Blame SOURCES/nfs-utils-1.3.0-exportfs-securitylabel.patch

e19a30
diff -up nfs-utils-1.3.0/support/include/nfs/export.h.orig nfs-utils-1.3.0/support/include/nfs/export.h
e19a30
--- nfs-utils-1.3.0/support/include/nfs/export.h.orig	2017-03-27 10:07:41.440397336 -0400
e19a30
+++ nfs-utils-1.3.0/support/include/nfs/export.h	2017-03-27 10:08:57.195772235 -0400
e19a30
@@ -18,7 +18,8 @@
e19a30
 #define NFSEXP_ASYNC		0x0010
e19a30
 #define NFSEXP_GATHERED_WRITES	0x0020
e19a30
 #define NFSEXP_NOREADDIRPLUS	0x0040
e19a30
-/* 80, 100 unused */
e19a30
+#define NFSEXP_SECURITY_LABEL	0x0080
e19a30
+/* 0x100 unused */
e19a30
 #define NFSEXP_NOHIDE		0x0200
e19a30
 #define NFSEXP_NOSUBTREECHECK	0x0400
e19a30
 #define NFSEXP_NOAUTHNLM	0x0800
e19a30
diff -up nfs-utils-1.3.0/support/nfs/exports.c.orig nfs-utils-1.3.0/support/nfs/exports.c
e19a30
--- nfs-utils-1.3.0/support/nfs/exports.c.orig	2017-03-27 10:07:41.549399315 -0400
e19a30
+++ nfs-utils-1.3.0/support/nfs/exports.c	2017-03-27 10:08:58.441794848 -0400
e19a30
@@ -274,6 +274,8 @@ putexportent(struct exportent *ep)
e19a30
 		"no_" : "");
e19a30
 	if (ep->e_flags & NFSEXP_NOREADDIRPLUS)
e19a30
 		fprintf(fp, "nordirplus,");
e19a30
+	if (ep->e_flags & NFSEXP_SECURITY_LABEL)
e19a30
+		fprintf(fp, "security_label,");
e19a30
 	fprintf(fp, "%spnfs,", (ep->e_flags & NFSEXP_PNFS)? "" : "no_");
e19a30
 	if (ep->e_flags & NFSEXP_FSID) {
e19a30
 		fprintf(fp, "fsid=%d,", ep->e_fsid);
e19a30
@@ -543,6 +545,8 @@ parseopts(char *cp, struct exportent *ep
e19a30
 			setflags(NFSEXP_ASYNC, active, ep);
e19a30
 		else if (!strcmp(opt, "nordirplus"))
e19a30
 			setflags(NFSEXP_NOREADDIRPLUS, active, ep);
e19a30
+		else if (!strcmp(opt, "security_label"))
e19a30
+			setflags(NFSEXP_SECURITY_LABEL, active, ep);
e19a30
 		else if (!strcmp(opt, "nohide"))
e19a30
 			setflags(NFSEXP_NOHIDE, active, ep);
e19a30
 		else if (!strcmp(opt, "hide"))
e19a30
diff -up nfs-utils-1.3.0/utils/exportfs/exportfs.c.orig nfs-utils-1.3.0/utils/exportfs/exportfs.c
e19a30
--- nfs-utils-1.3.0/utils/exportfs/exportfs.c.orig	2017-03-27 10:08:58.441794848 -0400
e19a30
+++ nfs-utils-1.3.0/utils/exportfs/exportfs.c	2017-03-27 10:11:00.939046616 -0400
e19a30
@@ -835,6 +835,8 @@ dump(int verbose, int export_format)
e19a30
 				c = dumpopt(c, "no_subtree_check");
e19a30
 			if (ep->e_flags & NFSEXP_NOAUTHNLM)
e19a30
 				c = dumpopt(c, "insecure_locks");
e19a30
+			if (ep->e_flags & NFSEXP_SECURITY_LABEL)
e19a30
+				c = dumpopt(c, "security_label");
e19a30
 			if (ep->e_flags & NFSEXP_NOACL)
e19a30
 				c = dumpopt(c, "no_acl");
e19a30
 			if (ep->e_flags & NFSEXP_PNFS)
e19a30
diff -up nfs-utils-1.3.0/utils/exportfs/exports.man.orig nfs-utils-1.3.0/utils/exportfs/exports.man
e19a30
--- nfs-utils-1.3.0/utils/exportfs/exports.man.orig	2017-03-27 10:07:41.515398698 -0400
e19a30
+++ nfs-utils-1.3.0/utils/exportfs/exports.man	2017-03-27 10:08:58.441794848 -0400
e19a30
@@ -417,6 +417,14 @@ devices. The default can be explicitly r
e19a30
 .I no_pnfs
e19a30
 option.
e19a30
 
e19a30
+.TP
e19a30
+.IR security_label
e19a30
+With this option set, clients using NFSv4.2 or higher will be able to
e19a30
+set and retrieve security labels (such as those used by SELinux).  This
e19a30
+will only work if all clients use a consistent security policy.  Note
e19a30
+that early kernels did not support this export option, and instead
e19a30
+enabled security labels by default.
e19a30
+
e19a30
 .SS User ID Mapping
e19a30
 .PP
e19a30
 .B nfsd