2019-03-15 19:15:31 +01:00
|
|
|
type fsverity_init, domain, coredomain;
|
|
|
|
type fsverity_init_exec, exec_type, file_type, system_file_type;
|
|
|
|
|
|
|
|
init_daemon_domain(fsverity_init)
|
|
|
|
|
|
|
|
# Allow to read /proc/keys for searching key id.
|
|
|
|
allow fsverity_init proc_keys:file r_file_perms;
|
|
|
|
|
2021-07-13 21:21:54 +02:00
|
|
|
# Ignore denials to access irrelevant keys, as a side effect to access /proc/keys.
|
|
|
|
dontaudit fsverity_init domain:key view;
|
2019-03-15 19:15:31 +01:00
|
|
|
allow fsverity_init kernel:key { view search write setattr };
|
|
|
|
allow fsverity_init fsverity_init:key { view search write };
|
|
|
|
|
2020-11-27 12:23:54 +01:00
|
|
|
# Read the on-device signing certificate, to be able to add it to the keyring
|
|
|
|
allow fsverity_init odsign:fd use;
|
|
|
|
allow fsverity_init odsign_data_file:file { getattr read };
|
|
|
|
|
2019-03-15 19:15:31 +01:00
|
|
|
# When kernel requests an algorithm, the crypto API first looks for an
|
|
|
|
# already registered algorithm with that name. If it fails, the kernel creates
|
|
|
|
# an implementation of the algorithm from templates.
|
|
|
|
dontaudit fsverity_init kernel:system module_request;
|