From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 34C8615800F for ; Mon, 13 Feb 2023 15:35:38 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 10A91E0843; Mon, 13 Feb 2023 15:35:33 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id EB757E0855 for ; Mon, 13 Feb 2023 15:35:32 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 04D52335D6F for ; Mon, 13 Feb 2023 15:35:32 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 049558C1 for ; Mon, 13 Feb 2023 15:35:28 +0000 (UTC) From: "Kenton Groombridge" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Kenton Groombridge" Message-ID: <1676301845.55eca939543fc86c71b3b4843b6f72249fc5774d.concord@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/selinuxutil.te X-VCS-Directories: policy/modules/system/ X-VCS-Committer: concord X-VCS-Committer-Name: Kenton Groombridge X-VCS-Revision: 55eca939543fc86c71b3b4843b6f72249fc5774d X-VCS-Branch: master Date: Mon, 13 Feb 2023 15:35:28 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: d9f0f61b-9cba-4284-ace3-21b8cd924b4e X-Archives-Hash: ae42c79ff5f41f220364a07b7af509ef commit: 55eca939543fc86c71b3b4843b6f72249fc5774d Author: Corentin LABBE gmail com> AuthorDate: Wed Jan 25 20:33:13 2023 +0000 Commit: Kenton Groombridge gentoo org> CommitDate: Mon Feb 13 15:24:05 2023 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=55eca939 selinuxutil: permit run_init to read kernel sysctl When restarting services with run_init, I got some AVC due to run_init reading /proc/sys/kernel/cap_last_cap Signed-off-by: Corentin LABBE gmail.com> Signed-off-by: Kenton Groombridge gentoo.org> policy/modules/system/selinuxutil.te | 2 ++ 1 file changed, 2 insertions(+) diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te index 5c7c1aec2..a3ff73778 100644 --- a/policy/modules/system/selinuxutil.te +++ b/policy/modules/system/selinuxutil.te @@ -452,6 +452,8 @@ init_spec_domtrans_script(run_init_t) # for utmp init_rw_utmp(run_init_t) +kernel_read_kernel_sysctls(run_init_t) + logging_send_syslog_msg(run_init_t) miscfiles_read_localization(run_init_t)