xref: /aosp_15_r20/system/sepolicy/prebuilts/api/202404/private/shell.te (revision e4a36f4174b17bbab9dc043f4a65dc8d87377290)
1*e4a36f41SAndroid Build Coastguard Workertypeattribute shell coredomain, mlstrustedsubject;
2*e4a36f41SAndroid Build Coastguard Worker
3*e4a36f41SAndroid Build Coastguard Worker# allow shell input injection
4*e4a36f41SAndroid Build Coastguard Workerallow shell uhid_device:chr_file rw_file_perms;
5*e4a36f41SAndroid Build Coastguard Worker
6*e4a36f41SAndroid Build Coastguard Worker# systrace support - allow atrace to run
7*e4a36f41SAndroid Build Coastguard Workerallow shell debugfs_tracing_debug:dir r_dir_perms;
8*e4a36f41SAndroid Build Coastguard Workerallow shell debugfs_tracing:dir r_dir_perms;
9*e4a36f41SAndroid Build Coastguard Workerallow shell debugfs_tracing:file rw_file_perms;
10*e4a36f41SAndroid Build Coastguard Workerallow shell debugfs_trace_marker:file getattr;
11*e4a36f41SAndroid Build Coastguard Workerallow shell atrace_exec:file rx_file_perms;
12*e4a36f41SAndroid Build Coastguard Worker
13*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(`
14*e4a36f41SAndroid Build Coastguard Worker  allow shell debugfs_tracing_debug:file rw_file_perms;
15*e4a36f41SAndroid Build Coastguard Worker')
16*e4a36f41SAndroid Build Coastguard Worker
17*e4a36f41SAndroid Build Coastguard Worker# read config.gz for CTS purposes
18*e4a36f41SAndroid Build Coastguard Workerallow shell config_gz:file r_file_perms;
19*e4a36f41SAndroid Build Coastguard Worker
20*e4a36f41SAndroid Build Coastguard Worker# allow reading tombstones. users can already use bugreports to get those.
21*e4a36f41SAndroid Build Coastguard Workerallow shell tombstone_data_file:dir r_dir_perms;
22*e4a36f41SAndroid Build Coastguard Workerallow shell tombstone_data_file:file r_file_perms;
23*e4a36f41SAndroid Build Coastguard Worker
24*e4a36f41SAndroid Build Coastguard Worker# Run app_process.
25*e4a36f41SAndroid Build Coastguard Worker# XXX Transition into its own domain?
26*e4a36f41SAndroid Build Coastguard Workerapp_domain(shell)
27*e4a36f41SAndroid Build Coastguard Worker
28*e4a36f41SAndroid Build Coastguard Worker# allow shell to call dumpsys storaged
29*e4a36f41SAndroid Build Coastguard Workerbinder_call(shell, storaged)
30*e4a36f41SAndroid Build Coastguard Worker
31*e4a36f41SAndroid Build Coastguard Worker# Perform SELinux access checks, needed for CTS
32*e4a36f41SAndroid Build Coastguard Workerselinux_check_access(shell)
33*e4a36f41SAndroid Build Coastguard Workerselinux_check_context(shell)
34*e4a36f41SAndroid Build Coastguard Worker
35*e4a36f41SAndroid Build Coastguard Worker# Control Perfetto traced and obtain traces from it.
36*e4a36f41SAndroid Build Coastguard Worker# Needed for Studio and debugging.
37*e4a36f41SAndroid Build Coastguard Workerunix_socket_connect(shell, traced_consumer, traced)
38*e4a36f41SAndroid Build Coastguard Worker
39*e4a36f41SAndroid Build Coastguard Worker# Allow shell binaries to write trace data to Perfetto. Used for testing and
40*e4a36f41SAndroid Build Coastguard Worker# cmdline utils.
41*e4a36f41SAndroid Build Coastguard Workerperfetto_producer(shell)
42*e4a36f41SAndroid Build Coastguard Worker
43*e4a36f41SAndroid Build Coastguard Workerdomain_auto_trans(shell, vendor_shell_exec, vendor_shell)
44*e4a36f41SAndroid Build Coastguard Worker
45*e4a36f41SAndroid Build Coastguard Worker# Allow shell binaries to exec the perfetto cmdline util and have that
46*e4a36f41SAndroid Build Coastguard Worker# transition into its own domain, so that it behaves consistently to
47*e4a36f41SAndroid Build Coastguard Worker# when exec()-d by statsd.
48*e4a36f41SAndroid Build Coastguard Workerdomain_auto_trans(shell, perfetto_exec, perfetto)
49*e4a36f41SAndroid Build Coastguard Worker# Allow to send SIGINT to perfetto when daemonized.
50*e4a36f41SAndroid Build Coastguard Workerallow shell perfetto:process signal;
51*e4a36f41SAndroid Build Coastguard Worker
52*e4a36f41SAndroid Build Coastguard Worker# Allow shell to run adb shell cmd stats commands. Needed for CTS.
53*e4a36f41SAndroid Build Coastguard Workerbinder_call(shell, statsd);
54*e4a36f41SAndroid Build Coastguard Worker
55*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read and unlink traces stored in /data/misc/a11ytraces.
56*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(`
57*e4a36f41SAndroid Build Coastguard Worker  allow shell accessibility_trace_data_file:dir rw_dir_perms;
58*e4a36f41SAndroid Build Coastguard Worker  allow shell accessibility_trace_data_file:file { r_file_perms unlink };
59*e4a36f41SAndroid Build Coastguard Worker')
60*e4a36f41SAndroid Build Coastguard Worker
61*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read and unlink traces stored in /data/misc/perfetto-traces.
62*e4a36f41SAndroid Build Coastguard Workerallow shell perfetto_traces_data_file:dir rw_dir_perms;
63*e4a36f41SAndroid Build Coastguard Workerallow shell perfetto_traces_data_file:file { r_file_perms unlink };
64*e4a36f41SAndroid Build Coastguard Worker# ... and /data/misc/perfetto-traces/bugreport/ .
65*e4a36f41SAndroid Build Coastguard Workerallow shell perfetto_traces_bugreport_data_file:dir rw_dir_perms;
66*e4a36f41SAndroid Build Coastguard Workerallow shell perfetto_traces_bugreport_data_file:file { r_file_perms unlink };
67*e4a36f41SAndroid Build Coastguard Worker
68*e4a36f41SAndroid Build Coastguard Worker# Allow shell to create/remove configs stored in /data/misc/perfetto-configs.
69*e4a36f41SAndroid Build Coastguard Workerallow shell perfetto_configs_data_file:dir rw_dir_perms;
70*e4a36f41SAndroid Build Coastguard Workerallow shell perfetto_configs_data_file:file create_file_perms;
71*e4a36f41SAndroid Build Coastguard Worker
72*e4a36f41SAndroid Build Coastguard Worker# Allow shell to run adb shell cmd gpu commands.
73*e4a36f41SAndroid Build Coastguard Workerbinder_call(shell, gpuservice);
74*e4a36f41SAndroid Build Coastguard Worker
75*e4a36f41SAndroid Build Coastguard Worker# Allow shell to use atrace HAL
76*e4a36f41SAndroid Build Coastguard Workerhal_client_domain(shell, hal_atrace)
77*e4a36f41SAndroid Build Coastguard Worker
78*e4a36f41SAndroid Build Coastguard Worker# For hostside tests such as CTS listening ports test.
79*e4a36f41SAndroid Build Coastguard Workerallow shell proc_net_tcp_udp:file r_file_perms;
80*e4a36f41SAndroid Build Coastguard Worker
81*e4a36f41SAndroid Build Coastguard Worker# The dl.exec_linker* tests need to execute /system/bin/linker
82*e4a36f41SAndroid Build Coastguard Worker# b/124789393
83*e4a36f41SAndroid Build Coastguard Workerallow shell system_linker_exec:file rx_file_perms;
84*e4a36f41SAndroid Build Coastguard Worker
85*e4a36f41SAndroid Build Coastguard Worker# Renderscript host side tests depend on being able to execute
86*e4a36f41SAndroid Build Coastguard Worker# /system/bin/bcc (b/126388046)
87*e4a36f41SAndroid Build Coastguard Workerallow shell rs_exec:file rx_file_perms;
88*e4a36f41SAndroid Build Coastguard Worker
89*e4a36f41SAndroid Build Coastguard Worker# Allow (host-driven) ART run-tests to execute dex2oat, in order to
90*e4a36f41SAndroid Build Coastguard Worker# check ART's compiler.
91*e4a36f41SAndroid Build Coastguard Workerallow shell dex2oat_exec:file rx_file_perms;
92*e4a36f41SAndroid Build Coastguard Workerallow shell dex2oat_exec:lnk_file read;
93*e4a36f41SAndroid Build Coastguard Worker
94*e4a36f41SAndroid Build Coastguard Worker# Allow shell to start and comminicate with lpdumpd.
95*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, lpdumpd_prop);
96*e4a36f41SAndroid Build Coastguard Workerbinder_call(shell, lpdumpd)
97*e4a36f41SAndroid Build Coastguard Worker
98*e4a36f41SAndroid Build Coastguard Worker# Allow shell to set and read value of properties used for CTS tests of
99*e4a36f41SAndroid Build Coastguard Worker# userspace reboot
100*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, userspace_reboot_test_prop)
101*e4a36f41SAndroid Build Coastguard Worker
102*e4a36f41SAndroid Build Coastguard Worker# Allow shell to set this property to disable charging.
103*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, power_debug_prop)
104*e4a36f41SAndroid Build Coastguard Worker
105*e4a36f41SAndroid Build Coastguard Worker# Allow shell to set this property used for rollback tests
106*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, rollback_test_prop)
107*e4a36f41SAndroid Build Coastguard Worker
108*e4a36f41SAndroid Build Coastguard Worker# Allow shell to set RKP properties for testing purposes
109*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, remote_prov_prop)
110*e4a36f41SAndroid Build Coastguard Worker
111*e4a36f41SAndroid Build Coastguard Worker# Allow shell to get encryption policy of /data/local/tmp/, for CTS
112*e4a36f41SAndroid Build Coastguard Workerallowxperm shell shell_data_file:dir ioctl {
113*e4a36f41SAndroid Build Coastguard Worker  FS_IOC_GET_ENCRYPTION_POLICY
114*e4a36f41SAndroid Build Coastguard Worker  FS_IOC_GET_ENCRYPTION_POLICY_EX
115*e4a36f41SAndroid Build Coastguard Worker};
116*e4a36f41SAndroid Build Coastguard Worker
117*e4a36f41SAndroid Build Coastguard Worker# Allow shell to execute simpleperf without a domain transition.
118*e4a36f41SAndroid Build Coastguard Workerallow shell simpleperf_exec:file rx_file_perms;
119*e4a36f41SAndroid Build Coastguard Worker
120*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(`
121*e4a36f41SAndroid Build Coastguard Worker  # Allow shell to execute profcollectctl without a domain transition.
122*e4a36f41SAndroid Build Coastguard Worker  allow shell profcollectd_exec:file rx_file_perms;
123*e4a36f41SAndroid Build Coastguard Worker
124*e4a36f41SAndroid Build Coastguard Worker  # Allow shell to read profcollectd data files.
125*e4a36f41SAndroid Build Coastguard Worker  r_dir_file(shell, profcollectd_data_file)
126*e4a36f41SAndroid Build Coastguard Worker
127*e4a36f41SAndroid Build Coastguard Worker  # Allow to issue control commands to profcollectd binder service.
128*e4a36f41SAndroid Build Coastguard Worker  allow shell profcollectd:binder call;
129*e4a36f41SAndroid Build Coastguard Worker')
130*e4a36f41SAndroid Build Coastguard Worker
131*e4a36f41SAndroid Build Coastguard Worker# Allow shell to run remount command.
132*e4a36f41SAndroid Build Coastguard Workerallow shell remount_exec:file rx_file_perms;
133*e4a36f41SAndroid Build Coastguard Worker
134*e4a36f41SAndroid Build Coastguard Worker# Allow shell to call perf_event_open for profiling other shell processes, but
135*e4a36f41SAndroid Build Coastguard Worker# not the whole system.
136*e4a36f41SAndroid Build Coastguard Workerallow shell self:perf_event { open read write kernel };
137*e4a36f41SAndroid Build Coastguard Workerneverallow shell self:perf_event ~{ open read write kernel };
138*e4a36f41SAndroid Build Coastguard Worker
139*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read microdroid vendor image
140*e4a36f41SAndroid Build Coastguard Workerr_dir_file(shell, vendor_microdroid_file)
141*e4a36f41SAndroid Build Coastguard Worker
142*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read /apex/apex-info-list.xml and the vendor apexes
143*e4a36f41SAndroid Build Coastguard Workerallow shell apex_info_file:file r_file_perms;
144*e4a36f41SAndroid Build Coastguard Workerallow shell vendor_apex_file:file r_file_perms;
145*e4a36f41SAndroid Build Coastguard Workerallow shell vendor_apex_file:dir r_dir_perms;
146*e4a36f41SAndroid Build Coastguard Workerallow shell vendor_apex_metadata_file:dir r_dir_perms;
147*e4a36f41SAndroid Build Coastguard Worker
148*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read updated APEXes under /data/apex
149*e4a36f41SAndroid Build Coastguard Workerallow shell apex_data_file:dir search;
150*e4a36f41SAndroid Build Coastguard Workerallow shell staging_data_file:file r_file_perms;
151*e4a36f41SAndroid Build Coastguard Worker
152*e4a36f41SAndroid Build Coastguard Worker# Set properties.
153*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, shell_prop)
154*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, ctl_bugreport_prop)
155*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, ctl_dumpstate_prop)
156*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, dumpstate_prop)
157*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, exported_dumpstate_prop)
158*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, debug_prop)
159*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, perf_drop_caches_prop)
160*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, powerctl_prop)
161*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, log_tag_prop)
162*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, wifi_log_prop)
163*e4a36f41SAndroid Build Coastguard Worker# Allow shell to start/stop traced via the persist.traced.enable
164*e4a36f41SAndroid Build Coastguard Worker# property (which also takes care of /data/misc initialization).
165*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, traced_enabled_prop)
166*e4a36f41SAndroid Build Coastguard Worker# adjust SELinux audit rates
167*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, logd_auditrate_prop)
168*e4a36f41SAndroid Build Coastguard Worker# adjust is_loggable properties
169*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(`set_prop(shell, log_prop)')
170*e4a36f41SAndroid Build Coastguard Worker# logpersist script
171*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(`set_prop(shell, logpersistd_logging_prop)')
172*e4a36f41SAndroid Build Coastguard Worker# Allow shell to start/stop heapprofd via the persist.heapprofd.enable
173*e4a36f41SAndroid Build Coastguard Worker# property.
174*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, heapprofd_enabled_prop)
175*e4a36f41SAndroid Build Coastguard Worker# Allow shell to start/stop traced_perf via the persist.traced_perf.enable
176*e4a36f41SAndroid Build Coastguard Worker# property.
177*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, traced_perf_enabled_prop)
178*e4a36f41SAndroid Build Coastguard Worker# Allow shell to start/stop gsid via ctl.start|stop|restart gsid.
179*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, ctl_gsid_prop)
180*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, ctl_snapuserd_prop)
181*e4a36f41SAndroid Build Coastguard Worker# Allow shell to enable Dynamic System Update
182*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, dynamic_system_prop)
183*e4a36f41SAndroid Build Coastguard Worker# Allow shell to mock an OTA using persist.pm.mock-upgrade
184*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, mock_ota_prop)
185*e4a36f41SAndroid Build Coastguard Worker
186*e4a36f41SAndroid Build Coastguard Worker# Read device's serial number from system properties
187*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, serialno_prop)
188*e4a36f41SAndroid Build Coastguard Worker
189*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read the vendor security patch level for CTS
190*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, vendor_security_patch_level_prop)
191*e4a36f41SAndroid Build Coastguard Worker
192*e4a36f41SAndroid Build Coastguard Worker# Read state of logging-related properties
193*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, device_logging_prop)
194*e4a36f41SAndroid Build Coastguard Worker
195*e4a36f41SAndroid Build Coastguard Worker# Read state of boot reason properties
196*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, bootloader_boot_reason_prop)
197*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, last_boot_reason_prop)
198*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, system_boot_reason_prop)
199*e4a36f41SAndroid Build Coastguard Worker
200*e4a36f41SAndroid Build Coastguard Worker# Allow shell to execute the remote key provisioning factory tool
201*e4a36f41SAndroid Build Coastguard Workerbinder_call(shell, hal_keymint)
202*e4a36f41SAndroid Build Coastguard Worker
203*e4a36f41SAndroid Build Coastguard Worker# Allow reading the outcome of perf_event_open LSM support test for CTS.
204*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, init_perf_lsm_hooks_prop)
205*e4a36f41SAndroid Build Coastguard Worker
206*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read boot image timestamps and fingerprints.
207*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, build_bootimage_prop)
208*e4a36f41SAndroid Build Coastguard Worker
209*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read odsign verification properties
210*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, odsign_prop)
211*e4a36f41SAndroid Build Coastguard Worker
212*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(`set_prop(shell, persist_debug_prop)')
213*e4a36f41SAndroid Build Coastguard Worker
214*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read the keystore key contexts files. Used by native tests to test label lookup.
215*e4a36f41SAndroid Build Coastguard Workerallow shell keystore2_key_contexts_file:file r_file_perms;
216*e4a36f41SAndroid Build Coastguard Worker
217*e4a36f41SAndroid Build Coastguard Worker# Allow shell to access the keystore2_key namespace shell_key. Mainly used for native tests.
218*e4a36f41SAndroid Build Coastguard Workerallow shell shell_key:keystore2_key { delete rebind use get_info update };
219*e4a36f41SAndroid Build Coastguard Worker
220*e4a36f41SAndroid Build Coastguard Worker# Allow shell to open and execute memfd files for minijail unit tests.
221*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(`
222*e4a36f41SAndroid Build Coastguard Worker  allow shell appdomain_tmpfs:file { open execute_no_trans };
223*e4a36f41SAndroid Build Coastguard Worker')
224*e4a36f41SAndroid Build Coastguard Worker
225*e4a36f41SAndroid Build Coastguard Worker# Allow shell to write db.log.detailed, db.log.slow_query_threshold*
226*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, sqlite_log_prop)
227*e4a36f41SAndroid Build Coastguard Worker
228*e4a36f41SAndroid Build Coastguard Worker# Allow shell to write MTE properties even on user builds.
229*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, arm64_memtag_prop)
230*e4a36f41SAndroid Build Coastguard Worker
231*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read the dm-verity props on user builds.
232*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, verity_status_prop)
233*e4a36f41SAndroid Build Coastguard Worker
234*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read Virtual A/B related properties
235*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, virtual_ab_prop)
236*e4a36f41SAndroid Build Coastguard Worker
237*e4a36f41SAndroid Build Coastguard Worker# Never allow others to set or get the perf.drop_caches property.
238*e4a36f41SAndroid Build Coastguard Workerneverallow { domain -shell -init } perf_drop_caches_prop:property_service set;
239*e4a36f41SAndroid Build Coastguard Workerneverallow { domain -shell -init -dumpstate } perf_drop_caches_prop:file read;
240*e4a36f41SAndroid Build Coastguard Worker
241*e4a36f41SAndroid Build Coastguard Worker# Allow ReadDefaultFstab() for CTS.
242*e4a36f41SAndroid Build Coastguard Workerread_fstab(shell)
243*e4a36f41SAndroid Build Coastguard Worker
244*e4a36f41SAndroid Build Coastguard Worker# Allow shell read access to /apex/apex-info-list.xml for CTS.
245*e4a36f41SAndroid Build Coastguard Workerallow shell apex_info_file:file r_file_perms;
246*e4a36f41SAndroid Build Coastguard Worker
247*e4a36f41SAndroid Build Coastguard Worker# Let the shell user call virtualizationservice (and
248*e4a36f41SAndroid Build Coastguard Worker# virtualizationservice call back to shell) for debugging.
249*e4a36f41SAndroid Build Coastguard Workervirtualizationservice_use(shell)
250*e4a36f41SAndroid Build Coastguard Worker
251*e4a36f41SAndroid Build Coastguard Worker# Allow shell to set persist.wm.debug properties
252*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(`set_prop(shell, persist_wm_debug_prop)')
253*e4a36f41SAndroid Build Coastguard Worker
254*e4a36f41SAndroid Build Coastguard Worker# Allow shell to write GWP-ASan properties even on user builds.
255*e4a36f41SAndroid Build Coastguard Workerset_prop(shell, gwp_asan_prop)
256*e4a36f41SAndroid Build Coastguard Worker
257*e4a36f41SAndroid Build Coastguard Worker# Allow shell to set persist.sysui.notification.builder_extras_override property
258*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(`set_prop(shell, persist_sysui_builder_extras_prop)')
259*e4a36f41SAndroid Build Coastguard Worker# Allow shell to set persist.sysui.notification.ranking_update_ashmem property
260*e4a36f41SAndroid Build Coastguard Workeruserdebug_or_eng(`set_prop(shell, persist_sysui_ranking_update_prop)')
261*e4a36f41SAndroid Build Coastguard Worker
262*e4a36f41SAndroid Build Coastguard Worker# Allow shell to read the build properties for attestation feature
263*e4a36f41SAndroid Build Coastguard Workerget_prop(shell, build_attestation_prop)
264*e4a36f41SAndroid Build Coastguard Worker
265*e4a36f41SAndroid Build Coastguard Worker# Allow shell to execute oatdump.
266*e4a36f41SAndroid Build Coastguard Workerallow shell oatdump_exec:file rx_file_perms;
267