1 |
commit: 8e8d374ced11e137555f2b06155f864469506b42 |
2 |
Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
3 |
AuthorDate: Sat Sep 29 17:40:36 2012 +0000 |
4 |
Commit: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
5 |
CommitDate: Sat Sep 29 17:40:36 2012 +0000 |
6 |
URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=8e8d374c |
7 |
|
8 |
Allow chromium to create a netlink uevent socket |
9 |
|
10 |
The libudev integration within chromium requires this in order to start |
11 |
succesfully. If not, the following error is displayed and the application fails |
12 |
to start up: |
13 |
|
14 |
libudev: udev_monitor_new_from_netlink_fd: error getting socket: Permission |
15 |
denied |
16 |
|
17 |
--- |
18 |
policy/modules/contrib/chromium.te | 3 ++- |
19 |
1 files changed, 2 insertions(+), 1 deletions(-) |
20 |
|
21 |
diff --git a/policy/modules/contrib/chromium.te b/policy/modules/contrib/chromium.te |
22 |
index 9c682a3..d47ced6 100644 |
23 |
--- a/policy/modules/contrib/chromium.te |
24 |
+++ b/policy/modules/contrib/chromium.te |
25 |
@@ -72,9 +72,10 @@ xdg_cache_home_content(chromium_xdg_cache_t) |
26 |
# chromium local policy |
27 |
# |
28 |
|
29 |
-allow chromium_t self:fifo_file rw_fifo_file_perms;; |
30 |
allow chromium_t self:process { getsched setsched signal }; |
31 |
+allow chromium_t self:fifo_file rw_fifo_file_perms;; |
32 |
allow chromium_t self:sem create_sem_perms; |
33 |
+allow chromium_t self:netlink_kobject_uevent_socket client_stream_socket_perms; |
34 |
|
35 |
allow chromium_t chromium_exec_t:file execute_no_trans; |
36 |
allow chromium_t chromium_renderer_t:dir list_dir_perms; |