Merge pull request #579 from montjoie/portage-misc

portage: add misc mising rules
This commit is contained in:
Chris PeBenito 2023-03-10 14:58:38 -05:00 committed by GitHub
commit f625d5b788
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 11 additions and 2 deletions

View File

@ -262,7 +262,7 @@ interface(`portage_domtrans_gcc_config',`
')
corecmd_search_bin($1)
domtrans_pattern($1, gcc_config_exec_t, gcc_config_t)
nnp_domtrans_pattern($1, gcc_config_exec_t, gcc_config_t)
')
########################################

View File

@ -87,6 +87,7 @@ files_tmpfs_file(portage_tmpfs_t)
allow gcc_config_t self:capability { chown fsetid };
allow gcc_config_t self:fifo_file rw_fifo_file_perms;
allow gcc_config_t self:process getsched;
manage_files_pattern(gcc_config_t, portage_cache_t, portage_cache_t)
@ -95,6 +96,8 @@ read_files_pattern(gcc_config_t, portage_conf_t, portage_conf_t)
allow gcc_config_t portage_ebuild_t:dir list_dir_perms;
read_files_pattern(gcc_config_t, portage_ebuild_t, portage_ebuild_t)
allow gcc_config_t portage_devpts_t:chr_file rw_inherited_term_perms;
allow gcc_config_t portage_exec_t:file mmap_exec_file_perms;
kernel_read_system_state(gcc_config_t)
@ -104,6 +107,8 @@ corecmd_exec_shell(gcc_config_t)
corecmd_exec_bin(gcc_config_t)
corecmd_manage_bin_files(gcc_config_t)
dev_read_sysfs(gcc_config_t)
domain_use_interactive_fds(gcc_config_t)
files_manage_etc_files(gcc_config_t)
@ -128,6 +133,8 @@ logging_send_syslog_msg(gcc_config_t)
miscfiles_read_localization(gcc_config_t)
storage_getattr_fixed_disk_dev(gcc_config_t)
userdom_use_user_terminals(gcc_config_t)
ifdef(`distro_gentoo',`
@ -255,7 +262,7 @@ allow portage_fetch_t portage_devpts_t:chr_file { rw_chr_file_perms setattr_chr_
allow portage_fetch_t portage_gpg_t:dir rw_dir_perms;
allow portage_fetch_t portage_gpg_t:file manage_file_perms;
allow portage_fetch_t portage_tmp_t:dir manage_dir_perms;
allow portage_fetch_t portage_tmp_t:dir { manage_dir_perms watch };
allow portage_fetch_t portage_tmp_t:file manage_file_perms;
allow portage_fetch_t portage_tmp_t:sock_file manage_sock_file_perms;
@ -349,6 +356,8 @@ dontaudit portage_sandbox_t portage_cache_t:file { setattr_file_perms write };
allow portage_sandbox_t portage_log_t:file { create_file_perms delete_file_perms setattr_file_perms append_file_perms };
logging_log_filetrans(portage_sandbox_t, portage_log_t, file)
allow portage_sandbox_t portage_tmp_t:dir watch;
portage_compile_domain(portage_sandbox_t)
auth_use_nsswitch(portage_sandbox_t)