From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id E28E3138ACF for ; Thu, 29 Jan 2015 09:12:20 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id B7532E07E1; Thu, 29 Jan 2015 09:12:18 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id D95E2E07E0 for ; Thu, 29 Jan 2015 09:12:17 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id DBEDB3406DD for ; Thu, 29 Jan 2015 09:12:16 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 768E3108F6 for ; Thu, 29 Jan 2015 09:12:15 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1422518630.996d64d63da9b3510b66053b8a82fd0bce7ac3fc.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/udev.te X-VCS-Directories: policy/modules/system/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 996d64d63da9b3510b66053b8a82fd0bce7ac3fc X-VCS-Branch: master Date: Thu, 29 Jan 2015 09:12:15 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 8ac13d15-a9b0-4bcc-be61-a9fe7b4fdb47 X-Archives-Hash: c9eb115991fbf4e2ddb98fbb2916be6e Message-ID: <20150129091215.oSqaz6xiJBBI-JXfCdegKhJXcAtEtN_WD_CpXFc-Ja0@z> commit: 996d64d63da9b3510b66053b8a82fd0bce7ac3fc Author: Jason Zaman perfinion com> AuthorDate: Tue Jan 20 14:21:00 2015 +0000 Commit: Jason Zaman perfinion com> CommitDate: Thu Jan 29 08:03:50 2015 +0000 URL: http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=996d64d6 udev: allow netlink_socket perms udev needs these perms for CRDA communication (Central Regulatory Domain Agent for wifi) type=AVC msg=audit(1421753429.771:3718): avc: denied { create } for pid=28698 comm="crda" scontext=system_u:system_r:udev_t tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1 type=AVC msg=audit(1421753429.771:3719): avc: denied { setopt } for pid=28698 comm="crda" scontext=system_u:system_r:udev_t tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1 type=AVC msg=audit(1421753429.771:3720): avc: denied { bind } for pid=28698 comm="crda" scontext=system_u:system_r:udev_t tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1 type=AVC msg=audit(1421753429.771:3721): avc: denied { getattr } for pid=28698 comm="crda" scontext=system_u:system_r:udev_t tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1 type=AVC msg=audit(1421753429.771:3722): avc: denied { write } for pid=28698 comm="crda" scontext=system_u:system_r:udev_t tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1 type=AVC msg=audit(1421753429.771:3723): avc: denied { read } for pid=28698 comm="crda" scontext=system_u:system_r:udev_t tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1 --- policy/modules/system/udev.te | 2 ++ 1 file changed, 2 insertions(+) diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te index 78e4328..d4d77f2 100644 --- a/policy/modules/system/udev.te +++ b/policy/modules/system/udev.te @@ -334,6 +334,8 @@ ifdef(`distro_gentoo',` # needed for predictable network interfaces naming allow udev_t self:netlink_route_socket rw_netlink_socket_perms; + # needed for crda, bug #538110 + allow udev_t self:netlink_socket create_socket_perms; manage_dirs_pattern(udev_t, udev_tbl_t, udev_tbl_t) manage_files_pattern(udev_t, udev_tbl_t, udev_tbl_t)