Re: [PATCH] Allow domain access to /dev/ion

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2012-09-12 at 14:43 -0700, William Roberts wrote:
> Change-Id: I87f81a632ed61f284f2fe09726f5c4529d36f252
> ---
>  domain.te      |    3 +++
>  mediaserver.te |    1 -
>  2 files changed, 3 insertions(+), 1 deletions(-)

ueventd.grouper.rc assigns mode 0666 to /dev/ion, i.e. world-readable
and -writable, so I guess this is fine.  At some point we should audit
the ion driver code.

Acked-by:  Stephen Smalley <sds@xxxxxxxxxxxxx>

> diff --git a/domain.te b/domain.te
> index 6be7ddd..47ad05a 100644
> --- a/domain.te
> +++ b/domain.te
> @@ -83,6 +83,9 @@ allow domain cache_file:lnk_file read;
>  allow domain cgroup:dir { search write };
>  allow domain cgroup:file w_file_perms;
>  
> +#Allow access to ion memory allocation device
> +allow domain ion_device:chr_file rw_file_perms;
> +
>  # For /sys/qemu_trace files in the emulator.
>  bool in_qemu false;
>  if (in_qemu) {
> diff --git a/mediaserver.te b/mediaserver.te
> index e124db0..4b299a0 100644
> --- a/mediaserver.te
> +++ b/mediaserver.te
> @@ -25,7 +25,6 @@ allow mediaserver qemu_device:chr_file rw_file_perms;
>  allow mediaserver sysfs:file rw_file_perms;
>  # XXX Why?
>  allow mediaserver apk_data_file:file { read getattr };
> -allow mediaserver ion_device:chr_file rw_file_perms;
>  
>  # To use remote processor
>  allow mediaserver rpmsg_device:chr_file rw_file_perms;

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux