Merge pull request #779 from yizhao1/fixes

Fixes for dhcpcd and newrole
This commit is contained in:
Chris PeBenito 2024-06-04 10:05:54 -04:00 committed by GitHub
commit d53aa53110
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
3 changed files with 24 additions and 0 deletions

View File

@ -845,6 +845,24 @@ interface(`auth_rw_shadow_lock',`
rw_files_pattern($1, shadow_lock_t, shadow_lock_t) rw_files_pattern($1, shadow_lock_t, shadow_lock_t)
') ')
########################################
## <summary>
## Search faillock directory (/run/faillock).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`auth_search_faillog',`
gen_require(`
type faillog_t;
')
allow $1 faillog_t:dir search_dir_perms;
')
####################################### #######################################
## <summary> ## <summary>
## Append to the login failure log. ## Append to the login failure log.

View File

@ -294,6 +294,7 @@ auth_use_nsswitch(newrole_t)
auth_run_chk_passwd(newrole_t, newrole_roles) auth_run_chk_passwd(newrole_t, newrole_roles)
auth_run_upd_passwd(newrole_t, newrole_roles) auth_run_upd_passwd(newrole_t, newrole_roles)
auth_rw_faillog(newrole_t) auth_rw_faillog(newrole_t)
auth_search_faillog(newrole_t)
# Write to utmp. # Write to utmp.
init_rw_utmp(newrole_t) init_rw_utmp(newrole_t)

View File

@ -73,6 +73,7 @@ allow dhcpc_t self:tcp_socket create_stream_socket_perms;
allow dhcpc_t self:udp_socket create_socket_perms; allow dhcpc_t self:udp_socket create_socket_perms;
allow dhcpc_t self:packet_socket create_socket_perms; allow dhcpc_t self:packet_socket create_socket_perms;
allow dhcpc_t self:netlink_generic_socket create_socket_perms; allow dhcpc_t self:netlink_generic_socket create_socket_perms;
allow dhcpc_t self:netlink_kobject_uevent_socket create_socket_perms;
allow dhcpc_t self:netlink_route_socket create_netlink_socket_perms; allow dhcpc_t self:netlink_route_socket create_netlink_socket_perms;
allow dhcpc_t self:rawip_socket create_socket_perms; allow dhcpc_t self:rawip_socket create_socket_perms;
allow dhcpc_t self:unix_dgram_socket { create_socket_perms sendto }; allow dhcpc_t self:unix_dgram_socket { create_socket_perms sendto };
@ -266,6 +267,10 @@ optional_policy(`
seutil_dontaudit_search_config(dhcpc_t) seutil_dontaudit_search_config(dhcpc_t)
') ')
optional_policy(`
udev_read_runtime_files(dhcpc_t)
')
optional_policy(` optional_policy(`
userdom_use_all_users_fds(dhcpc_t) userdom_use_all_users_fds(dhcpc_t)
') ')