diff --git a/policy/modules/contrib/lldpad.te b/policy/modules/contrib/lldpad.te index a59c715c9e..d5b2cbe6ed 100644 --- a/policy/modules/contrib/lldpad.te +++ b/policy/modules/contrib/lldpad.te @@ -88,11 +88,16 @@ optional_policy(` snmp_stream_connect(lldpad_t) ') +optional_policy(` + sysadm_dgram_send(lldpad_t) +') + optional_policy(` sysnet_read_config(lldpad_t) ') optional_policy(` + systemd_machined_stream_connect(lldpad_t) systemd_userdbd_stream_connect(lldpad_t) ') diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te index fb64880eb1..762b4e84c6 100644 --- a/policy/modules/roles/staff.te +++ b/policy/modules/roles/staff.te @@ -208,6 +208,10 @@ optional_policy(` iotop_run(staff_t, staff_r) ') +optional_policy(` + lldpad_dgram_send(staff_t) +') + optional_policy(` logadm_role_change(staff_r) ') diff --git a/policy/modules/roles/sysadm.if b/policy/modules/roles/sysadm.if index 36740eab39..24970ea227 100644 --- a/policy/modules/roles/sysadm.if +++ b/policy/modules/roles/sysadm.if @@ -253,3 +253,21 @@ interface(`sysadm_rw_pipes',` allow $1 sysadm_t:fifo_file rw_fifo_file_perms; ') + +######################################## +## +## Send a message to sysadm user over a datagram socket. +## +## +## +## Domain allowed access. +## +## +# +interface(`sysadm_dgram_send',` + gen_require(` + type sysadm_t; + ') + + allow $1 sysadm_t:unix_dgram_socket sendto; +') diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te index f7afd1be4c..29b6d361c7 100644 --- a/policy/modules/roles/sysadm.te +++ b/policy/modules/roles/sysadm.te @@ -379,6 +379,10 @@ optional_policy(` libs_run_ldconfig(sysadm_t, sysadm_r) ') +optional_policy(` + lldpad_dgram_send(sysadm_t) +') + optional_policy(` logrotate_run(sysadm_t, sysadm_r) ') diff --git a/policy/modules/roles/unprivuser.te b/policy/modules/roles/unprivuser.te index ffed3193ea..3ae83d6490 100644 --- a/policy/modules/roles/unprivuser.te +++ b/policy/modules/roles/unprivuser.te @@ -95,6 +95,10 @@ optional_policy(` irc_role(user_r, user_t) ') +optional_policy(` + lldpad_dgram_send(user_t) +') + optional_policy(` oident_manage_user_content(user_t) oident_relabel_user_content(user_t)