commit: 9b58424a4d94e678b364bcc24869aa142abdaa62
Author: Jason Zaman <jason <AT> perfinion <DOT> com>
AuthorDate: Tue Jan 20 14:21:00 2015 +0000
Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org>
CommitDate: Sun Jan 25 13:45:20 2015 +0000
URL:
http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=9b58424a
udev: allow netlink_socket perms
udev needs these perms for CRDA communication (Central Regulatory Domain
Agent for wifi)
type=AVC msg=audit(1421753429.771:3718): avc: denied { create } for
pid=28698 comm="crda" scontext=system_u:system_r:udev_t
tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1
type=AVC msg=audit(1421753429.771:3719): avc: denied { setopt } for
pid=28698 comm="crda" scontext=system_u:system_r:udev_t
tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1
type=AVC msg=audit(1421753429.771:3720): avc: denied { bind } for
pid=28698 comm="crda" scontext=system_u:system_r:udev_t
tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1
type=AVC msg=audit(1421753429.771:3721): avc: denied { getattr } for
pid=28698 comm="crda" scontext=system_u:system_r:udev_t
tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1
type=AVC msg=audit(1421753429.771:3722): avc: denied { write } for
pid=28698 comm="crda" scontext=system_u:system_r:udev_t
tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1
type=AVC msg=audit(1421753429.771:3723): avc: denied { read } for
pid=28698 comm="crda" scontext=system_u:system_r:udev_t
tcontext=system_u:system_r:udev_t tclass=netlink_socket permissive=1
---
policy/modules/system/udev.te | 2 ++
1 file changed, 2 insertions(+)
diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
index 78e4328..810d135 100644
--- a/policy/modules/system/udev.te
+++ b/policy/modules/system/udev.te
@@ -334,6 +334,8 @@ ifdef(`distro_gentoo',`
# needed for predictable network interfaces naming
allow udev_t self:netlink_route_socket rw_netlink_socket_perms;
+ # needed for crda
+ allow udev_t self:netlink_socket create_socket_perms;
manage_dirs_pattern(udev_t, udev_tbl_t, udev_tbl_t)
manage_files_pattern(udev_t, udev_tbl_t, udev_tbl_t)