summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy/0044-policy-modules-services-rngd-fix-security-context-fo.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0044-policy-modules-services-rngd-fix-security-context-fo.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy/0044-policy-modules-services-rngd-fix-security-context-fo.patch65
1 files changed, 0 insertions, 65 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0044-policy-modules-services-rngd-fix-security-context-fo.patch b/recipes-security/refpolicy/refpolicy/0044-policy-modules-services-rngd-fix-security-context-fo.patch
deleted file mode 100644
index 7bd1402..0000000
--- a/recipes-security/refpolicy/refpolicy/0044-policy-modules-services-rngd-fix-security-context-fo.patch
+++ /dev/null
@@ -1,65 +0,0 @@
1From 5dbfff582a9c7745f8517adefb27c5f90653f8fa Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Wed, 25 May 2016 03:16:24 -0400
4Subject: [PATCH] policy/modules/services/rngd: fix security context for
5 rng-tools
6
7* Fix security context for /etc/init.d/rng-tools
8* Allow rngd_t to read sysfs
9
10Fixes:
11avc: denied { read } for pid=355 comm="rngd" name="cpu" dev="sysfs"
12ino=36 scontext=system_u:system_r:rngd_t
13tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1
14
15avc: denied { getsched } for pid=355 comm="rngd"
16scontext=system_u:system_r:rngd_t tcontext=system_u:system_r:rngd_t
17tclass=process permissive=1
18
19avc: denied { setsched } for pid=355 comm="rngd"
20scontext=system_u:system_r:rngd_t tcontext=system_u:system_r:rngd_t
21tclass=process permissive=1
22
23Upstream-Status: Inappropriate [embedded specific]
24
25Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
26Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
27---
28 policy/modules/services/rngd.fc | 1 +
29 policy/modules/services/rngd.te | 3 ++-
30 2 files changed, 3 insertions(+), 1 deletion(-)
31
32diff --git a/policy/modules/services/rngd.fc b/policy/modules/services/rngd.fc
33index 382c067f9..0ecc5acc4 100644
34--- a/policy/modules/services/rngd.fc
35+++ b/policy/modules/services/rngd.fc
36@@ -1,4 +1,5 @@
37 /etc/rc\.d/init\.d/rngd -- gen_context(system_u:object_r:rngd_initrc_exec_t,s0)
38+/etc/rc\.d/init\.d/rng-tools -- gen_context(system_u:object_r:rngd_initrc_exec_t,s0)
39
40 /usr/bin/rngd -- gen_context(system_u:object_r:rngd_exec_t,s0)
41
42diff --git a/policy/modules/services/rngd.te b/policy/modules/services/rngd.te
43index 4540e4ec7..48f08fb48 100644
44--- a/policy/modules/services/rngd.te
45+++ b/policy/modules/services/rngd.te
46@@ -21,7 +21,7 @@ files_runtime_file(rngd_runtime_t)
47 #
48
49 allow rngd_t self:capability { ipc_lock sys_admin };
50-allow rngd_t self:process signal;
51+allow rngd_t self:process { signal getsched setsched };
52 allow rngd_t self:fifo_file rw_fifo_file_perms;
53 allow rngd_t self:unix_stream_socket { accept listen };
54
55@@ -34,6 +34,7 @@ dev_read_rand(rngd_t)
56 dev_read_urand(rngd_t)
57 dev_rw_tpm(rngd_t)
58 dev_write_rand(rngd_t)
59+dev_read_sysfs(rngd_t)
60
61 files_read_etc_files(rngd_t)
62
63--
642.17.1
65