* [refpolicy] [PATCH 1/1] Allow capabilities for syslog-ng
@ 2013-10-21 18:52 Sven Vermeulen
2013-11-13 14:15 ` Christopher J. PeBenito
0 siblings, 1 reply; 2+ messages in thread
From: Sven Vermeulen @ 2013-10-21 18:52 UTC (permalink / raw)
To: refpolicy
The syslog-ng logger has (build-optional) support for capabilities. If
capabilities support is enabled, running it without setcap/getcap
permissions gives the following upon start:
* Starting syslog-ng ...
syslog-ng: Error setting capabilities, capability management disabled;
error='Permission denied' [ ok ]
Granting only setcap (initial AVC seen) does not fully help either:
* Starting syslog-ng ...
Error managing capability set, cap_set_proc returned an error;
With setcap and getcap enabled, syslog-ng starts and functions fine.
See also https://bugs.gentoo.org/show_bug.cgi?id=488718
Reported-by: Vincent Brillault <gentoo@lerya.net>
Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
---
policy/modules/system/logging.te | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
index 59b04c1..d7e857e 100644
--- a/policy/modules/system/logging.te
+++ b/policy/modules/system/logging.te
@@ -361,7 +361,7 @@ dontaudit syslogd_t self:capability sys_tty_config;
# setrlimit for syslog-ng
# getsched for syslog-ng
# setsched for rsyslog
-allow syslogd_t self:process { signal_perms setpgid setrlimit getsched setsched };
+allow syslogd_t self:process { getcap setcap signal_perms setpgid setrlimit getsched setsched };
# receive messages to be logged
allow syslogd_t self:unix_dgram_socket create_socket_perms;
allow syslogd_t self:unix_stream_socket create_stream_socket_perms;
--
1.8.1.5
^ permalink raw reply related [flat|nested] 2+ messages in thread
* [refpolicy] [PATCH 1/1] Allow capabilities for syslog-ng
2013-10-21 18:52 [refpolicy] [PATCH 1/1] Allow capabilities for syslog-ng Sven Vermeulen
@ 2013-11-13 14:15 ` Christopher J. PeBenito
0 siblings, 0 replies; 2+ messages in thread
From: Christopher J. PeBenito @ 2013-11-13 14:15 UTC (permalink / raw)
To: refpolicy
On Mon Oct 21 14:52:05 2013, Sven Vermeulen wrote:
> The syslog-ng logger has (build-optional) support for capabilities. If
> capabilities support is enabled, running it without setcap/getcap
> permissions gives the following upon start:
>
> * Starting syslog-ng ...
> syslog-ng: Error setting capabilities, capability management disabled;
> error='Permission denied' [ ok ]
>
> Granting only setcap (initial AVC seen) does not fully help either:
>
> * Starting syslog-ng ...
> Error managing capability set, cap_set_proc returned an error;
>
> With setcap and getcap enabled, syslog-ng starts and functions fine.
>
> See also https://bugs.gentoo.org/show_bug.cgi?id=488718
>
> Reported-by: Vincent Brillault <gentoo@lerya.net>
> Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
> ---
> policy/modules/system/logging.te | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
> index 59b04c1..d7e857e 100644
> --- a/policy/modules/system/logging.te
> +++ b/policy/modules/system/logging.te
> @@ -361,7 +361,7 @@ dontaudit syslogd_t self:capability sys_tty_config;
> # setrlimit for syslog-ng
> # getsched for syslog-ng
> # setsched for rsyslog
> -allow syslogd_t self:process { signal_perms setpgid setrlimit getsched setsched };
> +allow syslogd_t self:process { getcap setcap signal_perms setpgid setrlimit getsched setsched };
> # receive messages to be logged
> allow syslogd_t self:unix_dgram_socket create_socket_perms;
> allow syslogd_t self:unix_stream_socket create_stream_socket_perms;
Merged.
--
Chris PeBenito
Tresys Technology, LLC
www.tresys.com | oss.tresys.com
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2013-11-13 14:15 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-10-21 18:52 [refpolicy] [PATCH 1/1] Allow capabilities for syslog-ng Sven Vermeulen
2013-11-13 14:15 ` Christopher J. PeBenito
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.