HomeSort by relevance Sort by last modified time
    Searched refs:ephemeral_app (Results 1 - 4 of 4) sorted by null

  /system/sepolicy/public/
ephemeral_app.te 7 ### The ephemeral_app domain is a reduced permissions sandbox allowing
14 type ephemeral_app, domain;
  /system/sepolicy/private/
ephemeral_app.te 7 ### The ephemeral_app domain is a reduced permissions sandbox allowing
14 typeattribute ephemeral_app coredomain;
16 net_domain(ephemeral_app)
17 app_domain(ephemeral_app)
20 allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ioctl lock append};
23 allow ephemeral_app audioserver_service:service_manager find;
24 allow ephemeral_app cameraserver_service:service_manager find;
25 allow ephemeral_app mediaserver_service:service_manager find;
26 allow ephemeral_app mediaextractor_service:service_manager find;
27 allow ephemeral_app mediacodec_service:service_manager find
    [all...]
net.te 11 allow {netdomain -ephemeral_app} node_type:{ tcp_socket udp_socket } node_bind;
12 allow {netdomain -ephemeral_app} port_type:udp_socket name_bind;
13 allow {netdomain -ephemeral_app} port_type:tcp_socket name_bind;
app.te 95 allow { appdomain -ephemeral_app -untrusted_v2_app } shell_exec:file rx_file_perms;
96 allow { appdomain -ephemeral_app -untrusted_v2_app } toolbox_exec:file rx_file_perms;
97 allow { appdomain -ephemeral_app -untrusted_v2_app } system_file:file x_file_perms;
98 not_full_treble(`allow { appdomain -ephemeral_app -untrusted_v2_app } vendor_file:file x_file_perms;')
116 r_dir_file({ appdomain -ephemeral_app -untrusted_v2_app }, vendor_app_file)
117 allow { appdomain -ephemeral_app -untrusted_v2_app } vendor_app_file:file execute;
166 r_dir_file({ appdomain -ephemeral_app}, proc_net)
182 binder_call(appdomain, ephemeral_app)
216 allow { appdomain -isolated_app -ephemeral_app } storage_file:dir r_dir_perms;
217 allow { appdomain -isolated_app -ephemeral_app } storage_file:lnk_file r_file_perms
    [all...]

Completed in 1403 milliseconds