Package: selinux-policy-default Version: 2:2.20140206-1 Severity: normal ndc_t being prevented from block_suspend on itself:
Feb 13 00:46:38 a6 kernel: [ 541.076682] type=1400 audit(1392281198.624:176): avc: denied { block_suspend } for pid=4506 comm="rndc" capability=36 scontext=system_u:system_r:ndc_t:s0 tcontext=system_u:system_r:ndc_t:s0 tclass=capability2 This also came up in Redhat Bug#895070 but the fix was seemingly never pushed upstream. Patch attached. -- System Information: Debian Release: jessie/sid APT prefers testing APT policy: (990, 'testing'), (500, 'testing-updates'), (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.12-1-amd64 (SMP w/8 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages selinux-policy-default depends on: ii libpam-modules 1.1.3-9 ii libselinux1 2.2.2-1 ii libsepol1 2.2-1 ii policycoreutils 2.2.5-1 ii python 2.7.5-5 ii selinux-utils 2.2.2-1 Versions of packages selinux-policy-default recommends: ii checkpolicy 2.2-1 ii setools 3.3.8-3 Versions of packages selinux-policy-default suggests: pn logcheck <none> pn syslog-summary <none> -- Configuration Files: /etc/selinux/default/modules/active/file_contexts.local [Errno 13] Permission denied: u'/etc/selinux/default/modules/active/file_contexts.local' -- debconf-show failed
commit 5aacc83a8e267ea4dada5d6044a42f598b8b1735 Author: Devin Carraway <g...@devin.com> Date: Thu Feb 13 21:59:54 2014 -0800 Allow ndc_t to prevent suspend on epoll events. Capability background: http://thread.gmane.org/gmane.linux.kernel/1289986 Fixes audit denial: Feb 13 00:46:38 a6 kernel: [ 541.076682] type=1400 audit(1392281198.624:176): avc: denied { block_suspend } for pid=4506 comm="rndc" capability=36 scontext=system_u:system_r:ndc_t:s0 tcontext=system_u:system_r:ndc_t:s0 tclass=capability2 diff --git a/policy/modules/contrib/bind.te b/policy/modules/contrib/bind.te index 1241123..101893f 100644 --- a/policy/modules/contrib/bind.te +++ b/policy/modules/contrib/bind.te @@ -215,6 +215,7 @@ optional_policy(` # allow ndc_t self:capability { dac_override net_admin }; +allow ndc_t self:capability2 block_suspend; allow ndc_t self:process signal_perms; allow ndc_t self:fifo_file rw_fifo_file_perms; allow ndc_t self:unix_stream_socket { accept listen };