Skip to content

Commit

Permalink
Merge pull request #779 from yizhao1/fixes
Browse files Browse the repository at this point in the history
Fixes for dhcpcd and newrole
  • Loading branch information
pebenito authored Jun 4, 2024
2 parents 50a1ee7 + 10feb47 commit d53aa53
Show file tree
Hide file tree
Showing 3 changed files with 24 additions and 0 deletions.
18 changes: 18 additions & 0 deletions policy/modules/system/authlogin.if
Original file line number Diff line number Diff line change
Expand Up @@ -845,6 +845,24 @@ interface(`auth_rw_shadow_lock',`
rw_files_pattern($1, shadow_lock_t, shadow_lock_t)
')

########################################
## <summary>
## Search faillock directory (/run/faillock).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`auth_search_faillog',`
gen_require(`
type faillog_t;
')

allow $1 faillog_t:dir search_dir_perms;
')

#######################################
## <summary>
## Append to the login failure log.
Expand Down
1 change: 1 addition & 0 deletions policy/modules/system/selinuxutil.te
Original file line number Diff line number Diff line change
Expand Up @@ -294,6 +294,7 @@ auth_use_nsswitch(newrole_t)
auth_run_chk_passwd(newrole_t, newrole_roles)
auth_run_upd_passwd(newrole_t, newrole_roles)
auth_rw_faillog(newrole_t)
auth_search_faillog(newrole_t)

# Write to utmp.
init_rw_utmp(newrole_t)
Expand Down
5 changes: 5 additions & 0 deletions policy/modules/system/sysnetwork.te
Original file line number Diff line number Diff line change
Expand Up @@ -73,6 +73,7 @@ allow dhcpc_t self:tcp_socket create_stream_socket_perms;
allow dhcpc_t self:udp_socket create_socket_perms;
allow dhcpc_t self:packet_socket create_socket_perms;
allow dhcpc_t self:netlink_generic_socket create_socket_perms;
allow dhcpc_t self:netlink_kobject_uevent_socket create_socket_perms;
allow dhcpc_t self:netlink_route_socket create_netlink_socket_perms;
allow dhcpc_t self:rawip_socket create_socket_perms;
allow dhcpc_t self:unix_dgram_socket { create_socket_perms sendto };
Expand Down Expand Up @@ -266,6 +267,10 @@ optional_policy(`
seutil_dontaudit_search_config(dhcpc_t)
')

optional_policy(`
udev_read_runtime_files(dhcpc_t)
')

optional_policy(`
userdom_use_all_users_fds(dhcpc_t)
')
Expand Down

0 comments on commit d53aa53

Please sign in to comment.