1 |
commit: 9aaa2422ee9903dab8bd049c7cbc7f17850cd66d |
2 |
Author: cgzones <cgzones <AT> googlemail <DOT> com> |
3 |
AuthorDate: Thu Jan 5 10:32:17 2017 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Mon Feb 27 10:38:00 2017 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=9aaa2422 |
7 |
|
8 |
newrole: fix denials |
9 |
|
10 |
dontaudit net_admin access due to setsockopt |
11 |
allow communication with systemd-logind |
12 |
|
13 |
policy/modules/system/selinuxutil.te | 6 ++++++ |
14 |
1 file changed, 6 insertions(+) |
15 |
|
16 |
diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te |
17 |
index bc57e4a7..5f624126 100644 |
18 |
--- a/policy/modules/system/selinuxutil.te |
19 |
+++ b/policy/modules/system/selinuxutil.te |
20 |
@@ -221,6 +221,7 @@ optional_policy(` |
21 |
# Newrole local policy |
22 |
# |
23 |
|
24 |
+dontaudit newrole_t self:capability net_admin; |
25 |
allow newrole_t self:capability { dac_override fowner setgid setuid }; |
26 |
allow newrole_t self:process setexec; |
27 |
allow newrole_t self:fd use; |
28 |
@@ -282,6 +283,7 @@ auth_use_nsswitch(newrole_t) |
29 |
auth_run_chk_passwd(newrole_t, newrole_roles) |
30 |
auth_run_upd_passwd(newrole_t, newrole_roles) |
31 |
auth_rw_faillog(newrole_t) |
32 |
+auth_use_pam_systemd(newrole_t) |
33 |
|
34 |
# Write to utmp. |
35 |
init_rw_utmp(newrole_t) |
36 |
@@ -330,6 +332,10 @@ tunable_policy(`allow_polyinstantiation',` |
37 |
files_polyinstantiate_all(newrole_t) |
38 |
') |
39 |
|
40 |
+optional_policy(` |
41 |
+ systemd_use_logind_fds(newrole_t) |
42 |
+') |
43 |
+ |
44 |
######################################## |
45 |
# |
46 |
# Restorecond local policy |