On Thu, Sep 27, 2012 at 3:18 PM, Stephen Smalley
<stephen.smal...@gmail.com> wrote:
> On Thu, Sep 27, 2012 at 3:11 PM, Cesar Maiorino
> <cesar.maior...@gmail.com> wrote:
>> I've attached the log. Below is the audit2allow output (minus the shell 
>> stuff):
>>
>> #============= release_app ==============
>> allow release_app device:chr_file { read write ioctl open };
>>
>> #============= untrusted_app ==============
>> allow untrusted_app device:chr_file { read write ioctl open };
>> allow untrusted_app device:sock_file write;
>> allow untrusted_app init:unix_stream_socket connectto;
>> allow untrusted_app ion_device:chr_file { read open };
>
> The "device" denials indicate that you have a device node that isn't
> properly labeled.  We need to see the actual avc message to know which
> device node it is.

Looks like two devices are mislabeled, /dev/kgsl-3d0 and /dev/genlock.
Need to identify what kind of devices they are and define
file_contexts entries for them.

--
This message was distributed to subscribers of the seandroid-list mailing list.
If you no longer wish to subscribe, send mail to majord...@tycho.nsa.gov with
the words "unsubscribe seandroid-list" without quotes as the message.

Reply via email to