Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chrome_sandbox_t sandbox breaks if unprivileged user namespaces are off #393

Closed
DemiMarie opened this issue Jul 8, 2021 · 1 comment
Closed

Comments

@DemiMarie
Copy link

Allowing the following AVCs makes it work:

#============= chrome_sandbox_t ==============
allow chrome_sandbox_t self:capability dac_override;
allow chrome_sandbox_t self:process setcap;
allow chrome_sandbox_t staff_t:file write;

#============= staff_t ==============
allow staff_t chrome_sandbox_t:process setsched;

Presumably similar rules would be needed for other user domains that can use rtkit.

@pebenito
Copy link
Member

chrome_sandbox_t does not exist in refpolicy.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants