diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0044-policy-modules-system-modutils-allow-kmod_t-to-write.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0044-policy-modules-system-modutils-allow-kmod_t-to-write.patch | 34 |
1 files changed, 34 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0044-policy-modules-system-modutils-allow-kmod_t-to-write.patch b/recipes-security/refpolicy/refpolicy/0044-policy-modules-system-modutils-allow-kmod_t-to-write.patch new file mode 100644 index 0000000..2f94974 --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0044-policy-modules-system-modutils-allow-kmod_t-to-write.patch | |||
@@ -0,0 +1,34 @@ | |||
1 | From 8343ff97a265836ba1e1e2f4159f888c21e5cabe Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Tue, 9 Feb 2021 17:31:55 +0800 | ||
4 | Subject: [PATCH] policy/modules/system/modutils: allow kmod_t to write keys | ||
5 | |||
6 | Fixes: | ||
7 | kernel: cfg80211: Problem loading in-kernel X.509 certificate (-13) | ||
8 | |||
9 | avc: denied { write } for pid=219 comm="modprobe" | ||
10 | scontext=system_u:system_r:kmod_t tcontext=system_u:system_r:kmod_t | ||
11 | tclass=key permissive=0 | ||
12 | |||
13 | Upstream-Status: Inappropriate [embedded specific] | ||
14 | |||
15 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
16 | --- | ||
17 | policy/modules/system/modutils.te | 1 + | ||
18 | 1 file changed, 1 insertion(+) | ||
19 | |||
20 | diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te | ||
21 | index 5b4f0aca1..008f286a8 100644 | ||
22 | --- a/policy/modules/system/modutils.te | ||
23 | +++ b/policy/modules/system/modutils.te | ||
24 | @@ -42,6 +42,7 @@ allow kmod_t self:udp_socket create_socket_perms; | ||
25 | allow kmod_t self:rawip_socket create_socket_perms; | ||
26 | |||
27 | allow kmod_t self:lockdown confidentiality; | ||
28 | +allow kmod_t self:key write; | ||
29 | |||
30 | # Read module config and dependency information | ||
31 | list_dirs_pattern(kmod_t, modules_conf_t, modules_conf_t) | ||
32 | -- | ||
33 | 2.17.1 | ||
34 | |||