From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <gentoo-commits+bounces-1362837-garchives=archives.gentoo.org@lists.gentoo.org> Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id A3209158087 for <garchives@archives.gentoo.org>; Sun, 30 Jan 2022 01:22:57 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 386202BC051; Sun, 30 Jan 2022 01:22:53 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id B4BC52BC050 for <gentoo-commits@lists.gentoo.org>; Sun, 30 Jan 2022 01:22:52 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 0DE82343386 for <gentoo-commits@lists.gentoo.org>; Sun, 30 Jan 2022 01:22:51 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 6D38B2DB for <gentoo-commits@lists.gentoo.org>; Sun, 30 Jan 2022 01:22:46 +0000 (UTC) From: "Jason Zaman" <perfinion@gentoo.org> To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" <perfinion@gentoo.org> Message-ID: <1643505306.16711830e9075fd6d36b32875cde26c286a98b5d.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/services/container.te X-VCS-Directories: policy/modules/services/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 16711830e9075fd6d36b32875cde26c286a98b5d X-VCS-Branch: master Date: Sun, 30 Jan 2022 01:22:46 +0000 (UTC) Precedence: bulk List-Post: <mailto:gentoo-commits@lists.gentoo.org> List-Help: <mailto:gentoo-commits+help@lists.gentoo.org> List-Unsubscribe: <mailto:gentoo-commits+unsubscribe@lists.gentoo.org> List-Subscribe: <mailto:gentoo-commits+subscribe@lists.gentoo.org> List-Id: Gentoo Linux mail <gentoo-commits.gentoo.org> X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: a8242d87-75e6-48d5-95bf-e3b1b20bbdc3 X-Archives-Hash: bc49e4d2db29a929814aa02100cedf9d commit: 16711830e9075fd6d36b32875cde26c286a98b5d Author: Kenton Groombridge <me <AT> concord <DOT> sh> AuthorDate: Mon Jan 24 16:08:50 2022 +0000 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> CommitDate: Sun Jan 30 01:15:06 2022 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=16711830 container: allow containers to getsession Found to be required by a jellyfin container when testing. Signed-off-by: Kenton Groombridge <me <AT> concord.sh> Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org> policy/modules/services/container.te | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te index 1291768c..d5f79b15 100644 --- a/policy/modules/services/container.te +++ b/policy/modules/services/container.te @@ -150,7 +150,7 @@ corenet_port(container_port_t) allow container_domain self:capability { dac_override kill setgid setuid sys_boot sys_chroot }; allow container_domain self:cap_userns { chown dac_override fowner setgid setuid }; -allow container_domain self:process { execstack execmem getattr signal_perms getsched setsched setcap setpgid }; +allow container_domain self:process { execstack execmem getattr getsched getsession setsched setcap setpgid signal_perms }; allow container_domain self:fifo_file manage_fifo_file_perms; allow container_domain self:sem create_sem_perms; allow container_domain self:shm create_shm_perms;