+##
+## Allow icecast to connect to all ports, not just
+## sound ports.
+##
+##
+gen_tunable(icecast_connect_any, false)
+
type icecast_t;
type icecast_exec_t;
init_daemon_domain(icecast_t, icecast_exec_t)
@@ -42,6 +50,12 @@ kernel_read_system_state(icecast_t)
corenet_tcp_bind_soundd_port(icecast_t)
corenet_tcp_connect_soundd_port(icecast_t)
+tunable_policy(`icecast_connect_any',`
+ corenet_tcp_connect_all_ports(icecast_t)
+ corenet_tcp_bind_all_ports(icecast_t)
+ corenet_sendrecv_all_packets(icecast_t)
+')
+
# Init script handling
domain_use_interactive_fds(icecast_t)
diff --git a/policy/modules/services/openvpn.te b/policy/modules/services/openvpn.te
index 9be673c..196f2a2 100644
--- a/policy/modules/services/openvpn.te
+++ b/policy/modules/services/openvpn.te
@@ -51,7 +51,7 @@ allow openvpn_t self:unix_dgram_socket { create_socket_perms sendto };
allow openvpn_t self:unix_stream_socket { create_stream_socket_perms connectto };
allow openvpn_t self:udp_socket create_socket_perms;
allow openvpn_t self:tcp_socket server_stream_socket_perms;
-allow openvpn_t self:tun_socket create;
+allow openvpn_t self:tun_socket { create_socket_perms relabelfrom };
allow openvpn_t self:netlink_route_socket rw_netlink_socket_perms;
can_exec(openvpn_t, openvpn_etc_t)
diff --git a/policy/modules/services/piranha.te b/policy/modules/services/piranha.te
index 17d6b45..0a5f27d 100644
--- a/policy/modules/services/piranha.te
+++ b/policy/modules/services/piranha.te
@@ -115,6 +115,10 @@ optional_policy(`
')
optional_policy(`
+ gnome_dontaudit_search_config(piranha_web_t)
+')
+
+optional_policy(`
sasl_connect(piranha_web_t)
')
diff --git a/policy/modules/services/policykit.te b/policy/modules/services/policykit.te
index ab881a1..e731afa 100644
--- a/policy/modules/services/policykit.te
+++ b/policy/modules/services/policykit.te
@@ -107,7 +107,7 @@ optional_policy(`
# polkit_auth local policy
#
-allow policykit_auth_t self:capability { setgid setuid };
+allow policykit_auth_t self:capability { ipc_lock setgid setuid };
dontaudit policykit_auth_t self:capability sys_tty_config;
allow policykit_auth_t self:process { getattr getsched signal };
allow policykit_auth_t self:fifo_file rw_fifo_file_perms;
diff --git a/policy/modules/services/rgmanager.te b/policy/modules/services/rgmanager.te
index ce5dbc0..9ab1d80 100644
--- a/policy/modules/services/rgmanager.te
+++ b/policy/modules/services/rgmanager.te
@@ -209,13 +209,9 @@ optional_policy(`
virt_stream_connect(rgmanager_t)
')
-ifdef(`enforcing',`
optional_policy(`
unconfined_domain(rgmanager_t)
')
-', `
- permissive rgmanager_t;
-')
optional_policy(`
xen_domtrans_xm(rgmanager_t)
diff --git a/policy/modules/services/rwho.te b/policy/modules/services/rwho.te
index a07b2f4..d78daf4 100644
--- a/policy/modules/services/rwho.te
+++ b/policy/modules/services/rwho.te
@@ -55,6 +55,9 @@ files_read_etc_files(rwho_t)
init_read_utmp(rwho_t)
init_dontaudit_write_utmp(rwho_t)
+logging_send_syslog_msg(rwho_t)
+
miscfiles_read_localization(rwho_t)
sysnet_dns_name_resolve(rwho_t)
+
diff --git a/policy/modules/services/virt.te b/policy/modules/services/virt.te
index 8040c74..8f0fac9 100644
--- a/policy/modules/services/virt.te
+++ b/policy/modules/services/virt.te
@@ -446,13 +446,9 @@ optional_policy(`
udev_read_db(virtd_t)
')
-ifdef(`enforcing',`
optional_policy(`
unconfined_domain(virtd_t)
')
-', `
- permissive virtd_t;
-')
########################################
#
diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
index a5b3186..81c0af8 100644
--- a/policy/modules/services/xserver.if
+++ b/policy/modules/services/xserver.if
@@ -1283,6 +1283,7 @@ interface(`xserver_stream_connect',`
files_search_tmp($1)
stream_connect_pattern($1, xserver_tmp_t, xserver_tmp_t, xserver_t)
+ allow xserver $1:shm rw_shm_perms;
')
########################################
diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index 50b4a08..9b9e013 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -775,6 +775,7 @@ optional_policy(`
optional_policy(`
plymouthd_search_spool(xdm_t)
plymouthd_exec_plymouth(xdm_t)
+ plymouthd_stream_connect(xdm_t)
')
optional_policy(`
@@ -1093,14 +1094,10 @@ optional_policy(`
udev_read_db(xserver_t)
')
-ifdef(`enforcing',`
optional_policy(`
unconfined_domain(xserver_t)
unconfined_domtrans(xserver_t)
')
-', `
- permissive xserver_t;
-')
optional_policy(`
userhelper_search_config(xserver_t)
diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
index 227958c..304bc75 100644
--- a/policy/modules/system/authlogin.if
+++ b/policy/modules/system/authlogin.if
@@ -66,6 +66,10 @@ interface(`auth_use_pam',`
optional_policy(`
consolekit_dbus_chat($1)
')
+
+ optional_policy(`
+ fprintd_dbus_chat($1)
+ ')
')
optional_policy(`
diff --git a/policy/modules/system/fstools.te b/policy/modules/system/fstools.te
index e8dd9c8..7cb7582 100644
--- a/policy/modules/system/fstools.te
+++ b/policy/modules/system/fstools.te
@@ -154,13 +154,9 @@ seutil_read_config(fsadm_t)
term_use_all_terms(fsadm_t)
ifdef(`distro_redhat',`
-ifdef(`enforcing',`
optional_policy(`
unconfined_domain(fsadm_t)
')
-', `
- permissive fsadm_t;
-')
')
optional_policy(`
diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if
index 7da8294..c504f34 100644
--- a/policy/modules/system/init.if
+++ b/policy/modules/system/init.if
@@ -745,6 +745,7 @@ interface(`init_telinit',`
type init_t;
')
+ allow $1 init_t:process signal;
# upstart uses a datagram socket instead of initctl pipe
allow $1 self:unix_dgram_socket create_socket_perms;
allow $1 init_t:unix_dgram_socket sendto;
diff --git a/policy/modules/system/iptables.te b/policy/modules/system/iptables.te
index e9bd52a..bce3aea 100644
--- a/policy/modules/system/iptables.te
+++ b/policy/modules/system/iptables.te
@@ -135,6 +135,7 @@ optional_policy(`
optional_policy(`
shorewall_rw_lib_files(iptables_t)
+ shorewall_read_tmp_files(iptables_t)
')
optional_policy(`
diff --git a/policy/modules/system/libraries.if b/policy/modules/system/libraries.if
index d97d16d..8b174c8 100644
--- a/policy/modules/system/libraries.if
+++ b/policy/modules/system/libraries.if
@@ -46,6 +46,26 @@ interface(`libs_run_ldconfig',`
########################################
##