summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy-2.20190201/0023-policy-module-terminals-don-t-audit-tty_device_t-in-.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy-2.20190201/0023-policy-module-terminals-don-t-audit-tty_device_t-in-.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20190201/0023-policy-module-terminals-don-t-audit-tty_device_t-in-.patch37
1 files changed, 37 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy-2.20190201/0023-policy-module-terminals-don-t-audit-tty_device_t-in-.patch b/recipes-security/refpolicy/refpolicy-2.20190201/0023-policy-module-terminals-don-t-audit-tty_device_t-in-.patch
new file mode 100644
index 0000000..887af46
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy-2.20190201/0023-policy-module-terminals-don-t-audit-tty_device_t-in-.patch
@@ -0,0 +1,37 @@
1From fcf756e6906bba50d09224184d64ac56f40b6424 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH 23/34] policy/module/terminals: don't audit tty_device_t in
5 term_dontaudit_use_console.
6
7We should also not audit terminal to rw tty_device_t and fds in
8term_dontaudit_use_console.
9
10Upstream-Status: Inappropriate [only for Poky]
11
12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
13Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
14---
15 policy/modules/kernel/terminal.if | 3 +++
16 1 file changed, 3 insertions(+)
17
18diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if
19index a84787e6..cf66da2f 100644
20--- a/policy/modules/kernel/terminal.if
21+++ b/policy/modules/kernel/terminal.if
22@@ -335,9 +335,12 @@ interface(`term_use_console',`
23 interface(`term_dontaudit_use_console',`
24 gen_require(`
25 type console_device_t;
26+ type tty_device_t;
27 ')
28
29+ init_dontaudit_use_fds($1)
30 dontaudit $1 console_device_t:chr_file rw_chr_file_perms;
31+ dontaudit $1 tty_device_t:chr_file rw_chr_file_perms;
32 ')
33
34 ########################################
35--
362.19.1
37