summaryrefslogtreecommitdiff
path: root/bus/services.c
diff options
context:
space:
mode:
authorJohn Johansen <john.johansen@canonical.com>2014-02-13 12:55:52 -0600
committerSimon McVittie <simon.mcvittie@collabora.co.uk>2015-02-18 17:28:42 +0000
commitc2686d53f3065dc9443bb2744f3fbe50992962ea (patch)
tree2d0facedd2504695e661cf973fa684c453bd8a8d /bus/services.c
parentcd23a5df10b0465c99f91b5f9c4e160480078c1a (diff)
downloaddbus-c2686d53f3065dc9443bb2744f3fbe50992962ea.tar.gz
Mediation of processes that acquire well-known names
When an AppArmor confined process wants to acquire a well-known name, a check is performed to see if the action should be allowed. The check is based on the connection's label, the bus type, and the name being requested. An example AppArmor rule that would allow the name "com.example.ExampleName" to be acquired on the system bus would be: dbus bind bus=system name=com.example.ExampleName, To let a process acquire any name on any bus, the rule would be: dbus bind, Bug: https://bugs.freedesktop.org/show_bug.cgi?id=75113 Signed-off-by: John Johansen <john.johansen@canonical.com> [tyhicks: Use BusAppArmorConfinement, bug fixes, cleanup, commit msg] [tyhicks: initialize reserved area at the start of the query string] [tyhicks: Use empty string for NULL bustypes when building queries] Signed-off-by: Tyler Hicks <tyhicks@canonical.com> Reviewed-by: Simon McVittie <simon.mcvittie@collabora.co.uk>
Diffstat (limited to 'bus/services.c')
-rw-r--r--bus/services.c7
1 files changed, 7 insertions, 0 deletions
diff --git a/bus/services.c b/bus/services.c
index 584485b1..8e625867 100644
--- a/bus/services.c
+++ b/bus/services.c
@@ -36,6 +36,7 @@
#include "policy.h"
#include "bus.h"
#include "selinux.h"
+#include "apparmor.h"
struct BusService
{
@@ -458,6 +459,12 @@ bus_registry_acquire_service (BusRegistry *registry,
_dbus_string_get_const_data (service_name));
goto out;
}
+
+ if (!bus_apparmor_allows_acquire_service (connection,
+ (registry->context ?
+ bus_context_get_type (registry->context) : NULL),
+ _dbus_string_get_const_data (service_name), error))
+ goto out;
if (!bus_client_policy_check_can_own (policy, service_name))
{