All of lore.kernel.org
 help / color / mirror / Atom feed
* (no subject)
@ 2012-07-23 21:20 Haiqing Jiang
  2012-07-23 21:20 ` [PATCH] external/sepolicy: system r/w udp_socket of appdomain Haiqing Jiang
  0 siblings, 1 reply; 3+ messages in thread
From: Haiqing Jiang @ 2012-07-23 21:20 UTC (permalink / raw)
  To: selinux; +Cc: sds, bill.c.roberts

[PATCH] external/sepolicy: system r/w udp_socket of appdomain
According to Stephen's comments, I extend the object from untrusted_app to appdomain.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [PATCH] external/sepolicy: system r/w udp_socket of appdomain
  2012-07-23 21:20 Haiqing Jiang
@ 2012-07-23 21:20 ` Haiqing Jiang
  2012-07-24 13:04   ` Stephen Smalley
  0 siblings, 1 reply; 3+ messages in thread
From: Haiqing Jiang @ 2012-07-23 21:20 UTC (permalink / raw)
  To: selinux; +Cc: sds, bill.c.roberts, hqjiang

From: hqjiang <hqjiang1988@gmail.com>

external/sepolicy: allow media_app more permissions on sdcard

external/sepolicy: allow media_app more permissions on sdcard
---
 system.te |    3 +++
 1 files changed, 3 insertions(+), 0 deletions(-)

diff --git a/system.te b/system.te
index a4065cf..bfbc35a 100644
--- a/system.te
+++ b/system.te
@@ -196,3 +196,6 @@ allow system domain:file r_file_perms;
 # to uart driver and ctrl proc entry
 allow system gps_device:chr_file rw_file_perms;
 allow system gps_control:file rw_file_perms;
+
+# system Read/Write udp_socket of untrusted_app
+allow system appdomain:udp_socket { read write };
-- 
1.7.0.4


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH] external/sepolicy: system r/w udp_socket of appdomain
  2012-07-23 21:20 ` [PATCH] external/sepolicy: system r/w udp_socket of appdomain Haiqing Jiang
@ 2012-07-24 13:04   ` Stephen Smalley
  0 siblings, 0 replies; 3+ messages in thread
From: Stephen Smalley @ 2012-07-24 13:04 UTC (permalink / raw)
  To: Haiqing Jiang; +Cc: selinux, bill.c.roberts

On Mon, 2012-07-23 at 14:20 -0700, Haiqing Jiang wrote:
> From: hqjiang <hqjiang1988@gmail.com>
> 
> external/sepolicy: allow media_app more permissions on sdcard
> 
> external/sepolicy: allow media_app more permissions on sdcard

Patch description did not match content.  Applied with amended message.

> ---
>  system.te |    3 +++
>  1 files changed, 3 insertions(+), 0 deletions(-)
> 
> diff --git a/system.te b/system.te
> index a4065cf..bfbc35a 100644
> --- a/system.te
> +++ b/system.te
> @@ -196,3 +196,6 @@ allow system domain:file r_file_perms;
>  # to uart driver and ctrl proc entry
>  allow system gps_device:chr_file rw_file_perms;
>  allow system gps_control:file rw_file_perms;
> +
> +# system Read/Write udp_socket of untrusted_app
> +allow system appdomain:udp_socket { read write };

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2012-07-24 13:04 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-07-23 21:20 Haiqing Jiang
2012-07-23 21:20 ` [PATCH] external/sepolicy: system r/w udp_socket of appdomain Haiqing Jiang
2012-07-24 13:04   ` Stephen Smalley

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.