Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/
Date: Sun, 30 Jan 2022 01:22:51
Message-Id: 1643505162.9a4bd55ce8206aae6be8fcba774d5659d9daf8ce.perfinion@gentoo
1 commit: 9a4bd55ce8206aae6be8fcba774d5659d9daf8ce
2 Author: Kenton Groombridge <me <AT> concord <DOT> sh>
3 AuthorDate: Fri Dec 31 19:04:16 2021 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Sun Jan 30 01:12:42 2022 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=9a4bd55c
7
8 container: allow containers to read read-only container files
9
10 Signed-off-by: Kenton Groombridge <me <AT> concord.sh>
11 Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
12
13 policy/modules/services/container.te | 7 +++++++
14 1 file changed, 7 insertions(+)
15
16 diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te
17 index 483cdcb2..87ceaeda 100644
18 --- a/policy/modules/services/container.te
19 +++ b/policy/modules/services/container.te
20 @@ -137,6 +137,13 @@ rw_chr_files_pattern(container_domain, container_file_t, container_file_t)
21 rw_blk_files_pattern(container_domain, container_file_t, container_file_t)
22 allow container_domain container_file_t:dir_file_class_set watch;
23
24 +allow container_domain container_ro_file_t:blk_file read_blk_file_perms;
25 +allow container_domain container_ro_file_t:dir list_dir_perms;
26 +allow container_domain container_ro_file_t:chr_file read_chr_file_perms;
27 +allow container_domain container_ro_file_t:file { exec_file_perms read_file_perms };
28 +allow container_domain container_ro_file_t:lnk_file read_lnk_file_perms;
29 +allow container_domain container_ro_file_t:sock_file read_sock_file_perms;
30 +
31 can_exec(container_domain, container_file_t)
32
33 kernel_getattr_proc(container_domain)