diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy-git/poky-policy-allow-nfsd-to-exec-shell-commands.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy-git/poky-policy-allow-nfsd-to-exec-shell-commands.patch | 81 |
1 files changed, 0 insertions, 81 deletions
diff --git a/recipes-security/refpolicy/refpolicy-git/poky-policy-allow-nfsd-to-exec-shell-commands.patch b/recipes-security/refpolicy/refpolicy-git/poky-policy-allow-nfsd-to-exec-shell-commands.patch deleted file mode 100644 index a9a0a55..0000000 --- a/recipes-security/refpolicy/refpolicy-git/poky-policy-allow-nfsd-to-exec-shell-commands.patch +++ /dev/null | |||
@@ -1,81 +0,0 @@ | |||
1 | From 22cd030a8118faae37c0835eb7875e482efe5dc1 Mon Sep 17 00:00:00 2001 | ||
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | ||
3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 | ||
4 | Subject: [PATCH] allow nfsd to exec shell commands. | ||
5 | |||
6 | Upstream-Status: Inappropriate [only for Poky] | ||
7 | |||
8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | ||
9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
10 | --- | ||
11 | policy/modules/contrib/rpc.te | 2 +- | ||
12 | policy/modules/kernel/kernel.if | 18 ++++++++++++++++++ | ||
13 | 2 files changed, 19 insertions(+), 1 deletion(-) | ||
14 | |||
15 | --- a/policy/modules/contrib/rpc.te | ||
16 | +++ b/policy/modules/contrib/rpc.te | ||
17 | @@ -224,11 +224,11 @@ allow nfsd_t { nfsd_rw_t nfsd_ro_t }:dir | ||
18 | |||
19 | kernel_read_network_state(nfsd_t) | ||
20 | kernel_dontaudit_getattr_core_if(nfsd_t) | ||
21 | kernel_setsched(nfsd_t) | ||
22 | kernel_request_load_module(nfsd_t) | ||
23 | -# kernel_mounton_proc(nfsd_t) | ||
24 | +kernel_mounton_proc(nfsd_t) | ||
25 | |||
26 | corenet_sendrecv_nfs_server_packets(nfsd_t) | ||
27 | corenet_tcp_bind_nfs_port(nfsd_t) | ||
28 | corenet_udp_bind_nfs_port(nfsd_t) | ||
29 | |||
30 | --- a/policy/modules/kernel/kernel.if | ||
31 | +++ b/policy/modules/kernel/kernel.if | ||
32 | @@ -880,43 +880,42 @@ interface(`kernel_unmount_proc',` | ||
33 | allow $1 proc_t:filesystem unmount; | ||
34 | ') | ||
35 | |||
36 | ######################################## | ||
37 | ## <summary> | ||
38 | -## Get the attributes of the proc filesystem. | ||
39 | +## Mounton a proc filesystem. | ||
40 | ## </summary> | ||
41 | ## <param name="domain"> | ||
42 | ## <summary> | ||
43 | ## Domain allowed access. | ||
44 | ## </summary> | ||
45 | ## </param> | ||
46 | # | ||
47 | -interface(`kernel_getattr_proc',` | ||
48 | +interface(`kernel_mounton_proc',` | ||
49 | gen_require(` | ||
50 | type proc_t; | ||
51 | ') | ||
52 | |||
53 | - allow $1 proc_t:filesystem getattr; | ||
54 | + allow $1 proc_t:dir mounton; | ||
55 | ') | ||
56 | |||
57 | ######################################## | ||
58 | ## <summary> | ||
59 | -## Mount on proc directories. | ||
60 | +## Get the attributes of the proc filesystem. | ||
61 | ## </summary> | ||
62 | ## <param name="domain"> | ||
63 | ## <summary> | ||
64 | ## Domain allowed access. | ||
65 | ## </summary> | ||
66 | ## </param> | ||
67 | -## <rolecap/> | ||
68 | # | ||
69 | -interface(`kernel_mounton_proc',` | ||
70 | +interface(`kernel_getattr_proc',` | ||
71 | gen_require(` | ||
72 | type proc_t; | ||
73 | ') | ||
74 | |||
75 | - allow $1 proc_t:dir mounton; | ||
76 | + allow $1 proc_t:filesystem getattr; | ||
77 | ') | ||
78 | |||
79 | ######################################## | ||
80 | ## <summary> | ||
81 | ## Do not audit attempts to set the | ||