apparmor: Allow read-only access to uid_map
Starting with commit770d1a4502
("isolation: Initially Keep CAP_SETFCAP if running as UID 0 in non-init"), the lack of this rule became more apparent as pasta needs to access uid_map in procfs even as non-root. However, both passt and pasta needs this, in case they are started as root, so add this directly to passt's abstraction (which is sourced by pasta's profile too). Fixes:770d1a4502
("isolation: Initially Keep CAP_SETFCAP if running as UID 0 in non-init") Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
This commit is contained in:
parent
b686afa23e
commit
e2ad420fa2
1 changed files with 2 additions and 0 deletions
|
@ -31,6 +31,8 @@
|
||||||
pivot_root "/tmp/" -> "/tmp/",
|
pivot_root "/tmp/" -> "/tmp/",
|
||||||
umount "/",
|
umount "/",
|
||||||
|
|
||||||
|
owner @{PROC}/@{pid}/uid_map r, # conf_ugid()
|
||||||
|
|
||||||
network netlink raw, # nl_sock_init_do(), netlink.c
|
network netlink raw, # nl_sock_init_do(), netlink.c
|
||||||
|
|
||||||
network inet stream, # tcp.c
|
network inet stream, # tcp.c
|
||||||
|
|
Loading…
Reference in a new issue