Skip to content

Commit

Permalink
Allow containers to setattr on their processes link files
Browse files Browse the repository at this point in the history
Also allow remounting of /proc.  These AVCs are seen
when attempt to run buildah within a user namespace
separated container.

Signed-off-by: Daniel J Walsh <[email protected]>
  • Loading branch information
rhatdan committed Aug 19, 2019
1 parent 4f7d6bb commit 028ab00
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 2 deletions.
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2.113.0
2.114.0
5 changes: 4 additions & 1 deletion container.te
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
policy_module(container, 2.113.0)
policy_module(container, 2.114.0)
gen_require(`
class passwd rootok;
')
Expand Down Expand Up @@ -659,6 +659,7 @@ allow container_domain container_runtime_t:fifo_file { rw_fifo_file_perms map };
allow container_domain container_runtime_t:fd use;
allow container_runtime_t container_domain:fd use;
allow container_domain self:socket_class_set { create_socket_perms map accept };
allow container_domain self:lnk_file setattr;

dontaudit container_domain self:capability fsetid;
allow container_domain self:association sendto;
Expand Down Expand Up @@ -1038,3 +1039,5 @@ gen_require(`
attribute device_node;
')
dontaudit container_domain device_node:chr_file setattr;

allow container_t proc_t:filesystem remount;

0 comments on commit 028ab00

Please sign in to comment.