On Wed, 2012-09-12 at 14:43 -0700, William Roberts wrote: > Change-Id: I87f81a632ed61f284f2fe09726f5c4529d36f252 > --- > domain.te | 3 +++ > mediaserver.te | 1 - > 2 files changed, 3 insertions(+), 1 deletions(-) ueventd.grouper.rc assigns mode 0666 to /dev/ion, i.e. world-readable and -writable, so I guess this is fine. At some point we should audit the ion driver code. Acked-by: Stephen Smalley <sds@xxxxxxxxxxxxx> > diff --git a/domain.te b/domain.te > index 6be7ddd..47ad05a 100644 > --- a/domain.te > +++ b/domain.te > @@ -83,6 +83,9 @@ allow domain cache_file:lnk_file read; > allow domain cgroup:dir { search write }; > allow domain cgroup:file w_file_perms; > > +#Allow access to ion memory allocation device > +allow domain ion_device:chr_file rw_file_perms; > + > # For /sys/qemu_trace files in the emulator. > bool in_qemu false; > if (in_qemu) { > diff --git a/mediaserver.te b/mediaserver.te > index e124db0..4b299a0 100644 > --- a/mediaserver.te > +++ b/mediaserver.te > @@ -25,7 +25,6 @@ allow mediaserver qemu_device:chr_file rw_file_perms; > allow mediaserver sysfs:file rw_file_perms; > # XXX Why? > allow mediaserver apk_data_file:file { read getattr }; > -allow mediaserver ion_device:chr_file rw_file_perms; > > # To use remote processor > allow mediaserver rpmsg_device:chr_file rw_file_perms; -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.