From: Dan Walsh <dwalsh(a)redhat.com>
We do not want to allow contained applications to be able to read fusefs_t.
So we want /proc/meminfo label to match the system default proc_t.
---
src/lxc/lxc_container.c | 24 ++++++++++++++++++++++++
1 file changed, 24 insertions(+)
diff --git a/src/lxc/lxc_container.c b/src/lxc/lxc_container.c
index ac0f69c..bba2e3a 100644
--- a/src/lxc/lxc_container.c
+++ b/src/lxc/lxc_container.c
@@ -52,6 +52,10 @@
# include <blkid/blkid.h>
#endif
+#if WITH_SELINUX
+# include <selinux/selinux.h>
+#endif
+
#include "virerror.h"
#include "virlog.h"
#include "lxc_container.h"
@@ -763,6 +767,26 @@ static int lxcContainerMountProcFuse(virDomainDefPtr def,
def->name)) < 0)
return ret;
+#if WITH_SELINUX
+ if (is_selinux_enabled() > 0) {
+ security_context_t scon;
+ ret = getfilecon("/proc/meminfo", &scon);
+ if (ret) {
+ virReportSystemError(errno,
+ _("Failed to get security context of %s for
/proc/meminfo mount point"),
+ meminfo_path);
+ return ret;
+ }
+ ret = setfilecon(meminfo_path, scon);
+ freecon(scon);
+ if (ret) {
+ virReportSystemError(errno,
+ _("Failed to set security context of %s for
/proc/meminfo mount point"),
+ meminfo_path);
+ return ret;
+ }
+ }
+#endif
if ((ret = mount(meminfo_path, "/proc/meminfo",
NULL, MS_BIND, NULL)) < 0) {
virReportSystemError(errno,
--
1.8.2.1