summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy/0048-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0048-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy/0048-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch48
1 files changed, 48 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0048-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch b/recipes-security/refpolicy/refpolicy/0048-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch
new file mode 100644
index 0000000..f659e7e
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0048-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch
@@ -0,0 +1,48 @@
1From 18ad027229a06fdcb833482dff0c2ae637d08e78 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Fri, 23 Aug 2013 12:01:53 +0800
4Subject: [PATCH] policy/modules/services/rpc: make nfsd_t domain MLS trusted
5 for reading from files up to its clearance
6
7Upstream-Status: Inappropriate [embedded specific]
8
9Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
12---
13 policy/modules/kernel/kernel.te | 2 ++
14 policy/modules/services/rpcbind.te | 5 +++++
15 2 files changed, 7 insertions(+)
16
17diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
18index ca951cb44..a32c59eb1 100644
19--- a/policy/modules/kernel/kernel.te
20+++ b/policy/modules/kernel/kernel.te
21@@ -356,6 +356,8 @@ mls_process_read_all_levels(kernel_t)
22 mls_process_write_all_levels(kernel_t)
23 mls_file_write_all_levels(kernel_t)
24 mls_file_read_all_levels(kernel_t)
25+mls_socket_write_all_levels(kernel_t)
26+mls_fd_use_all_levels(kernel_t)
27
28 ifdef(`distro_redhat',`
29 # Bugzilla 222337
30diff --git a/policy/modules/services/rpcbind.te b/policy/modules/services/rpcbind.te
31index e1eb7d5fc..da0994749 100644
32--- a/policy/modules/services/rpcbind.te
33+++ b/policy/modules/services/rpcbind.te
34@@ -73,6 +73,11 @@ logging_send_syslog_msg(rpcbind_t)
35
36 miscfiles_read_localization(rpcbind_t)
37
38+# nfsd_t would not be allowed to send unix_stream_socket to rpcbind_t,
39+# because the are running in different level. So add rules to allow this.
40+mls_socket_read_all_levels(rpcbind_t)
41+mls_socket_write_all_levels(rpcbind_t)
42+
43 ifdef(`distro_debian',`
44 term_dontaudit_use_unallocated_ttys(rpcbind_t)
45 ')
46--
472.17.1
48