1 |
commit: 3453ea565d37914f41109bf1d742451c448e673d |
2 |
Author: Laurent Bigonville <bigon <AT> bigon <DOT> be> |
3 |
AuthorDate: Fri Jan 15 10:42:25 2016 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Sat Jan 30 17:16:56 2016 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=3453ea56 |
7 |
|
8 |
Allow systemd the audit_read capability |
9 |
|
10 |
At early boot, I get the following messages in dmesg: |
11 |
|
12 |
audit: type=1400 audit(1452851002.184:3): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=capability2 permissive=1 |
13 |
systemd[1]: Listening on Journal Audit Socket. |
14 |
|
15 |
policy/modules/system/init.te | 2 +- |
16 |
1 file changed, 1 insertion(+), 1 deletion(-) |
17 |
|
18 |
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te |
19 |
index 0aafb44..1239f1b 100644 |
20 |
--- a/policy/modules/system/init.te |
21 |
+++ b/policy/modules/system/init.te |
22 |
@@ -195,7 +195,7 @@ ifdef(`init_systemd',` |
23 |
typeattribute init_t init_run_all_scripts_domain; |
24 |
|
25 |
allow init_t self:process { getcap getsched setsched setpgid setfscreate setsockcreate setcap setrlimit }; |
26 |
- allow init_t self:capability2 block_suspend; |
27 |
+ allow init_t self:capability2 { audit_read block_suspend }; |
28 |
allow init_t self:netlink_kobject_uevent_socket create_socket_perms; |
29 |
allow init_t self:netlink_route_socket create_netlink_socket_perms; |
30 |
allow init_t self:netlink_selinux_socket create_socket_perms; |