[yocto] [meta-selinux][PATCH] refpolicy: Allow udev the block_suspend capability

jackie.huang at windriver.com jackie.huang at windriver.com
Tue May 13 03:01:13 PDT 2014


From: Jackie Huang <jackie.huang at windriver.com>

Fix the avc denied issue:
type=1400 audit(1399440994.656:14): avc: denied { block_suspend } for pid=80 comm="udevd" capability=36 scontext=system_u:system_r:udev_t:s0-s15:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s15:c0.c1023 tclass=capability2

The patch is backported from upstream

Signed-off-by: Jackie Huang <jackie.huang at windriver.com>
---
 .../Allow-udev-the-block_suspend-capability.patch  |   25 ++++++++++++++++++++
 .../refpolicy/refpolicy_2.20130424.inc             |    1 +
 2 files changed, 26 insertions(+)
 create mode 100644 recipes-security/refpolicy/refpolicy-2.20130424/Allow-udev-the-block_suspend-capability.patch

diff --git a/recipes-security/refpolicy/refpolicy-2.20130424/Allow-udev-the-block_suspend-capability.patch b/recipes-security/refpolicy/refpolicy-2.20130424/Allow-udev-the-block_suspend-capability.patch
new file mode 100644
index 0000000..3c6a979
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy-2.20130424/Allow-udev-the-block_suspend-capability.patch
@@ -0,0 +1,25 @@
+Allow udev the block_suspend capability
+
+Upstream-Status: backport
+upstream commit: 5905067f2acf710ffbb13ba32575e6316619ddd8
+
+Signed-off-by: Jackie Huang <jackie.huang at windriver.com>
+---
+ policy/modules/system/udev.te |    1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
+index 90e4ab3..efe6c02 100644
+--- a/policy/modules/system/udev.te
++++ b/policy/modules/system/udev.te
+@@ -39,6 +39,7 @@ ifdef(`enable_mcs',`
+ 
+ allow udev_t self:capability { chown dac_override dac_read_search fowner fsetid sys_admin mknod net_raw net_admin sys_nice sys_rawio sys_resource setuid setgid sys_nice sys_ptrace };
+ dontaudit udev_t self:capability sys_tty_config;
++allow udev_t self:capability2 block_suspend;
+ allow udev_t self:process ~{ setcurrent setexec setfscreate setrlimit execmem execstack execheap };
+ allow udev_t self:process { execmem setfscreate };
+ allow udev_t self:fd use;
+-- 
+1.7.9.5
+
diff --git a/recipes-security/refpolicy/refpolicy_2.20130424.inc b/recipes-security/refpolicy/refpolicy_2.20130424.inc
index 5dbb2dc..0e7419d 100644
--- a/recipes-security/refpolicy/refpolicy_2.20130424.inc
+++ b/recipes-security/refpolicy/refpolicy_2.20130424.inc
@@ -61,6 +61,7 @@ SRC_URI += "file://poky-policy-fix-xconsole_device_t-as-a-dev_node.patch \
 # Backport from upstream
 SRC_URI += "file://Allow-ping-to-get-set-capabilities.patch \
             file://filesystem-associate-tmpfs_t-shm-to-device_t-devtmpf.patch \
+            file://Allow-udev-the-block_suspend-capability.patch \
            "
 
 include refpolicy_common.inc
-- 
1.7.9.5




More information about the yocto mailing list