sec-policy/selinux-virt: Allow setattr on devpts ptys and grant pipefs access

Policy was blocking the modification of attributes on devpts ptys, making it
impossible to enter a rkt container interactively. Fix that. In addition,
pipefs access is being blocked which makes Docker unhappy. Fix that too.
This commit is contained in:
Matthew Garrett 2016-05-23 16:08:14 -07:00
parent 70060e867d
commit 6dc592af52
5 changed files with 3 additions and 1 deletions

View File

@ -1,7 +1,7 @@
diff -u contrib.orig/virt.te contrib/virt.te diff -u contrib.orig/virt.te contrib/virt.te
--- modules/contrib.orig/virt.te 2016-02-20 13:18:44.670955920 -0800 --- modules/contrib.orig/virt.te 2016-02-20 13:18:44.670955920 -0800
+++ modules/contrib/virt.te 2016-02-20 13:22:24.186318856 -0800 +++ modules/contrib/virt.te 2016-02-20 13:22:24.186318856 -0800
@@ -1299,3 +1299,30 @@ @@ -1299,3 +1299,32 @@
virt_append_log(virtlockd_t) virt_append_log(virtlockd_t)
virt_read_config(virtlockd_t) virt_read_config(virtlockd_t)
@ -27,8 +27,10 @@ diff -u contrib.orig/virt.te contrib/virt.te
+term_use_generic_ptys(svirt_lxc_net_t) +term_use_generic_ptys(svirt_lxc_net_t)
+term_setattr_generic_ptys(svirt_lxc_net_t) +term_setattr_generic_ptys(svirt_lxc_net_t)
+allow svirt_lxc_net_t tmpfs_t:chr_file { read write open }; +allow svirt_lxc_net_t tmpfs_t:chr_file { read write open };
+allow svirt_lxc_net_t svirt_lxc_file_t:chr_file { setattr };
+allow svirt_lxc_net_t self:capability sys_chroot; +allow svirt_lxc_net_t self:capability sys_chroot;
+allow svirt_lxc_net_t self:process getpgid; +allow svirt_lxc_net_t self:process getpgid;
+allow svirt_lxc_net_t svirt_lxc_file_t:file { entrypoint mounton }; +allow svirt_lxc_net_t svirt_lxc_file_t:file { entrypoint mounton };
+allow svirt_lxc_net_t var_lib_t:file { entrypoint execute execute_no_trans }; +allow svirt_lxc_net_t var_lib_t:file { entrypoint execute execute_no_trans };
+allow svirt_lxc_net_t kernel_t:fifo_file {read write open };
+ +