1 |
commit: b1eeb204c510ac91225cbd0d05c94475017f2779 |
2 |
Author: Kenton Groombridge <me <AT> concord <DOT> sh> |
3 |
AuthorDate: Sat Apr 30 01:36:10 2022 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Sat Sep 3 18:41:55 2022 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=b1eeb204 |
7 |
|
8 |
container: allow containers to manipulate own fds |
9 |
|
10 |
Signed-off-by: Kenton Groombridge <me <AT> concord.sh> |
11 |
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org> |
12 |
|
13 |
policy/modules/services/container.te | 3 +++ |
14 |
1 file changed, 3 insertions(+) |
15 |
|
16 |
diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te |
17 |
index 3f6e7aea..36a7163a 100644 |
18 |
--- a/policy/modules/services/container.te |
19 |
+++ b/policy/modules/services/container.te |
20 |
@@ -165,6 +165,8 @@ corenet_port(container_port_t) |
21 |
allow container_domain self:capability { dac_override kill setgid setuid sys_boot sys_chroot }; |
22 |
allow container_domain self:cap_userns { chown dac_override dac_read_search fowner kill setgid setuid }; |
23 |
allow container_domain self:process { execstack execmem getattr getsched getsession setsched setcap setpgid signal_perms }; |
24 |
+allow container_domain self:dir rw_dir_perms; |
25 |
+allow container_domain self:file create_file_perms; |
26 |
allow container_domain self:fifo_file manage_fifo_file_perms; |
27 |
allow container_domain self:sem create_sem_perms; |
28 |
allow container_domain self:shm create_shm_perms; |
29 |
@@ -192,6 +194,7 @@ can_exec(container_domain, container_file_t) |
30 |
|
31 |
kernel_getattr_proc(container_domain) |
32 |
kernel_list_all_proc(container_domain) |
33 |
+kernel_associate_proc(container_domain) |
34 |
kernel_read_kernel_sysctls(container_domain) |
35 |
kernel_rw_net_sysctls(container_domain) |
36 |
kernel_read_system_state(container_domain) |