mirror of
https://github.com/containers/podman
synced 2024-10-22 02:03:38 +00:00
Merge pull request #2613 from rhatdan/selinux
Fix SELinux on host shared systems in userns
This commit is contained in:
commit
1466c8a2f8
|
@ -454,10 +454,6 @@ func findMount(target string, mounts []*pmount.Info) (*pmount.Info, error) {
|
|||
}
|
||||
|
||||
func blockAccessToKernelFilesystems(config *CreateConfig, g *generate.Generator) {
|
||||
if config.PidMode.IsHost() && rootless.IsRootless() {
|
||||
return
|
||||
}
|
||||
|
||||
if !config.Privileged {
|
||||
for _, mp := range []string{
|
||||
"/proc/acpi",
|
||||
|
@ -469,10 +465,15 @@ func blockAccessToKernelFilesystems(config *CreateConfig, g *generate.Generator)
|
|||
"/proc/sched_debug",
|
||||
"/proc/scsi",
|
||||
"/sys/firmware",
|
||||
"/sys/fs/selinux",
|
||||
} {
|
||||
g.AddLinuxMaskedPaths(mp)
|
||||
}
|
||||
|
||||
if config.PidMode.IsHost() && rootless.IsRootless() {
|
||||
return
|
||||
}
|
||||
|
||||
for _, rp := range []string{
|
||||
"/proc/asound",
|
||||
"/proc/bus",
|
||||
|
|
Loading…
Reference in a new issue