Gentoo Archives: gentoo-commits

From: Jason Zaman <gentoo@×××××××××.com>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:perfinion commit in: policy/modules/system/
Date: Mon, 25 Aug 2014 17:16:28
Message-Id: 1408734735.482dc188fa0709641e76778f2c22f0b248cb4f82.perfinion@gentoo
1 commit: 482dc188fa0709641e76778f2c22f0b248cb4f82
2 Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
3 AuthorDate: Fri Aug 22 19:12:15 2014 +0000
4 Commit: Jason Zaman <gentoo <AT> perfinion <DOT> com>
5 CommitDate: Fri Aug 22 19:12:15 2014 +0000
6 URL: http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=482dc188
7
8 It is a template, so use _t (compile issue otherwise)
9
10 ---
11 policy/modules/system/userdomain.if | 2 +-
12 1 file changed, 1 insertion(+), 1 deletion(-)
13
14 diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
15 index 78cb3ad..08139d9 100644
16 --- a/policy/modules/system/userdomain.if
17 +++ b/policy/modules/system/userdomain.if
18 @@ -1246,7 +1246,7 @@ template(`userdom_admin_user_template',`
19 # Grant block_suspend capability2 to administrators, this annoys the heck out of me
20 allow $1_t self:capability2 { block_suspend };
21 # Allow admins to interact with kernel, for instance using lsusb command
22 - allow $1 self:netlink_kobject_uevent_socket create_socket_perms;
23 + allow $1_t self:netlink_kobject_uevent_socket create_socket_perms;
24 # Moved out of files_relabel_non_auth_files as it cannot be used in tunable_policy otherwise
25 seutil_relabelto_bin_policy($1_t)
26 ')