From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 0F8D058973 for ; Sat, 30 Jan 2016 17:21:43 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 5B04921C06E; Sat, 30 Jan 2016 17:21:23 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 7536C21C05C for ; Sat, 30 Jan 2016 17:21:22 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id B2872340B6A for ; Sat, 30 Jan 2016 17:21:21 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 96FE7FF9 for ; Sat, 30 Jan 2016 17:21:18 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1454174216.3453ea565d37914f41109bf1d742451c448e673d.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/init.te X-VCS-Directories: policy/modules/system/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 3453ea565d37914f41109bf1d742451c448e673d X-VCS-Branch: master Date: Sat, 30 Jan 2016 17:21:18 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: ee9e0e71-a469-45cf-9253-371bf4b635f1 X-Archives-Hash: 99f03ff5d92cdf6e22c59cf3bec5ff32 commit: 3453ea565d37914f41109bf1d742451c448e673d Author: Laurent Bigonville bigon be> AuthorDate: Fri Jan 15 10:42:25 2016 +0000 Commit: Jason Zaman gentoo org> CommitDate: Sat Jan 30 17:16:56 2016 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=3453ea56 Allow systemd the audit_read capability At early boot, I get the following messages in dmesg: audit: type=1400 audit(1452851002.184:3): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=capability2 permissive=1 systemd[1]: Listening on Journal Audit Socket. policy/modules/system/init.te | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te index 0aafb44..1239f1b 100644 --- a/policy/modules/system/init.te +++ b/policy/modules/system/init.te @@ -195,7 +195,7 @@ ifdef(`init_systemd',` typeattribute init_t init_run_all_scripts_domain; allow init_t self:process { getcap getsched setsched setpgid setfscreate setsockcreate setcap setrlimit }; - allow init_t self:capability2 block_suspend; + allow init_t self:capability2 { audit_read block_suspend }; allow init_t self:netlink_kobject_uevent_socket create_socket_perms; allow init_t self:netlink_route_socket create_netlink_socket_perms; allow init_t self:netlink_selinux_socket create_socket_perms;