Gentoo Archives: gentoo-commits

From: Jason Zaman <gentoo@×××××××××.com>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:perfinion commit in: policy/modules/system/
Date: Mon, 25 Aug 2014 17:16:27
Message-Id: 1408734319.1df21420237c54a402798d9cff437c32017c714e.perfinion@gentoo
1 commit: 1df21420237c54a402798d9cff437c32017c714e
2 Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
3 AuthorDate: Fri Aug 22 19:05:19 2014 +0000
4 Commit: Jason Zaman <gentoo <AT> perfinion <DOT> com>
5 CommitDate: Fri Aug 22 19:05:19 2014 +0000
6 URL: http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=1df21420
7
8 Allow sysadmins to interact with kernel (for instance for lsusb command)
9
10 ---
11 policy/modules/system/userdomain.if | 2 ++
12 1 file changed, 2 insertions(+)
13
14 diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
15 index 5b26aef..78cb3ad 100644
16 --- a/policy/modules/system/userdomain.if
17 +++ b/policy/modules/system/userdomain.if
18 @@ -1245,6 +1245,8 @@ template(`userdom_admin_user_template',`
19 ifdef(`distro_gentoo',`
20 # Grant block_suspend capability2 to administrators, this annoys the heck out of me
21 allow $1_t self:capability2 { block_suspend };
22 + # Allow admins to interact with kernel, for instance using lsusb command
23 + allow $1 self:netlink_kobject_uevent_socket create_socket_perms;
24 # Moved out of files_relabel_non_auth_files as it cannot be used in tunable_policy otherwise
25 seutil_relabelto_bin_policy($1_t)
26 ')