Skip to content

Commit

Permalink
Update bootupd policy when ESP is not mounted
Browse files Browse the repository at this point in the history
bootupd needs to check if device exists before mounting it,
then uses "cp -a" to update the bootloader.

The commit addresses the following AVC denials:
type=AVC msg=audit(1725385838.182:370): avc:  denied  { getattr } for  pid=3034 comm="bootupctl" path="/dev/vda1" dev="devtmpfs" ino=311 scontext=system_u:system_r:bootupd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
type=AVC msg=audit(1725385843.983:373): avc:  denied  { setfscreate } for  pid=3046 comm="cp" scontext=system_u:system_r:bootupd_t:s0 tcontext=system_u:system_r:bootupd_t:s0 tclass=process permissive=1

Resolves: #2341
  • Loading branch information
zpytela committed Sep 4, 2024
1 parent 7ece861 commit 9131c0b
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion policy/modules/contrib/bootupd.te
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ files_pid_file(bootupd_var_run_t)
# bootupd local policy
#
allow bootupd_t self:capability { setgid setuid };
allow bootupd_t self:process { fork setpgid };
allow bootupd_t self:process { fork setfscreate setpgid };
allow bootupd_t self:fifo_file rw_fifo_file_perms;
allow bootupd_t self:unix_dgram_socket create_socket_perms;
allow bootupd_t self:unix_stream_socket create_stream_socket_perms;
Expand All @@ -46,6 +46,8 @@ fs_manage_dos_dirs(bootupd_t)
fs_manage_dos_files(bootupd_t)
fs_search_efivarfs_dirs(bootupd_t)

storage_getattr_fixed_disk_dev(bootupd_t)

optional_policy(`
bootloader_domtrans(bootupd_t)
')
Expand Down

0 comments on commit 9131c0b

Please sign in to comment.