* [PATCH] selinux: Allow pasta to create and use its control socket when started by Podman
@ 2026-05-19 17:36 Stefano Brivio
0 siblings, 0 replies; only message in thread
From: Stefano Brivio @ 2026-05-19 17:36 UTC (permalink / raw)
To: passt-dev; +Cc: Jan Rodák, Paul Holzinger
If Podman starts us, we need to be able to create and use a UNIX
domain socket file under ifconfig_var_run_t or container_var_run_t:
add the related permissions.
The failure reported by Jan would have been fixed by a simple:
allow pasta_t ifconfig_var_run_t:sock_file create;
but we'll need more than that for actual operation with pesto(1),
and to cover all possible cases.
Reported-by: Jan Rodák <jrodak@redhat.com>
Link: https://github.com/containers/podman/pull/28478
Fixes: 533577008942 ("selinux: Add file context and type enforcement for pesto")
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
---
contrib/selinux/pasta.te | 2 ++
1 file changed, 2 insertions(+)
diff --git a/contrib/selinux/pasta.te b/contrib/selinux/pasta.te
index fb51416..ff74dd7 100644
--- a/contrib/selinux/pasta.te
+++ b/contrib/selinux/pasta.te
@@ -253,6 +253,8 @@ allow pasta_t container_var_run_t:dir { add_name open rmdir write };
allow pasta_t ifconfig_var_run_t:dir { add_name open rmdir write };
allow pasta_t container_var_run_t:file { create open write };
allow pasta_t ifconfig_var_run_t:file { create open write };
+allow pasta_t container_var_run_t:sock_file { getattr create open read write };
+allow pasta_t ifconfig_var_run_t:sock_file { getattr create open read write };
allow systemd_user_runtimedir_t ifconfig_var_run_t:dir rmdir;
# Allow pasta to bind to any port
--
2.43.0
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2026-05-19 17:36 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2026-05-19 17:36 [PATCH] selinux: Allow pasta to create and use its control socket when started by Podman Stefano Brivio
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).