diff options
author | Joe MacDonald <joe@deserted.net> | 2019-04-08 13:50:40 -0400 |
---|---|---|
committer | Joe MacDonald <joe@deserted.net> | 2019-04-10 10:57:14 -0400 |
commit | 776da889b550ac9e5be414a8cc10fd86b1923264 (patch) | |
tree | 79771fa29c551e934321434f4b5f3da7a27fd91f /recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch | |
parent | a6a3cadb1ef3203a123d8f5f9df27832f55b2ce3 (diff) | |
download | meta-selinux-jjm/RELEASE_2.20190201.tar.gz |
refpolicy: update to 2.20190201 and git HEAD policiesjjm/RELEASE_2.20190201
Additionally, the README has fallen out of date, update it to reflect the
current reality of layer dependencies.
Signed-off-by: Joe MacDonald <joe@deserted.net>
Diffstat (limited to 'recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch | 29 |
1 files changed, 0 insertions, 29 deletions
diff --git a/recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch b/recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch deleted file mode 100644 index 7c7355f..0000000 --- a/recipes-security/refpolicy/refpolicy-git/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch +++ /dev/null | |||
@@ -1,29 +0,0 @@ | |||
1 | Subject: [PATCH] add rules for the symlink of /var/log - audisp_remote_t | ||
2 | |||
3 | We have added rules for the symlink of /var/log in logging.if, | ||
4 | while audisp_remote_t uses /var/log but does not use the | ||
5 | interfaces in logging.if. So still need add a individual rule for | ||
6 | audisp_remote_t. | ||
7 | |||
8 | Upstream-Status: Inappropriate [only for Poky] | ||
9 | |||
10 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | ||
11 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
12 | --- | ||
13 | policy/modules/system/logging.te | 1 + | ||
14 | 1 file changed, 1 insertion(+) | ||
15 | |||
16 | --- a/policy/modules/system/logging.te | ||
17 | +++ b/policy/modules/system/logging.te | ||
18 | @@ -280,10 +280,11 @@ optional_policy(` | ||
19 | |||
20 | allow audisp_remote_t self:capability { setpcap setuid }; | ||
21 | allow audisp_remote_t self:process { getcap setcap }; | ||
22 | allow audisp_remote_t self:tcp_socket create_socket_perms; | ||
23 | allow audisp_remote_t var_log_t:dir search_dir_perms; | ||
24 | +allow audisp_remote_t var_log_t:lnk_file read_lnk_file_perms; | ||
25 | |||
26 | manage_dirs_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) | ||
27 | manage_files_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) | ||
28 | files_spool_filetrans(audisp_remote_t, audit_spool_t, { dir file }) | ||
29 | |||