From 22cd030a8118faae37c0835eb7875e482efe5dc1 Mon Sep 17 00:00:00 2001 From: Xin Ouyang Date: Thu, 22 Aug 2013 13:37:23 +0800 Subject: [PATCH] allow nfsd to exec shell commands. Upstream-Status: Inappropriate [only for Poky] Signed-off-by: Xin Ouyang Signed-off-by: Joe MacDonald --- policy/modules/contrib/rpc.te | 2 +- policy/modules/kernel/kernel.if | 18 ++++++++++++++++++ 2 files changed, 19 insertions(+), 1 deletions(-) --- a/policy/modules/contrib/rpc.te +++ b/policy/modules/contrib/rpc.te @@ -222,11 +222,11 @@ allow nfsd_t { nfsd_rw_t nfsd_ro_t }:dir kernel_read_network_state(nfsd_t) kernel_dontaudit_getattr_core_if(nfsd_t) kernel_setsched(nfsd_t) kernel_request_load_module(nfsd_t) -# kernel_mounton_proc(nfsd_t) +kernel_mounton_proc(nfsd_t) corenet_sendrecv_nfs_server_packets(nfsd_t) corenet_tcp_bind_nfs_port(nfsd_t) corenet_udp_bind_nfs_port(nfsd_t) --- a/policy/modules/kernel/kernel.if +++ b/policy/modules/kernel/kernel.if @@ -844,10 +844,28 @@ interface(`kernel_unmount_proc',` allow $1 proc_t:filesystem unmount; ') ######################################## ## +## Mounton a proc filesystem. +## +## +## +## Domain allowed access. +## +## +# +interface(`kernel_mounton_proc',` + gen_require(` + type proc_t; + ') + + allow $1 proc_t:dir mounton; +') + +######################################## +## ## Get the attributes of the proc filesystem. ## ## ## ## Domain allowed access.