commit: b1eeb204c510ac91225cbd0d05c94475017f2779 Author: Kenton Groombridge <me <AT> concord <DOT> sh> AuthorDate: Sat Apr 30 01:36:10 2022 +0000 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> CommitDate: Sat Sep 3 18:41:55 2022 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=b1eeb204
container: allow containers to manipulate own fds Signed-off-by: Kenton Groombridge <me <AT> concord.sh> Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org> policy/modules/services/container.te | 3 +++ 1 file changed, 3 insertions(+) diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te index 3f6e7aea..36a7163a 100644 --- a/policy/modules/services/container.te +++ b/policy/modules/services/container.te @@ -165,6 +165,8 @@ corenet_port(container_port_t) allow container_domain self:capability { dac_override kill setgid setuid sys_boot sys_chroot }; allow container_domain self:cap_userns { chown dac_override dac_read_search fowner kill setgid setuid }; allow container_domain self:process { execstack execmem getattr getsched getsession setsched setcap setpgid signal_perms }; +allow container_domain self:dir rw_dir_perms; +allow container_domain self:file create_file_perms; allow container_domain self:fifo_file manage_fifo_file_perms; allow container_domain self:sem create_sem_perms; allow container_domain self:shm create_shm_perms; @@ -192,6 +194,7 @@ can_exec(container_domain, container_file_t) kernel_getattr_proc(container_domain) kernel_list_all_proc(container_domain) +kernel_associate_proc(container_domain) kernel_read_kernel_sysctls(container_domain) kernel_rw_net_sysctls(container_domain) kernel_read_system_state(container_domain)