All of lore.kernel.org
 help / color / mirror / Atom feed
* [refpolicy] [PATCH 1/1] Allow capabilities for syslog-ng
@ 2013-10-21 18:52 Sven Vermeulen
  2013-11-13 14:15 ` Christopher J. PeBenito
  0 siblings, 1 reply; 2+ messages in thread
From: Sven Vermeulen @ 2013-10-21 18:52 UTC (permalink / raw)
  To: refpolicy

The syslog-ng logger has (build-optional) support for capabilities. If
capabilities support is enabled, running it without setcap/getcap
permissions gives the following upon start:

 * Starting syslog-ng ...
syslog-ng: Error setting capabilities, capability management disabled;
error='Permission denied' [ ok ]

Granting only setcap (initial AVC seen) does not fully help either:

 * Starting syslog-ng ...
 Error managing capability set, cap_set_proc returned an error;

With setcap and getcap enabled, syslog-ng starts and functions fine.

See also https://bugs.gentoo.org/show_bug.cgi?id=488718

Reported-by: Vincent Brillault <gentoo@lerya.net>
Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
---
 policy/modules/system/logging.te | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
index 59b04c1..d7e857e 100644
--- a/policy/modules/system/logging.te
+++ b/policy/modules/system/logging.te
@@ -361,7 +361,7 @@ dontaudit syslogd_t self:capability sys_tty_config;
 # setrlimit for syslog-ng
 # getsched for syslog-ng
 # setsched for rsyslog
-allow syslogd_t self:process { signal_perms setpgid setrlimit getsched setsched };
+allow syslogd_t self:process { getcap setcap signal_perms setpgid setrlimit getsched setsched };
 # receive messages to be logged
 allow syslogd_t self:unix_dgram_socket create_socket_perms;
 allow syslogd_t self:unix_stream_socket create_stream_socket_perms;
-- 
1.8.1.5

^ permalink raw reply related	[flat|nested] 2+ messages in thread

* [refpolicy] [PATCH 1/1] Allow capabilities for syslog-ng
  2013-10-21 18:52 [refpolicy] [PATCH 1/1] Allow capabilities for syslog-ng Sven Vermeulen
@ 2013-11-13 14:15 ` Christopher J. PeBenito
  0 siblings, 0 replies; 2+ messages in thread
From: Christopher J. PeBenito @ 2013-11-13 14:15 UTC (permalink / raw)
  To: refpolicy

On Mon Oct 21 14:52:05 2013, Sven Vermeulen wrote:
> The syslog-ng logger has (build-optional) support for capabilities. If
> capabilities support is enabled, running it without setcap/getcap
> permissions gives the following upon start:
>
>  * Starting syslog-ng ...
> syslog-ng: Error setting capabilities, capability management disabled;
> error='Permission denied' [ ok ]
>
> Granting only setcap (initial AVC seen) does not fully help either:
>
>  * Starting syslog-ng ...
>  Error managing capability set, cap_set_proc returned an error;
>
> With setcap and getcap enabled, syslog-ng starts and functions fine.
>
> See also https://bugs.gentoo.org/show_bug.cgi?id=488718
>
> Reported-by: Vincent Brillault <gentoo@lerya.net>
> Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
> ---
>  policy/modules/system/logging.te | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
> index 59b04c1..d7e857e 100644
> --- a/policy/modules/system/logging.te
> +++ b/policy/modules/system/logging.te
> @@ -361,7 +361,7 @@ dontaudit syslogd_t self:capability sys_tty_config;
>  # setrlimit for syslog-ng
>  # getsched for syslog-ng
>  # setsched for rsyslog
> -allow syslogd_t self:process { signal_perms setpgid setrlimit getsched setsched };
> +allow syslogd_t self:process { getcap setcap signal_perms setpgid setrlimit getsched setsched };
>  # receive messages to be logged
>  allow syslogd_t self:unix_dgram_socket create_socket_perms;
>  allow syslogd_t self:unix_stream_socket create_stream_socket_perms;

Merged.

--
Chris PeBenito
Tresys Technology, LLC
www.tresys.com | oss.tresys.com

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2013-11-13 14:15 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-10-21 18:52 [refpolicy] [PATCH 1/1] Allow capabilities for syslog-ng Sven Vermeulen
2013-11-13 14:15 ` Christopher J. PeBenito

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.