summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch39
1 files changed, 39 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch b/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch
new file mode 100644
index 0000000..64a1dfc
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch
@@ -0,0 +1,39 @@
1From 2b64eabf0cf8982bbb3c537e84fc3a99085858d3 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Thu, 25 Feb 2016 04:25:08 -0500
4Subject: [PATCH] policy/modules/system/logging: allow auditd_t to write socket
5 at any level
6
7Allow auditd_t to write init_t:unix_stream_socket at any level.
8
9Fixes:
10 avc: denied { write } for pid=748 comm="auditd" \
11 path="socket:[17371]" dev="sockfs" ino=17371 \
12 scontext=system_u:system_r:auditd_t:s15:c0.c1023 \
13 tcontext=system_u:system_r:init_t:s0-s15:c0.c1023 \
14 tclass=unix_stream_socket permissive=1
15
16Upstream-Status: Inappropriate [embedded specific]
17
18Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
19Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
20---
21 policy/modules/system/logging.te | 2 ++
22 1 file changed, 2 insertions(+)
23
24diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
25index caf319f04..25e1d1397 100644
26--- a/policy/modules/system/logging.te
27+++ b/policy/modules/system/logging.te
28@@ -235,6 +235,8 @@ miscfiles_read_localization(auditd_t)
29
30 mls_file_read_all_levels(auditd_t)
31 mls_file_write_all_levels(auditd_t) # Need to be able to write to /var/run/ directory
32+mls_fd_use_all_levels(auditd_t)
33+mls_socket_write_all_levels(auditd_t)
34
35 seutil_dontaudit_read_config(auditd_t)
36
37--
382.25.1
39