diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch | 29 |
1 files changed, 0 insertions, 29 deletions
diff --git a/recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch b/recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch deleted file mode 100644 index 7c7355f..0000000 --- a/recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch +++ /dev/null | |||
@@ -1,29 +0,0 @@ | |||
1 | Subject: [PATCH] add rules for the symlink of /var/log - audisp_remote_t | ||
2 | |||
3 | We have added rules for the symlink of /var/log in logging.if, | ||
4 | while audisp_remote_t uses /var/log but does not use the | ||
5 | interfaces in logging.if. So still need add a individual rule for | ||
6 | audisp_remote_t. | ||
7 | |||
8 | Upstream-Status: Inappropriate [only for Poky] | ||
9 | |||
10 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | ||
11 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
12 | --- | ||
13 | policy/modules/system/logging.te | 1 + | ||
14 | 1 file changed, 1 insertion(+) | ||
15 | |||
16 | --- a/policy/modules/system/logging.te | ||
17 | +++ b/policy/modules/system/logging.te | ||
18 | @@ -280,10 +280,11 @@ optional_policy(` | ||
19 | |||
20 | allow audisp_remote_t self:capability { setpcap setuid }; | ||
21 | allow audisp_remote_t self:process { getcap setcap }; | ||
22 | allow audisp_remote_t self:tcp_socket create_socket_perms; | ||
23 | allow audisp_remote_t var_log_t:dir search_dir_perms; | ||
24 | +allow audisp_remote_t var_log_t:lnk_file read_lnk_file_perms; | ||
25 | |||
26 | manage_dirs_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) | ||
27 | manage_files_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) | ||
28 | files_spool_filetrans(audisp_remote_t, audit_spool_t, { dir file }) | ||
29 | |||