diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0035-policy-modules-system-systemd-enable-support-for-sys.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0035-policy-modules-system-systemd-enable-support-for-sys.patch | 64 |
1 files changed, 0 insertions, 64 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0035-policy-modules-system-systemd-enable-support-for-sys.patch b/recipes-security/refpolicy/refpolicy/0035-policy-modules-system-systemd-enable-support-for-sys.patch deleted file mode 100644 index 43b2f4d..0000000 --- a/recipes-security/refpolicy/refpolicy/0035-policy-modules-system-systemd-enable-support-for-sys.patch +++ /dev/null | |||
@@ -1,64 +0,0 @@ | |||
1 | From 6465e39b6dfe8daa88cab321e3cf44ccc9f1441d Mon Sep 17 00:00:00 2001 | ||
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | ||
3 | Date: Thu, 4 Feb 2016 06:03:19 -0500 | ||
4 | Subject: [PATCH] policy/modules/system/systemd: enable support for | ||
5 | systemd-tmpfiles to manage all non-security files | ||
6 | |||
7 | Fixes: | ||
8 | systemd-tmpfiles[137]: Failed to create directory or subvolume "/var/volatile/log": Permission denied | ||
9 | systemd-tmpfiles[137]: Failed to create directory or subvolume "/var/volatile/tmp": Permission denied | ||
10 | systemd-tmpfiles[137]: Failed to create directory or subvolume "/var/log/audit": Permission denied | ||
11 | |||
12 | avc: denied { write } for pid=137 comm="systemd-tmpfile" name="/" | ||
13 | dev="tmpfs" ino=12400 scontext=system_u:system_r:systemd_tmpfiles_t | ||
14 | tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 | ||
15 | |||
16 | avc: denied { read } for pid=137 comm="systemd-tmpfile" name="dbus" | ||
17 | dev="vda" ino=12363 scontext=system_u:system_r:systemd_tmpfiles_t | ||
18 | tcontext=system_u:object_r:system_dbusd_var_lib_t tclass=dir | ||
19 | permissive=0 | ||
20 | |||
21 | avc: denied { relabelfrom } for pid=137 comm="systemd-tmpfile" | ||
22 | name="log" dev="vda" ino=14129 | ||
23 | scontext=system_u:system_r:systemd_tmpfiles_t | ||
24 | tcontext=system_u:object_r:var_log_t tclass=lnk_file permissive=0 | ||
25 | |||
26 | avc: denied { create } for pid=137 comm="systemd-tmpfile" | ||
27 | name="audit" scontext=system_u:system_r:systemd_tmpfiles_t | ||
28 | tcontext=system_u:object_r:auditd_log_t tclass=dir permissive=0 | ||
29 | |||
30 | Upstream-Status: Inappropriate [embedded specific] | ||
31 | |||
32 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | ||
33 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
34 | --- | ||
35 | policy/modules/system/systemd.te | 6 +++++- | ||
36 | 1 file changed, 5 insertions(+), 1 deletion(-) | ||
37 | |||
38 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | ||
39 | index ef25974ac..362248d17 100644 | ||
40 | --- a/policy/modules/system/systemd.te | ||
41 | +++ b/policy/modules/system/systemd.te | ||
42 | @@ -10,7 +10,7 @@ policy_module(systemd) | ||
43 | ## Enable support for systemd-tmpfiles to manage all non-security files. | ||
44 | ## </p> | ||
45 | ## </desc> | ||
46 | -gen_tunable(systemd_tmpfiles_manage_all, false) | ||
47 | +gen_tunable(systemd_tmpfiles_manage_all, true) | ||
48 | |||
49 | ## <desc> | ||
50 | ## <p> | ||
51 | @@ -1640,6 +1640,10 @@ files_relabelfrom_home(systemd_tmpfiles_t) | ||
52 | files_relabelto_home(systemd_tmpfiles_t) | ||
53 | files_relabelto_etc_dirs(systemd_tmpfiles_t) | ||
54 | files_setattr_lock_dirs(systemd_tmpfiles_t) | ||
55 | + | ||
56 | +files_manage_non_auth_files(systemd_tmpfiles_t) | ||
57 | +files_relabel_non_auth_files(systemd_tmpfiles_t) | ||
58 | + | ||
59 | # for /etc/mtab | ||
60 | files_manage_etc_symlinks(systemd_tmpfiles_t) | ||
61 | |||
62 | -- | ||
63 | 2.25.1 | ||
64 | |||