| # Domain for shell processes spawned by ADB or console service. |
| type shell, domain, mlstrustedsubject; |
| type shell_exec, exec_type, file_type; |
| |
| # Create and use network sockets. |
| net_domain(shell) |
| |
| # logcat |
| read_logd(shell) |
| control_logd(shell) |
| # logcat -L (directly, or via dumpstate) |
| allow shell pstorefs:dir search; |
| allow shell pstorefs:file r_file_perms; |
| |
| # Root fs. |
| allow shell rootfs:dir r_dir_perms; |
| |
| # read files in /data/anr |
| allow shell anr_data_file:dir r_dir_perms; |
| allow shell anr_data_file:file r_file_perms; |
| |
| # Access /data/local/tmp. |
| allow shell shell_data_file:dir create_dir_perms; |
| allow shell shell_data_file:file create_file_perms; |
| allow shell shell_data_file:file rx_file_perms; |
| allow shell shell_data_file:lnk_file create_file_perms; |
| |
| # Read and delete from /data/local/traces. |
| allow shell trace_data_file:file { r_file_perms unlink }; |
| allow shell trace_data_file:dir { r_dir_perms remove_name write }; |
| |
| # Access /data/misc/profman. |
| allow shell profman_dump_data_file:dir { search getattr write remove_name }; |
| allow shell profman_dump_data_file:file { getattr unlink }; |
| |
| # Read/execute files in /data/nativetest |
| userdebug_or_eng(` |
| allow shell nativetest_data_file:dir r_dir_perms; |
| allow shell nativetest_data_file:file rx_file_perms; |
| ') |
| |
| # adb bugreport |
| unix_socket_connect(shell, dumpstate, dumpstate) |
| |
| allow shell devpts:chr_file rw_file_perms; |
| allow shell tty_device:chr_file rw_file_perms; |
| allow shell console_device:chr_file rw_file_perms; |
| allow shell input_device:dir r_dir_perms; |
| allow shell input_device:chr_file rw_file_perms; |
| r_dir_file(shell, system_file) |
| allow shell system_file:file x_file_perms; |
| allow shell toolbox_exec:file rx_file_perms; |
| allow shell tzdatacheck_exec:file rx_file_perms; |
| allow shell shell_exec:file rx_file_perms; |
| allow shell zygote_exec:file rx_file_perms; |
| |
| r_dir_file(shell, apk_data_file) |
| |
| # Set properties. |
| set_prop(shell, shell_prop) |
| set_prop(shell, ctl_bugreport_prop) |
| set_prop(shell, ctl_dumpstate_prop) |
| set_prop(shell, dumpstate_prop) |
| set_prop(shell, exported_dumpstate_prop) |
| set_prop(shell, debug_prop) |
| set_prop(shell, powerctl_prop) |
| set_prop(shell, log_tag_prop) |
| set_prop(shell, wifi_log_prop) |
| # adjust is_loggable properties |
| userdebug_or_eng(`set_prop(shell, log_prop)') |
| # logpersist script |
| userdebug_or_eng(`set_prop(shell, logpersistd_logging_prop)') |
| |
| userdebug_or_eng(` |
| # "systrace --boot" support - allow boottrace service to run |
| allow shell boottrace_data_file:dir rw_dir_perms; |
| allow shell boottrace_data_file:file create_file_perms; |
| set_prop(shell, persist_debug_prop) |
| ') |
| |
| # Read device's serial number from system properties |
| get_prop(shell, serialno_prop) |
| |
| # Read state of logging-related properties |
| get_prop(shell, device_logging_prop) |
| |
| # Read state of boot reason properties |
| get_prop(shell, bootloader_boot_reason_prop) |
| get_prop(shell, last_boot_reason_prop) |
| get_prop(shell, system_boot_reason_prop) |
| |
| # allow shell access to services |
| allow shell servicemanager:service_manager list; |
| # don't allow shell to access GateKeeper service |
| # TODO: why is this so broad? Tightening candidate? It needs at list: |
| # - dumpstate_service (so it can receive dumpstate progress updates) |
| allow shell { |
| service_manager_type |
| -gatekeeper_service |
| -incident_service |
| -installd_service |
| -netd_service |
| -virtual_touchpad_service |
| -vold_service |
| -vr_hwc_service |
| }:service_manager find; |
| allow shell dumpstate:binder call; |
| |
| # allow shell to get information from hwservicemanager |
| # for instance, listing hardware services with lshal |
| hwbinder_use(shell) |
| allow shell hwservicemanager:hwservice_manager list; |
| |
| # allow shell to look through /proc/ for lsmod, ps, top, netstat. |
| r_dir_file(shell, proc_net) |
| |
| allow shell { |
| proc_asound |
| proc_filesystems |
| proc_interrupts |
| proc_meminfo |
| proc_modules |
| proc_pid_max |
| proc_stat |
| proc_timer |
| proc_uptime |
| proc_version |
| proc_zoneinfo |
| }:file r_file_perms; |
| |
| # allow listing network interfaces under /sys/class/net. |
| allow shell sysfs_net:dir r_dir_perms; |
| |
| r_dir_file(shell, cgroup) |
| allow shell domain:dir { search open read getattr }; |
| allow shell domain:{ file lnk_file } { open read getattr }; |
| |
| # statvfs() of /proc and other labeled filesystems |
| # (yaffs2, jffs2, ext2, ext3, ext4, xfs, btrfs, f2fs, squashfs) |
| allow shell { proc labeledfs }:filesystem getattr; |
| |
| # stat() of /dev |
| allow shell device:dir getattr; |
| |
| # allow shell to read /proc/pid/attr/current for ps -Z |
| allow shell domain:process getattr; |
| |
| # Allow pulling the SELinux policy for CTS purposes |
| allow shell selinuxfs:dir r_dir_perms; |
| allow shell selinuxfs:file r_file_perms; |
| |
| # enable shell domain to read/write files/dirs for bootchart data |
| # User will creates the start and stop file via adb shell |
| # and read other files created by init process under /data/bootchart |
| allow shell bootchart_data_file:dir rw_dir_perms; |
| allow shell bootchart_data_file:file create_file_perms; |
| |
| # Make sure strace works for the non-privileged shell user |
| allow shell self:process ptrace; |
| |
| # allow shell to get battery info |
| allow shell sysfs:dir r_dir_perms; |
| allow shell sysfs_batteryinfo:dir r_dir_perms; |
| allow shell sysfs_batteryinfo:file r_file_perms; |
| |
| # Allow access to ion memory allocation device. |
| allow shell ion_device:chr_file rw_file_perms; |
| |
| # |
| # filesystem test for insecure chr_file's is done |
| # via a host side test |
| # |
| allow shell dev_type:dir r_dir_perms; |
| allow shell dev_type:chr_file getattr; |
| |
| # /dev/fd is a symlink |
| allow shell proc:lnk_file getattr; |
| |
| # |
| # filesystem test for insucre blk_file's is done |
| # via hostside test |
| # |
| allow shell dev_type:blk_file getattr; |
| |
| # read selinux policy files |
| allow shell file_contexts_file:file r_file_perms; |
| allow shell property_contexts_file:file r_file_perms; |
| allow shell seapp_contexts_file:file r_file_perms; |
| allow shell service_contexts_file:file r_file_perms; |
| allow shell sepolicy_file:file r_file_perms; |
| |
| # Allow shell to start up vendor shell |
| allow shell vendor_shell_exec:file rx_file_perms; |
| |
| ### |
| ### Neverallow rules |
| ### |
| |
| # Do not allow shell to hard link to any files. |
| # In particular, if shell hard links to app data |
| # files, installd will not be able to guarantee the deletion |
| # of the linked to file. Hard links also contribute to security |
| # bugs, so we want to ensure the shell user never has this |
| # capability. |
| neverallow shell file_type:file link; |
| |
| # Do not allow privileged socket ioctl commands |
| neverallowxperm shell domain:{ rawip_socket tcp_socket udp_socket } ioctl priv_sock_ioctls; |
| |
| # limit shell access to sensitive char drivers to |
| # only getattr required for host side test. |
| neverallow shell { |
| fuse_device |
| hw_random_device |
| kmem_device |
| port_device |
| }:chr_file ~getattr; |
| |
| # Limit shell to only getattr on blk devices for host side tests. |
| neverallow shell dev_type:blk_file ~getattr; |