Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 1 | ###################################### |
| 2 | # Attribute declarations |
| 3 | # |
| 4 | |
| 5 | # All types used for devices. |
William Roberts | ad3cb39 | 2015-09-24 18:10:54 -0700 | [diff] [blame] | 6 | # On change, update CHECK_FC_ASSERT_ATTRS |
| 7 | # in tools/checkfc.c |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 8 | attribute dev_type; |
| 9 | |
Maciej Żenczykowski | b13921c | 2022-05-21 05:03:29 -0700 | [diff] [blame] | 10 | # Attribute for all bpf filesystem subtypes. |
| 11 | attribute bpffs_type; |
| 12 | |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 13 | # All types used for processes. |
| 14 | attribute domain; |
| 15 | |
| 16 | # All types used for filesystems. |
William Roberts | ad3cb39 | 2015-09-24 18:10:54 -0700 | [diff] [blame] | 17 | # On change, update CHECK_FC_ASSERT_ATTRS |
| 18 | # definition in tools/checkfc.c. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 19 | attribute fs_type; |
| 20 | |
Stephen Smalley | d2503ba | 2014-05-30 08:49:51 -0400 | [diff] [blame] | 21 | # All types used for context= mounts. |
| 22 | attribute contextmount_type; |
| 23 | |
Thiébaud Weksteen | 9ec5327 | 2021-06-23 10:21:49 +0200 | [diff] [blame] | 24 | # All types referencing a FUSE filesystem. |
| 25 | # When mounting a new FUSE filesystem, the fscontext= option should be used to |
| 26 | # set a domain-specific type with this attribute. See app_fusefs for an |
| 27 | # example. |
| 28 | attribute fusefs_type; |
| 29 | |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 30 | # All types used for files that can exist on a labeled fs. |
| 31 | # Do not use for pseudo file types. |
William Roberts | ad3cb39 | 2015-09-24 18:10:54 -0700 | [diff] [blame] | 32 | # On change, update CHECK_FC_ASSERT_ATTRS |
| 33 | # definition in tools/checkfc.c. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 34 | attribute file_type; |
| 35 | |
| 36 | # All types used for domain entry points. |
| 37 | attribute exec_type; |
| 38 | |
| 39 | # All types used for /data files. |
| 40 | attribute data_file_type; |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 41 | expandattribute data_file_type false; |
Jeff Vander Stoep | 4a478c4 | 2017-03-27 22:44:40 -0700 | [diff] [blame] | 42 | # All types in /data, not in /data/vendor |
| 43 | attribute core_data_file_type; |
Jeff Vander Stoep | ccf965e | 2018-01-24 07:01:13 -0800 | [diff] [blame] | 44 | expandattribute core_data_file_type false; |
Nick Kralevich | 5e37271 | 2018-09-27 10:21:37 -0700 | [diff] [blame] | 45 | |
Alan Stokes | 668e74f | 2020-11-12 18:08:18 +0000 | [diff] [blame] | 46 | # All types used for app private data files in seapp_contexts. |
| 47 | # Such types should not be applied to any other files. |
Alan Stokes | f8ad339 | 2020-10-27 17:35:33 +0000 | [diff] [blame] | 48 | attribute app_data_file_type; |
| 49 | expandattribute app_data_file_type false; |
| 50 | |
Nick Kralevich | 5e37271 | 2018-09-27 10:21:37 -0700 | [diff] [blame] | 51 | # All types in /system |
| 52 | attribute system_file_type; |
| 53 | |
Ramji Jiyani | 4a55689 | 2022-02-10 00:35:54 +0000 | [diff] [blame] | 54 | # All types in /system_dlkm |
| 55 | attribute system_dlkm_file_type; |
| 56 | |
Sandeep Patil | 277a20e | 2017-04-01 17:17:12 -0700 | [diff] [blame] | 57 | # All types in /vendor |
| 58 | attribute vendor_file_type; |
| 59 | |
Tri Vo | 41bf08e | 2018-02-15 18:07:18 -0800 | [diff] [blame] | 60 | # All types used for procfs files. |
| 61 | attribute proc_type; |
Jeff Vander Stoep | a629541 | 2018-05-01 09:40:33 -0700 | [diff] [blame] | 62 | expandattribute proc_type false; |
Tri Vo | 41bf08e | 2018-02-15 18:07:18 -0800 | [diff] [blame] | 63 | |
Bart Sears | dbca625 | 2024-08-04 23:06:24 +0000 | [diff] [blame] | 64 | # Types in /proc/net, excluding qtaguid types. |
Jeff Vander Stoep | 7a4af30 | 2018-04-10 12:47:48 -0700 | [diff] [blame] | 65 | # TODO(b/9496886) Lock down access to /proc/net. |
| 66 | # This attribute is used to audit access to proc_net. it is temporary and will |
| 67 | # be removed. |
| 68 | attribute proc_net_type; |
| 69 | expandattribute proc_net_type true; |
| 70 | |
Tri Vo | 41bf08e | 2018-02-15 18:07:18 -0800 | [diff] [blame] | 71 | # All types used for sysfs files. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 72 | attribute sysfs_type; |
| 73 | |
Nick Kralevich | 44826cb | 2015-12-07 17:02:31 -0800 | [diff] [blame] | 74 | # All types use for debugfs files. |
| 75 | attribute debugfs_type; |
| 76 | |
Hridya Valsaraju | 23f9f51 | 2021-05-04 22:01:51 -0700 | [diff] [blame] | 77 | # All types used for tracefs files. |
| 78 | attribute tracefs_type; |
| 79 | |
William Roberts | c195ec3 | 2013-03-06 16:26:36 -0800 | [diff] [blame] | 80 | # Attribute used for all sdcards |
| 81 | attribute sdcard_type; |
| 82 | |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 83 | # All types used for nodes/hosts. |
| 84 | attribute node_type; |
| 85 | |
| 86 | # All types used for network interfaces. |
| 87 | attribute netif_type; |
| 88 | |
| 89 | # All types used for network ports. |
| 90 | attribute port_type; |
| 91 | |
Stephen Smalley | 124720a | 2012-04-04 10:11:16 -0400 | [diff] [blame] | 92 | # All types used for property service |
William Roberts | ad3cb39 | 2015-09-24 18:10:54 -0700 | [diff] [blame] | 93 | # On change, update CHECK_PC_ASSERT_ATTRS |
| 94 | # definition in tools/checkfc.c. |
Stephen Smalley | 124720a | 2012-04-04 10:11:16 -0400 | [diff] [blame] | 95 | attribute property_type; |
| 96 | |
Nick Kralevich | 5a570a4 | 2015-12-08 14:45:50 -0800 | [diff] [blame] | 97 | # All properties defined in core SELinux policy. Should not be |
| 98 | # used by device specific properties |
| 99 | attribute core_property_type; |
| 100 | |
mukesh agrawal | 84cfde2 | 2016-04-15 11:10:06 -0700 | [diff] [blame] | 101 | # All properties used to configure log filtering. |
| 102 | attribute log_property_type; |
| 103 | |
Jiyong Park | d8ae007 | 2018-05-30 17:38:09 +0900 | [diff] [blame] | 104 | # All properties that are not specific to device but are added from |
| 105 | # outside of AOSP. (e.g. OEM-specific properties) |
| 106 | # These properties are not accessible from device-specific domains |
| 107 | attribute extended_core_property_type; |
| 108 | |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 109 | # Properties used for representing ownership. All properties should have one |
| 110 | # of: system_property_type, product_property_type, or vendor_property_type. |
| 111 | |
| 112 | # All properties defined by /system. |
| 113 | attribute system_property_type; |
Inseob Kim | 2eb0396 | 2020-09-15 12:22:44 +0900 | [diff] [blame] | 114 | expandattribute system_property_type false; |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 115 | |
| 116 | # All /system-defined properties used only in /system. |
| 117 | attribute system_internal_property_type; |
Inseob Kim | 2eb0396 | 2020-09-15 12:22:44 +0900 | [diff] [blame] | 118 | expandattribute system_internal_property_type false; |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 119 | |
| 120 | # All /system-defined properties which can't be written outside /system. |
| 121 | attribute system_restricted_property_type; |
Inseob Kim | 2eb0396 | 2020-09-15 12:22:44 +0900 | [diff] [blame] | 122 | expandattribute system_restricted_property_type false; |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 123 | |
| 124 | # All /system-defined properties with no restrictions. |
| 125 | attribute system_public_property_type; |
Inseob Kim | 2eb0396 | 2020-09-15 12:22:44 +0900 | [diff] [blame] | 126 | expandattribute system_public_property_type false; |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 127 | |
Janis Danisevskis | c40681f | 2020-07-25 13:02:29 -0700 | [diff] [blame] | 128 | # All keystore2_key labels. |
| 129 | attribute keystore2_key_type; |
| 130 | |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 131 | # All properties defined by /product. |
| 132 | # Currently there are no enforcements between /system and /product, so for now |
| 133 | # /product attributes are just replaced to /system attributes. |
| 134 | define(`product_property_type', `system_property_type') |
Inseob Kim | c9610de | 2020-08-25 16:38:13 +0900 | [diff] [blame] | 135 | define(`product_internal_property_type', `system_internal_property_type') |
| 136 | define(`product_restricted_property_type', `system_restricted_property_type') |
| 137 | define(`product_public_property_type', `system_public_property_type') |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 138 | |
| 139 | # All properties defined by /vendor. |
| 140 | attribute vendor_property_type; |
Inseob Kim | 2eb0396 | 2020-09-15 12:22:44 +0900 | [diff] [blame] | 141 | expandattribute vendor_property_type false; |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 142 | |
| 143 | # All /vendor-defined properties used only in /vendor. |
| 144 | attribute vendor_internal_property_type; |
Inseob Kim | 2eb0396 | 2020-09-15 12:22:44 +0900 | [diff] [blame] | 145 | expandattribute vendor_internal_property_type false; |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 146 | |
| 147 | # All /vendor-defined properties which can't be written outside /vendor. |
| 148 | attribute vendor_restricted_property_type; |
Inseob Kim | 2eb0396 | 2020-09-15 12:22:44 +0900 | [diff] [blame] | 149 | expandattribute vendor_restricted_property_type false; |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 150 | |
| 151 | # All /vendor-defined properties with no restrictions. |
| 152 | attribute vendor_public_property_type; |
Inseob Kim | 2eb0396 | 2020-09-15 12:22:44 +0900 | [diff] [blame] | 153 | expandattribute vendor_public_property_type false; |
Inseob Kim | 19b99f1 | 2019-09-09 19:46:15 +0900 | [diff] [blame] | 154 | |
dcashman | bd7f580 | 2015-04-08 15:12:24 -0700 | [diff] [blame] | 155 | # All service_manager types created by system_server |
dcashman | d12993f | 2015-04-02 16:50:08 -0700 | [diff] [blame] | 156 | attribute system_server_service; |
| 157 | |
| 158 | # services which should be available to all but isolated apps |
| 159 | attribute app_api_service; |
| 160 | |
Alex Klyubin | 6237d8b | 2017-02-28 13:59:06 -0800 | [diff] [blame] | 161 | # services which should be available to all ephemeral apps |
| 162 | attribute ephemeral_app_api_service; |
| 163 | |
dcashman | d12993f | 2015-04-02 16:50:08 -0700 | [diff] [blame] | 164 | # services which export only system_api |
| 165 | attribute system_api_service; |
dcashman | 4a89cdf | 2014-12-16 15:45:26 -0800 | [diff] [blame] | 166 | |
Steven Moreland | a43e26e | 2020-10-21 21:47:00 +0000 | [diff] [blame] | 167 | # services which are explicitly disallowed for untrusted apps to access |
| 168 | attribute protected_service; |
| 169 | |
Martijn Coenen | bc6d88d | 2017-04-06 09:24:41 -0700 | [diff] [blame] | 170 | # All types used for services managed by servicemanager. |
William Roberts | ad3cb39 | 2015-09-24 18:10:54 -0700 | [diff] [blame] | 171 | # On change, update CHECK_SC_ASSERT_ATTRS |
| 172 | # definition in tools/checkfc.c. |
Riley Spahn | f90c41f | 2014-06-05 15:52:02 -0700 | [diff] [blame] | 173 | attribute service_manager_type; |
| 174 | |
Martijn Coenen | bc6d88d | 2017-04-06 09:24:41 -0700 | [diff] [blame] | 175 | # All types used for services managed by hwservicemanager |
| 176 | attribute hwservice_manager_type; |
| 177 | |
Alex Klyubin | 2a7f4fb | 2017-04-21 17:06:43 -0700 | [diff] [blame] | 178 | # All HwBinder services guaranteed to be passthrough. These services always run |
| 179 | # in the process of their clients, and thus operate with the same access as |
| 180 | # their clients. |
| 181 | attribute same_process_hwservice; |
| 182 | |
| 183 | # All HwBinder services guaranteed to be offered only by core domain components |
| 184 | attribute coredomain_hwservice; |
| 185 | |
Jiyong Park | e95c704 | 2019-08-22 00:04:50 +0900 | [diff] [blame] | 186 | # All HwBinder services that untrusted apps can't directly access |
| 187 | attribute protected_hwservice; |
| 188 | |
Martijn Coenen | bc6d88d | 2017-04-06 09:24:41 -0700 | [diff] [blame] | 189 | # All types used for services managed by vndservicemanager |
| 190 | attribute vndservice_manager_type; |
| 191 | |
Thiébaud Weksteen | 373cf3b | 2022-02-16 10:17:50 +1100 | [diff] [blame] | 192 | # All services declared as part of an HAL |
| 193 | attribute hal_service_type; |
Martijn Coenen | bc6d88d | 2017-04-06 09:24:41 -0700 | [diff] [blame] | 194 | |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 195 | # All domains that can override MLS restrictions. |
| 196 | # i.e. processes that can read up and write down. |
| 197 | attribute mlstrustedsubject; |
| 198 | |
| 199 | # All types that can override MLS restrictions. |
| 200 | # i.e. files that can be read by lower and written by higher |
| 201 | attribute mlstrustedobject; |
| 202 | |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 203 | # All domains used for apps. |
| 204 | attribute appdomain; |
| 205 | |
Steven Moreland | 826b92f | 2020-09-17 17:15:26 +0000 | [diff] [blame] | 206 | # All third party apps (except isolated_app and ephemeral_app) |
Jeff Vander Stoep | bacb6d7 | 2017-02-13 13:33:27 -0800 | [diff] [blame] | 207 | attribute untrusted_app_all; |
| 208 | |
Charles Chen | ccf8014 | 2023-01-20 03:34:19 +0000 | [diff] [blame] | 209 | # All apps with UID between AID_ISOLATED_START (99000) and AID_ISOLATED_END (99999). |
| 210 | attribute isolated_app_all; |
| 211 | |
Charles Chen | c8ab359 | 2023-04-17 22:33:40 +0000 | [diff] [blame] | 212 | # All service types that would be allowed for isolated_compute_app. |
Charles Chen | 27a8f43 | 2023-04-20 16:38:30 +0000 | [diff] [blame] | 213 | attribute isolated_compute_allowed_service; |
Charles Chen | c8ab359 | 2023-04-17 22:33:40 +0000 | [diff] [blame] | 214 | |
| 215 | # All device types that would be allowed for isolated_compute_app. |
Charles Chen | 27a8f43 | 2023-04-20 16:38:30 +0000 | [diff] [blame] | 216 | attribute isolated_compute_allowed_device; |
Charles Chen | c8ab359 | 2023-04-17 22:33:40 +0000 | [diff] [blame] | 217 | |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 218 | # All domains used for apps with network access. |
| 219 | attribute netdomain; |
| 220 | |
| 221 | # All domains used for apps with bluetooth access. |
| 222 | attribute bluetoothdomain; |
| 223 | |
Thiébaud Weksteen | 5e9b88f | 2023-08-28 12:22:17 +1000 | [diff] [blame] | 224 | # Specific domains that expose a binder service. |
| 225 | # Deprecated, consider granting the exact permissions required by your service. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 226 | attribute binderservicedomain; |
Alex Deymo | 0f8d926 | 2016-04-22 13:23:36 -0700 | [diff] [blame] | 227 | |
Steven Moreland | 6598175 | 2022-02-10 00:32:44 +0000 | [diff] [blame] | 228 | # All domains which have BPF access. |
| 229 | attribute bpfdomain; |
| 230 | expandattribute bpfdomain false; |
| 231 | |
Alex Deymo | d63084d | 2016-08-03 20:31:37 -0700 | [diff] [blame] | 232 | # update_engine related domains that need to apply an update and run |
| 233 | # postinstall. This includes the background daemon and the sideload tool from |
| 234 | # recovery for A/B devices. |
| 235 | attribute update_engine_common; |
dcashman | 3319d5e | 2016-11-15 10:05:55 -0800 | [diff] [blame] | 236 | |
Alex Klyubin | f5446eb | 2017-03-23 14:27:32 -0700 | [diff] [blame] | 237 | # All core domains (as opposed to vendor/device-specific domains) |
| 238 | attribute coredomain; |
| 239 | |
Mariia Sandrikova | 44c7a70 | 2020-09-25 21:33:02 +0100 | [diff] [blame] | 240 | # All vendor hwservice. |
| 241 | attribute vendor_hwservice_type; |
| 242 | |
Alex Klyubin | 2f6151e | 2017-03-30 17:39:00 -0700 | [diff] [blame] | 243 | # All socket devices owned by core domain components |
| 244 | attribute coredomain_socket; |
Jeff Vander Stoep | ccf965e | 2018-01-24 07:01:13 -0800 | [diff] [blame] | 245 | expandattribute coredomain_socket false; |
Alex Klyubin | 2f6151e | 2017-03-30 17:39:00 -0700 | [diff] [blame] | 246 | |
Alex Klyubin | 2746ae6 | 2017-03-24 16:07:35 -0700 | [diff] [blame] | 247 | # All vendor domains which violate the requirement of not using sockets for |
| 248 | # communicating with core components |
| 249 | # TODO(b/36577153): Remove this once there are no violations |
| 250 | attribute socket_between_core_and_vendor_violators; |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 251 | expandattribute socket_between_core_and_vendor_violators false; |
Alex Klyubin | 2746ae6 | 2017-03-24 16:07:35 -0700 | [diff] [blame] | 252 | |
Sandeep Patil | b99676e | 2017-04-14 21:26:57 -0700 | [diff] [blame] | 253 | # All vendor domains which violate the requirement of not executing |
| 254 | # system processes |
| 255 | # TODO(b/36463595) |
| 256 | attribute vendor_executes_system_violators; |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 257 | expandattribute vendor_executes_system_violators false; |
Sandeep Patil | b99676e | 2017-04-14 21:26:57 -0700 | [diff] [blame] | 258 | |
Jeff Vander Stoep | 2ae575b | 2017-10-17 13:07:54 -0700 | [diff] [blame] | 259 | # All domains which violate the requirement of not sharing files by path |
| 260 | # between between vendor and core domains. |
| 261 | # TODO(b/34980020) |
| 262 | attribute data_between_core_and_vendor_violators; |
| 263 | expandattribute data_between_core_and_vendor_violators false; |
| 264 | |
Tri Vo | 282dbf7 | 2017-12-20 15:38:35 -0800 | [diff] [blame] | 265 | # All system domains which violate the requirement of not executing vendor |
| 266 | # binaries/libraries. |
| 267 | # TODO(b/62041836) |
| 268 | attribute system_executes_vendor_violators; |
| 269 | expandattribute system_executes_vendor_violators false; |
| 270 | |
Tom Cherry | 5897e23 | 2018-05-01 15:15:16 -0700 | [diff] [blame] | 271 | # All system domains which violate the requirement of not writing vendor |
| 272 | # properties. |
| 273 | # TODO(b/78598545): Remove this once there are no violations |
| 274 | attribute system_writes_vendor_properties_violators; |
| 275 | expandattribute system_writes_vendor_properties_violators false; |
| 276 | |
Tri Vo | ca4217e | 2018-09-17 19:17:41 -0700 | [diff] [blame] | 277 | # All system domains which violate the requirement of not writing to |
| 278 | # /mnt/vendor/*. Must not be used on devices launched with P or later. |
| 279 | attribute system_writes_mnt_vendor_violators; |
| 280 | expandattribute system_writes_mnt_vendor_violators false; |
| 281 | |
Dan Cashman | 3e307a4 | 2017-06-21 10:00:32 -0700 | [diff] [blame] | 282 | # hwservices that are accessible from untrusted applications |
| 283 | # WARNING: Use of this attribute should be avoided unless |
| 284 | # absolutely necessary. It is a temporary allowance to aid the |
| 285 | # transition to treble and will be removed in a future platform |
| 286 | # version, requiring all hwservices that are labeled with this |
| 287 | # attribute to be submitted to AOSP in order to maintain their |
| 288 | # app-visibility. |
Tri Vo | 7f8b6cc | 2018-07-28 16:48:06 -0700 | [diff] [blame] | 289 | attribute untrusted_app_visible_hwservice_violators; |
| 290 | expandattribute untrusted_app_visible_hwservice_violators false; |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 291 | |
| 292 | # halserver domains that are accessible to untrusted applications. These |
| 293 | # domains are typically those hosting hwservices attributed by the |
Tri Vo | 7f8b6cc | 2018-07-28 16:48:06 -0700 | [diff] [blame] | 294 | # untrusted_app_visible_hwservice_violators. |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 295 | # WARNING: Use of this attribute should be avoided unless absolutely necessary. |
| 296 | # It is a temporary allowance to aid the transition to treble and will be |
| 297 | # removed in the future platform version, requiring all halserver domains that |
| 298 | # are labeled with this attribute to be submitted to AOSP in order to maintain |
| 299 | # their app-visibility. |
Tri Vo | 7f8b6cc | 2018-07-28 16:48:06 -0700 | [diff] [blame] | 300 | attribute untrusted_app_visible_halserver_violators; |
| 301 | expandattribute untrusted_app_visible_halserver_violators false; |
Dan Cashman | 3e307a4 | 2017-06-21 10:00:32 -0700 | [diff] [blame] | 302 | |
Alex Vakulenko | 41daa7f | 2017-05-01 13:01:44 -0700 | [diff] [blame] | 303 | # PDX services |
| 304 | attribute pdx_endpoint_dir_type; |
| 305 | attribute pdx_endpoint_socket_type; |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 306 | expandattribute pdx_endpoint_socket_type false; |
Alex Vakulenko | 41daa7f | 2017-05-01 13:01:44 -0700 | [diff] [blame] | 307 | attribute pdx_channel_socket_type; |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 308 | expandattribute pdx_channel_socket_type false; |
Alex Vakulenko | 41daa7f | 2017-05-01 13:01:44 -0700 | [diff] [blame] | 309 | |
| 310 | pdx_service_attributes(display_client) |
| 311 | pdx_service_attributes(display_manager) |
| 312 | pdx_service_attributes(display_screenshot) |
| 313 | pdx_service_attributes(display_vsync) |
| 314 | pdx_service_attributes(performance_client) |
Alex Vakulenko | 41daa7f | 2017-05-01 13:01:44 -0700 | [diff] [blame] | 315 | pdx_service_attributes(bufferhub_client) |
| 316 | |
Alex Klyubin | ac2b4cd | 2017-02-13 14:40:49 -0800 | [diff] [blame] | 317 | # All HAL servers |
| 318 | attribute halserverdomain; |
| 319 | # All HAL clients |
| 320 | attribute halclientdomain; |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 321 | expandattribute halclientdomain true; |
Alex Klyubin | f41d89e | 2017-01-10 15:54:25 -0800 | [diff] [blame] | 322 | |
Pavel Maltsev | 8d7f503 | 2018-05-15 14:16:57 -0700 | [diff] [blame] | 323 | # Exempt for halserverdomain to access sockets. Only builds for automotive |
| 324 | # device types are allowed to use this attribute (enforced by CTS). |
| 325 | # Unlike phone, in a car many modules are external from Android perspective and |
| 326 | # HALs should be able to communicate with those devices through sockets. |
| 327 | attribute hal_automotive_socket_exemption; |
| 328 | |
dcashman | 3319d5e | 2016-11-15 10:05:55 -0800 | [diff] [blame] | 329 | # HALs |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 330 | hal_attribute(allocator); |
Wei Wang | bc71a61 | 2018-09-19 16:06:28 -0700 | [diff] [blame] | 331 | hal_attribute(atrace); |
Tri Vo | 1156d59 | 2018-03-10 14:13:01 -0800 | [diff] [blame] | 332 | hal_attribute(audio); |
Pavel Maltsev | 43e172a | 2018-04-10 14:07:14 -0700 | [diff] [blame] | 333 | hal_attribute(audiocontrol); |
David Drysdale | c4ab01b | 2023-10-09 15:05:07 +0100 | [diff] [blame] | 334 | hal_attribute(authgraph); |
Andrew Scull | 64f35fa | 2018-01-10 16:11:46 +0000 | [diff] [blame] | 335 | hal_attribute(authsecret); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 336 | hal_attribute(bluetooth); |
Tri Vo | 1156d59 | 2018-03-10 14:13:01 -0800 | [diff] [blame] | 337 | hal_attribute(bootctl); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 338 | hal_attribute(broadcastradio); |
Tri Vo | 1156d59 | 2018-03-10 14:13:01 -0800 | [diff] [blame] | 339 | hal_attribute(camera); |
Tomasz Wasilczyk | 602b303 | 2019-07-23 17:38:51 -0700 | [diff] [blame] | 340 | hal_attribute(can_bus); |
| 341 | hal_attribute(can_controller); |
Tri Vo | 1156d59 | 2018-03-10 14:13:01 -0800 | [diff] [blame] | 342 | hal_attribute(cas); |
Pawin Vongmasa | 609c243 | 2019-04-30 05:09:28 -0700 | [diff] [blame] | 343 | hal_attribute(codec2); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 344 | hal_attribute(configstore); |
Janis Danisevskis | 97c56bd | 2018-01-09 17:42:53 -0500 | [diff] [blame] | 345 | hal_attribute(confirmationui); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 346 | hal_attribute(contexthub); |
Tri Vo | 1156d59 | 2018-03-10 14:13:01 -0800 | [diff] [blame] | 347 | hal_attribute(drm); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 348 | hal_attribute(dumpstate); |
Pavel Maltsev | 43e172a | 2018-04-10 14:07:14 -0700 | [diff] [blame] | 349 | hal_attribute(evs); |
Zachary Iqbal | 893272d | 2018-05-24 00:59:40 -0700 | [diff] [blame] | 350 | hal_attribute(face); |
Sandeep Dhavale | f0ea953 | 2022-11-08 23:57:09 +0000 | [diff] [blame] | 351 | hal_attribute(fastboot); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 352 | hal_attribute(fingerprint); |
| 353 | hal_attribute(gatekeeper); |
| 354 | hal_attribute(gnss); |
| 355 | hal_attribute(graphics_allocator); |
| 356 | hal_attribute(graphics_composer); |
| 357 | hal_attribute(health); |
Yifan Hong | 1cef6a9 | 2018-09-19 10:24:45 -0700 | [diff] [blame] | 358 | hal_attribute(health_storage); |
David Zeuthen | b8b5da4 | 2020-01-14 19:44:40 -0500 | [diff] [blame] | 359 | hal_attribute(identity); |
Siarhei Vishniakou | 41a871b | 2018-01-17 12:27:06 -0800 | [diff] [blame] | 360 | hal_attribute(input_classifier); |
Siarhei Vishniakou | c655bec | 2022-01-11 23:06:14 +0000 | [diff] [blame] | 361 | hal_attribute(input_processor); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 362 | hal_attribute(ir); |
Yu Shan | 9eb7246 | 2023-04-10 17:33:12 -0700 | [diff] [blame] | 363 | hal_attribute(ivn); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 364 | hal_attribute(keymaster); |
Shawn Willden | b41f498 | 2020-12-11 13:05:27 +0000 | [diff] [blame] | 365 | hal_attribute(keymint); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 366 | hal_attribute(light); |
| 367 | hal_attribute(lowpan); |
Keith Mok | df794b4 | 2023-11-03 20:27:43 +0000 | [diff] [blame] | 368 | hal_attribute(macsec); |
Haofan Wang | f5ff3eb | 2024-10-23 05:30:53 +0000 | [diff] [blame] | 369 | starting_at_board_api(202504, ` |
| 370 | hal_attribute(mediaquality); |
| 371 | ') |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 372 | hal_attribute(memtrack); |
| 373 | hal_attribute(neuralnetworks); |
| 374 | hal_attribute(nfc); |
Chris Weir | 4ac3d74 | 2021-10-05 16:53:52 -0700 | [diff] [blame] | 375 | hal_attribute(nlinterceptor); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 376 | hal_attribute(oemlock); |
Steven Moreland | 7baf725 | 2018-05-25 16:23:37 -0700 | [diff] [blame] | 377 | hal_attribute(omx); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 378 | hal_attribute(power); |
Benjamin Schwartz | e7040ea | 2018-12-10 14:59:57 -0800 | [diff] [blame] | 379 | hal_attribute(power_stats); |
Kenny Root | 76ea325 | 2019-12-03 16:55:43 -0800 | [diff] [blame] | 380 | hal_attribute(rebootescrow); |
Yu Shan | 05a7389 | 2022-09-13 17:06:55 -0700 | [diff] [blame] | 381 | hal_attribute(remoteaccess); |
Shikha Panwar | 59c9707 | 2023-08-22 00:15:39 +0000 | [diff] [blame] | 382 | hal_attribute(secretkeeper); |
Alice Wang | e79bbf9 | 2023-11-14 07:38:18 +0000 | [diff] [blame] | 383 | hal_attribute(remotelyprovisionedcomponent_avf); |
Ruchi Kandoi | 8a2b4a7 | 2018-01-04 10:33:20 -0800 | [diff] [blame] | 384 | hal_attribute(secure_element); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 385 | hal_attribute(sensors); |
| 386 | hal_attribute(telephony); |
| 387 | hal_attribute(tetheroffload); |
| 388 | hal_attribute(thermal); |
Zhanglong Xia | b2d1fbb | 2023-06-14 05:26:15 +0000 | [diff] [blame] | 389 | hal_attribute(threadnetwork); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 390 | hal_attribute(tv_cec); |
Venkatarama Avadhani | 38ff3b4 | 2022-09-19 21:16:07 +0530 | [diff] [blame] | 391 | hal_attribute(tv_hdmi_cec); |
Venkatarama Avadhani | 5a86d5f | 2022-12-14 13:10:07 +0530 | [diff] [blame] | 392 | hal_attribute(tv_hdmi_connection); |
| 393 | hal_attribute(tv_hdmi_earc); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 394 | hal_attribute(tv_input); |
Amy | 89b4bbd | 2019-08-09 14:27:17 -0700 | [diff] [blame] | 395 | hal_attribute(tv_tuner); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 396 | hal_attribute(usb); |
Badhri Jagan Sridharan | 7bee33e | 2018-01-08 09:29:40 -0800 | [diff] [blame] | 397 | hal_attribute(usb_gadget); |
Michael Ayoubi | 0be7c67 | 2021-06-10 02:01:52 +0000 | [diff] [blame] | 398 | hal_attribute(uwb); |
Roshan Pius | 65e938e | 2021-08-24 13:59:07 -0700 | [diff] [blame] | 399 | # TODO(b/196225233): Remove this attribute and its usages elsewhere |
| 400 | # once all chip vendors integrate to the new UWB stack. |
| 401 | hal_attribute(uwb_vendor); |
Pavel Maltsev | 43e172a | 2018-04-10 14:07:14 -0700 | [diff] [blame] | 402 | hal_attribute(vehicle); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 403 | hal_attribute(vibrator); |
| 404 | hal_attribute(vr); |
| 405 | hal_attribute(weaver); |
| 406 | hal_attribute(wifi); |
Roshan Pius | d7b34a4 | 2017-12-22 15:03:15 -0800 | [diff] [blame] | 407 | hal_attribute(wifi_hostapd); |
Dan Cashman | 91d398d | 2017-09-26 12:58:29 -0700 | [diff] [blame] | 408 | hal_attribute(wifi_supplicant); |
Alex Klyubin | 9a14704 | 2017-04-04 14:56:31 -0700 | [diff] [blame] | 409 | |
| 410 | # HwBinder services offered across the core-vendor boundary |
| 411 | # |
| 412 | # We annotate server domains with x_server to loosen the coupling between |
| 413 | # system and vendor images. For example, it should be possible to move a service |
| 414 | # from one core domain to another, without having to update the vendor image |
| 415 | # which contains clients of this service. |
| 416 | |
Haoxiang Li | 741b9cd | 2019-11-13 11:25:55 -0800 | [diff] [blame] | 417 | attribute automotive_display_service_server; |
Jayant Chowdhary | fe0af51 | 2019-02-27 10:41:07 -0800 | [diff] [blame] | 418 | attribute camera_service_server; |
Tri Vo | 1bbbf81 | 2019-04-22 10:09:38 -0700 | [diff] [blame] | 419 | attribute display_service_server; |
Changyeon Jo | 8c12609 | 2022-02-10 14:09:02 +0000 | [diff] [blame] | 420 | attribute evsmanager_service_server; |
Seth Moore | 3accea4 | 2022-10-20 14:09:11 -0700 | [diff] [blame] | 421 | attribute remote_provisioning_service_server; |
Tri Vo | 1bbbf81 | 2019-04-22 10:09:38 -0700 | [diff] [blame] | 422 | attribute scheduler_service_server; |
| 423 | attribute sensor_service_server; |
| 424 | attribute stats_service_server; |
Darren Hsu | 70ae5f4 | 2021-02-25 18:02:53 +0800 | [diff] [blame] | 425 | attribute system_suspend_internal_server; |
Tri Vo | 1bbbf81 | 2019-04-22 10:09:38 -0700 | [diff] [blame] | 426 | attribute system_suspend_server; |
| 427 | attribute wifi_keystore_service_server; |
Yifan Hong | e3ee390 | 2019-03-22 14:14:32 -0700 | [diff] [blame] | 428 | |
| 429 | # All types used for super partition block devices. |
| 430 | attribute super_block_device_type; |
Hridya Valsaraju | 8c9cf62 | 2020-12-14 22:57:49 -0800 | [diff] [blame] | 431 | |
| 432 | # All types used for DMA-BUF heaps |
| 433 | attribute dmabuf_heap_device_type; |
Hridya Valsaraju | eab2858 | 2020-12-22 18:44:07 -0800 | [diff] [blame] | 434 | expandattribute dmabuf_heap_device_type false; |
Yi-Yo Chiang | 806898d | 2021-03-22 13:46:12 +0800 | [diff] [blame] | 435 | |
Elliot Berman | ae5869a | 2023-03-22 17:31:35 -0700 | [diff] [blame] | 436 | # Types for VM managers |
| 437 | attribute vm_manager_device_type; |
| 438 | |
Yi-Yo Chiang | 806898d | 2021-03-22 13:46:12 +0800 | [diff] [blame] | 439 | # All types used for DSU metadata files. |
| 440 | attribute gsi_metadata_file_type; |
Alan Stokes | fa10a14 | 2021-07-12 14:21:48 +0100 | [diff] [blame] | 441 | |
| 442 | # Types used for module-specific APEX data directories under |
| 443 | # /data/{misc,misc_ce,misc_de}/apexdata. |
| 444 | attribute apex_data_file_type; |
Yifan Hong | 4238b0e | 2021-10-25 17:58:04 -0700 | [diff] [blame] | 445 | |
| 446 | # Domains used for charger. |
| 447 | # This is the common type for domains that executes charger's |
| 448 | # functionalities, including setting and getting necessary properties, |
| 449 | # permissions to maintain the health loop, writing to kernel log, handling |
| 450 | # inputs and drawing screens, etc. |
| 451 | attribute charger_type; |
Jiakai Zhang | 22fb5c7 | 2023-03-30 15:50:05 +0100 | [diff] [blame] | 452 | |
| 453 | # All types of ART properties. |
| 454 | attribute dalvik_config_prop_type; |
Nikita Ioffe | 48966b6 | 2024-10-22 14:01:17 +0000 | [diff] [blame] | 455 | |
| 456 | # All tee services that can be accessed by VMs |
| 457 | starting_at_board_api(202504, ` |
| 458 | attribute tee_service_type; |
| 459 | ') |