* (no subject)
@ 2012-07-23 21:20 Haiqing Jiang
2012-07-23 21:20 ` [PATCH] external/sepolicy: system r/w udp_socket of appdomain Haiqing Jiang
0 siblings, 1 reply; 3+ messages in thread
From: Haiqing Jiang @ 2012-07-23 21:20 UTC (permalink / raw)
To: selinux; +Cc: sds, bill.c.roberts
[PATCH] external/sepolicy: system r/w udp_socket of appdomain
According to Stephen's comments, I extend the object from untrusted_app to appdomain.
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 3+ messages in thread
* [PATCH] external/sepolicy: system r/w udp_socket of appdomain
2012-07-23 21:20 Haiqing Jiang
@ 2012-07-23 21:20 ` Haiqing Jiang
2012-07-24 13:04 ` Stephen Smalley
0 siblings, 1 reply; 3+ messages in thread
From: Haiqing Jiang @ 2012-07-23 21:20 UTC (permalink / raw)
To: selinux; +Cc: sds, bill.c.roberts, hqjiang
From: hqjiang <hqjiang1988@gmail.com>
external/sepolicy: allow media_app more permissions on sdcard
external/sepolicy: allow media_app more permissions on sdcard
---
system.te | 3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/system.te b/system.te
index a4065cf..bfbc35a 100644
--- a/system.te
+++ b/system.te
@@ -196,3 +196,6 @@ allow system domain:file r_file_perms;
# to uart driver and ctrl proc entry
allow system gps_device:chr_file rw_file_perms;
allow system gps_control:file rw_file_perms;
+
+# system Read/Write udp_socket of untrusted_app
+allow system appdomain:udp_socket { read write };
--
1.7.0.4
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH] external/sepolicy: system r/w udp_socket of appdomain
2012-07-23 21:20 ` [PATCH] external/sepolicy: system r/w udp_socket of appdomain Haiqing Jiang
@ 2012-07-24 13:04 ` Stephen Smalley
0 siblings, 0 replies; 3+ messages in thread
From: Stephen Smalley @ 2012-07-24 13:04 UTC (permalink / raw)
To: Haiqing Jiang; +Cc: selinux, bill.c.roberts
On Mon, 2012-07-23 at 14:20 -0700, Haiqing Jiang wrote:
> From: hqjiang <hqjiang1988@gmail.com>
>
> external/sepolicy: allow media_app more permissions on sdcard
>
> external/sepolicy: allow media_app more permissions on sdcard
Patch description did not match content. Applied with amended message.
> ---
> system.te | 3 +++
> 1 files changed, 3 insertions(+), 0 deletions(-)
>
> diff --git a/system.te b/system.te
> index a4065cf..bfbc35a 100644
> --- a/system.te
> +++ b/system.te
> @@ -196,3 +196,6 @@ allow system domain:file r_file_perms;
> # to uart driver and ctrl proc entry
> allow system gps_device:chr_file rw_file_perms;
> allow system gps_control:file rw_file_perms;
> +
> +# system Read/Write udp_socket of untrusted_app
> +allow system appdomain:udp_socket { read write };
--
Stephen Smalley
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2012-07-24 13:04 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-07-23 21:20 Haiqing Jiang
2012-07-23 21:20 ` [PATCH] external/sepolicy: system r/w udp_socket of appdomain Haiqing Jiang
2012-07-24 13:04 ` Stephen Smalley
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.