1 |
commit: 66e018165d78d4128923e5211b7d63137ac121e6 |
2 |
Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
3 |
AuthorDate: Wed Jul 1 17:11:05 2015 +0000 |
4 |
Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org> |
5 |
CommitDate: Wed Jul 1 17:11:05 2015 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=66e01816 |
7 |
|
8 |
Recent salt-minion require setsched/getsched and sys_nice, otherwise process just stalls and cannot be connected to by the master |
9 |
|
10 |
policy/modules/contrib/salt.te | 4 ++-- |
11 |
1 file changed, 2 insertions(+), 2 deletions(-) |
12 |
|
13 |
diff --git a/policy/modules/contrib/salt.te b/policy/modules/contrib/salt.te |
14 |
index 554e927..89995ce 100644 |
15 |
--- a/policy/modules/contrib/salt.te |
16 |
+++ b/policy/modules/contrib/salt.te |
17 |
@@ -207,9 +207,9 @@ tunable_policy(`salt_master_read_nfs',` |
18 |
# salt_minion_t policy |
19 |
# |
20 |
|
21 |
-allow salt_minion_t self:capability { fsetid chown dac_override dac_read_search net_admin setgid setuid sys_admin sys_tty_config }; |
22 |
+allow salt_minion_t self:capability { fsetid chown dac_override dac_read_search net_admin setgid setuid sys_admin sys_nice sys_tty_config }; |
23 |
allow salt_minion_t self:capability2 block_suspend; |
24 |
-allow salt_minion_t self:process { signal signull }; |
25 |
+allow salt_minion_t self:process { getsched setsched signal signull }; |
26 |
allow salt_minion_t self:tcp_socket create_stream_socket_perms; |
27 |
allow salt_minion_t self:udp_socket create_socket_perms; |
28 |
allow salt_minion_t self:unix_dgram_socket create_socket_perms; |