diff --git a/policy-f23-base.patch b/policy-f23-base.patch index f5bac9c..a8080ef 100644 --- a/policy-f23-base.patch +++ b/policy-f23-base.patch @@ -37078,7 +37078,7 @@ index b50c5fe..5c39fe5 100644 +/var/webmin(/.*)? gen_context(system_u:object_r:var_log_t,s0) + diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if -index 4e94884..c665768 100644 +index 4e94884..4c9d4f5 100644 --- a/policy/modules/system/logging.if +++ b/policy/modules/system/logging.if @@ -233,7 +233,7 @@ interface(`logging_run_auditd',` @@ -37538,7 +37538,7 @@ index 4e94884..c665768 100644 + + systemd_exec_systemctl($1) + allow $1 syslogd_unit_file_t:file read_file_perms; -+ allow $1 syslog_unit_file_t:service manage_service_perms; ++ allow $1 syslogd_unit_file_t:service manage_service_perms; + + ps_process_pattern($1, syslogd_t) ') diff --git a/policy-f23-contrib.patch b/policy-f23-contrib.patch index 74c4687..b810611 100644 --- a/policy-f23-contrib.patch +++ b/policy-f23-contrib.patch @@ -13294,7 +13294,7 @@ index 32e8265..c5a2913 100644 + allow $1 chronyd_unit_file_t:service all_service_perms; ') diff --git a/chronyd.te b/chronyd.te -index e5b621c..74e168f 100644 +index e5b621c..bc73da9 100644 --- a/chronyd.te +++ b/chronyd.te @@ -18,6 +18,9 @@ files_type(chronyd_keys_t) @@ -13325,7 +13325,7 @@ index e5b621c..74e168f 100644 allow chronyd_t chronyd_keys_t:file read_file_perms; manage_dirs_pattern(chronyd_t, chronyd_tmpfs_t, chronyd_tmpfs_t) -@@ -76,18 +83,41 @@ corenet_sendrecv_chronyd_server_packets(chronyd_t) +@@ -76,18 +83,42 @@ corenet_sendrecv_chronyd_server_packets(chronyd_t) corenet_udp_bind_chronyd_port(chronyd_t) corenet_udp_sendrecv_chronyd_port(chronyd_t) @@ -13354,6 +13354,7 @@ index e5b621c..74e168f 100644 + +optional_policy(` + dbus_system_bus_client(chronyd_t) ++') optional_policy(` gpsd_rw_shm(chronyd_t)