summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch48
1 files changed, 48 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch b/recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch
new file mode 100644
index 0000000..a0b5cbc
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch
@@ -0,0 +1,48 @@
1From 3b260a0dc07f61b9bf873a8ac976430c80a653c3 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Fri, 23 Aug 2013 12:01:53 +0800
4Subject: [PATCH] policy/modules/services/rpc: make nfsd_t domain MLS trusted
5 for reading from files up to its clearance
6
7Upstream-Status: Inappropriate [embedded specific]
8
9Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
12---
13 policy/modules/kernel/kernel.te | 2 ++
14 policy/modules/services/rpcbind.te | 5 +++++
15 2 files changed, 7 insertions(+)
16
17diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
18index 887ca3332..f6ca775e6 100644
19--- a/policy/modules/kernel/kernel.te
20+++ b/policy/modules/kernel/kernel.te
21@@ -380,6 +380,8 @@ mls_process_read_all_levels(kernel_t)
22 mls_process_write_all_levels(kernel_t)
23 mls_file_write_all_levels(kernel_t)
24 mls_file_read_all_levels(kernel_t)
25+mls_socket_write_all_levels(kernel_t)
26+mls_fd_use_all_levels(kernel_t)
27
28 ifdef(`distro_redhat',`
29 # Bugzilla 222337
30diff --git a/policy/modules/services/rpcbind.te b/policy/modules/services/rpcbind.te
31index 2a712192b..923e48db7 100644
32--- a/policy/modules/services/rpcbind.te
33+++ b/policy/modules/services/rpcbind.te
34@@ -73,6 +73,11 @@ logging_send_syslog_msg(rpcbind_t)
35
36 miscfiles_read_localization(rpcbind_t)
37
38+# nfsd_t would not be allowed to send unix_stream_socket to rpcbind_t,
39+# because they are running in different level. So add rules to allow this.
40+mls_socket_read_all_levels(rpcbind_t)
41+mls_socket_write_all_levels(rpcbind_t)
42+
43 ifdef(`distro_debian',`
44 term_dontaudit_use_unallocated_ttys(rpcbind_t)
45 ')
46--
472.25.1
48