Re: [PATCH 1/1] Appdomain write to cgroup on android_cts enabled

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2012-07-27 at 15:51 -0700, Haiqing Jiang wrote:
> ---
>  cts.te |    3 +++
>  1 files changed, 3 insertions(+), 0 deletions(-)
> 
> diff --git a/cts.te b/cts.te
> index ff8a9f0..7877b19 100644
> --- a/cts.te
> +++ b/cts.te
> @@ -31,6 +31,9 @@ allow appdomain system_file:file rx_file_perms;
>  allow appdomain apk_tmp_file:file rw_file_perms;
>  allow appdomain shell_data_file:file r_file_perms;
>  
> +# Write to cgroup
> +allow appdomain cgroup:dir write;

Likely should get merged into domain.te rule for cgroup:dir.
Future work: Investigate finer-grained labeling for kernel cgroup pseudo
filesystem (requires kernel modifications), and use it to only allow
access to specific cgroup subdirectory.

> +
>  # Read routing information.
>  allow netdomain self:netlink_route_socket { create read write nlmsg_read };
>  

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux