forked from pool/selinux-policy
cf699a6f0f
- New patches: * fix_accountsd.patch * fix_automount.patch * fix_colord.patch * fix_mcelog.patch * fix_sslh.patch * fix_nagios.patch * fix_openvpn.patch * fix_cron.patch * fix_usermanage.patch * fix_smartmon.patch * fix_geoclue.patch * suse_specific.patch Default systems should now work without selinuxuser_execmod - Removed xdm_entrypoint_pam.patch, necessary change is in fix_unconfineduser.patch - Enable SUSE specific settings again OBS-URL: https://build.opensuse.org/request/show/785956 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=75
19 lines
945 B
Diff
19 lines
945 B
Diff
Index: fedora-policy/policy/modules/contrib/irqbalance.te
|
|
===================================================================
|
|
--- fedora-policy.orig/policy/modules/contrib/irqbalance.te
|
|
+++ fedora-policy/policy/modules/contrib/irqbalance.te
|
|
@@ -25,8 +25,12 @@ dontaudit irqbalance_t self:capability s
|
|
allow irqbalance_t self:process { getcap getsched setcap signal_perms };
|
|
allow irqbalance_t self:udp_socket create_socket_perms;
|
|
|
|
+manage_dirs_pattern(irqbalance_t, irqbalance_var_run_t, irqbalance_var_run_t)
|
|
manage_files_pattern(irqbalance_t, irqbalance_var_run_t, irqbalance_var_run_t)
|
|
-files_pid_filetrans(irqbalance_t, irqbalance_var_run_t, file)
|
|
+manage_sock_files_pattern(irqbalance_t, irqbalance_var_run_t, irqbalance_var_run_t)
|
|
+files_pid_filetrans(irqbalance_t, irqbalance_var_run_t, { dir file sock_file })
|
|
+
|
|
+init_nnp_daemon_domain(irqbalance_t)
|
|
|
|
kernel_read_network_state(irqbalance_t)
|
|
kernel_read_system_state(irqbalance_t)
|