diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te index 2b86191fb..45163753a 100644 --- a/policy/modules/system/init.te +++ b/policy/modules/system/init.te @@ -433,6 +433,7 @@ ifdef(`init_systemd',` logging_send_audit_msgs(init_t) logging_relabelto_devlog_sock_files(init_t) logging_relabel_generic_log_dirs(init_t) + logging_audit_socket_activation(init_t) # lvm2-activation-generator checks file labels seutil_read_file_contexts(init_t) diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if index 5e4c0bacf..4223e6b76 100644 --- a/policy/modules/system/logging.if +++ b/policy/modules/system/logging.if @@ -484,6 +484,25 @@ interface(`logging_setattr_syslogd_tmp_files',` allow $1 syslogd_tmp_t:file setattr; ') +######################################## +## +## Allow the domain to create the audit socket +## for syslogd. +## +## +## +## Domain allowed access. +## +## +# +interface(`logging_audit_socket_activation', ` + gen_require(` + type syslogd_t; + ') + + allow $1 syslogd_t:netlink_audit_socket create_socket_perms; +') + ######################################## ## ## Relabel to and from syslog temporary file type.