On Tuesday, October 06, 2015 08:55:33 PM Nicolas Iooss wrote: > On 10/05/2015 10:41 PM, Paul Moore wrote: > > Add the SELinux access control implementation for the new kdbus LSM > > > hooks using the new kdbus object class and the following permissions: > [[SNIP]] > > > diff --git a/security/selinux/include/classmap.h > > b/security/selinux/include/classmap.h index eccd61b..31e4435 100644 > > --- a/security/selinux/include/classmap.h > > +++ b/security/selinux/include/classmap.h > > @@ -153,5 +153,9 @@ struct security_class_mapping secclass_map[] = { > > > > { COMMON_SOCK_PERMS, "attach_queue", NULL } }, > > > > { "binder", { "impersonate", "call", "set_context_mgr", "transfer", > > > > NULL } }, > > > > + { "kdbus", { "impersonate", "fakecreds", "fakepids", "owner", > > + "privileged", "activator", "monitor", "policy_holder", > > + "connect", "own", "talk", "see", "see_name", > > + "see_notification" } }, > > > > { NULL } > > > > }; > > Hello, > Out of curiosity, why is the new list of permissions not > NULL-terminated? Honest answer: I forgot :) These patches are still "RFC quality" which means I'm emphasizing getting the patches posted quickly (hardy har har) and not putting the code through as much testing and scrutiny as I usually do. The idea right now is to get feedback about the hooks and the individual LSM implementations. Regardless, thanks for catching the missing terminator, the fix will be in the next draft of the patches. -- paul moore security @ redhat _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.