Proposition from James Henstridge (jamesh)
"If you want to identify the executable, calling os.Readlink() on
/proc/$PID/exe would be more appropriate:
$ ps x | grep maliit
5823 ? Ssl 2:38 maliit-server
25788 pts/16 S+ 0:00 grep --color=auto maliit
$ ls -l /proc/5823/exe
lrwxrwxrwx 1 phablet phablet 0 Jul 7 11:47 /proc/5823/exe ->
/usr/bin/maliit-server
I'd combine that with the a check that the security label is
"unconfined" as Tyler suggested (which you can do using the code
fragment I gave via mail). That should be enough to ensure you aren't
being faked out by an untrusted application, and are talking to the
expected system service."
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1433590
Title:
apparmor dbus denial for org.freedesktop.Accounts and make Other
vibrations work
To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-devices-system-image/+bug/1433590/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs