2019-01-31 16:16:01 +01:00
|
|
|
# The entries in this file define how security contexts for apps are determined.
|
|
|
|
# Each entry lists input selectors, used to match the app, and outputs which are
|
|
|
|
# used to determine the security contexts for matching apps.
|
|
|
|
#
|
2014-07-01 22:59:50 +02:00
|
|
|
# Input selectors:
|
2017-02-14 18:48:57 +01:00
|
|
|
# isSystemServer (boolean)
|
|
|
|
# isEphemeralApp (boolean)
|
|
|
|
# user (string)
|
|
|
|
# seinfo (string)
|
|
|
|
# name (string)
|
|
|
|
# isPrivApp (boolean)
|
|
|
|
# minTargetSdkVersion (unsigned integer)
|
2018-11-02 22:34:06 +01:00
|
|
|
# fromRunAs (boolean)
|
2023-01-15 06:41:42 +01:00
|
|
|
# isIsolatedComputeApp (boolean)
|
2023-05-07 19:41:57 +02:00
|
|
|
# isSdkSandboxNext (boolean)
|
2023-10-19 17:00:55 +02:00
|
|
|
# isSdkSandboxAudit (boolean)
|
2019-01-31 16:16:01 +01:00
|
|
|
#
|
|
|
|
# All specified input selectors in an entry must match (i.e. logical AND).
|
|
|
|
# An unspecified string or boolean selector with no default will match any
|
|
|
|
# value.
|
2021-07-01 10:28:37 +02:00
|
|
|
# A user, or name string selector that ends in * will perform a prefix
|
2019-01-31 16:16:01 +01:00
|
|
|
# match.
|
|
|
|
# String matching is case-insensitive.
|
|
|
|
# See external/selinux/libselinux/src/android/android_platform.c,
|
|
|
|
# seapp_context_lookup().
|
|
|
|
#
|
|
|
|
# isSystemServer=true only matches the system server.
|
2012-07-27 23:08:21 +02:00
|
|
|
# An unspecified isSystemServer defaults to false.
|
2016-10-06 22:15:44 +02:00
|
|
|
# isEphemeralApp=true will match apps marked by PackageManager as Ephemeral
|
2019-01-31 16:16:01 +01:00
|
|
|
# user=_app will match any regular app process.
|
|
|
|
# user=_isolated will match any isolated service process.
|
2022-02-21 18:55:59 +01:00
|
|
|
# user=_sdksandbox will match sdk sandbox process for an app.
|
2019-01-31 16:16:01 +01:00
|
|
|
# Other values of user are matched against the name associated with the process
|
|
|
|
# UID.
|
|
|
|
# seinfo= matches aginst the seinfo tag for the app, determined from
|
|
|
|
# mac_permissions.xml files.
|
|
|
|
# The ':' character is reserved and may not be used in seinfo.
|
|
|
|
# name= matches against the package name of the app.
|
2015-10-05 18:15:04 +02:00
|
|
|
# isPrivApp=true will only match for applications preinstalled in
|
|
|
|
# /system/priv-app.
|
2017-02-14 18:48:57 +01:00
|
|
|
# minTargetSdkVersion will match applications with a targetSdkVersion
|
|
|
|
# greater than or equal to the specified value. If unspecified,
|
|
|
|
# it has a default value of 0.
|
2019-01-31 16:16:01 +01:00
|
|
|
# fromRunAs=true means the process being labeled is started by run-as. Default
|
|
|
|
# is false.
|
2023-01-15 06:41:42 +01:00
|
|
|
# isIsolatedComputeApp=true means the process re-uses an isolated Uid but not
|
|
|
|
# restricted to run in an isolated_app domain. Processes match this selector will
|
|
|
|
# be mapped to isolated_compute_app by default. It is expected to be used together
|
|
|
|
# with user=_isolated. This selector should not be used unless it is intended
|
|
|
|
# to provide isolated processes with relaxed security restrictions.
|
2023-07-17 12:53:25 +02:00
|
|
|
# An unspecified isIsolatedComputeApp defaults to false.
|
2014-07-01 22:59:50 +02:00
|
|
|
#
|
2023-10-19 17:00:55 +02:00
|
|
|
# The sdk_sandbox_next and sdk_sandbox_audit domains are special domains for the
|
|
|
|
# SDK sandbox process. sdk_sandbox_next defines the set of restrictions proposed
|
|
|
|
# for the upcoming dessert release. sdk_sandbox_audit uses the same restrictions
|
|
|
|
# as the current dessert release, with additional auditing rules for the accesses
|
|
|
|
# we are considering forbidding in the upcoming release.
|
|
|
|
#
|
2023-11-17 10:54:33 +01:00
|
|
|
# The sdk_sandbox_next and sdk_sandbox_audit domains are special domains for the
|
|
|
|
# SDK sandbox process. sdk_sandbox_next defines the set of restrictions proposed
|
|
|
|
# for the upcoming dessert release. sdk_sandbox_audit uses the same restrictions
|
|
|
|
# as the current dessert release, with additional auditing rules for the accesses
|
|
|
|
# we are considering forbidding in the upcoming release.
|
|
|
|
#
|
2023-05-07 19:41:57 +02:00
|
|
|
# isSdkSandboxNext=true means sdk sandbox processes will get
|
|
|
|
# sdk_sandbox_next sepolicy applied to them.
|
2023-07-17 12:53:25 +02:00
|
|
|
# An unspecified isSdkSandboxNext defaults to false.
|
2023-11-20 00:51:03 +01:00
|
|
|
#
|
|
|
|
# isSdkSandboxAudit=true means sdk sandbox processes will get
|
|
|
|
# sdk_sandbox_audit sepolicy applied to them.
|
|
|
|
# An unspecified isSdkSandboxAudit defaults to false.
|
2023-05-07 19:41:57 +02:00
|
|
|
#
|
2023-10-19 17:00:55 +02:00
|
|
|
# isSdkSandboxAudit=true means sdk sandbox processes will get
|
|
|
|
# sdk_sandbox_audit sepolicy applied to them.
|
|
|
|
# An unspecified isSdkSandboxAudit defaults to false.
|
|
|
|
#
|
2019-01-31 16:16:01 +01:00
|
|
|
# Precedence: entries are compared using the following rules, in the order shown
|
2024-04-09 03:28:25 +02:00
|
|
|
# (see external/selinux/libselinux/src/android/android_seapp.c,
|
2019-01-31 16:16:01 +01:00
|
|
|
# seapp_context_cmp()).
|
2017-02-14 18:48:57 +01:00
|
|
|
# (1) isSystemServer=true before isSystemServer=false.
|
2019-01-31 16:16:01 +01:00
|
|
|
# (2) Specified isEphemeralApp= before unspecified isEphemeralApp=
|
|
|
|
# boolean.
|
2021-07-01 10:28:37 +02:00
|
|
|
# (3) Specified user= string before unspecified user= string;
|
2019-01-31 16:16:01 +01:00
|
|
|
# more specific user= string before less specific user= string.
|
2021-07-01 10:28:37 +02:00
|
|
|
# (4) Specified seinfo= string before unspecified seinfo= string.
|
|
|
|
# (5) Specified name= string before unspecified name= string;
|
2019-01-31 16:16:01 +01:00
|
|
|
# more specific name= string before less specific name= string.
|
2021-07-01 10:28:37 +02:00
|
|
|
# (6) Specified isPrivApp= before unspecified isPrivApp= boolean.
|
|
|
|
# (7) Higher value of minTargetSdkVersion= before lower value of
|
2019-01-31 16:16:01 +01:00
|
|
|
# minTargetSdkVersion= integer. Note that minTargetSdkVersion=
|
|
|
|
# defaults to 0 if unspecified.
|
2021-07-01 10:28:37 +02:00
|
|
|
# (8) fromRunAs=true before fromRunAs=false.
|
2023-07-21 11:20:10 +02:00
|
|
|
# (9) Platform seapp_contexts files (system, system_ext, product) before
|
|
|
|
# vendor seapp_contexts files (vendor, odm).
|
2019-01-31 16:16:01 +01:00
|
|
|
# (A fixed selector is more specific than a prefix, i.e. ending in *, and a
|
|
|
|
# longer prefix is more specific than a shorter prefix.)
|
|
|
|
# Apps are checked against entries in precedence order until the first match,
|
|
|
|
# regardless of their order in this file.
|
|
|
|
#
|
|
|
|
# Duplicate entries, i.e. with identical input selectors, are not allowed.
|
2012-01-04 18:33:27 +01:00
|
|
|
#
|
|
|
|
# Outputs:
|
2017-02-14 18:48:57 +01:00
|
|
|
# domain (string)
|
|
|
|
# type (string)
|
|
|
|
# levelFrom (string; one of none, all, app, or user)
|
|
|
|
# level (string)
|
2019-01-31 16:16:01 +01:00
|
|
|
#
|
|
|
|
# domain= determines the label to be used for the app process; entries
|
|
|
|
# without domain= are ignored for this purpose.
|
|
|
|
# type= specifies the label to be used for the app data directory; entries
|
2020-10-27 18:35:33 +01:00
|
|
|
# without type= are ignored for this purpose. The label specified must
|
|
|
|
# have the app_data_file_type attribute.
|
2019-01-31 16:16:01 +01:00
|
|
|
# levelFrom and level are used to determine the level (sensitivity + categories)
|
|
|
|
# for MLS/MCS.
|
|
|
|
# levelFrom=none omits the level.
|
|
|
|
# levelFrom=app determines the level from the process UID.
|
|
|
|
# levelFrom=user determines the level from the user ID.
|
|
|
|
# levelFrom=all determines the level from both UID and user ID.
|
2019-04-17 00:56:33 +02:00
|
|
|
#
|
2012-11-28 16:46:18 +01:00
|
|
|
# levelFrom=user is only supported for _app or _isolated UIDs.
|
|
|
|
# levelFrom=app or levelFrom=all is only supported for _app UIDs.
|
2014-07-01 22:59:50 +02:00
|
|
|
# level may be used to specify a fixed level for any UID.
|
2012-01-04 18:33:27 +01:00
|
|
|
#
|
2019-01-31 16:16:01 +01:00
|
|
|
# For backwards compatibility levelFromUid=true is equivalent to levelFrom=app
|
|
|
|
# and levelFromUid=false is equivalent to levelFrom=none.
|
|
|
|
#
|
2015-06-04 06:57:47 +02:00
|
|
|
#
|
|
|
|
# Neverallow Assertions
|
2019-01-31 16:16:01 +01:00
|
|
|
# Additional compile time assertion checks for the rules in this file can be
|
|
|
|
# added as well. The assertion
|
2015-06-04 06:57:47 +02:00
|
|
|
# rules are lines beginning with the keyword neverallow. Full support for PCRE
|
|
|
|
# regular expressions exists on all input and output selectors. Neverallow
|
|
|
|
# rules are never output to the built seapp_contexts file. Like all keywords,
|
|
|
|
# neverallows are case-insensitive. A neverallow is asserted when all key value
|
|
|
|
# inputs are matched on a key value rule line.
|
|
|
|
#
|
|
|
|
|
2021-11-26 12:39:02 +01:00
|
|
|
# only the system server can be assigned the system_server domains
|
2015-06-04 06:57:47 +02:00
|
|
|
neverallow isSystemServer=false domain=system_server
|
2021-11-26 12:39:02 +01:00
|
|
|
neverallow isSystemServer=false domain=system_server_startup
|
2015-06-04 06:57:47 +02:00
|
|
|
neverallow isSystemServer="" domain=system_server
|
2021-11-26 12:39:02 +01:00
|
|
|
neverallow isSystemServer="" domain=system_server_startup
|
2015-06-04 06:57:47 +02:00
|
|
|
|
|
|
|
# system domains should never be assigned outside of system uid
|
|
|
|
neverallow user=((?!system).)* domain=system_app
|
|
|
|
neverallow user=((?!system).)* type=system_app_data_file
|
|
|
|
|
2019-10-31 23:45:00 +01:00
|
|
|
# any non priv-app with a non-known uid with a specified name should have a specified
|
|
|
|
# seinfo
|
|
|
|
neverallow user=_app isPrivApp=false name=.* seinfo=""
|
|
|
|
neverallow user=_app isPrivApp=false name=.* seinfo=default
|
2015-06-04 06:57:47 +02:00
|
|
|
|
|
|
|
# neverallow shared relro to any other domain
|
|
|
|
# and neverallow any other uid into shared_relro
|
|
|
|
neverallow user=shared_relro domain=((?!shared_relro).)*
|
|
|
|
neverallow user=((?!shared_relro).)* domain=shared_relro
|
|
|
|
|
|
|
|
# neverallow non-isolated uids into isolated_app domain
|
|
|
|
# and vice versa
|
2023-01-15 06:41:42 +01:00
|
|
|
neverallow user=_isolated isIsolatedComputeApp=false domain=((?!isolated_app).)*
|
2015-06-04 06:57:47 +02:00
|
|
|
neverallow user=((?!_isolated).)* domain=isolated_app
|
|
|
|
|
2023-01-15 06:41:42 +01:00
|
|
|
# neverallow isolatedComputeApp into domains other than isolated_compute_app
|
|
|
|
neverallow user=_isolated isIsolatedComputeApp=true domain=((?!isolated_compute_app).)*
|
|
|
|
|
2015-06-04 06:57:47 +02:00
|
|
|
# uid shell should always be in shell domain, however non-shell
|
|
|
|
# uid's can be in shell domain
|
|
|
|
neverallow user=shell domain=((?!shell).)*
|
|
|
|
|
2018-01-24 22:17:18 +01:00
|
|
|
# only the package named com.android.shell can run in the shell domain
|
|
|
|
neverallow domain=shell name=((?!com\.android\.shell).)*
|
|
|
|
neverallow user=shell name=((?!com\.android\.shell).)*
|
|
|
|
|
2016-10-06 22:15:44 +02:00
|
|
|
# Ephemeral Apps must run in the ephemeral_app domain
|
|
|
|
neverallow isEphemeralApp=true domain=((?!ephemeral_app).)*
|
2015-10-30 20:43:19 +01:00
|
|
|
|
2018-10-04 19:57:29 +02:00
|
|
|
isSystemServer=true domain=system_server_startup
|
|
|
|
|
2023-04-28 11:22:15 +02:00
|
|
|
# sdksandbox must run in an sdksandbox domain
|
|
|
|
neverallow user=_sdksandbox domain=((?!sdk_sandbox).)*
|
2021-11-03 17:08:04 +01:00
|
|
|
|
2022-01-26 23:32:40 +01:00
|
|
|
user=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
|
2014-09-29 19:29:48 +02:00
|
|
|
user=system seinfo=platform domain=system_app type=system_app_data_file
|
2023-01-24 08:49:50 +01:00
|
|
|
user=system seinfo=platform isPrivApp=true name=com.android.DeviceAsWebcam domain=device_as_webcam type=system_app_data_file levelFrom=all
|
2022-03-28 23:39:42 +02:00
|
|
|
user=bluetooth seinfo=bluetooth domain=bluetooth type=bluetooth_data_file
|
2020-11-26 02:55:56 +01:00
|
|
|
user=network_stack seinfo=network_stack domain=network_stack type=radio_data_file
|
2023-11-04 01:39:43 +01:00
|
|
|
# NFC stack signed with platform cert needed for maintaining backwards comptibility for -next release config.
|
2014-09-29 19:29:48 +02:00
|
|
|
user=nfc seinfo=platform domain=nfc type=nfc_data_file
|
2023-11-04 01:39:43 +01:00
|
|
|
user=nfc seinfo=nfc domain=nfc type=nfc_data_file
|
2018-01-04 19:33:20 +01:00
|
|
|
user=secure_element seinfo=platform domain=secure_element levelFrom=all
|
2014-09-29 19:29:48 +02:00
|
|
|
user=radio seinfo=platform domain=radio type=radio_data_file
|
2020-09-24 14:46:46 +02:00
|
|
|
user=shared_relro domain=shared_relro levelFrom=all
|
2018-01-24 22:17:18 +01:00
|
|
|
user=shell seinfo=platform domain=shell name=com.android.shell type=shell_data_file
|
2018-01-30 16:54:33 +01:00
|
|
|
user=webview_zygote seinfo=webview_zygote domain=webview_zygote
|
2020-06-08 20:31:33 +02:00
|
|
|
user=_isolated domain=isolated_app levelFrom=user
|
2023-01-29 13:04:20 +01:00
|
|
|
user=_isolated isIsolatedComputeApp=true domain=isolated_compute_app levelFrom=user
|
2023-04-28 11:22:15 +02:00
|
|
|
user=_sdksandbox domain=sdk_sandbox_34 type=sdk_sandbox_data_file levelFrom=all
|
2023-05-07 19:41:57 +02:00
|
|
|
user=_sdksandbox isSdkSandboxNext=true domain=sdk_sandbox_next type=sdk_sandbox_data_file levelFrom=all
|
2023-10-19 17:00:55 +02:00
|
|
|
user=_sdksandbox isSdkSandboxAudit=true domain=sdk_sandbox_audit type=sdk_sandbox_data_file levelFrom=all
|
2020-06-08 20:31:33 +02:00
|
|
|
user=_app seinfo=app_zygote domain=app_zygote levelFrom=user
|
2020-04-22 15:26:02 +02:00
|
|
|
user=_app seinfo=media domain=mediaprovider type=app_data_file levelFrom=user
|
Enable per-user isolation for normal apps.
Add levelFrom=user to the entries for apps other than those
that run in the predefined platform UIDs (e.g. system, nfc, radio, ...).
This causes libselinux to assign a per-user category set computed from
the user ID portion of the Linux UID to each app process and its
/data/data/<pkgdir> or /data/user/N/<pkgdir> directory. These
per-user category sets can be seen in the last field of ps -Z output for
apps and ls -Z /data/data or /data/user/N output for the package
directories.
With this applied, apps running on behalf of one user cannot read
or write files created by apps running on behalf of another user,
even if the file is world-readable or -writable. Similar isolation is
enforced over process interactions (including /proc/pid file access),
local socket communications, and System V IPC, as expressed in the
set of constraints defined in the mls configuration. At present,
Binder IPC is not restricted by the mls configuration; if desired,
there is a constraint in the configuration that can be uncommented
to also apply isolation on direct binder IPC, although communication
will still be possible indirectly via the system_server.
Bug: 13507660
Change-Id: I3972f846ff5e7363799ba521f1258d662b18d64e
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-09-11 20:07:28 +02:00
|
|
|
user=_app seinfo=platform domain=platform_app type=app_data_file levelFrom=user
|
2019-04-17 00:56:33 +02:00
|
|
|
user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all
|
Change priv-apps /data/data labels to privapp_data_file
Currently, both untrusted apps and priv-apps use the SELinux file label
"app_data_file" for files in their /data/data directory. This is
problematic, as we really want different rules for such files. For
example, we may want to allow untrusted apps to load executable code
from priv-app directories, but disallow untrusted apps from loading
executable code from their own home directories.
Commit 23c9d91b46352bd91cdc58f33d55378e5567dc1c introduced a new type
called privapp_data_file and added rules necessary to preserve
compatibility. However, that change did not relabel any existing files,
so effectively the change was a no-op.
This change performs the switch, relabeling priv-app's /data/data files
from app_data_file to privapp_data_file. Due to the compatibility rules
added in 23c9d91b46352bd91cdc58f33d55378e5567dc1c, there should be no
noticeable effect from this change.
This change was originally submitted as
4df57822fce7e87b41edbe410a2554c6c39fc286. However, it was reverted in
cdc6649acc43d3a38753e22790f372290c1189c1 due to a different labeling
bug. That bug has been fixed, and we can reapply this change.
Test: Factory reset and boot - no problems on fresh install.
Test: Upgrade to new version and test. No compatibility problems on
filesystem upgrade.
Bug: 112357170
2018-09-12 21:30:32 +02:00
|
|
|
user=_app isPrivApp=true domain=priv_app type=privapp_data_file levelFrom=user
|
2019-10-31 23:45:00 +01:00
|
|
|
user=_app isPrivApp=true name=com.google.android.permissioncontroller domain=permissioncontroller_app type=privapp_data_file levelFrom=all
|
2020-04-22 15:26:02 +02:00
|
|
|
user=_app seinfo=media isPrivApp=true name=com.android.providers.media.module domain=mediaprovider_app type=privapp_data_file levelFrom=all
|
2023-02-09 18:31:47 +01:00
|
|
|
user=_app seinfo=media isPrivApp=true name=com.android.providers.media.module:* domain=mediaprovider_app type=privapp_data_file levelFrom=all
|
2020-01-30 16:52:45 +01:00
|
|
|
user=_app isPrivApp=true name=com.google.android.providers.media.module domain=mediaprovider_app type=privapp_data_file levelFrom=all
|
2023-02-09 18:31:47 +01:00
|
|
|
user=_app isPrivApp=true name=com.google.android.providers.media.module:* domain=mediaprovider_app type=privapp_data_file levelFrom=all
|
2020-06-15 20:14:04 +02:00
|
|
|
user=_app seinfo=platform isPrivApp=true name=com.android.permissioncontroller domain=permissioncontroller_app type=privapp_data_file levelFrom=all
|
2019-11-14 23:00:30 +01:00
|
|
|
user=_app isPrivApp=true name=com.android.vzwomatrigger domain=vzwomatrigger_app type=privapp_data_file levelFrom=all
|
2023-06-08 12:24:56 +02:00
|
|
|
user=_app isPrivApp=true name=com.android.rkpdapp domain=rkpdapp type=privapp_data_file levelFrom=all
|
|
|
|
user=_app isPrivApp=true name=com.google.android.rkpdapp domain=rkpdapp type=privapp_data_file levelFrom=all
|
2019-10-29 22:13:20 +01:00
|
|
|
user=_app isPrivApp=true name=com.google.android.gms domain=gmscore_app type=privapp_data_file levelFrom=user
|
|
|
|
user=_app isPrivApp=true name=com.google.android.gms.* domain=gmscore_app type=privapp_data_file levelFrom=user
|
|
|
|
user=_app isPrivApp=true name=com.google.android.gms:* domain=gmscore_app type=privapp_data_file levelFrom=user
|
2020-04-22 19:22:45 +02:00
|
|
|
user=_app isPrivApp=true name=com.google.android.gsf domain=gmscore_app type=privapp_data_file levelFrom=user
|
2023-01-18 08:52:43 +01:00
|
|
|
user=_app minTargetSdkVersion=34 domain=untrusted_app type=app_data_file levelFrom=all
|
|
|
|
user=_app minTargetSdkVersion=32 domain=untrusted_app_32 type=app_data_file levelFrom=all
|
2021-05-12 14:19:24 +02:00
|
|
|
user=_app minTargetSdkVersion=30 domain=untrusted_app_30 type=app_data_file levelFrom=all
|
2020-01-20 10:14:48 +01:00
|
|
|
user=_app minTargetSdkVersion=29 domain=untrusted_app_29 type=app_data_file levelFrom=all
|
2018-11-02 19:12:43 +01:00
|
|
|
user=_app minTargetSdkVersion=28 domain=untrusted_app_27 type=app_data_file levelFrom=all
|
Enforce per-app data protections for targetSdk 28+
Adds per-app categories to untrusted app domains and their
app data types. Per-app categories are in addition to the
existing per-user categories.
Apps targeting sdk version 28+ will now have the following
characteristics:
Domain: u:r:untrusted_app:s0:c[0-9]+,c[0-9]+,c[0-9],c[0-9]
Data context: u:object_r:app_data_file:s0:c[0-9]+,c[0-9]+,c[0-9],c[0-9]
Whereas apps targeting 27- will look like:
Domain: u:r:untrusted_app_27:s0:c[0-9]+,c[0-9]+
Data context: u:object_r:app_data_file:s0:c[0-9]+,c[0-9]+
To ensure backwards compatibility with previous SDK versions,
the levelFrom=all now enforces categories by dominance instead of
equality. Apps with per-app and per-user categories will continue
to have selinux permissions (but not necessarily unix permissions)
to access app data with only per-user categories, but apps with only
per-user categories will not be able to access the data of apps with
both per-app and per-user categories.
Bug: 63897054
Test: Boot sailfish, run apps, verify no new selinux denials.
Test: cts-tradefed run cts -m CtsSelinuxTargetSdkCurrentTestCases
Test: cts-tradefed run cts -m CtsSelinuxTargetSdk27TestCases
Test: cts-tradefed run cts -m CtsSelinuxTargetSdk25TestCases
Test: adb sideload an OTA and verify that files are correctly labeled.
Change-Id: I64b013874fe87b55f47e817a1279e76ecf86b7c0
2017-12-18 05:55:12 +01:00
|
|
|
user=_app minTargetSdkVersion=26 domain=untrusted_app_27 type=app_data_file levelFrom=user
|
2017-02-13 22:33:27 +01:00
|
|
|
user=_app domain=untrusted_app_25 type=app_data_file levelFrom=user
|
2019-01-08 01:37:24 +01:00
|
|
|
user=_app minTargetSdkVersion=28 fromRunAs=true domain=runas_app levelFrom=all
|
|
|
|
user=_app fromRunAs=true domain=runas_app levelFrom=user
|
2024-04-09 08:02:28 +02:00
|
|
|
user=_app isPrivApp=true name=com.android.virtualization.vmlauncher domain=vmlauncher_app type=privapp_data_file levelFrom=all
|
2024-04-29 09:17:27 +02:00
|
|
|
user=_app isPrivApp=true name=com.google.android.virtualization.vmlauncher domain=vmlauncher_app type=privapp_data_file levelFrom=all
|