summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch60
1 files changed, 0 insertions, 60 deletions
diff --git a/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch
deleted file mode 100644
index ca2796f..0000000
--- a/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch
+++ /dev/null
@@ -1,60 +0,0 @@
1From 22cd030a8118faae37c0835eb7875e482efe5dc1 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH] allow nfsd to exec shell commands.
5
6Upstream-Status: Inappropriate [only for Poky]
7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
10---
11 policy/modules/contrib/rpc.te | 2 +-
12 policy/modules/kernel/kernel.if | 18 ++++++++++++++++++
13 2 files changed, 19 insertions(+), 1 deletions(-)
14
15--- a/policy/modules/contrib/rpc.te
16+++ b/policy/modules/contrib/rpc.te
17@@ -222,11 +222,11 @@ allow nfsd_t { nfsd_rw_t nfsd_ro_t }:dir
18
19 kernel_read_network_state(nfsd_t)
20 kernel_dontaudit_getattr_core_if(nfsd_t)
21 kernel_setsched(nfsd_t)
22 kernel_request_load_module(nfsd_t)
23-# kernel_mounton_proc(nfsd_t)
24+kernel_mounton_proc(nfsd_t)
25
26 corenet_sendrecv_nfs_server_packets(nfsd_t)
27 corenet_tcp_bind_nfs_port(nfsd_t)
28 corenet_udp_bind_nfs_port(nfsd_t)
29
30--- a/policy/modules/kernel/kernel.if
31+++ b/policy/modules/kernel/kernel.if
32@@ -844,10 +844,28 @@ interface(`kernel_unmount_proc',`
33 allow $1 proc_t:filesystem unmount;
34 ')
35
36 ########################################
37 ## <summary>
38+## Mounton a proc filesystem.
39+## </summary>
40+## <param name="domain">
41+## <summary>
42+## Domain allowed access.
43+## </summary>
44+## </param>
45+#
46+interface(`kernel_mounton_proc',`
47+ gen_require(`
48+ type proc_t;
49+ ')
50+
51+ allow $1 proc_t:dir mounton;
52+')
53+
54+########################################
55+## <summary>
56 ## Get the attributes of the proc filesystem.
57 ## </summary>
58 ## <param name="domain">
59 ## <summary>
60 ## Domain allowed access.