refpolicy: Allow udev the block_suspend capability

Fix the avc denied issue:
type=1400 audit(1399440994.656:14): avc: denied { block_suspend } for pid=80 comm="udevd" capability=36 scontext=system_u:system_r:udev_t:s0-s15:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s15:c0.c1023 tclass=capability2

The patch is backported from upstream

Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Mark Hatle <mark.hatle@windriver.com>
This commit is contained in:
Jackie Huang 2014-05-13 06:01:13 -04:00 committed by Mark Hatle
parent d562aac270
commit 623ee2d0f2
2 changed files with 26 additions and 0 deletions

View File

@ -0,0 +1,25 @@
Allow udev the block_suspend capability
Upstream-Status: backport
upstream commit: 5905067f2acf710ffbb13ba32575e6316619ddd8
Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
---
policy/modules/system/udev.te | 1 +
1 file changed, 1 insertion(+)
diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
index 90e4ab3..efe6c02 100644
--- a/policy/modules/system/udev.te
+++ b/policy/modules/system/udev.te
@@ -39,6 +39,7 @@ ifdef(`enable_mcs',`
allow udev_t self:capability { chown dac_override dac_read_search fowner fsetid sys_admin mknod net_raw net_admin sys_nice sys_rawio sys_resource setuid setgid sys_nice sys_ptrace };
dontaudit udev_t self:capability sys_tty_config;
+allow udev_t self:capability2 block_suspend;
allow udev_t self:process ~{ setcurrent setexec setfscreate setrlimit execmem execstack execheap };
allow udev_t self:process { execmem setfscreate };
allow udev_t self:fd use;
--
1.7.9.5

View File

@ -61,6 +61,7 @@ SRC_URI += "file://poky-policy-fix-xconsole_device_t-as-a-dev_node.patch \
# Backport from upstream
SRC_URI += "file://Allow-ping-to-get-set-capabilities.patch \
file://filesystem-associate-tmpfs_t-shm-to-device_t-devtmpf.patch \
file://Allow-udev-the-block_suspend-capability.patch \
"
include refpolicy_common.inc