From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 822A913877A for ; Wed, 25 Jun 2014 19:06:53 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id EDF4CE07E0; Wed, 25 Jun 2014 19:06:49 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 76163E07E0 for ; Wed, 25 Jun 2014 19:06:49 +0000 (UTC) Received: from spoonbill.gentoo.org (spoonbill.gentoo.org [81.93.255.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 966E4340022 for ; Wed, 25 Jun 2014 19:06:48 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by spoonbill.gentoo.org (Postfix) with ESMTP id 3857319148 for ; Wed, 25 Jun 2014 19:06:46 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <1403722751.185af393c476122508ba701df7bcbdcb0e4d4a68.swift@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/unconfined.if X-VCS-Directories: policy/modules/system/ X-VCS-Committer: swift X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: 185af393c476122508ba701df7bcbdcb0e4d4a68 X-VCS-Branch: master Date: Wed, 25 Jun 2014 19:06:46 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: fb191697-fb5d-4cd8-8083-82a5b2ce7f86 X-Archives-Hash: 398e6b6d8df683228a24475da973c0c0 commit: 185af393c476122508ba701df7bcbdcb0e4d4a68 Author: Nicolas Iooss m4x org> AuthorDate: Mon Jun 9 12:38:45 2014 +0000 Commit: Sven Vermeulen gentoo org> CommitDate: Wed Jun 25 18:59:11 2014 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=185af393 Allow unconfined domains to use syslog capability When an unconfined_t root user runs dmesg, the kernel complains with this message in its logs (when SELinux is in enforcing mode): dmesg (16289): Attempt to access syslog with CAP_SYS_ADMIN but no CAP_SYSLOG (deprecated). audit.log contains following AVC: avc: denied { syslog } for pid=16289 comm="dmesg" capability=34 scontext=unconfined_u:unconfined_r:unconfined_t tcontext=unconfined_u:unconfined_r:unconfined_t tclass=capability2 --- policy/modules/system/unconfined.if | 1 + 1 file changed, 1 insertion(+) diff --git a/policy/modules/system/unconfined.if b/policy/modules/system/unconfined.if index 5ca20a9..2b85a6e 100644 --- a/policy/modules/system/unconfined.if +++ b/policy/modules/system/unconfined.if @@ -20,6 +20,7 @@ interface(`unconfined_domain_noaudit',` # Use most Linux capabilities allow $1 self:capability ~sys_module; + allow $1 self:capability2 syslog; allow $1 self:fifo_file manage_fifo_file_perms; # Transition to myself, to make get_ordered_context_list happy.