Mediation of processes becoming a monitor
authorTyler Hicks <tyhicks@canonical.com>
Mon, 9 Feb 2015 06:41:37 +0000 (00:41 -0600)
committerSimon McVittie <simon.mcvittie@collabora.co.uk>
Wed, 18 Feb 2015 18:59:46 +0000 (18:59 +0000)
commit439723610e0d66ab4b3f9de6e453e517921bd361
tree0f3fe5af7b4d8771c858fc1483be9c337c44f23d
parent66979aae614eef97a30a9cad1ab4c77f277b63f4
Mediation of processes becoming a monitor

When an AppArmor confined process wants to become a monitor, a check is
performed to see if eavesdropping should be allowed.

The check is based on the connection's label and the bus type.

This patch reuses the bus_apparmor_allows_eavesdropping() hook.

An example AppArmor rule that would allow a process to become a monitor
on the system bus would be:

  dbus eavesdrop bus=system,

Bug: https://bugs.freedesktop.org/show_bug.cgi?id=75113
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Reviewed-by: Simon McVittie <simon.mcvittie@collabora.co.uk>
bus/driver.c