File selinux-policy-SUSE.patch of Package selinux-policy

Index: refpolicy/policy/modules/services/xserver.fc
===================================================================
--- refpolicy.orig/policy/modules/services/xserver.fc	2012-05-10 16:22:52.000000000 +0200
+++ refpolicy/policy/modules/services/xserver.fc	2012-10-22 21:59:12.308452994 +0200
@@ -9,6 +9,7 @@ HOME_DIR/\.ICEauthority.* --	gen_context
 HOME_DIR/\.serverauth.*	--	gen_context(system_u:object_r:xauth_home_t,s0)
 HOME_DIR/\.xauth.*	--	gen_context(system_u:object_r:xauth_home_t,s0)
 HOME_DIR/\.Xauthority.*	--	gen_context(system_u:object_r:xauth_home_t,s0)
+HOME_DIR/\.xsession-errors.*	--	gen_context(system_u:object_r:xdm_home_t,s0)
 
 #
 # /dev
Index: refpolicy/policy/modules/suse/a2a.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a.fc	2012-10-22 21:59:12.308452994 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2a.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a.if	2012-10-22 21:59:12.308452994 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's from var log messages</summary>
Index: refpolicy/policy/modules/suse/a2a.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a.te	2012-10-22 21:59:12.308452994 +0200
@@ -0,0 +1,76 @@
+
+module a2a 1.0;
+
+require {
+	type system_cronjob_t;
+	type loadkeys_t;
+	type hald_t;
+	type usr_t;
+	type crond_t;
+	type cronjob_t;
+	type user_dbusd_t;
+	type device_t;
+	type mount_t;
+	type debugfs_t;
+	type lib_t;
+	type kernel_t;
+	type setfiles_t;
+	type klogd_t;
+	type var_log_t;
+	type proc_t;
+	type audisp_t;
+	type klogd_t;
+        type user_dbusd_t;
+        type xauth_home_t;
+	type admin_home_t;
+	class chr_file open;
+	class process setsched;
+	class chr_file { read write open };
+	class dir { getattr write add_name search };
+	class system syslog_read;
+	class key create;
+	class lnk_file read;
+	class dbus send_msg;
+	class file { read write create getattr open ioctl append };
+}
+
+optional_policy(`
+	unconfined_dbus_chat(user_dbusd_t)
+')
+
+
+#============= hald_t ==============
+allow hald_t system_cronjob_t:dbus send_msg;
+
+#============= loadkeys_t ==============
+allow loadkeys_t usr_t:file { read getattr open ioctl };
+allow loadkeys_t usr_t:lnk_file read;
+
+#============= system_cronjob_t ==============
+allow system_cronjob_t hald_t:dbus send_msg;
+
+allow crond_t cronjob_t:key create;
+
+#============= klogd_t ==============
+allow klogd_t kernel_t:system syslog_read;
+allow klogd_t var_log_t:dir { write add_name search };
+allow klogd_t var_log_t:file { write create open getattr };
+
+#============= mount_t ==============
+allow mount_t debugfs_t:dir getattr;
+allow mount_t device_t:chr_file open;
+allow mount_t kernel_t:process setsched;
+allow mount_t lib_t:chr_file { read write open };
+allow mount_t device_t:chr_file { read write };
+
+#============= setfiles_t ==============
+allow setfiles_t device_t:chr_file { read write };
+
+#============= audisp_t ==============
+allow audisp_t proc_t:file read;
+
+#============= user_dbusd_t ==============
+allow user_dbusd_t xauth_home_t:file { read append };
+
+#============= crond_t ==============
+allow crond_t admin_home_t:dir search;
Index: refpolicy/policy/modules/suse/a2a2.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a2.fc	2012-10-22 21:59:12.308452994 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2a2.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a2.if	2012-10-22 21:59:12.308452994 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's from var log messages</summary>
Index: refpolicy/policy/modules/suse/a2a2.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a2.te	2012-10-22 21:59:12.309453025 +0200
@@ -0,0 +1,45 @@
+
+module a2a2 1.0;
+
+require {
+	type lib_t;
+	type devicekit_power_t;
+	type avahi_t;
+	type hald_t;
+	type consolekit_t;
+	type rtkit_daemon_t;
+	type system_dbusd_t;
+	type NetworkManager_t;
+	type xdm_t;
+	class dbus send_msg;
+	class file execute_no_trans;
+}
+
+#============= NetworkManager_t ==============
+allow NetworkManager_t xdm_t:dbus send_msg;
+
+#============= avahi_t ==============
+allow avahi_t xdm_t:dbus send_msg;
+
+#============= devicekit_power_t ==============
+allow devicekit_power_t lib_t:file execute_no_trans;
+allow devicekit_power_t xdm_t:dbus send_msg;
+
+#============= hald_t ==============
+allow hald_t xdm_t:dbus send_msg;
+
+#============= rtkit_daemon_t ==============
+allow rtkit_daemon_t xdm_t:dbus send_msg;
+
+#============= system_dbusd_t ==============
+allow system_dbusd_t consolekit_t:dbus send_msg;
+allow system_dbusd_t devicekit_power_t:dbus send_msg;
+allow system_dbusd_t rtkit_daemon_t:dbus send_msg;
+allow system_dbusd_t xdm_t:dbus send_msg;
+
+#============= xdm_t ==============
+allow xdm_t NetworkManager_t:dbus send_msg;
+allow xdm_t avahi_t:dbus send_msg;
+allow xdm_t devicekit_power_t:dbus send_msg;
+allow xdm_t hald_t:dbus send_msg;
+allow xdm_t rtkit_daemon_t:dbus send_msg;
Index: refpolicy/policy/modules/suse/a2a3.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a3.fc	2012-10-22 21:59:12.309453025 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2a3.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a3.if	2012-10-22 21:59:12.309453025 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's from var log messages</summary>
Index: refpolicy/policy/modules/suse/a2a3.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a3.te	2012-10-22 21:59:12.309453025 +0200
@@ -0,0 +1,43 @@
+
+module a2a3 1.0;
+
+require {
+	type xserver_log_t;
+	type hplip_etc_t;
+	type syslogd_t;
+	type etc_t;
+	type xauth_home_t;
+	type pulseaudio_home_t;
+	type gpg_secret_t;
+	type device_t;
+	type devlog_t;
+	type user_t;
+	type gconf_home_t;
+	type gconf_etc_t;
+	class sock_file write;
+	class fifo_file setattr;
+	class unix_dgram_socket sendto;
+	class dir { write setattr };
+	class file { write relabelfrom entrypoint read open };
+}
+
+#============= user_t ==============
+allow user_t device_t:fifo_file setattr;
+allow user_t devlog_t:sock_file write;
+allow user_t etc_t:file entrypoint;
+allow user_t gconf_etc_t:file { read open };
+#!!!! The source type 'user_t' can write to a 'dir' of the following types:
+# tmpfs_t, uml_tmp_t, xdm_tmp_t, httpd_user_ra_content_t, httpd_user_rw_content_t, gpg_agent_tmp_t, user_fonts_cache_t, user_tmp_t, ethereal_home_t, screen_home_t, user_home_t, nfsd_rw_t, session_dbusd_tmp_t, bluetooth_helper_tmpfs_t, mozilla_home_t, tmp_t, screen_var_run_t, gpg_pinentry_tmp_t, user_fonts_t, user_tmpfs_t, bluetooth_helper_tmp_t, uml_exec_t, user_fonts_config_t, ssh_home_t, httpd_user_script_exec_t, user_home_dir_t, mplayer_home_t, tvtime_home_t, uml_ro_t, uml_rw_t, nfs_t, noxattrfs
+
+allow user_t gconf_home_t:dir write;
+#!!!! The source type 'user_t' can write to a 'file' of the following types:
+# usbfs_t, uml_tmp_t, xdm_tmp_t, httpd_user_ra_content_t, httpd_user_rw_content_t, gpg_agent_tmp_t, user_fonts_cache_t, user_tmp_t, xserver_tmpfs_t, iceauth_home_t, xauth_home_t, ethereal_home_t, screen_home_t, user_home_t, nfsd_rw_t, session_dbusd_tmp_t, anon_inodefs_t, bluetooth_helper_tmpfs_t, mozilla_home_t, screen_var_run_t, user_fonts_t, user_tmpfs_t, httpd_user_htaccess_t, bluetooth_helper_tmp_t, uml_exec_t, user_fonts_config_t, ssh_home_t, httpd_user_script_exec_t, security_t, mplayer_home_t, mail_spool_t, tvtime_home_t, uml_ro_t, uml_rw_t, nfs_t, noxattrfs
+
+allow user_t gpg_secret_t:file { read write open };
+allow user_t hplip_etc_t:file { read open };
+allow user_t pulseaudio_home_t:dir setattr;
+allow user_t syslogd_t:unix_dgram_socket sendto;
+#!!!! This avc is a constraint violation.  You will need to add an attribute to either the source or target type to make it work.
+
+allow user_t xauth_home_t:file relabelfrom;
+allow user_t xserver_log_t:file { read open };
Index: refpolicy/policy/modules/suse/a2a4.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a4.fc	2012-10-22 21:59:12.309453025 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2a4.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a4.if	2012-10-22 21:59:12.309453025 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's from var log messages</summary>
Index: refpolicy/policy/modules/suse/a2a4.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a4.te	2012-10-22 21:59:12.309453025 +0200
@@ -0,0 +1,53 @@
+
+module a2a4 1.0;
+
+require {
+	type mount_t;
+	type etc_t;
+	type device_t;
+	type cupsd_t;
+	type pulseaudio_home_t;
+	type cupsd_etc_t;
+	type tmp_t;
+	type avahi_t;
+	type user_t;
+	type proc_t;
+	type gconf_home_t;
+	type xdm_tmp_t;
+	type samba_etc_t;
+	class fifo_file write;
+	class netlink_kobject_uevent_socket { read bind create getattr setopt };
+	class capability dac_override;
+	class file { write read lock create unlink open };
+	class sock_file unlink;
+	class lnk_file read;
+	class dir { remove_name add_name setattr };
+}
+
+#============= avahi_t ==============
+allow avahi_t device_t:fifo_file write;
+
+#============= cupsd_t ==============
+allow cupsd_t cupsd_etc_t:file write;
+
+#============= mount_t ==============
+allow mount_t device_t:fifo_file write;
+allow mount_t etc_t:file { write unlink };
+
+#============= user_t ==============
+allow user_t gconf_home_t:dir { remove_name add_name };
+#!!!! The source type 'user_t' can write to a 'file' of the following types:
+# uml_tmp_t, xdm_tmp_t, httpd_user_ra_content_t, httpd_user_rw_content_t, gpg_agent_tmp_t, user_fonts_cache_t, user_tmp_t, iceauth_home_t, xauth_home_t, ethereal_home_t, screen_home_t, user_home_t, nfsd_rw_t, bluetooth_helper_tmpfs_t, mozilla_home_t, screen_var_run_t, user_fonts_t, user_tmpfs_t, httpd_user_htaccess_t, bluetooth_helper_tmp_t, uml_exec_t, user_fonts_config_t, ssh_home_t, httpd_user_script_exec_t, mplayer_home_t, tvtime_home_t, uml_ro_t, uml_rw_t, nfs_t, noxattrfs
+
+allow user_t gconf_home_t:file { write create unlink open };
+allow user_t proc_t:file write;
+#!!!! The source type 'user_t' can write to a 'file' of the following types:
+# usbfs_t, uml_tmp_t, xdm_tmp_t, httpd_user_ra_content_t, httpd_user_rw_content_t, gpg_agent_tmp_t, user_fonts_cache_t, user_tmp_t, xserver_tmpfs_t, iceauth_home_t, xauth_home_t, ethereal_home_t, screen_home_t, user_home_t, nfsd_rw_t, session_dbusd_tmp_t, anon_inodefs_t, bluetooth_helper_tmpfs_t, mozilla_home_t, screen_var_run_t, user_fonts_t, user_tmpfs_t, httpd_user_htaccess_t, bluetooth_helper_tmp_t, uml_exec_t, user_fonts_config_t, ssh_home_t, httpd_user_script_exec_t, security_t, mplayer_home_t, mail_spool_t, tvtime_home_t, uml_ro_t, uml_rw_t, nfs_t, noxattrfs
+
+allow user_t pulseaudio_home_t:file { read write open lock };
+allow user_t pulseaudio_home_t:lnk_file read;
+allow user_t samba_etc_t:file { read open };
+allow user_t self:capability dac_override;
+allow user_t self:netlink_kobject_uevent_socket { read bind create getattr setopt };
+allow user_t tmp_t:dir setattr;
+allow user_t xdm_tmp_t:sock_file unlink;
Index: refpolicy/policy/modules/suse/a2a5.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a5.fc	2012-10-22 21:59:12.309453025 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2a5.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a5.if	2012-10-22 21:59:12.309453025 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's from var log messages</summary>
Index: refpolicy/policy/modules/suse/a2a5.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2a5.te	2012-10-22 21:59:12.310453056 +0200
@@ -0,0 +1,21 @@
+
+module a2a5 1.0;
+
+require {
+	type fsadm_t;
+	type tty_device_t;
+	type device_t;
+	type auditctl_t;
+	type hostname_t;
+	class fifo_file write;
+	class chr_file { read write };
+}
+
+#============= auditctl_t ==============
+allow auditctl_t device_t:fifo_file write;
+
+#============= fsadm_t ==============
+allow fsadm_t tty_device_t:chr_file { read write };
+
+#============= hostname_t ==============
+allow hostname_t tty_device_t:chr_file { read write };
Index: refpolicy/policy/modules/suse/a2aaudit.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2aaudit.fc	2012-10-22 21:59:12.310453056 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2aaudit.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2aaudit.if	2012-10-22 21:59:12.310453056 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's from var log audit audit.log</summary>
Index: refpolicy/policy/modules/suse/a2aaudit.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2aaudit.te	2012-10-22 21:59:12.310453056 +0200
@@ -0,0 +1,16 @@
+
+module a2aaudit 1.0;
+
+require {
+	type fsdaemon_t;
+	type crond_t;
+	type usr_t;
+	class capability audit_control;
+	class file { read getattr open };
+}
+
+#============= crond_t ==============
+allow crond_t self:capability audit_control;
+
+#============= fsdaemon_t ==============
+allow fsdaemon_t usr_t:file { read getattr open };
Index: refpolicy/policy/modules/suse/a2aaudit2.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2aaudit2.fc	2012-10-22 21:59:12.310453056 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2aaudit2.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2aaudit2.if	2012-10-22 21:59:12.310453056 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's from var log audit audit.log</summary>
Index: refpolicy/policy/modules/suse/a2aaudit2.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2aaudit2.te	2012-10-22 21:59:12.310453056 +0200
@@ -0,0 +1,37 @@
+
+module a2aaudit2 1.0;
+
+require {
+	type consolekit_var_run_t;
+	type udev_t;
+	type nscd_t;
+	type consolekit_t;
+	type lib_t;
+	type system_dbusd_var_run_t;
+	type cupsd_t;
+	class process { execstack execmem };
+	class fifo_file write;
+	class dir { write search rmdir remove_name create add_name };
+	class file { read create execute_no_trans write getattr unlink open };
+}
+
+#============= consolekit_t ==============
+allow consolekit_t lib_t:file execute_no_trans;
+#!!!! The source type 'consolekit_t' can write to a 'dir' of the following types:
+# consolekit_var_run_t, user_fonts_cache_t
+
+allow consolekit_t system_dbusd_var_run_t:dir { write remove_name create add_name rmdir };
+#!!!! The source type 'consolekit_t' can write to a 'file' of the following types:
+# pam_var_console_t, consolekit_var_run_t, user_fonts_cache_t, consolekit_log_t
+
+allow consolekit_t system_dbusd_var_run_t:file { write create unlink open };
+
+#============= cupsd_t ==============
+allow cupsd_t self:process { execstack execmem };
+
+#============= nscd_t ==============
+allow nscd_t self:fifo_file write;
+
+#============= udev_t ==============
+allow udev_t consolekit_var_run_t:dir search;
+allow udev_t consolekit_var_run_t:file { read getattr open };
Index: refpolicy/policy/modules/suse/a2aaudit3.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2aaudit3.fc	2012-10-22 21:59:12.310453056 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2aaudit3.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2aaudit3.if	2012-10-22 21:59:12.310453056 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's from var log audit audit.log</summary>
Index: refpolicy/policy/modules/suse/a2aaudit3.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2aaudit3.te	2012-10-22 21:59:12.311453087 +0200
@@ -0,0 +1,43 @@
+
+module a2aaudit3 1.0;
+
+require {
+	type tmp_t;
+	type user_t;
+	type gconf_home_t;
+	type pulseaudio_home_t;
+	type samba_etc_t;
+	type mail_spool_t;
+	type default_t;
+	type postfix_local_t;
+	type etc_t;
+	type chkpwd_t;
+	type bin_t;
+	type shell_exec_t;
+	type xsession_exec_t;
+	class lnk_file read;
+	class netlink_kobject_uevent_socket { bind create getattr setopt };
+	class dir { remove_name add_name rmdir setattr search };
+	class file { write entrypoint read lock create unlink open rmdir };
+}
+
+#============= user_t ==============
+allow user_t gconf_home_t:dir { remove_name add_name };
+allow user_t gconf_home_t:file { write create unlink open };
+allow user_t pulseaudio_home_t:file { read write open lock };
+allow user_t pulseaudio_home_t:lnk_file read;
+allow user_t pulseaudio_home_t:dir rmdir;
+allow user_t samba_etc_t:file { read open };
+allow user_t self:netlink_kobject_uevent_socket { bind create getattr setopt };
+allow user_t tmp_t:dir setattr;
+allow user_t pulseaudio_home_t:dir rmdir;
+
+#============= postfix_local_t ==============
+allow postfix_local_t default_t:dir search;
+allow postfix_local_t mail_spool_t:file write;
+
+#============= chkpwd_t ==============
+allow chkpwd_t bin_t:file entrypoint;
+allow chkpwd_t etc_t:file entrypoint;
+allow chkpwd_t shell_exec_t:file entrypoint;
+allow chkpwd_t xsession_exec_t:file entrypoint;
Index: refpolicy/policy/modules/suse/a2adbusd.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2adbusd.fc	2012-10-22 21:59:12.311453087 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2adbusd.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2adbusd.if	2012-10-22 21:59:12.311453087 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's related to system_dbusd_t</summary>
Index: refpolicy/policy/modules/suse/a2adbusd.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2adbusd.te	2012-10-22 21:59:12.311453087 +0200
@@ -0,0 +1,144 @@
+
+module a2adbusd 1.0;
+
+require {
+	type user_t;
+	type var_log_t;
+	type setroubleshootd_exec_t;
+	type bin_t;
+	type setroubleshoot_var_lib_t;
+	type default_t;
+	type rpm_var_lib_t;
+	type setroubleshoot_var_log_t;
+	type system_dbusd_t;
+	type session_dbusd_tmp_t;
+	type system_dbusd_var_run_t;
+        type user_dbusd_t;
+        type syslogd_t;
+        type devicekit_power_t;
+        type avahi_t;
+        type user_t;
+        type consolekit_t;
+        type rtkit_daemon_t;
+	type fusefs_t;
+	type sysfs_t;
+	type gconf_home_t;
+	type xdm_var_run_t;
+	type etc_runtime_t;
+	type gconf_etc_t;
+	type debugfs_t;
+	type lib_t;
+	type fuse_device_t;
+	type xserver_t;
+	type etc_t;
+	type user_home_t;
+	type fixed_disk_device_t;
+	type mount_exec_t;
+        class fifo_file setattr;
+        class dbus send_msg;
+        class file { write entrypoint read open append };
+        class sock_file write;
+        class unix_dgram_socket sendto;
+        class dir search;
+
+	class process { execstack execmem };
+	class lnk_file read;
+	class dir { write search getattr };
+        class process getsched;
+        class unix_stream_socket connectto;
+        class netlink_kobject_uevent_socket { bind create setopt getattr };
+        class chr_file { read write open };
+        class capability { setuid dac_override };
+        class file { rename execute setattr read lock create ioctl execute_no_trans write getattr link unlink open append };
+        class filesystem mount;
+        class sock_file { write create unlink };
+        class blk_file getattr;
+        class dir { search setattr read mounton write getattr remove_name open add_name };
+
+}
+optional_policy(`
+	unconfined_dbus_chat(user_t)
+')
+
+#============= system_dbusd_t ==============
+allow system_dbusd_t bin_t:file { read execute open getattr };
+allow system_dbusd_t bin_t:lnk_file read;
+allow system_dbusd_t default_t:dir search;
+#!!!! The source type 'system_dbusd_t' can write to a 'dir' of the following types:
+# tmp_t, system_dbusd_var_run_t, var_run_t, system_dbusd_tmp_t
+
+allow system_dbusd_t rpm_var_lib_t:dir { write getattr search };
+allow system_dbusd_t rpm_var_lib_t:file { read lock getattr open };
+allow system_dbusd_t self:process { execstack execmem };
+allow system_dbusd_t setroubleshoot_var_lib_t:dir search;
+#!!!! The source type 'system_dbusd_t' can write to a 'file' of the following types:
+# system_dbusd_var_run_t, system_dbusd_tmp_t
+
+allow system_dbusd_t setroubleshoot_var_lib_t:file { read write getattr open setattr };
+allow system_dbusd_t setroubleshoot_var_log_t:dir search;
+#!!!! The source type 'system_dbusd_t' can write to a 'file' of the following types:
+# system_dbusd_var_run_t, security_t, system_dbusd_tmp_t
+
+allow system_dbusd_t setroubleshoot_var_log_t:file { write getattr open };
+allow system_dbusd_t setroubleshootd_exec_t:file { ioctl execute read open getattr execute_no_trans };
+allow system_dbusd_t var_log_t:dir search;
+
+#============= avahi_t ==============
+allow avahi_t user_t:dbus send_msg;
+
+#============= consolekit_t ==============
+allow consolekit_t user_t:dbus send_msg;
+
+#============= devicekit_power_t ==============
+allow devicekit_power_t user_t:dbus send_msg;
+
+#============= rtkit_daemon_t ==============
+allow rtkit_daemon_t user_t:dbus send_msg;
+
+#============= system_dbusd_t ==============
+allow system_dbusd_t user_dbusd_t:dbus send_msg;
+allow system_dbusd_t user_t:dbus send_msg;
+
+#============= user_dbusd_t ==============
+allow user_dbusd_t system_dbusd_t:dbus send_msg;
+allow user_dbusd_t user_t:dbus send_msg;
+allow user_dbusd_t debugfs_t:dir search;
+allow user_dbusd_t default_t:dir { write search read open getattr mounton };
+allow user_dbusd_t default_t:file { read append };
+allow user_dbusd_t etc_runtime_t:file { read write getattr open append };
+allow user_dbusd_t etc_t:dir { write remove_name add_name };
+allow user_dbusd_t etc_t:file { write create unlink link };
+allow user_dbusd_t fixed_disk_device_t:blk_file getattr;
+allow user_dbusd_t fuse_device_t:chr_file { read write open };
+allow user_dbusd_t fusefs_t:filesystem mount;
+allow user_dbusd_t gconf_etc_t:dir { read search open getattr };
+allow user_dbusd_t gconf_etc_t:file { read getattr open };
+allow user_dbusd_t gconf_home_t:dir { write search read remove_name open getattr add_name };
+allow user_dbusd_t gconf_home_t:file { rename setattr read create write getattr unlink open append };
+allow user_dbusd_t lib_t:file execute_no_trans;
+allow user_dbusd_t mount_exec_t:file { read execute open execute_no_trans };
+allow user_dbusd_t self:capability { setuid dac_override };
+allow user_dbusd_t self:netlink_kobject_uevent_socket { bind create setopt getattr };
+allow user_dbusd_t self:process getsched;
+allow user_dbusd_t self:unix_stream_socket connectto;
+allow user_dbusd_t session_dbusd_tmp_t:sock_file { write create };
+allow user_dbusd_t sysfs_t:dir { read search open getattr };
+allow user_dbusd_t system_dbusd_t:unix_stream_socket connectto;
+allow user_dbusd_t system_dbusd_var_run_t:dir search;
+allow user_dbusd_t system_dbusd_var_run_t:sock_file write;
+allow user_dbusd_t user_home_t:dir { read write add_name remove_name };
+allow user_dbusd_t user_home_t:file { write rename create unlink };
+allow user_dbusd_t user_t:unix_stream_socket connectto;
+allow user_dbusd_t xdm_var_run_t:dir search;
+allow user_dbusd_t xdm_var_run_t:file { read getattr open };
+allow user_dbusd_t xserver_t:unix_stream_socket connectto;
+
+#============= user_t ==============
+allow user_t avahi_t:dbus send_msg;
+allow user_t consolekit_t:dbus send_msg;
+allow user_t devicekit_power_t:dbus send_msg;
+allow user_t rtkit_daemon_t:dbus send_msg;
+allow user_t session_dbusd_tmp_t:dir { write remove_name add_name setattr };
+allow user_t session_dbusd_tmp_t:file { read write create open lock };
+allow user_t session_dbusd_tmp_t:sock_file { write create unlink };
+
Index: refpolicy/policy/modules/suse/a2adbusd2.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2adbusd2.fc	2012-10-22 21:59:12.311453087 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2adbusd2.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2adbusd2.if	2012-10-22 21:59:12.311453087 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's from var log messages</summary>
Index: refpolicy/policy/modules/suse/a2adbusd2.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2adbusd2.te	2012-10-22 21:59:12.311453087 +0200
@@ -0,0 +1,31 @@
+
+module a2adbusd2 1.0;
+
+require {
+	type user_t;
+	type fusefs_t;
+	type etc_t;
+	type user_dbusd_t;
+	type session_dbusd_tmp_t;
+	type etc_runtime_t;
+	type system_cronjob_t;
+	type system_dbusd_t;
+	class dbus send_msg;
+	class capability chown;
+	class sock_file unlink;
+	class file { rename unlink setattr };
+	class filesystem unmount;
+}
+
+#============= user_dbusd_t ==============
+allow user_dbusd_t etc_runtime_t:file unlink;
+allow user_dbusd_t etc_t:file { rename setattr };
+allow user_dbusd_t fusefs_t:filesystem unmount;
+allow user_dbusd_t self:capability chown;
+allow user_dbusd_t session_dbusd_tmp_t:sock_file unlink;
+
+#============= user_t ==============
+allow user_t session_dbusd_tmp_t:file unlink;
+
+#============= system_dbusd_t ==============
+allow system_dbusd_t system_cronjob_t:dbus send_msg;
Index: refpolicy/policy/modules/suse/a2admesg.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2admesg.fc	2012-10-22 21:59:12.311453087 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2admesg.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2admesg.if	2012-10-22 21:59:12.312453118 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's related to system_dbusd_t</summary>
Index: refpolicy/policy/modules/suse/a2admesg.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2admesg.te	2012-10-22 21:59:12.312453118 +0200
@@ -0,0 +1,26 @@
+
+module a2admesg 1.0;
+
+require {
+	type hwclock_t;
+	type mount_t;
+	type init_t;
+	type setfiles_t;
+	type klogd_t;
+	type tty_device_t;
+	class chr_file { read write };
+	class fifo_file read;
+}
+
+#============= hwclock_t ==============
+allow hwclock_t init_t:fifo_file read;
+
+#============= klogd_t ==============
+allow klogd_t init_t:fifo_file read;
+allow klogd_t tty_device_t:chr_file { read write };
+
+#============= mount_t ==============
+allow mount_t init_t:fifo_file read;
+
+#============= setfiles_t ==============
+allow setfiles_t init_t:fifo_file read;
Index: refpolicy/policy/modules/suse/a2adolphin.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2adolphin.fc	2012-10-22 21:59:12.312453118 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2adolphin.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2adolphin.if	2012-10-22 21:59:12.312453118 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's under opensuse 11.3</summary>
Index: refpolicy/policy/modules/suse/a2adolphin.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2adolphin.te	2012-10-22 21:59:12.312453118 +0200
@@ -0,0 +1,13 @@
+
+module a2adolphin 1.0;
+
+require {
+	type httpd_user_content_t;
+	type exports_t;
+	type user_t;
+	class file { write read open };
+}
+
+#============= user_t ==============
+allow user_t exports_t:file { read open };
+allow user_t httpd_user_content_t:file write;
Index: refpolicy/policy/modules/suse/a2afirefox.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2afirefox.fc	2012-10-22 21:59:12.312453118 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2afirefox.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2afirefox.if	2012-10-22 21:59:12.312453118 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's from var log messages</summary>
Index: refpolicy/policy/modules/suse/a2afirefox.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2afirefox.te	2012-10-22 21:59:12.312453118 +0200
@@ -0,0 +1,17 @@
+
+module a2afirefox 1.0;
+
+require {
+	type tmp_t;
+	type mozilla_t;
+	type security_t;
+	type user_t;
+	class fifo_file read;
+	class dir read;
+	class filesystem getattr;
+}
+
+#============= mozilla_t ==============
+allow mozilla_t security_t:filesystem getattr;
+allow mozilla_t tmp_t:dir read;
+allow mozilla_t user_t:fifo_file read;
Index: refpolicy/policy/modules/suse/a2amozilla.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2amozilla.fc	2012-10-22 21:59:12.312453118 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2amozilla.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2amozilla.if	2012-10-22 21:59:12.313453148 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's under opensuse 11.3</summary>
Index: refpolicy/policy/modules/suse/a2amozilla.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2amozilla.te	2012-10-22 21:59:12.313453148 +0200
@@ -0,0 +1,39 @@
+
+module a2amozilla 1.0;
+
+require {
+	type lib_t;
+	type tmp_t;
+	type fs_t;
+	type user_t;
+	type user_dbusd_t;
+	type mozilla_t;
+	type session_dbusd_tmp_t;
+	type devpts_t;
+	type xauth_home_t;
+	class process ptrace;
+	class dir { rmdir setattr };
+	class chr_file getattr;
+	class unix_stream_socket connectto;
+	class dbus { acquire_svc send_msg };
+	class file { setattr read create execute_no_trans write relabelfrom getattr link unlink open entrypoint };
+	class filesystem getattr;
+	class sock_file { write create };
+	class dir { create rmdir search setattr write getattr remove_name add_name };
+}
+
+#============= mozilla_t ==============
+allow mozilla_t fs_t:filesystem getattr;
+allow mozilla_t lib_t:file execute_no_trans;
+allow mozilla_t session_dbusd_tmp_t:dir { write getattr search setattr add_name };
+allow mozilla_t session_dbusd_tmp_t:sock_file { write create };
+allow mozilla_t tmp_t:dir { create rmdir write remove_name add_name };
+allow mozilla_t tmp_t:file { setattr read create write getattr link unlink open };
+allow mozilla_t user_dbusd_t:dbus acquire_svc;
+allow mozilla_t self:process ptrace;
+allow mozilla_t tmp_t:dir setattr;
+allow mozilla_t xauth_home_t:file write;
+
+#============= user_dbusd_t ==============
+allow user_dbusd_t mozilla_t:dbus send_msg;
+allow user_dbusd_t mozilla_t:unix_stream_socket connectto;
Index: refpolicy/policy/modules/suse/a2assh.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2assh.fc	2012-10-22 21:59:12.313453148 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2assh.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2assh.if	2012-10-22 21:59:12.313453148 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's under opensuse 11.3</summary>
Index: refpolicy/policy/modules/suse/a2assh.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2assh.te	2012-10-22 21:59:12.313453148 +0200
@@ -0,0 +1,16 @@
+
+module a2assh 1.0;
+
+require {
+	type admin_home_t;
+	type ssh_t;
+	type tty_device_t;
+	class chr_file { read write };
+	class dir { search getattr };
+	class file { read append open getattr };
+}
+
+#============= ssh_t ==============
+allow ssh_t admin_home_t:dir { search getattr };
+allow ssh_t tty_device_t:chr_file { read write };
+allow ssh_t admin_home_t:file { read append open getattr };
Index: refpolicy/policy/modules/suse/a2asuse113.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2asuse113.fc	2012-10-22 21:59:12.313453148 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2asuse113.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2asuse113.if	2012-10-22 21:59:12.313453148 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's under opensuse 11.3</summary>
Index: refpolicy/policy/modules/suse/a2asuse113.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2asuse113.te	2012-10-22 21:59:12.313453148 +0200
@@ -0,0 +1,89 @@
+
+module a2asuse113 1.0;
+
+require {
+	type udev_t;
+	type init_t;
+	type hald_t;
+	type fsadm_t;
+	type hostname_t;
+	type system_dbusd_t;
+	type lib_t;
+	type tty_device_t;
+	type user_home_t;
+	type xauth_home_t;
+	type proc_kcore_t;
+	type wtmp_t;
+	type user_dbusd_t;
+	type tmp_t;
+	type xdm_var_run_t;
+	type user_t;
+	type root_t;
+	type ptmx_t;
+	type user_ssh_agent_t;
+	type lastlog_t;
+	type utempter_t;
+	type sysadm_t;
+	type pulseaudio_home_t;
+	class lnk_file { rename create unlink };
+	class dir { write remove_name add_name mounton };
+	class unix_stream_socket connectto;
+	class dbus send_msg;
+	class netlink_audit_socket { write nlmsg_relay create read };
+	class capability { setuid sys_resource sys_ptrace audit_write };
+	class sock_file write;
+	class chr_file { read ioctl open setattr };
+	class dir mounton;
+	class file { relabelfrom execmod write read getattr unlink open append };
+	class process getsched;
+	class fd use;
+	class fifo_file read;
+}
+
+#============= fsadm_t ==============
+allow fsadm_t init_t:fifo_file read;
+
+#============= hald_t ==============
+allow hald_t self:process getsched;
+
+#============= hostname_t ==============
+allow hostname_t init_t:fifo_file read;
+
+#============= udev_t ==============
+allow udev_t init_t:fifo_file read;
+allow udev_t system_dbusd_t:fd use;
+
+#============= user_dbusd_t ==============
+allow user_dbusd_t root_t:dir mounton;
+allow user_dbusd_t tmp_t:dir mounton;
+allow user_dbusd_t user_home_t:dir mounton;
+allow user_dbusd_t xauth_home_t:file write;
+
+#============= user_ssh_agent_t ==============
+allow user_ssh_agent_t xauth_home_t:file write;
+
+#============= user_t ==============
+allow user_t lastlog_t:file { read write open };
+allow user_t lib_t:file execmod;
+allow user_t proc_kcore_t:file getattr;
+allow user_t self:capability { setuid sys_resource sys_ptrace };
+allow user_t tmp_t:file { read write unlink open };
+allow user_t tty_device_t:chr_file { read open setattr };
+allow user_t wtmp_t:file append;
+allow user_t xdm_var_run_t:sock_file write;
+allow user_t pulseaudio_home_t:dir { write remove_name add_name };
+allow user_t pulseaudio_home_t:lnk_file { rename create unlink };
+
+#============= utempter_t ==============
+allow utempter_t ptmx_t:chr_file ioctl;
+allow utempter_t user_home_t:file { write getattr };
+allow utempter_t xauth_home_t:file { write getattr };
+
+#============= sysadm_t ==============
+allow sysadm_t init_t:unix_stream_socket connectto;
+allow sysadm_t self:capability audit_write;
+allow sysadm_t self:netlink_audit_socket { write nlmsg_relay create read };
+
+#============= system_dbusd_t ==============
+allow system_dbusd_t hald_t:dbus send_msg;
+
Index: refpolicy/policy/modules/suse/a2ayast.fc
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2ayast.fc	2012-10-22 21:59:12.313453148 +0200
@@ -0,0 +1,2 @@
+
+# currently has no file contexts
Index: refpolicy/policy/modules/suse/a2ayast.if
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2ayast.if	2012-10-22 21:59:12.314453178 +0200
@@ -0,0 +1 @@
+## <summary>Policy generated by audit2allow for avc's under opensuse 11.3</summary>
Index: refpolicy/policy/modules/suse/a2ayast.te
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/a2ayast.te	2012-10-22 21:59:12.314453178 +0200
@@ -0,0 +1,33 @@
+
+module a2ayast 1.0;
+
+require {
+	type user_su_t;
+	type user_tmp_t;
+	type xauth_tmp_t;
+	type user_t;
+	type var_run_t;
+	type xauth_t;
+	type default_t;
+	type xauth_home_t;
+	class process sigkill;
+	class unix_stream_socket { read write };
+	class lnk_file read;
+	class dir { write remove_name add_name };
+	class file { write relabelfrom read create unlink open };
+}
+
+#============= user_t ==============
+allow user_t default_t:lnk_file read;
+allow user_t user_su_t:process sigkill;
+allow user_t var_run_t:dir { write remove_name add_name };
+allow user_t var_run_t:file { write create unlink open };
+allow user_t xauth_tmp_t:file { read unlink open };
+
+#============= xauth_t ==============
+allow xauth_t user_t:unix_stream_socket { read write };
+allow xauth_t user_tmp_t:file { write unlink };
+
+#============= user_su_t ==============
+allow user_su_t default_t:dir remove_name;
+allow user_su_t default_t:file unlink;
Index: refpolicy/policy/modules/suse/metadata.xml
===================================================================
--- /dev/null	1970-01-01 00:00:00.000000000 +0000
+++ refpolicy/policy/modules/suse/metadata.xml	2012-10-22 21:59:12.314453178 +0200
@@ -0,0 +1,3 @@
+<summary>
+	Policy modules for suse
+</summary>
Index: refpolicy/policy/modules/system/fstools.fc
===================================================================
--- refpolicy.orig/policy/modules/system/fstools.fc	2012-05-04 15:14:47.000000000 +0200
+++ refpolicy/policy/modules/system/fstools.fc	2012-10-22 21:59:12.314453178 +0200
@@ -45,3 +45,10 @@
 /usr/sbin/smartctl	--	gen_context(system_u:object_r:fsadm_exec_t,s0)
 
 /var/log/fsck(/.*)?		gen_context(system_u:object_r:fsadm_log_t,s0)
+
+ifdef(`distro_suse',`
+/usr/sbin/parted            --      gen_context(system_u:object_r:fsadm_exec_t,s0)
+/usr/sbin/partprobe         --      gen_context(system_u:object_r:fsadm_exec_t,s0)
+/usr/sbin/partx             --      gen_context(system_u:object_r:fsadm_exec_t,s0)
+')
+
Index: refpolicy/policy/modules/system/getty.te
===================================================================
--- refpolicy.orig/policy/modules/system/getty.te	2012-05-04 15:16:38.000000000 +0200
+++ refpolicy/policy/modules/system/getty.te	2012-10-22 21:59:12.314453178 +0200
@@ -107,6 +107,12 @@ ifdef(`distro_redhat',`
 	allow getty_t self:capability sys_admin;
 ')
 
+ifdef(`distro_suse',`
+	optional_policy(`
+		unconfined_domain(getty_t)
+	')
+')
+
 ifdef(`distro_ubuntu',`
 	optional_policy(`
 		unconfined_domain(getty_t)
Index: refpolicy/policy/modules/system/logging.te
===================================================================
--- refpolicy.orig/policy/modules/system/logging.te	2012-07-25 20:33:04.000000000 +0200
+++ refpolicy/policy/modules/system/logging.te	2012-10-22 21:59:12.314453178 +0200
@@ -476,6 +476,9 @@ ifdef(`distro_gentoo',`
 ifdef(`distro_suse',`
 	# suse creates a /dev/log under /var/lib/stunnel for chrooted stunnel
 	files_var_lib_filetrans(syslogd_t, devlog_t, sock_file)
+	optional_policy(`
+		unconfined_domain(syslogd_t)
+	')
 ')
 
 ifdef(`distro_ubuntu',`
Index: refpolicy/policy/modules/system/mount.fc
===================================================================
--- refpolicy.orig/policy/modules/system/mount.fc	2012-05-04 15:14:47.000000000 +0200
+++ refpolicy/policy/modules/system/mount.fc	2012-10-22 21:59:12.315453208 +0200
@@ -2,3 +2,9 @@
 /bin/umount.*			--	gen_context(system_u:object_r:mount_exec_t,s0)
 
 /usr/bin/fusermount		--	gen_context(system_u:object_r:mount_exec_t,s0)
+
+ifdef(`distro_suse',`
+/usr/sbin/umount.*              --      gen_context(system_u:object_r:mount_exec_t,s0)
+')
+
+
Index: refpolicy/policy/modules/system/sysnetwork.fc
===================================================================
--- refpolicy.orig/policy/modules/system/sysnetwork.fc	2012-05-04 15:14:47.000000000 +0200
+++ refpolicy/policy/modules/system/sysnetwork.fc	2012-10-22 21:59:12.315453208 +0200
@@ -72,3 +72,8 @@ ifdef(`distro_redhat',`
 ifdef(`distro_gentoo',`
 /var/lib/dhcpc(/.*)?		gen_context(system_u:object_r:dhcpc_state_t,s0)
 ')
+
+ifdef(`distro_suse',`
+/usr/sbin/iwconfig      --      gen_context(system_u:object_r:ifconfig_exec_t,s0)
+')
+
Index: refpolicy/policy/modules/system/sysnetwork.te
===================================================================
--- refpolicy.orig/policy/modules/system/sysnetwork.te	2012-07-25 20:33:04.000000000 +0200
+++ refpolicy/policy/modules/system/sysnetwork.te	2012-10-22 21:59:12.315453208 +0200
@@ -153,6 +153,12 @@ ifdef(`distro_ubuntu',`
 	')
 ')
 
+ifdef(`distro_suse',`
+	optional_policy(`
+		unconfined_domain(dhcpc_t)
+	')
+')
+
 optional_policy(`
 	consoletype_run(dhcpc_t, dhcpc_roles)
 ')
@@ -315,6 +321,11 @@ ifdef(`distro_ubuntu',`
 	optional_policy(`
 		unconfined_domain(ifconfig_t)
 	')
+')
+ifdef(`distro_suse',`
+	optional_policy(`
+		unconfined_domain(ifconfig_t)
+	')
 ')
 
 ifdef(`hide_broken_symptoms',`
Index: refpolicy/policy/modules/system/userdomain.fc
===================================================================
--- refpolicy.orig/policy/modules/system/userdomain.fc	2012-05-04 15:14:47.000000000 +0200
+++ refpolicy/policy/modules/system/userdomain.fc	2012-10-22 21:59:12.315453208 +0200
@@ -1,4 +1,4 @@
 HOME_DIR	-d	gen_context(system_u:object_r:user_home_dir_t,s0-mls_systemhigh)
 HOME_DIR/.+		gen_context(system_u:object_r:user_home_t,s0)
-
+/root(/.*)?		gen_context(system_u:object_r:admin_home_t,s0)
 /tmp/gconfd-USER -d	gen_context(system_u:object_r:user_tmp_t,s0)
Index: refpolicy/policy/modules/system/userdomain.if
===================================================================
--- refpolicy.orig/policy/modules/system/userdomain.if	2012-05-10 15:25:34.000000000 +0200
+++ refpolicy/policy/modules/system/userdomain.if	2012-10-22 21:59:12.316453239 +0200
@@ -3296,3 +3296,198 @@ interface(`userdom_dbus_send_all_users',
 
 	allow $1 userdomain:dbus send_msg;
 ')
+########################################
+## <summary>
+##	dontaudit Search /root
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`userdom_dontaudit_search_admin_dir',`
+	gen_require(`
+		type admin_home_t;
+	')
+
+	dontaudit $1 admin_home_t:dir search_dir_perms;
+')
+
+########################################
+## <summary>
+##	dontaudit Search getatrr /root files
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`userdom_dontaudit_getattr_admin_home_files',`
+	gen_require(`
+		type admin_home_t;
+	')
+
+	dontaudit $1 admin_home_t:file getattr;
+')
+
+########################################
+## <summary>
+##	dontaudit list /root
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`userdom_dontaudit_list_admin_dir',`
+	gen_require(`
+		type admin_home_t;
+	')
+
+	dontaudit $1 admin_home_t:dir list_dir_perms;
+')
+
+########################################
+## <summary>
+##	Allow domain to list /root
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`userdom_list_admin_dir',`
+	gen_require(`
+		type admin_home_t;
+	')
+
+	allow $1 admin_home_t:dir list_dir_perms;
+')
+
+########################################
+## <summary>
+##	Allow Search /root
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`userdom_search_admin_dir',`
+	gen_require(`
+		type admin_home_t;
+	')
+
+	allow $1 admin_home_t:dir search_dir_perms;
+')
+
+########################################
+## <summary>
+##	Add attrinute admin domain
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`userdom_admin',`
+	gen_require(`
+		attribute admin_userdomain;
+	')
+
+	typeattribute $1 admin_userdomain;
+')
+
+########################################
+## <summary>
+##	Read admin home files.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <rolecap/>
+#
+interface(`userdom_read_admin_home_files',`
+	gen_require(`
+		type admin_home_t;
+	')
+
+	read_files_pattern($1, admin_home_t, admin_home_t)
+')
+
+########################################
+## <summary>
+##	Execute admin home files.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <rolecap/>
+#
+interface(`userdom_exec_admin_home_files',`
+	gen_require(`
+		type admin_home_t;
+	')
+
+	exec_files_pattern($1, admin_home_t, admin_home_t)
+')
+
+########################################
+## <summary>
+##	Create objects in the /root directory
+##	with an automatic type transition to
+##	a specified private type.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+## <param name="private_type">
+##	<summary>
+##	The type of the object to create.
+##	</summary>
+## </param>
+## <param name="object_class">
+##	<summary>
+##	The class of the object to be created.
+##	</summary>
+## </param>
+#
+interface(`userdom_admin_home_dir_filetrans',`
+	gen_require(`
+		type admin_home_t;
+	')
+
+	filetrans_pattern($1, admin_home_t, $2, $3)
+')
+
+########################################
+## <summary>
+##	Append files inherited
+##	in the /root directory.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`userdom_inherit_append_admin_home_files',`
+	gen_require(`
+		type admin_home_t;
+	')
+
+	allow $1 admin_home_t:file { getattr append };
+')
+
Index: refpolicy/policy/modules/system/userdomain.te
===================================================================
--- refpolicy.orig/policy/modules/system/userdomain.te	2012-07-25 20:33:04.000000000 +0200
+++ refpolicy/policy/modules/system/userdomain.te	2012-10-22 21:59:12.316453239 +0200
@@ -94,3 +94,10 @@ userdom_user_home_content(user_tmpfs_t)
 type user_tty_device_t alias { staff_tty_device_t sysadm_tty_device_t secadm_tty_device_t auditadm_tty_device_t unconfined_tty_device_t };
 dev_node(user_tty_device_t)
 ubac_constrained(user_tty_device_t)
+
+# admin domain
+type admin_home_t;
+files_type(admin_home_t)
+files_associate_tmp(admin_home_t)
+fs_associate_tmpfs(admin_home_t)
+files_mountpoint(admin_home_t)
openSUSE Build Service is sponsored by