commit: 66e018165d78d4128923e5211b7d63137ac121e6 Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> AuthorDate: Wed Jul 1 17:11:05 2015 +0000 Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org> CommitDate: Wed Jul 1 17:11:05 2015 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=66e01816
Recent salt-minion require setsched/getsched and sys_nice, otherwise process just stalls and cannot be connected to by the master policy/modules/contrib/salt.te | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/policy/modules/contrib/salt.te b/policy/modules/contrib/salt.te index 554e927..89995ce 100644 --- a/policy/modules/contrib/salt.te +++ b/policy/modules/contrib/salt.te @@ -207,9 +207,9 @@ tunable_policy(`salt_master_read_nfs',` # salt_minion_t policy # -allow salt_minion_t self:capability { fsetid chown dac_override dac_read_search net_admin setgid setuid sys_admin sys_tty_config }; +allow salt_minion_t self:capability { fsetid chown dac_override dac_read_search net_admin setgid setuid sys_admin sys_nice sys_tty_config }; allow salt_minion_t self:capability2 block_suspend; -allow salt_minion_t self:process { signal signull }; +allow salt_minion_t self:process { getsched setsched signal signull }; allow salt_minion_t self:tcp_socket create_stream_socket_perms; allow salt_minion_t self:udp_socket create_socket_perms; allow salt_minion_t self:unix_dgram_socket create_socket_perms;