mirror of
https://passt.top/passt
synced 2024-12-22 05:35:23 +00:00
apparmor: Fix access to procfs namespace entries in pasta's abstraction
From an original patch by Danish Prakash. With commitff22a78d7b
("pasta: Don't try to watch namespaces in procfs with inotify, use timer instead"), if a filesystem-bound target namespace is passed on the command line, we'll grab a handle on its parent directory. That commit, however, didn't introduce a matching AppArmor rule. Add it here. To access a network namespace procfs entry, we also need a 'ptrace' rule. See commit594dce66d3
("isolation: keep CAP_SYS_PTRACE when required") for details as to when we need this -- essentially, it's about operation with Buildah. Reported-by: Jörg Sonnenberger <joerg@bec.de> Link: https://github.com/containers/buildah/issues/5440 Link: https://bugzilla.suse.com/show_bug.cgi?id=1221840 Fixes:ff22a78d7b
("pasta: Don't try to watch namespaces in procfs with inotify, use timer instead") Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
This commit is contained in:
parent
100919ce74
commit
88c2f08eba
@ -29,6 +29,7 @@
|
||||
|
||||
@{run}/user/@{uid}/** rw, # pasta_open_ns(), main()
|
||||
|
||||
@{PROC}/[0-9]*/ns/ r, # pasta_netns_quit_init(),
|
||||
@{PROC}/[0-9]*/ns/net r, # pasta_wait_for_ns(),
|
||||
@{PROC}/[0-9]*/ns/user r, # conf_pasta_ns()
|
||||
|
||||
@ -42,3 +43,5 @@
|
||||
/{usr/,}bin/** Ux,
|
||||
|
||||
/usr/bin/pasta.avx2 ix, # arch_avx2_exec(), arch.c
|
||||
|
||||
ptrace r, # pasta_open_ns()
|
||||
|
Loading…
Reference in New Issue
Block a user