diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0077-policy-modules-system-systemd-make-systemd-modules_t.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0077-policy-modules-system-systemd-make-systemd-modules_t.patch | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0077-policy-modules-system-systemd-make-systemd-modules_t.patch b/recipes-security/refpolicy/refpolicy/0077-policy-modules-system-systemd-make-systemd-modules_t.patch new file mode 100644 index 0000000..a1013a1 --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0077-policy-modules-system-systemd-make-systemd-modules_t.patch | |||
@@ -0,0 +1,36 @@ | |||
1 | From 569033512340d791a13c1ee2f269788c55fff63c Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Sun, 28 Jun 2020 15:19:44 +0800 | ||
4 | Subject: [PATCH] policy/modules/system/systemd: make systemd-modules_t domain | ||
5 | MLS trusted for reading from files up to its clearance | ||
6 | |||
7 | Fixes: | ||
8 | avc: denied { search } for pid=142 comm="systemd-modules" | ||
9 | name="journal" dev="tmpfs" ino=10990 | ||
10 | scontext=system_u:system_r:systemd_modules_load_t:s0-s15:c0.c1023 | ||
11 | tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir | ||
12 | permissive=0 | ||
13 | |||
14 | Upstream-Status: Inappropriate [embedded specific] | ||
15 | |||
16 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
17 | --- | ||
18 | policy/modules/system/systemd.te | 2 ++ | ||
19 | 1 file changed, 2 insertions(+) | ||
20 | |||
21 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | ||
22 | index 806468109..e82a1e64a 100644 | ||
23 | --- a/policy/modules/system/systemd.te | ||
24 | +++ b/policy/modules/system/systemd.te | ||
25 | @@ -739,6 +739,8 @@ modutils_read_module_objects(systemd_modules_load_t) | ||
26 | |||
27 | systemd_log_parse_environment(systemd_modules_load_t) | ||
28 | |||
29 | +mls_file_read_to_clearance(systemd_modules_load_t) | ||
30 | + | ||
31 | ######################################## | ||
32 | # | ||
33 | # networkd local policy | ||
34 | -- | ||
35 | 2.17.1 | ||
36 | |||