Package: selinux-policy-default
Version: 2:2.20140206-1
Severity: normal
ndc_t being prevented from block_suspend on itself:
Feb 13 00:46:38 a6 kernel: [ 541.076682] type=1400
audit(1392281198.624:176): avc: denied { block_suspend } for pid=4506
comm="rndc" capability=36 scontext=system_u:system_r:ndc_t:s0
tcontext=system_u:system_r:ndc_t:s0 tclass=capability2
This also came up in Redhat Bug#895070 but the fix was seemingly never pushed
upstream.
Patch attached.
-- System Information:
Debian Release: jessie/sid
APT prefers testing
APT policy: (990, 'testing'), (500, 'testing-updates'), (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 3.12-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages selinux-policy-default depends on:
ii libpam-modules 1.1.3-9
ii libselinux1 2.2.2-1
ii libsepol1 2.2-1
ii policycoreutils 2.2.5-1
ii python 2.7.5-5
ii selinux-utils 2.2.2-1
Versions of packages selinux-policy-default recommends:
ii checkpolicy 2.2-1
ii setools 3.3.8-3
Versions of packages selinux-policy-default suggests:
pn logcheck <none>
pn syslog-summary <none>
-- Configuration Files:
/etc/selinux/default/modules/active/file_contexts.local [Errno 13] Permission
denied: u'/etc/selinux/default/modules/active/file_contexts.local'
-- debconf-show failed
commit 5aacc83a8e267ea4dada5d6044a42f598b8b1735
Author: Devin Carraway <[email protected]>
Date: Thu Feb 13 21:59:54 2014 -0800
Allow ndc_t to prevent suspend on epoll events.
Capability background: http://thread.gmane.org/gmane.linux.kernel/1289986
Fixes audit denial:
Feb 13 00:46:38 a6 kernel: [ 541.076682] type=1400 audit(1392281198.624:176): avc: denied { block_suspend } for pid=4506 comm="rndc" capability=36 scontext=system_u:system_r:ndc_t:s0 tcontext=system_u:system_r:ndc_t:s0 tclass=capability2
diff --git a/policy/modules/contrib/bind.te b/policy/modules/contrib/bind.te
index 1241123..101893f 100644
--- a/policy/modules/contrib/bind.te
+++ b/policy/modules/contrib/bind.te
@@ -215,6 +215,7 @@ optional_policy(`
#
allow ndc_t self:capability { dac_override net_admin };
+allow ndc_t self:capability2 block_suspend;
allow ndc_t self:process signal_perms;
allow ndc_t self:fifo_file rw_fifo_file_perms;
allow ndc_t self:unix_stream_socket { accept listen };
_______________________________________________
SELinux-devel mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/selinux-devel