Michał Bednarski added the comment: > Hum, I'm surprised that SELinux blocks such safe function. Maybe the SELinux > policy should be completed to allow it? The ioctl is blocked for given file type regardless of request argument. As I'm running Python on non-rooted Android updating policy is not really an option.
> But do you expect ioctl() to always fail with EACCESS? Or only fail > sometimes, or only on some file descriptors? Your patch remembers that > ioctl() fails once and never retries. It will always fail for given file type (such as sockets), while it will work for others (such as regular files). I think that remembering that ioctl doesn't work may be okay, though I may be wrong. Either way if we are wrong whenever ioctl works we'll do one extra syscall. > About your patch: please add a comment explaining why you fallback with a > reference to this issue ("Issue #27057"). Attached ---------- Added file: http://bugs.python.org/file42900/set_inheritable-eacces.diff _______________________________________ Python tracker <rep...@bugs.python.org> <http://bugs.python.org/issue27057> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com