volatile-binds: add recipe variable to allow disabling OverlayFS

Use the new MOUNT_COPYBIND_AVOID_OVERLAYFS flag provided by mount-copybind.
When SELinux is enabled, processes accessing OverlayFS mounts will get a denial
if the process setting up the mount doesn't have all the permissions that
the accessor has.

(From OE-Core rev: 6002bdc77643c363a8326bf163baecba8b36e3e0)

Signed-off-by: Luca Boccassi <luca.boccassi@microsoft.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
Luca Boccassi
2022-03-28 16:26:54 +01:00
committed by Richard Purdie
parent 240e5ab3c4
commit 259c30621f
2 changed files with 5 additions and 0 deletions

View File

@@ -11,6 +11,7 @@ ConditionPathIsReadWrite=!@where@
Type=oneshot
RemainAfterExit=Yes
TimeoutSec=0
Environment=MOUNT_COPYBIND_AVOID_OVERLAYFS=@avoid_overlayfs@
ExecStart=/sbin/mount-copybind @what@ @where@
ExecStop=/bin/umount @where@

View File

@@ -37,6 +37,9 @@ SYSTEMD_SERVICE:${PN} = "${@volatile_systemd_services(d)}"
FILES:${PN} += "${systemd_system_unitdir}/*.service ${servicedir}"
# Set to 1 to forcibly skip OverlayFS, and default to copy+bind
AVOID_OVERLAYFS = "0"
do_compile () {
while read spec mountpoint; do
if [ -z "$spec" ]; then
@@ -47,6 +50,7 @@ do_compile () {
servicefile="$(echo "$servicefile" | tr / -).service"
sed -e "s#@what@#$spec#g; s#@where@#$mountpoint#g" \
-e "s#@whatparent@#${spec%/*}#g; s#@whereparent@#${mountpoint%/*}#g" \
-e "s#@avoid_overlayfs@#${@d.getVar('AVOID_OVERLAYFS')}#g" \
volatile-binds.service.in >$servicefile
done <<END
${@d.getVar('VOLATILE_BINDS').replace("\\n", "\n")}