diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0068-policy-modules-system-logging-add-the-syslogd_t-to-t.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0068-policy-modules-system-logging-add-the-syslogd_t-to-t.patch | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0068-policy-modules-system-logging-add-the-syslogd_t-to-t.patch b/recipes-security/refpolicy/refpolicy/0068-policy-modules-system-logging-add-the-syslogd_t-to-t.patch new file mode 100644 index 0000000..921305e --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0068-policy-modules-system-logging-add-the-syslogd_t-to-t.patch | |||
@@ -0,0 +1,37 @@ | |||
1 | From f5a6c667186850ba8c5057742195c46d9f7ff8cf Mon Sep 17 00:00:00 2001 | ||
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | ||
3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 | ||
4 | Subject: [PATCH] policy/modules/system/logging: add the syslogd_t to trusted | ||
5 | object | ||
6 | |||
7 | We add the syslogd_t to trusted object, because other process need | ||
8 | to have the right to connectto/sendto /dev/log. | ||
9 | |||
10 | Upstream-Status: Inappropriate [embedded specific] | ||
11 | |||
12 | Signed-off-by: Roy.Li <rongqing.li@windriver.com> | ||
13 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | ||
14 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
15 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
16 | --- | ||
17 | policy/modules/system/logging.te | 4 ++++ | ||
18 | 1 file changed, 4 insertions(+) | ||
19 | |||
20 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | ||
21 | index 1d45a5fa9..eec0560d1 100644 | ||
22 | --- a/policy/modules/system/logging.te | ||
23 | +++ b/policy/modules/system/logging.te | ||
24 | @@ -501,6 +501,10 @@ fs_getattr_all_fs(syslogd_t) | ||
25 | fs_search_auto_mountpoints(syslogd_t) | ||
26 | |||
27 | mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and /var/log directories | ||
28 | +mls_file_read_all_levels(syslogd_t) | ||
29 | +mls_socket_write_all_levels(syslogd_t) # Neet to be able to sendto dgram | ||
30 | +mls_trusted_object(syslogd_t) # Other process need to have the right to connectto/sendto /dev/log | ||
31 | +mls_fd_use_all_levels(syslogd_t) | ||
32 | |||
33 | term_write_console(syslogd_t) | ||
34 | # Allow syslog to a terminal | ||
35 | -- | ||
36 | 2.17.1 | ||
37 | |||