Bluetooth: Open management interface for untrusted users
authorMarcel Holtmann <marcel@holtmann.org>
Sun, 15 Mar 2015 02:28:04 +0000 (19:28 -0700)
committerJohan Hedberg <johan.hedberg@intel.com>
Sun, 15 Mar 2015 07:59:18 +0000 (09:59 +0200)
commit1195fbb8d03e5a6d7e7e49a73592caeb113a0f70
treed305cca349a3ac14b088f09ff1869c7fc7d43235
parentc927a10487477eeed0441e5c88147700e69e5db9
Bluetooth: Open management interface for untrusted users

Until now the management interface was restricted to CAP_NET_ADMIN. With
this change every user can open the management socket. However the list
of commands is heavily restricted to getting basic information about the
attached controllers. No access for configuration or other operation is
provided. The events are also limited. This is done so that no keys can
leak or untrusted users can mess with the Bluetooth configuration.

Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
net/bluetooth/hci_sock.c