From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id AC39E13855E for ; Sun, 6 Sep 2015 11:25:19 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id D901C141F9; Sun, 6 Sep 2015 11:25:18 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 28B18141F3 for ; Sun, 6 Sep 2015 11:25:18 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 48C04340A36 for ; Sun, 6 Sep 2015 11:25:17 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 8E96A19 for ; Sun, 6 Sep 2015 11:25:14 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1441537123.2a26ba597c47fe006e1c18cdd9224e74aba02bf8.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/chromium.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 2a26ba597c47fe006e1c18cdd9224e74aba02bf8 X-VCS-Branch: master Date: Sun, 6 Sep 2015 11:25:14 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: dc021bf7-a64f-4486-92f9-d28fea55328b X-Archives-Hash: 56ed3bf0bfe7bceb049d86f97638ee78 Message-ID: <20150906112514.Xbpq3ZBMLDf91bJKgbb0tUKNig54teXF276rO4_oUoY@z> commit: 2a26ba597c47fe006e1c18cdd9224e74aba02bf8 Author: Jason Zaman perfinion com> AuthorDate: Sun Sep 6 10:58:43 2015 +0000 Commit: Jason Zaman gentoo org> CommitDate: Sun Sep 6 10:58:43 2015 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=2a26ba59 chromium: v45 needs setcap perms type=AVC msg=audit(1441536942.937:329): avc: denied { setcap } for pid=4857 comm="chrome" scontext=staff_u:staff_r:chromium_t:s0-s0:c0.c511 tcontext=staff_u:staff_r:chromium_t:s0-s0:c0.c511 tclass=process permissive=0 type=SYSCALL msg=audit(1441536942.937:329): arch=c000003e syscall=126 success=no exit=-13 a0=3f40091b950 a1=3f40091b960 a2=3ce87534090 a3=3ce87530010 items=0 ppid=4772 pid=4857 auid=1000 uid=1000 gid=100 euid=1000 suid=1000 fsuid=1000 egid=100 sgid=100 fsgid=100 tty=pts4 ses=3 comm="chrome" exe="/usr/lib64/chromium-browser/chrome" subj=staff_u:staff_r:chromium_t:s0-s0:c0.c511 key=(null) type=ANOM_ABEND msg=audit(1441536942.937:330): auid=1000 uid=1000 gid=100 ses=3 subj=staff_u:staff_r:chromium_t:s0-s0:c0.c511 pid=4857 comm="chrome" exe="/usr/lib64/chromium-browser/chrome" sig=6 [4:4:0906/185542:FATAL:credentials.cc(306)] Check failed: DropAllCapabilitiesOnCurrentThread(). : Permission denied [4765:4783:0906/185542:ERROR:zygote_host_impl_linux.cc(374)] Did not receive ping from zygote child [3:3:0906/185542:ERROR:zygote_linux.cc(573)] Zygote could not fork: process_type renderer numfds 5 child_pid -1 policy/modules/contrib/chromium.te | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/policy/modules/contrib/chromium.te b/policy/modules/contrib/chromium.te index b2c9ccc..3185640 100644 --- a/policy/modules/contrib/chromium.te +++ b/policy/modules/contrib/chromium.te @@ -88,7 +88,7 @@ xdg_cache_home_content(chromium_xdg_cache_t) # chromium local policy # -allow chromium_t self:process { getsched setrlimit setsched sigkill signal }; +allow chromium_t self:process { getsched setcap setrlimit setsched sigkill signal }; allow chromium_t self:fifo_file rw_fifo_file_perms;; allow chromium_t self:sem create_sem_perms; allow chromium_t self:netlink_kobject_uevent_socket client_stream_socket_perms;