From b9ea0fed0fe44856620f6f52b370f90b6cc7b26a Mon Sep 17 00:00:00 2001 From: Chris PeBenito Date: Nov 01 2005 19:52:37 +0000 Subject: clean up last var_run_domain expansion errors --- diff --git a/refpolicy/policy/modules/services/portmap.te b/refpolicy/policy/modules/services/portmap.te index 80e2b5a..c9dcd28 100644 --- a/refpolicy/policy/modules/services/portmap.te +++ b/refpolicy/policy/modules/services/portmap.te @@ -39,6 +39,7 @@ allow portmap_t portmap_tmp_t:file create_file_perms; files_create_tmp_files(portmap_t, portmap_tmp_t, { file dir }) allow portmap_t portmap_var_run_t:file create_file_perms; +allow portmap_t portmap_var_run_t:dir rw_dir_perms; files_create_pid(portmap_t,portmap_var_run_t) kernel_read_kernel_sysctl(portmap_t) diff --git a/refpolicy/policy/modules/services/rlogin.te b/refpolicy/policy/modules/services/rlogin.te index ab2d4e9..17d8e1e 100644 --- a/refpolicy/policy/modules/services/rlogin.te +++ b/refpolicy/policy/modules/services/rlogin.te @@ -44,6 +44,7 @@ allow rlogind_t rlogind_tmp_t:file create_file_perms; files_create_tmp_files(rlogind_t, rlogind_tmp_t, { file dir }) allow rlogind_t rlogind_var_run_t:file create_file_perms; +allow rlogind_t rlogind_var_run_t:dir rw_dir_perms; files_create_pid(rlogind_t,rlogind_var_run_t) kernel_read_kernel_sysctl(rlogind_t) diff --git a/refpolicy/policy/modules/services/rsync.te b/refpolicy/policy/modules/services/rsync.te index 514a3df..8c2719e 100644 --- a/refpolicy/policy/modules/services/rsync.te +++ b/refpolicy/policy/modules/services/rsync.te @@ -48,6 +48,7 @@ allow rsync_t rsync_tmp_t:file create_file_perms; files_create_tmp_files(rsync_t, rsync_tmp_t, { file dir }) allow rsync_t rsync_var_run_t:file create_file_perms; +allow rsync_t rsync_var_run_t:dir rw_dir_perms; files_create_pid(rsync_t,rsync_var_run_t) kernel_read_kernel_sysctl(rsync_t) diff --git a/refpolicy/policy/modules/system/logging.te b/refpolicy/policy/modules/system/logging.te index e7869a5..77e6b6e 100644 --- a/refpolicy/policy/modules/system/logging.te +++ b/refpolicy/policy/modules/system/logging.te @@ -279,6 +279,7 @@ files_create_pid(syslogd_t,syslogd_var_run_t,file) # manage pid file allow syslogd_t syslogd_var_run_t:file create_file_perms; +allow syslogd_t syslogd_var_run_t:dir rw_dir_perms; files_create_pid(syslogd_t,syslogd_var_run_t) kernel_read_kernel_sysctl(syslogd_t)