Check that dir name is a pid before attempting to read
Prevents selinux denials for folders in /proc that do not have the default /proc label. Bug: 68146208 Test: no selinux denials for vold attempting to read proc_asound dir. Change-Id: I7cdd3bbe8e687e078372012773e9a34a5c76e0f8
This commit is contained in:
parent
8646da062a
commit
5889083d71
1 changed files with 7 additions and 1 deletions
|
@ -34,9 +34,11 @@
|
|||
#include <linux/kdev_t.h>
|
||||
|
||||
#include <android-base/logging.h>
|
||||
#include <android-base/parseint.h>
|
||||
#include <android-base/properties.h>
|
||||
#include <android-base/strings.h>
|
||||
#include <android-base/stringprintf.h>
|
||||
#include <android-base/strings.h>
|
||||
|
||||
#include <cutils/fs.h>
|
||||
#include <utils/Trace.h>
|
||||
|
||||
|
@ -420,6 +422,10 @@ int VolumeManager::remountUid(uid_t uid, const std::string& mode) {
|
|||
|
||||
// Poke through all running PIDs look for apps running as UID
|
||||
while ((de = readdir(dir))) {
|
||||
pid_t pid;
|
||||
if (de->d_type != DT_DIR) continue;
|
||||
if (!android::base::ParseInt(de->d_name, &pid)) continue;
|
||||
|
||||
pidFd = -1;
|
||||
nsFd = -1;
|
||||
|
||||
|
|
Loading…
Reference in a new issue