The inetd daemon is PAM-aware and, given pam_limits, is able to set resource
limits.
This patch grants it the sys_resource privilege as well as setrlimit.
Signed-off-by: Sven Vermeulen <[email protected]>
---
inetd.te | 4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/inetd.te b/inetd.te
index 6e82c4c..e341ab6 100644
--- a/inetd.te
+++ b/inetd.te
@@ -38,9 +38,9 @@ ifdef(`enable_mcs',`
# Local policy
#
-allow inetd_t self:capability { setuid setgid };
+allow inetd_t self:capability { setuid setgid sys_resource };
dontaudit inetd_t self:capability sys_tty_config;
-allow inetd_t self:process { setsched setexec };
+allow inetd_t self:process { setsched setexec setrlimit };
allow inetd_t self:fifo_file rw_fifo_file_perms;
allow inetd_t self:tcp_socket create_stream_socket_perms;
allow inetd_t self:udp_socket create_socket_perms;
--
1.7.3.4
On 11/15/11 04:53, Sven Vermeulen wrote:
> The inetd daemon is PAM-aware and, given pam_limits, is able to set resource
> limits.
>
> This patch grants it the sys_resource privilege as well as setrlimit.
Merged.
> Signed-off-by: Sven Vermeulen <[email protected]>
> ---
> inetd.te | 4 ++--
> 1 files changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/inetd.te b/inetd.te
> index 6e82c4c..e341ab6 100644
> --- a/inetd.te
> +++ b/inetd.te
> @@ -38,9 +38,9 @@ ifdef(`enable_mcs',`
> # Local policy
> #
>
> -allow inetd_t self:capability { setuid setgid };
> +allow inetd_t self:capability { setuid setgid sys_resource };
> dontaudit inetd_t self:capability sys_tty_config;
> -allow inetd_t self:process { setsched setexec };
> +allow inetd_t self:process { setsched setexec setrlimit };
> allow inetd_t self:fifo_file rw_fifo_file_perms;
> allow inetd_t self:tcp_socket create_stream_socket_perms;
> allow inetd_t self:udp_socket create_socket_perms;
--
Chris PeBenito
Tresys Technology, LLC
http://www.tresys.com | oss.tresys.com