From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 5D8011387FD for ; Sat, 7 Jun 2014 17:48:22 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 22388E0971; Sat, 7 Jun 2014 17:48:21 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id B1DA2E0971 for ; Sat, 7 Jun 2014 17:48:20 +0000 (UTC) Received: from spoonbill.gentoo.org (spoonbill.gentoo.org [81.93.255.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id DA26F33FC9F for ; Sat, 7 Jun 2014 17:48:19 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by spoonbill.gentoo.org (Postfix) with ESMTP id AB4A6181A9 for ; Sat, 7 Jun 2014 17:48:17 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <1402163156.2444e174c98a308ab6a27892f38028dbe4d0516b.swift@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/selinuxutil.te X-VCS-Directories: policy/modules/system/ X-VCS-Committer: swift X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: 2444e174c98a308ab6a27892f38028dbe4d0516b X-VCS-Branch: master Date: Sat, 7 Jun 2014 17:48:17 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: ec4269dc-3d9b-475e-95cf-413dd862deab X-Archives-Hash: 7b853d9477c1c43869fdd4ddfff6acc2 commit: 2444e174c98a308ab6a27892f38028dbe4d0516b Author: Sven Vermeulen siphos be> AuthorDate: Sat Jun 7 17:45:56 2014 +0000 Commit: Sven Vermeulen gentoo org> CommitDate: Sat Jun 7 17:45:56 2014 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=2444e174 Fix bug #512676 - Enable create/bind on SELinux netlink socket for run_init The run_init code calls avc_* functions, but the following failure occurs: ~# run_init rc-service nfs status Authenticating swift. run_init: avc.c:74: avc_context_to_sid_raw: Assertion `avc_running' failed. Segmentation fault AVC denials are shown related to the netlink_selinux_socket class (create/bind privileges) and signal (possibly to handle failure). Allowing them has the run_init code run properly again. --- policy/modules/system/selinuxutil.te | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te index 2b99c9b..b4d7bc3 100644 --- a/policy/modules/system/selinuxutil.te +++ b/policy/modules/system/selinuxutil.te @@ -650,6 +650,10 @@ ifdef(`distro_gentoo',` allow run_init_t self:passwd rootok; + # Fix bug #512676 + allow run_init_t self:process signal; + allow run_init_t self:selinux_netlink_socket { create bind }; + # Denials upon loading policy fs_getattr_tmpfs(setfiles_t) dev_getattr_fs(setfiles_t)