diff options
author | Nicolas Iooss | 2017-08-14 21:15:22 +0200 |
---|---|---|
committer | Nicolas Iooss | 2017-08-14 21:15:22 +0200 |
commit | 52fcaececc51507309cb0642422a78e225cb7ed7 (patch) | |
tree | 6d04b1b15d700ef4316cb2a17f39c75d0a80bd32 /0018-Make-fs_register_binary_executable_type-interface-al.patch | |
parent | 078674e43f9cc83bf869b8a00fd9083184f5c347 (diff) | |
download | aur-52fcaececc51507309cb0642422a78e225cb7ed7.tar.gz |
selinux-refpolicy-arch 20170805-1 update
Diffstat (limited to '0018-Make-fs_register_binary_executable_type-interface-al.patch')
-rw-r--r-- | 0018-Make-fs_register_binary_executable_type-interface-al.patch | 57 |
1 files changed, 0 insertions, 57 deletions
diff --git a/0018-Make-fs_register_binary_executable_type-interface-al.patch b/0018-Make-fs_register_binary_executable_type-interface-al.patch deleted file mode 100644 index 8bf379034527..000000000000 --- a/0018-Make-fs_register_binary_executable_type-interface-al.patch +++ /dev/null @@ -1,57 +0,0 @@ -From 59fbc8ea167e5d8797f8f850f1f5106025f7fe65 Mon Sep 17 00:00:00 2001 -From: Nicolas Iooss <nicolas.iooss@m4x.org> -Date: Tue, 5 Jan 2016 18:01:48 +0100 -Subject: [PATCH] Make fs_register_binary_executable_type interface allow - searching /proc/sys/fs - ---- - policy/modules/kernel/filesystem.if | 2 ++ - policy/modules/kernel/kernel.if | 19 +++++++++++++++++++ - 2 files changed, 21 insertions(+) - -diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if -index 1d1676561b4a..2a3cc90b8595 100644 ---- a/policy/modules/kernel/filesystem.if -+++ b/policy/modules/kernel/filesystem.if -@@ -612,6 +612,8 @@ interface(`fs_register_binary_executable_type',` - type binfmt_misc_fs_t; - ') - -+ # binfmt_misc filesystem is usually mounted on /proc/sys/fs/binfmt_misc -+ kernel_search_fs_sysctls($1) - rw_files_pattern($1, binfmt_misc_fs_t, binfmt_misc_fs_t) - ') - -diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if -index f1130d1a521d..132496ceab5d 100644 ---- a/policy/modules/kernel/kernel.if -+++ b/policy/modules/kernel/kernel.if -@@ -1987,6 +1987,25 @@ interface(`kernel_rw_kernel_sysctl',` - - ######################################## - ## <summary> -+## Search filesystem sysctl directories. -+## </summary> -+## <param name="domain"> -+## <summary> -+## Domain allowed access. -+## </summary> -+## </param> -+## <rolecap/> -+# -+interface(`kernel_search_fs_sysctls',` -+ gen_require(` -+ type proc_t, sysctl_t, sysctl_fs_t; -+ ') -+ -+ search_dirs_pattern($1, { proc_t sysctl_t sysctl_fs_t }, sysctl_fs_t) -+') -+ -+######################################## -+## <summary> - ## Read filesystem sysctls. - ## </summary> - ## <param name="domain"> --- -2.6.4 - |