Skip to content
Snippets Groups Projects
Commit 1c39637e authored by Nick Kralevich's avatar Nick Kralevich Committed by android-build-merger
Browse files

Merge "shell: remove /dev/input write access" am: efb6667a am: f2735e60

am: e0e51c0f

Change-Id: I781170cb0f51378769e6c8ef1a43ff2ef355e3f9
parents 4206748b e0e51c0f
Branches
No related tags found
No related merge requests found
...@@ -47,11 +47,7 @@ allow shell tty_device:chr_file rw_file_perms; ...@@ -47,11 +47,7 @@ allow shell tty_device:chr_file rw_file_perms;
allow shell console_device:chr_file rw_file_perms; allow shell console_device:chr_file rw_file_perms;
allow shell input_device:dir r_dir_perms; allow shell input_device:dir r_dir_perms;
allow shell input_device:chr_file rw_file_perms; allow shell input_device:chr_file r_file_perms;
# b/30861057: TODO: No shell write access to existing input devices
userdebug_or_eng(`
auditallow shell input_device:chr_file write;
')
r_dir_file(shell, system_file) r_dir_file(shell, system_file)
allow shell system_file:file x_file_perms; allow shell system_file:file x_file_perms;
...@@ -238,3 +234,12 @@ neverallow shell { ...@@ -238,3 +234,12 @@ neverallow shell {
# Limit shell to only getattr on blk devices for host side tests. # Limit shell to only getattr on blk devices for host side tests.
neverallow shell dev_type:blk_file ~getattr; neverallow shell dev_type:blk_file ~getattr;
# b/30861057: Shell access to existing input devices is an abuse
# vector. The shell user can inject events that look like they
# originate from the touchscreen etc.
# Everyone should have already moved to UiAutomation#injectInputEvent
# if they are running instrumentation tests (i.e. CTS), Monkey for
# their stress tests, and the input command (adb shell input ...) for
# injecting swipes and things.
neverallow shell input_device:chr_file no_w_file_perms;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment