diff options
author | Elena Reshetova <elena.reshetova@intel.com> | 2013-11-29 14:04:53 +0200 |
---|---|---|
committer | Elena Reshetova <elena.reshetova@intel.com> | 2013-12-03 13:46:35 +0200 |
commit | d4600691e348b7a01776921473c78dcd0c349e99 (patch) | |
tree | 6f2d81d93f982a3bd0fa64dab9c6b75632a09a24 | |
parent | efca47bdc3dd916dc09b077a2bc4ea9469ea4c31 (diff) | |
download | rpm-d4600691e348b7a01776921473c78dcd0c349e99.tar.gz rpm-d4600691e348b7a01776921473c78dcd0c349e99.tar.bz2 rpm-d4600691e348b7a01776921473c78dcd0c349e99.zip |
Security plugin: removing exec label restriction
Change-Id: I1da33e6e842a7f93dade78f2aebc00ed271a271c
-rw-r--r-- | plugins/msmxattr.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/plugins/msmxattr.c b/plugins/msmxattr.c index 0661ae365..cdc4bd046 100644 --- a/plugins/msmxattr.c +++ b/plugins/msmxattr.c @@ -1220,6 +1220,7 @@ int msmSetFileXAttributes(manifest_x *mfx, const char* filepath, magic_t cookie) found: if (exec_label) { execLabeldefined = 1; +#if 0 if ((strcmp(exec_label, "none") == 0) || ( (mfx->request) && (mfx->request->ac_domain) && (strcmp(exec_label, mfx->request->ac_domain) == 0))) { // these labels are allowed @@ -1229,6 +1230,7 @@ int msmSetFileXAttributes(manifest_x *mfx, const char* filepath, magic_t cookie) rpmlog(RPMLOG_DEBUG, "It isn't allowed to label the file with smack64label other than requested ac domain or \"none\" value\n"); rpmlog(RPMLOG_DEBUG, "The default ac domain label will be used instead\n"); } +#endif } if ((!label) || (!exec_label)) { /* no match, use default label of AC domain */ |