Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

AndroidSystemSEPolicy

  • Clone with SSH
  • Clone with HTTPS
  • user avatar
    Nick Kralevich authored
    https://android-review.googlesource.com/166419 changed the handling
    of non-interactive adb shells to use a socket instead of a PTY.
    When the stdin/stdout/stderr socket is received by /system/bin/sh,
    the code runs isatty() (ioctl TCGETS) to determine how to handle the
    file descriptor. This is denied by SELinux.
    
    Allow it for all domains.
    
    Addresses the following denial:
    
      avc: denied { ioctl } for pid=4394 comm="sh" path="socket:[87326]" dev="sockfs" ino=87326 ioctlcmd=5401 scontext=u:r:shell:s0 tcontext=u:r:adbd:s0 tclass=unix_stream_socket permissive=0
    
    TODO: When kernels are publicly available which support SELinux ioctl
    filtering, limit this just to ioctl 5401 (TCGETS) instead of all ioctls.
    
    Bug: 21215503
    Change-Id: I5c9394f27b8f198d96df14eac4b0c46ecb9b0898
    f4d39ca1
    History
    Name Last commit Last update