[Detail] For Andorid Q, there is a more stringent restriction for ioctl, app need to access pipe by ioctlcmd=0x5402. avc: denied { ioctl } for comm="kd" path="pipe:[7173861]" dev="pipefs" ino=7173861 ioctlcmd=0x5402 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=fifo_file permissive=0 app=com.tencent.qqpimsecure [Solution] Add sepolicy for app to access pipe by ioctlcmd=0x5402 MTK-Commit-Id: d38b9f7f97aab7b23d80d0f3aac8e25a790c8c91 Change-Id: I5ac20bf2dffa0c297b32aaebd75db9e04c35cc79 CR-Id: ALPS04654001 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
Description
No description provided
Languages
Makefile
100%