lvm_t self:unix_dgram_socket create_socket_perms;
-@@ -210,12 +223,15 @@ filetrans_pattern(lvm_t, lvm_etc_t, lvm_metadata_t, file)
+@@ -190,8 +203,9 @@ read_lnk_files_pattern(lvm_t, lvm_exec_t, lvm_exec_t)
+ can_exec(lvm_t, lvm_exec_t)
+
+ # Creating lock files
++manage_dirs_pattern(lvm_t, lvm_lock_t, lvm_lock_t)
+ manage_files_pattern(lvm_t, lvm_lock_t, lvm_lock_t)
+-files_lock_filetrans(lvm_t, lvm_lock_t, file)
++files_lock_filetrans(lvm_t, lvm_lock_t, { file dir })
+
+ manage_dirs_pattern(lvm_t, lvm_var_lib_t, lvm_var_lib_t)
+ manage_files_pattern(lvm_t, lvm_var_lib_t, lvm_var_lib_t)
+@@ -210,12 +224,15 @@ filetrans_pattern(lvm_t, lvm_etc_t, lvm_metadata_t, file)
files_etc_filetrans(lvm_t, lvm_metadata_t, file)
files_search_mnt(lvm_t)
@@ -42808,7 +42913,7 @@ index 86ef2da..7f649d5 100644
kernel_search_debugfs(lvm_t)
corecmd_exec_bin(lvm_t)
-@@ -242,6 +258,7 @@ dev_dontaudit_getattr_generic_chr_files(lvm_t)
+@@ -242,6 +259,7 @@ dev_dontaudit_getattr_generic_chr_files(lvm_t)
dev_dontaudit_getattr_generic_blk_files(lvm_t)
dev_dontaudit_getattr_generic_pipes(lvm_t)
dev_create_generic_dirs(lvm_t)
@@ -42816,7 +42921,7 @@ index 86ef2da..7f649d5 100644
domain_use_interactive_fds(lvm_t)
domain_read_all_domains_state(lvm_t)
-@@ -251,8 +268,9 @@ files_read_etc_files(lvm_t)
+@@ -251,8 +269,9 @@ files_read_etc_files(lvm_t)
files_read_etc_runtime_files(lvm_t)
# for when /usr is not mounted:
files_dontaudit_search_isid_type_dirs(lvm_t)
@@ -42827,7 +42932,7 @@ index 86ef2da..7f649d5 100644
fs_search_auto_mountpoints(lvm_t)
fs_list_tmpfs(lvm_t)
fs_read_tmpfs_symlinks(lvm_t)
-@@ -262,6 +280,7 @@ fs_rw_anon_inodefs_files(lvm_t)
+@@ -262,6 +281,7 @@ fs_rw_anon_inodefs_files(lvm_t)
mls_file_read_all_levels(lvm_t)
mls_file_write_to_clearance(lvm_t)
@@ -42835,7 +42940,7 @@ index 86ef2da..7f649d5 100644
selinux_get_fs_mount(lvm_t)
selinux_validate_context(lvm_t)
-@@ -309,6 +328,11 @@ ifdef(`distro_redhat',`
+@@ -309,6 +329,11 @@ ifdef(`distro_redhat',`
')
optional_policy(`
@@ -42847,7 +42952,7 @@ index 86ef2da..7f649d5 100644
bootloader_rw_tmp_files(lvm_t)
')
-@@ -329,6 +353,10 @@ optional_policy(`
+@@ -329,6 +354,10 @@ optional_policy(`
')
optional_policy(`
@@ -43298,7 +43403,7 @@ index 8b5c196..b195f9d 100644
+ role $2 types showmount_t;
')
diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
-index 6fe8471..be5821a 100644
+index 6fe8471..139e2c9 100644
--- a/policy/modules/system/mount.te
+++ b/policy/modules/system/mount.te
@@ -17,8 +17,15 @@ type mount_exec_t;
@@ -43348,7 +43453,7 @@ index 6fe8471..be5821a 100644
allow mount_t mount_loopback_t:file read_file_perms;
-@@ -46,8 +68,23 @@ can_exec(mount_t, mount_exec_t)
+@@ -46,59 +68,96 @@ can_exec(mount_t, mount_exec_t)
files_tmp_filetrans(mount_t, mount_tmp_t, { file dir })
@@ -43365,14 +43470,14 @@ index 6fe8471..be5821a 100644
kernel_read_system_state(mount_t)
+kernel_read_network_state(mount_t)
kernel_read_kernel_sysctls(mount_t)
+-kernel_dontaudit_getattr_core_if(mount_t)
+kernel_manage_debugfs(mount_t)
+kernel_setsched(mount_t)
+kernel_use_fds(mount_t)
+kernel_request_load_module(mount_t)
- kernel_dontaudit_getattr_core_if(mount_t)
kernel_dontaudit_write_debugfs_dirs(mount_t)
kernel_dontaudit_write_proc_dirs(mount_t)
-@@ -55,46 +92,68 @@ kernel_dontaudit_write_proc_dirs(mount_t)
+
# required for mount.smbfs
corecmd_exec_bin(mount_t)
@@ -43381,7 +43486,6 @@ index 6fe8471..be5821a 100644
dev_list_all_dev_nodes(mount_t)
+dev_read_usbfs(mount_t)
+dev_read_rand(mount_t)
-+dev_read_sysfs(mount_t)
dev_read_sysfs(mount_t)
dev_dontaudit_write_sysfs_dirs(mount_t)
dev_rw_lvm_control(mount_t)
@@ -43422,6 +43526,7 @@ index 6fe8471..be5821a 100644
# For reading cert files
files_read_usr_files(mount_t)
files_list_mnt(mount_t)
++files_write_all_dirs(mount_t)
files_dontaudit_write_root_dirs(mount_t)
-fs_getattr_xattr_fs(mount_t)
@@ -43446,7 +43551,14 @@ index 6fe8471..be5821a 100644
+fs_manage_cgroup_files(mount_t)
fs_dontaudit_write_tmpfs_dirs(mount_t)
- mls_file_read_all_levels(mount_t)
+-mls_file_read_all_levels(mount_t)
+-mls_file_write_all_levels(mount_t)
++mls_file_read_to_clearance(mount_t)
++mls_file_write_to_clearance(mount_t)
++mls_process_write_to_clearance(mount_t)
+
+ selinux_get_enforce_mode(mount_t)
+
@@ -106,6 +165,7 @@ storage_raw_read_fixed_disk(mount_t)
storage_raw_write_fixed_disk(mount_t)
storage_raw_read_removable_device(mount_t)
@@ -48808,19 +48920,20 @@ index 22ca011..df6b5de 100644
#
diff --git a/policy/support/obj_perm_sets.spt b/policy/support/obj_perm_sets.spt
-index f7380b3..cabc009 100644
+index f7380b3..51867f6 100644
--- a/policy/support/obj_perm_sets.spt
+++ b/policy/support/obj_perm_sets.spt
-@@ -28,7 +28,7 @@ define(`devfile_class_set', `{ chr_file blk_file }')
+@@ -28,8 +28,7 @@ define(`devfile_class_set', `{ chr_file blk_file }')
#
# All socket classes.
#
-define(`socket_class_set', `{ tcp_socket udp_socket rawip_socket netlink_socket packet_socket unix_stream_socket unix_dgram_socket appletalk_socket netlink_route_socket netlink_firewall_socket netlink_tcpdiag_socket netlink_nflog_socket netlink_xfrm_socket netlink_selinux_socket netlink_audit_socket netlink_ip6fw_socket netlink_dnrt_socket netlink_kobject_uevent_socket tun_socket }')
+-
+define(`socket_class_set', `{ socket tcp_socket udp_socket rawip_socket netlink_socket packet_socket unix_stream_socket unix_dgram_socket appletalk_socket netlink_route_socket netlink_firewall_socket netlink_tcpdiag_socket netlink_nflog_socket netlink_xfrm_socket netlink_selinux_socket netlink_audit_socket netlink_ip6fw_socket netlink_dnrt_socket netlink_kobject_uevent_socket tun_socket }')
-
#
-@@ -105,7 +105,7 @@ define(`mount_fs_perms', `{ mount remount unmount getattr }')
+ # Datagram socket classes.
+@@ -105,7 +104,7 @@ define(`mount_fs_perms', `{ mount remount unmount getattr }')
#
# Permissions for using sockets.
#
@@ -48829,7 +48942,7 @@ index f7380b3..cabc009 100644
#
# Permissions for creating and using sockets.
-@@ -199,12 +199,14 @@ define(`relabel_dir_perms',`{ getattr relabelfrom relabelto }')
+@@ -199,12 +198,14 @@ define(`relabel_dir_perms',`{ getattr relabelfrom relabelto }')
#
define(`getattr_file_perms',`{ getattr }')
define(`setattr_file_perms',`{ setattr }')
@@ -48846,7 +48959,7 @@ index f7380b3..cabc009 100644
define(`create_file_perms',`{ getattr create open }')
define(`rename_file_perms',`{ getattr rename }')
define(`delete_file_perms',`{ getattr unlink }')
-@@ -225,7 +227,7 @@ define(`rw_lnk_file_perms',`{ getattr read write lock ioctl }')
+@@ -225,7 +226,7 @@ define(`rw_lnk_file_perms',`{ getattr read write lock ioctl }')
define(`create_lnk_file_perms',`{ create getattr }')
define(`rename_lnk_file_perms',`{ getattr rename }')
define(`delete_lnk_file_perms',`{ getattr unlink }')
@@ -48855,7 +48968,7 @@ index f7380b3..cabc009 100644
define(`relabelfrom_lnk_file_perms',`{ getattr relabelfrom }')
define(`relabelto_lnk_file_perms',`{ getattr relabelto }')
define(`relabel_lnk_file_perms',`{ getattr relabelfrom relabelto }')
-@@ -238,7 +240,8 @@ define(`setattr_fifo_file_perms',`{ setattr }')
+@@ -238,7 +239,8 @@ define(`setattr_fifo_file_perms',`{ setattr }')
define(`read_fifo_file_perms',`{ getattr open read lock ioctl }')
define(`append_fifo_file_perms',`{ getattr open append lock ioctl }')
define(`write_fifo_file_perms',`{ getattr open write append lock ioctl }')
@@ -48865,7 +48978,7 @@ index f7380b3..cabc009 100644
define(`create_fifo_file_perms',`{ getattr create open }')
define(`rename_fifo_file_perms',`{ getattr rename }')
define(`delete_fifo_file_perms',`{ getattr unlink }')
-@@ -254,7 +257,8 @@ define(`getattr_sock_file_perms',`{ getattr }')
+@@ -254,7 +256,8 @@ define(`getattr_sock_file_perms',`{ getattr }')
define(`setattr_sock_file_perms',`{ setattr }')
define(`read_sock_file_perms',`{ getattr open read }')
define(`write_sock_file_perms',`{ getattr write open append }')
@@ -48875,7 +48988,7 @@ index f7380b3..cabc009 100644
define(`create_sock_file_perms',`{ getattr create open }')
define(`rename_sock_file_perms',`{ getattr rename }')
define(`delete_sock_file_perms',`{ getattr unlink }')
-@@ -271,7 +275,8 @@ define(`setattr_blk_file_perms',`{ setattr }')
+@@ -271,7 +274,8 @@ define(`setattr_blk_file_perms',`{ setattr }')
define(`read_blk_file_perms',`{ getattr open read lock ioctl }')
define(`append_blk_file_perms',`{ getattr open append lock ioctl }')
define(`write_blk_file_perms',`{ getattr open write append lock ioctl }')
@@ -48885,7 +48998,7 @@ index f7380b3..cabc009 100644
define(`create_blk_file_perms',`{ getattr create }')
define(`rename_blk_file_perms',`{ getattr rename }')
define(`delete_blk_file_perms',`{ getattr unlink }')
-@@ -288,7 +293,8 @@ define(`setattr_chr_file_perms',`{ setattr }')
+@@ -288,7 +292,8 @@ define(`setattr_chr_file_perms',`{ setattr }')
define(`read_chr_file_perms',`{ getattr open read lock ioctl }')
define(`append_chr_file_perms',`{ getattr open append lock ioctl }')
define(`write_chr_file_perms',`{ getattr open write append lock ioctl }')
@@ -48895,7 +49008,7 @@ index f7380b3..cabc009 100644
define(`create_chr_file_perms',`{ getattr create }')
define(`rename_chr_file_perms',`{ getattr rename }')
define(`delete_chr_file_perms',`{ getattr unlink }')
-@@ -305,7 +311,8 @@ define(`relabel_chr_file_perms',`{ getattr relabelfrom relabelto }')
+@@ -305,7 +310,8 @@ define(`relabel_chr_file_perms',`{ getattr relabelfrom relabelto }')
#
# Use (read and write) terminals
#
@@ -48905,7 +49018,7 @@ index f7380b3..cabc009 100644
#
# Sockets
-@@ -317,3 +324,14 @@ define(`server_stream_socket_perms', `{ client_stream_socket_perms listen accept
+@@ -317,3 +323,14 @@ define(`server_stream_socket_perms', `{ client_stream_socket_perms listen accept
# Keys
#
define(`manage_key_perms', `{ create link read search setattr view write } ')
diff --git a/selinux-policy.spec b/selinux-policy.spec
index b039c72..bfac031 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -21,7 +21,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.9.10
-Release: 2%{?dist}
+Release: 3%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -471,6 +471,13 @@ exit 0
%endif
%changelog
+* Tue Nov 30 2010 Miroslav Grepl 3.9.10-3
+- fixes to allow /var/run and /var/lock as tmpfs
+- Allow chrome sandbox to connect to web ports
+- Allow dovecot to listem on lmtp and sieve ports
+- Allov ddclient to search sysctl_net_t
+- Transition back to original domain if you execute the shell
+
* Thu Nov 25 2010 Miroslav Grepl 3.9.10-2
- Remove duplicate declaration