FYI this patch is relative to aosp/sepolicy. On Wed, Sep 12, 2012 at 2:48 PM, William Roberts <w.roberts@xxxxxxxxxxxxxxx> wrote: > Just wanted to get some feedback before submitting this to AOSP. I think everyone is going to need access to this, it seems to be cropping up more and more. I wrestled with r or rw perms on this, but it looks like rw is the way to go IMO. > > If this gets a blessing Ill submit upstream.... > > -----Original Message----- > From: William Roberts [mailto:bill.c.roberts@xxxxxxxxx] > Sent: Wednesday, September 12, 2012 2:44 PM > To: selinux@xxxxxxxxxxxxx > Cc: sds@xxxxxxxxxxxxx; William Roberts > Subject: [PATCH] Allow domain access to /dev/ion > > Change-Id: I87f81a632ed61f284f2fe09726f5c4529d36f252 > --- > domain.te | 3 +++ > mediaserver.te | 1 - > 2 files changed, 3 insertions(+), 1 deletions(-) > > diff --git a/domain.te b/domain.te > index 6be7ddd..47ad05a 100644 > --- a/domain.te > +++ b/domain.te > @@ -83,6 +83,9 @@ allow domain cache_file:lnk_file read; allow domain cgroup:dir { search write }; allow domain cgroup:file w_file_perms; > > +#Allow access to ion memory allocation device allow domain > +ion_device:chr_file rw_file_perms; > + > # For /sys/qemu_trace files in the emulator. > bool in_qemu false; > if (in_qemu) { > diff --git a/mediaserver.te b/mediaserver.te index e124db0..4b299a0 100644 > --- a/mediaserver.te > +++ b/mediaserver.te > @@ -25,7 +25,6 @@ allow mediaserver qemu_device:chr_file rw_file_perms; allow mediaserver sysfs:file rw_file_perms; # XXX Why? > allow mediaserver apk_data_file:file { read getattr }; -allow mediaserver ion_device:chr_file rw_file_perms; > > # To use remote processor > allow mediaserver rpmsg_device:chr_file rw_file_perms; > -- > 1.7.0.4 > -- Respectfully, William C Roberts -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.