commit: 2a26ba597c47fe006e1c18cdd9224e74aba02bf8 Author: Jason Zaman <jason <AT> perfinion <DOT> com> AuthorDate: Sun Sep 6 10:58:43 2015 +0000 Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org> CommitDate: Sun Sep 6 10:58:43 2015 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=2a26ba59
chromium: v45 needs setcap perms type=AVC msg=audit(1441536942.937:329): avc: denied { setcap } for pid=4857 comm="chrome" scontext=staff_u:staff_r:chromium_t:s0-s0:c0.c511 tcontext=staff_u:staff_r:chromium_t:s0-s0:c0.c511 tclass=process permissive=0 type=SYSCALL msg=audit(1441536942.937:329): arch=c000003e syscall=126 success=no exit=-13 a0=3f40091b950 a1=3f40091b960 a2=3ce87534090 a3=3ce87530010 items=0 ppid=4772 pid=4857 auid=1000 uid=1000 gid=100 euid=1000 suid=1000 fsuid=1000 egid=100 sgid=100 fsgid=100 tty=pts4 ses=3 comm="chrome" exe="/usr/lib64/chromium-browser/chrome" subj=staff_u:staff_r:chromium_t:s0-s0:c0.c511 key=(null) type=ANOM_ABEND msg=audit(1441536942.937:330): auid=1000 uid=1000 gid=100 ses=3 subj=staff_u:staff_r:chromium_t:s0-s0:c0.c511 pid=4857 comm="chrome" exe="/usr/lib64/chromium-browser/chrome" sig=6 [4:4:0906/185542:FATAL:credentials.cc(306)] Check failed: DropAllCapabilitiesOnCurrentThread(). : Permission denied [4765:4783:0906/185542:ERROR:zygote_host_impl_linux.cc(374)] Did not receive ping from zygote child [3:3:0906/185542:ERROR:zygote_linux.cc(573)] Zygote could not fork: process_type renderer numfds 5 child_pid -1 policy/modules/contrib/chromium.te | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/policy/modules/contrib/chromium.te b/policy/modules/contrib/chromium.te index b2c9ccc..3185640 100644 --- a/policy/modules/contrib/chromium.te +++ b/policy/modules/contrib/chromium.te @@ -88,7 +88,7 @@ xdg_cache_home_content(chromium_xdg_cache_t) # chromium local policy # -allow chromium_t self:process { getsched setrlimit setsched sigkill signal }; +allow chromium_t self:process { getsched setcap setrlimit setsched sigkill signal }; allow chromium_t self:fifo_file rw_fifo_file_perms;; allow chromium_t self:sem create_sem_perms; allow chromium_t self:netlink_kobject_uevent_socket client_stream_socket_perms;