1 |
commit: 9a4bd55ce8206aae6be8fcba774d5659d9daf8ce |
2 |
Author: Kenton Groombridge <me <AT> concord <DOT> sh> |
3 |
AuthorDate: Fri Dec 31 19:04:16 2021 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Sun Jan 30 01:12:42 2022 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=9a4bd55c |
7 |
|
8 |
container: allow containers to read read-only container files |
9 |
|
10 |
Signed-off-by: Kenton Groombridge <me <AT> concord.sh> |
11 |
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org> |
12 |
|
13 |
policy/modules/services/container.te | 7 +++++++ |
14 |
1 file changed, 7 insertions(+) |
15 |
|
16 |
diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te |
17 |
index 483cdcb2..87ceaeda 100644 |
18 |
--- a/policy/modules/services/container.te |
19 |
+++ b/policy/modules/services/container.te |
20 |
@@ -137,6 +137,13 @@ rw_chr_files_pattern(container_domain, container_file_t, container_file_t) |
21 |
rw_blk_files_pattern(container_domain, container_file_t, container_file_t) |
22 |
allow container_domain container_file_t:dir_file_class_set watch; |
23 |
|
24 |
+allow container_domain container_ro_file_t:blk_file read_blk_file_perms; |
25 |
+allow container_domain container_ro_file_t:dir list_dir_perms; |
26 |
+allow container_domain container_ro_file_t:chr_file read_chr_file_perms; |
27 |
+allow container_domain container_ro_file_t:file { exec_file_perms read_file_perms }; |
28 |
+allow container_domain container_ro_file_t:lnk_file read_lnk_file_perms; |
29 |
+allow container_domain container_ro_file_t:sock_file read_sock_file_perms; |
30 |
+ |
31 |
can_exec(container_domain, container_file_t) |
32 |
|
33 |
kernel_getattr_proc(container_domain) |