diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc index ba5542f..b5e845a 100644 --- a/policy/modules/system/logging.fc +++ b/policy/modules/system/logging.fc @@ -3,6 +3,8 @@ /etc/rsyslog.conf gen_context(system_u:object_r:syslog_conf_t,s0) /etc/syslog.conf gen_context(system_u:object_r:syslog_conf_t,s0) /etc/audit(/.*)? gen_context(system_u:object_r:auditd_etc_t,mls_systemhigh) +/etc/rc\.d/init\.d/auditd -- gen_context(system_u:object_r:auditd_initrc_exec_t,s0) +/etc/rc\.d/init\.d/rsyslog -- gen_context(system_u:object_r:syslogd_initrc_exec_t,s0) /sbin/audispd -- gen_context(system_u:object_r:audisp_exec_t,s0) /sbin/audisp-remote -- gen_context(system_u:object_r:audisp_remote_exec_t,s0) diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if index 64bea09..05d6d69 100644 --- a/policy/modules/system/logging.if +++ b/policy/modules/system/logging.if @@ -281,7 +281,7 @@ interface(`logging_dispatcher_domain',` role system_r types $1; domtrans_pattern(audisp_t, $2, $1) - allow $1 audisp_t:process signal; + allow audisp_t $1:process { sigkill sigstop signull signal }; allow audisp_t $2:file getattr; allow $1 audisp_t:unix_stream_socket rw_socket_perms; diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te index 9474b10..ab4edef 100644 --- a/policy/modules/system/logging.te +++ b/policy/modules/system/logging.te @@ -1,5 +1,5 @@ -policy_module(logging, 1.11.3) +policy_module(logging, 1.11.4) ######################################## # @@ -24,6 +24,9 @@ type auditd_t; type auditd_exec_t; init_daemon_domain(auditd_t,auditd_exec_t) +type auditd_initrc_exec_t; +init_script_file(auditd_initrc_exec_t) + type auditd_var_run_t; files_pid_file(auditd_var_run_t) @@ -59,6 +62,9 @@ type syslogd_t; type syslogd_exec_t; init_daemon_domain(syslogd_t,syslogd_exec_t) +type syslogd_initrc_exec_t; +init_script_file(syslogd_initrc_exec_t) + type syslogd_tmp_t; files_tmp_file(syslogd_tmp_t)