diff --git a/private/app_neverallows.te b/private/app_neverallows.te index 9ad7cfed6aacbbffe5211ad066395afe1f68a82d..c730d708b4de4fe575f61408fca7c709ef4013d2 100644 --- a/private/app_neverallows.te +++ b/private/app_neverallows.te @@ -225,5 +225,6 @@ full_treble_only(` -hal_graphics_allocator_server -hal_cas_server -binder_in_vendor_violators # TODO(b/35870313): Remove once all violations are gone + -untrusted_app_visible_halserver }:binder { call transfer }; ') diff --git a/public/attributes b/public/attributes index ffd6316aecf281bc852e323c5765312662b8aec8..9ac302b360fc9a541312437c4a6a376906bcc7a4 100644 --- a/public/attributes +++ b/public/attributes @@ -157,6 +157,17 @@ expandattribute vendor_executes_system_violators false; # app-visibility. attribute untrusted_app_visible_hwservice; +# halserver domains that are accessible to untrusted applications. These +# domains are typically those hosting hwservices attributed by the +# untrusted_app_visible_hwservice. +# WARNING: Use of this attribute should be avoided unless absolutely necessary. +# It is a temporary allowance to aid the transition to treble and will be +# removed in the future platform version, requiring all halserver domains that +# are labeled with this attribute to be submitted to AOSP in order to maintain +# their app-visibility. +attribute untrusted_app_visible_halserver; +expandattribute untrusted_app_visible_halserver false; + # PDX services attribute pdx_endpoint_dir_type; attribute pdx_endpoint_socket_type;