From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <gentoo-commits+bounces-933255-garchives=archives.gentoo.org@lists.gentoo.org>
Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by finch.gentoo.org (Postfix) with ESMTPS id 70DB7139694
	for <garchives@archives.gentoo.org>; Tue, 21 Feb 2017 08:42:50 +0000 (UTC)
Received: from pigeon.gentoo.org (localhost [127.0.0.1])
	by pigeon.gentoo.org (Postfix) with SMTP id 81D9E21C2D5;
	Tue, 21 Feb 2017 08:42:09 +0000 (UTC)
Received: from smtp.gentoo.org (dev.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by pigeon.gentoo.org (Postfix) with ESMTPS id 6247521C2D4
	for <gentoo-commits@lists.gentoo.org>; Tue, 21 Feb 2017 08:42:09 +0000 (UTC)
Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by smtp.gentoo.org (Postfix) with ESMTPS id 7C66833BF1C
	for <gentoo-commits@lists.gentoo.org>; Tue, 21 Feb 2017 08:42:08 +0000 (UTC)
Received: from localhost.localdomain (localhost [IPv6:::1])
	by oystercatcher.gentoo.org (Postfix) with ESMTP id 216934F55
	for <gentoo-commits@lists.gentoo.org>; Tue, 21 Feb 2017 08:42:07 +0000 (UTC)
From: "Jason Zaman" <perfinion@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Content-Transfer-Encoding: 8bit
Content-type: text/plain; charset=UTF-8
Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" <perfinion@gentoo.org>
Message-ID: <1487661622.df456d5061ced9438b779626ae72fbd3e05b44b1.perfinion@gentoo>
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/
X-VCS-Repository: proj/hardened-refpolicy
X-VCS-Files: policy/modules/contrib/portage.te
X-VCS-Directories: policy/modules/contrib/
X-VCS-Committer: perfinion
X-VCS-Committer-Name: Jason Zaman
X-VCS-Revision: df456d5061ced9438b779626ae72fbd3e05b44b1
X-VCS-Branch: master
Date: Tue, 21 Feb 2017 08:42:07 +0000 (UTC)
Precedence: bulk
List-Post: <mailto:gentoo-commits@lists.gentoo.org>
List-Help: <mailto:gentoo-commits+help@lists.gentoo.org>
List-Unsubscribe: <mailto:gentoo-commits+unsubscribe@lists.gentoo.org>
List-Subscribe: <mailto:gentoo-commits+subscribe@lists.gentoo.org>
List-Id: Gentoo Linux mail <gentoo-commits.gentoo.org>
X-BeenThere: gentoo-commits@lists.gentoo.org
X-Archives-Salt: 10d9204b-6ff0-42ab-9082-130ed73a3306
X-Archives-Hash: 250ed3b25ed0aba0e5c2e646483fc4b3

commit:     df456d5061ced9438b779626ae72fbd3e05b44b1
Author:     Jason Zaman <jason <AT> perfinion <DOT> com>
AuthorDate: Sat Feb 18 14:33:08 2017 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Tue Feb 21 07:20:22 2017 +0000
URL:        https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=df456d50

portage: allow sandbox to set fcaps

type=AVC avc:  denied  { setfcap } for  pid=29492 comm="setcap" capability=31  scontext=staff_u:sysadm_r:portage_sandbox_t:s0-s0:c0.c1023 tcontext=staff_u:sysadm_r:portage_sandbox_t:s0-s0:c0.c1023 tclass=capability permissive=0
type=SYSCALL arch=c000003e syscall=188 success=no exit=-1 a0=3f433a23dc3 a1=3d130457f80 a2=3f433a22980 a3=14 items=1 ppid=29491 pid=29492 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 ses=4 comm="setcap" exe="/sbin/setcap" subj=staff_u:sysadm_r:portage_sandbox_t:s0-s0:c0.c1023 key=(null)
type=PATH item=0 name="/var/tmp/portage/media-libs/gstreamer-1.10.3/image//usr/lib64/gstreamer-1.0/gst-ptp-helper" inode=13862 dev=00:3a mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:portage_tmp_t:s0 nametype=NORMAL

 policy/modules/contrib/portage.te | 1 +
 1 file changed, 1 insertion(+)

diff --git a/policy/modules/contrib/portage.te b/policy/modules/contrib/portage.te
index ef04131e..114a0fe4 100644
--- a/policy/modules/contrib/portage.te
+++ b/policy/modules/contrib/portage.te
@@ -350,6 +350,7 @@ optional_policy(`
 # - SELinux-enforced sandbox
 #
 
+allow portage_sandbox_t self:capability setfcap;
 allow portage_sandbox_t self:process ptrace;
 dontaudit portage_sandbox_t self:netlink_route_socket rw_netlink_socket_perms;