Re: [PATCH 1/1] socket permissions to untrusted_app

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2012-07-27 at 15:16 -0700, Haiqing Jiang wrote:
> ---
>  app.te |    2 +-
>  1 files changed, 1 insertions(+), 1 deletions(-)

Thanks, applied.  Future work:  Extend SELinux kernel code and policy to
distinguish a separate security class for bluetooth sockets.

> 
> diff --git a/app.te b/app.te
> index be0983f..41866d9 100644
> --- a/app.te
> +++ b/app.te
> @@ -105,7 +105,7 @@ unix_socket_connect(untrusted_app, dnsproxyd, netd)
>  }
>  # Bluetooth access.
>  bool app_bluetooth false;
> -if (app_bluetooth) {
> +if (app_bluetooth or android_cts) {
>  # No specific SELinux class for bluetooth sockets presently.
>  allow untrusted_app self:socket *;
>  }

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux