android_system_core/toolbox
Michael Wright 344e929e6d Only allow system to write to existing input nodes.
This prevents the shell user from injecting input as if it were coming
from an existing input device, which in turn makes it easier for malware
/ abuse analysis to detect when someone is injecting input via the
command line vs a real user using a device.

(cherrypick of 95637eb2a332b9a09914b1bf32c10fccfba4a175.)

Bug: 30861057
Test: ran getevent, saw correct output, played with device
Change-Id: Ib53eea1b7767f25510b5d36fe6109101a9fad8e0
2017-02-09 14:45:25 -08:00
..
upstream-netbsd Add empty <util.h> to build BSD source. 2016-04-29 11:53:29 -07:00
Android.mk delete toolbox/r.c 2016-11-29 15:45:11 -08:00
MODULE_LICENSE_BSD
NOTICE
bsd-compatibility.h Fix misc-macro-parentheses warnings in init and other core modules. 2016-05-18 18:11:49 -07:00
generate-input.h-labels.py Fix the generated getevent labels. 2016-06-29 14:12:29 -07:00
getevent.c Only allow system to write to existing input nodes. 2017-02-09 14:45:25 -08:00
newfs_msdos.c toolbox: fix memory leak 2016-11-15 16:27:03 -08:00
toolbox.c Fix toolbox failure return to match similar tools. 2016-04-12 08:40:43 -07:00