Merge pull request #779 from yizhao1/fixes
Fixes for dhcpcd and newrole
This commit is contained in:
commit
d53aa53110
|
@ -845,6 +845,24 @@ interface(`auth_rw_shadow_lock',`
|
||||||
rw_files_pattern($1, shadow_lock_t, shadow_lock_t)
|
rw_files_pattern($1, shadow_lock_t, shadow_lock_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Search faillock directory (/run/faillock).
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`auth_search_faillog',`
|
||||||
|
gen_require(`
|
||||||
|
type faillog_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 faillog_t:dir search_dir_perms;
|
||||||
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Append to the login failure log.
|
## Append to the login failure log.
|
||||||
|
|
|
@ -294,6 +294,7 @@ auth_use_nsswitch(newrole_t)
|
||||||
auth_run_chk_passwd(newrole_t, newrole_roles)
|
auth_run_chk_passwd(newrole_t, newrole_roles)
|
||||||
auth_run_upd_passwd(newrole_t, newrole_roles)
|
auth_run_upd_passwd(newrole_t, newrole_roles)
|
||||||
auth_rw_faillog(newrole_t)
|
auth_rw_faillog(newrole_t)
|
||||||
|
auth_search_faillog(newrole_t)
|
||||||
|
|
||||||
# Write to utmp.
|
# Write to utmp.
|
||||||
init_rw_utmp(newrole_t)
|
init_rw_utmp(newrole_t)
|
||||||
|
|
|
@ -73,6 +73,7 @@ allow dhcpc_t self:tcp_socket create_stream_socket_perms;
|
||||||
allow dhcpc_t self:udp_socket create_socket_perms;
|
allow dhcpc_t self:udp_socket create_socket_perms;
|
||||||
allow dhcpc_t self:packet_socket create_socket_perms;
|
allow dhcpc_t self:packet_socket create_socket_perms;
|
||||||
allow dhcpc_t self:netlink_generic_socket create_socket_perms;
|
allow dhcpc_t self:netlink_generic_socket create_socket_perms;
|
||||||
|
allow dhcpc_t self:netlink_kobject_uevent_socket create_socket_perms;
|
||||||
allow dhcpc_t self:netlink_route_socket create_netlink_socket_perms;
|
allow dhcpc_t self:netlink_route_socket create_netlink_socket_perms;
|
||||||
allow dhcpc_t self:rawip_socket create_socket_perms;
|
allow dhcpc_t self:rawip_socket create_socket_perms;
|
||||||
allow dhcpc_t self:unix_dgram_socket { create_socket_perms sendto };
|
allow dhcpc_t self:unix_dgram_socket { create_socket_perms sendto };
|
||||||
|
@ -266,6 +267,10 @@ optional_policy(`
|
||||||
seutil_dontaudit_search_config(dhcpc_t)
|
seutil_dontaudit_search_config(dhcpc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
udev_read_runtime_files(dhcpc_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
userdom_use_all_users_fds(dhcpc_t)
|
userdom_use_all_users_fds(dhcpc_t)
|
||||||
')
|
')
|
||||||
|
|
Loading…
Reference in New Issue