summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy/0062-policy-modules-system-setrans-allow-setrans-to-acces.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0062-policy-modules-system-setrans-allow-setrans-to-acces.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy/0062-policy-modules-system-setrans-allow-setrans-to-acces.patch42
1 files changed, 0 insertions, 42 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0062-policy-modules-system-setrans-allow-setrans-to-acces.patch b/recipes-security/refpolicy/refpolicy/0062-policy-modules-system-setrans-allow-setrans-to-acces.patch
deleted file mode 100644
index b692012..0000000
--- a/recipes-security/refpolicy/refpolicy/0062-policy-modules-system-setrans-allow-setrans-to-acces.patch
+++ /dev/null
@@ -1,42 +0,0 @@
1From 84c69d220ffdd039b88a34f9afc127274a985541 Mon Sep 17 00:00:00 2001
2From: Roy Li <rongqing.li@windriver.com>
3Date: Sat, 22 Feb 2014 13:35:38 +0800
4Subject: [PATCH] policy/modules/system/setrans: allow setrans to access
5 /sys/fs/selinux
6
71. mcstransd failed to boot-up since the below permission is denied
8statfs("/sys/fs/selinux", 0x7ffff2b80370) = -1 EACCES (Permission denied)
9
102. other programs can not connect to /run/setrans/.setrans-unix
11avc: denied { connectto } for pid=2055 comm="ls"
12path="/run/setrans/.setrans-unix"
13scontext=root:sysadm_r:sysadm_t:s0-s15:c0.c1023
14tcontext=system_u:system_r:setrans_t:s15:c0.c1023
15tclass=unix_stream_socket
16
17Upstream-Status: Inappropriate [embedded specific]
18
19Signed-off-by: Roy Li <rongqing.li@windriver.com>
20Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
21---
22 policy/modules/system/setrans.te | 4 +---
23 1 file changed, 1 insertion(+), 3 deletions(-)
24
25diff --git a/policy/modules/system/setrans.te b/policy/modules/system/setrans.te
26index 25aadfc5f..78bd6e2eb 100644
27--- a/policy/modules/system/setrans.te
28+++ b/policy/modules/system/setrans.te
29@@ -23,9 +23,7 @@ mls_trusted_object(setrans_runtime_t)
30 type setrans_unit_t;
31 init_unit_file(setrans_unit_t)
32
33-ifdef(`distro_debian',`
34- init_daemon_runtime_file(setrans_runtime_t, dir, "setrans")
35-')
36+init_daemon_runtime_file(setrans_runtime_t, dir, "setrans")
37
38 ifdef(`enable_mcs',`
39 init_ranged_daemon_domain(setrans_t, setrans_exec_t, s0 - mcs_systemhigh)
40--
412.17.1
42