summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy/0032-policy-modules-system-logging-fix-auditd-startup-fai.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0032-policy-modules-system-logging-fix-auditd-startup-fai.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy/0032-policy-modules-system-logging-fix-auditd-startup-fai.patch41
1 files changed, 41 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0032-policy-modules-system-logging-fix-auditd-startup-fai.patch b/recipes-security/refpolicy/refpolicy/0032-policy-modules-system-logging-fix-auditd-startup-fai.patch
new file mode 100644
index 0000000..3f10d06
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0032-policy-modules-system-logging-fix-auditd-startup-fai.patch
@@ -0,0 +1,41 @@
1From a196ae5e13b3f8e0d2e7ff27c8d481c9376b18e9 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH] policy/modules/system/logging: fix auditd startup failures
5
6Fixes:
7avc: denied { read } for pid=321 comm="auditd" name="log" dev="vda"
8ino=12552 scontext=system_u:system_r:auditd_t
9tcontext=system_u:object_r:var_log_t tclass=lnk_file permissive=0
10
11Upstream-Status: Inappropriate [embedded specific]
12
13Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
15---
16 policy/modules/system/logging.te | 2 ++
17 1 file changed, 2 insertions(+)
18
19diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
20index abee7df9c..cc530a2be 100644
21--- a/policy/modules/system/logging.te
22+++ b/policy/modules/system/logging.te
23@@ -161,6 +161,7 @@ dontaudit auditd_t auditd_etc_t:file map;
24 manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t)
25 allow auditd_t auditd_log_t:dir setattr;
26 manage_lnk_files_pattern(auditd_t, auditd_log_t, auditd_log_t)
27+allow auditd_t var_log_t:lnk_file read_lnk_file_perms;
28 allow auditd_t var_log_t:dir search_dir_perms;
29
30 manage_files_pattern(auditd_t, auditd_runtime_t, auditd_runtime_t)
31@@ -290,6 +291,7 @@ optional_policy(`
32 allow audisp_remote_t self:capability { setpcap setuid };
33 allow audisp_remote_t self:process { getcap setcap };
34 allow audisp_remote_t self:tcp_socket create_socket_perms;
35+allow audisp_remote_t var_log_t:lnk_file read_lnk_file_perms;
36 allow audisp_remote_t var_log_t:dir search_dir_perms;
37
38 manage_dirs_pattern(audisp_remote_t, audit_spool_t, audit_spool_t)
39--
402.17.1
41