commit: b1eeb204c510ac91225cbd0d05c94475017f2779
Author: Kenton Groombridge <me <AT> concord <DOT> sh>
AuthorDate: Sat Apr 30 01:36:10 2022 +0000
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Sat Sep 3 18:41:55 2022 +0000
URL:
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=b1eeb204
container: allow containers to manipulate own fds
Signed-off-by: Kenton Groombridge <me <AT> concord.sh>
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
policy/modules/services/container.te | 3 +++
1 file changed, 3 insertions(+)
diff --git a/policy/modules/services/container.te
b/policy/modules/services/container.te
index 3f6e7aea..36a7163a 100644
--- a/policy/modules/services/container.te
+++ b/policy/modules/services/container.te
@@ -165,6 +165,8 @@ corenet_port(container_port_t)
allow container_domain self:capability { dac_override kill setgid setuid
sys_boot sys_chroot };
allow container_domain self:cap_userns { chown dac_override dac_read_search
fowner kill setgid setuid };
allow container_domain self:process { execstack execmem getattr getsched
getsession setsched setcap setpgid signal_perms };
+allow container_domain self:dir rw_dir_perms;
+allow container_domain self:file create_file_perms;
allow container_domain self:fifo_file manage_fifo_file_perms;
allow container_domain self:sem create_sem_perms;
allow container_domain self:shm create_shm_perms;
@@ -192,6 +194,7 @@ can_exec(container_domain, container_file_t)
kernel_getattr_proc(container_domain)
kernel_list_all_proc(container_domain)
+kernel_associate_proc(container_domain)
kernel_read_kernel_sysctls(container_domain)
kernel_rw_net_sysctls(container_domain)
kernel_read_system_state(container_domain)