Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 1 | # The entries in this file define how security contexts for apps are determined. |
| 2 | # Each entry lists input selectors, used to match the app, and outputs which are |
| 3 | # used to determine the security contexts for matching apps. |
| 4 | # |
Nick Kralevich | 4be3190 | 2014-07-01 13:59:50 -0700 | [diff] [blame] | 5 | # Input selectors: |
Michael Peck | f54b362 | 2017-02-14 09:48:57 -0800 | [diff] [blame] | 6 | # isSystemServer (boolean) |
| 7 | # isEphemeralApp (boolean) |
Michael Peck | f54b362 | 2017-02-14 09:48:57 -0800 | [diff] [blame] | 8 | # user (string) |
| 9 | # seinfo (string) |
| 10 | # name (string) |
Michael Peck | f54b362 | 2017-02-14 09:48:57 -0800 | [diff] [blame] | 11 | # isPrivApp (boolean) |
| 12 | # minTargetSdkVersion (unsigned integer) |
Yabin Cui | ffa2b61 | 2018-11-02 14:34:06 -0700 | [diff] [blame] | 13 | # fromRunAs (boolean) |
Charles Chen | 3070492 | 2023-01-15 05:41:42 +0000 | [diff] [blame] | 14 | # isIsolatedComputeApp (boolean) |
Mugdha Lakhani | 49075f9 | 2023-05-07 17:41:57 +0000 | [diff] [blame] | 15 | # isSdkSandboxNext (boolean) |
Sandro Montanari | 4db0e27 | 2023-10-19 15:00:55 +0000 | [diff] [blame] | 16 | # isSdkSandboxAudit (boolean) |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 17 | # |
| 18 | # All specified input selectors in an entry must match (i.e. logical AND). |
| 19 | # An unspecified string or boolean selector with no default will match any |
| 20 | # value. |
Jeff Vander Stoep | 35779f0 | 2021-07-01 10:28:37 +0200 | [diff] [blame] | 21 | # A user, or name string selector that ends in * will perform a prefix |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 22 | # match. |
| 23 | # String matching is case-insensitive. |
| 24 | # See external/selinux/libselinux/src/android/android_platform.c, |
| 25 | # seapp_context_lookup(). |
| 26 | # |
| 27 | # isSystemServer=true only matches the system server. |
Stephen Smalley | dd31ddf | 2012-07-27 17:08:21 -0400 | [diff] [blame] | 28 | # An unspecified isSystemServer defaults to false. |
Chad Brubaker | 06cf31e | 2016-10-06 13:15:44 -0700 | [diff] [blame] | 29 | # isEphemeralApp=true will match apps marked by PackageManager as Ephemeral |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 30 | # user=_app will match any regular app process. |
| 31 | # user=_isolated will match any isolated service process. |
Nikita Ioffe | e2da633 | 2022-02-21 17:55:59 +0000 | [diff] [blame] | 32 | # user=_sdksandbox will match sdk sandbox process for an app. |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 33 | # Other values of user are matched against the name associated with the process |
| 34 | # UID. |
| 35 | # seinfo= matches aginst the seinfo tag for the app, determined from |
| 36 | # mac_permissions.xml files. |
| 37 | # The ':' character is reserved and may not be used in seinfo. |
| 38 | # name= matches against the package name of the app. |
Jeff Vander Stoep | ee9c0b5 | 2015-10-05 09:15:04 -0700 | [diff] [blame] | 39 | # isPrivApp=true will only match for applications preinstalled in |
| 40 | # /system/priv-app. |
Michael Peck | f54b362 | 2017-02-14 09:48:57 -0800 | [diff] [blame] | 41 | # minTargetSdkVersion will match applications with a targetSdkVersion |
| 42 | # greater than or equal to the specified value. If unspecified, |
| 43 | # it has a default value of 0. |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 44 | # fromRunAs=true means the process being labeled is started by run-as. Default |
| 45 | # is false. |
Charles Chen | 3070492 | 2023-01-15 05:41:42 +0000 | [diff] [blame] | 46 | # isIsolatedComputeApp=true means the process re-uses an isolated Uid but not |
| 47 | # restricted to run in an isolated_app domain. Processes match this selector will |
| 48 | # be mapped to isolated_compute_app by default. It is expected to be used together |
| 49 | # with user=_isolated. This selector should not be used unless it is intended |
| 50 | # to provide isolated processes with relaxed security restrictions. |
Inseob Kim | 9d6ce19 | 2023-07-17 19:53:25 +0900 | [diff] [blame] | 51 | # An unspecified isIsolatedComputeApp defaults to false. |
Nick Kralevich | 4be3190 | 2014-07-01 13:59:50 -0700 | [diff] [blame] | 52 | # |
Sandro Montanari | 4db0e27 | 2023-10-19 15:00:55 +0000 | [diff] [blame] | 53 | # The sdk_sandbox_next and sdk_sandbox_audit domains are special domains for the |
| 54 | # SDK sandbox process. sdk_sandbox_next defines the set of restrictions proposed |
| 55 | # for the upcoming dessert release. sdk_sandbox_audit uses the same restrictions |
| 56 | # as the current dessert release, with additional auditing rules for the accesses |
| 57 | # we are considering forbidding in the upcoming release. |
| 58 | # |
Sandro Montanari | 1e9eb36 | 2023-11-17 09:54:33 +0000 | [diff] [blame] | 59 | # The sdk_sandbox_next and sdk_sandbox_audit domains are special domains for the |
| 60 | # SDK sandbox process. sdk_sandbox_next defines the set of restrictions proposed |
| 61 | # for the upcoming dessert release. sdk_sandbox_audit uses the same restrictions |
| 62 | # as the current dessert release, with additional auditing rules for the accesses |
| 63 | # we are considering forbidding in the upcoming release. |
| 64 | # |
Mugdha Lakhani | 49075f9 | 2023-05-07 17:41:57 +0000 | [diff] [blame] | 65 | # isSdkSandboxNext=true means sdk sandbox processes will get |
| 66 | # sdk_sandbox_next sepolicy applied to them. |
Inseob Kim | 9d6ce19 | 2023-07-17 19:53:25 +0900 | [diff] [blame] | 67 | # An unspecified isSdkSandboxNext defaults to false. |
Mugdha Lakhani | 49075f9 | 2023-05-07 17:41:57 +0000 | [diff] [blame] | 68 | # |
Sandro Montanari | 4db0e27 | 2023-10-19 15:00:55 +0000 | [diff] [blame] | 69 | # isSdkSandboxAudit=true means sdk sandbox processes will get |
| 70 | # sdk_sandbox_audit sepolicy applied to them. |
| 71 | # An unspecified isSdkSandboxAudit defaults to false. |
| 72 | # |
Sandro Montanari | 1e9eb36 | 2023-11-17 09:54:33 +0000 | [diff] [blame] | 73 | # isSdkSandboxAudit=true means sdk sandbox processes will get |
| 74 | # sdk_sandbox_audit sepolicy applied to them. |
| 75 | # An unspecified isSdkSandboxAudit defaults to false. |
| 76 | # |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 77 | # Precedence: entries are compared using the following rules, in the order shown |
Ellen Arteca | 3315a90 | 2024-04-09 01:28:25 +0000 | [diff] [blame] | 78 | # (see external/selinux/libselinux/src/android/android_seapp.c, |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 79 | # seapp_context_cmp()). |
Michael Peck | f54b362 | 2017-02-14 09:48:57 -0800 | [diff] [blame] | 80 | # (1) isSystemServer=true before isSystemServer=false. |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 81 | # (2) Specified isEphemeralApp= before unspecified isEphemeralApp= |
| 82 | # boolean. |
Jeff Vander Stoep | 35779f0 | 2021-07-01 10:28:37 +0200 | [diff] [blame] | 83 | # (3) Specified user= string before unspecified user= string; |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 84 | # more specific user= string before less specific user= string. |
Jeff Vander Stoep | 35779f0 | 2021-07-01 10:28:37 +0200 | [diff] [blame] | 85 | # (4) Specified seinfo= string before unspecified seinfo= string. |
| 86 | # (5) Specified name= string before unspecified name= string; |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 87 | # more specific name= string before less specific name= string. |
Jeff Vander Stoep | 35779f0 | 2021-07-01 10:28:37 +0200 | [diff] [blame] | 88 | # (6) Specified isPrivApp= before unspecified isPrivApp= boolean. |
| 89 | # (7) Higher value of minTargetSdkVersion= before lower value of |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 90 | # minTargetSdkVersion= integer. Note that minTargetSdkVersion= |
| 91 | # defaults to 0 if unspecified. |
Jeff Vander Stoep | 35779f0 | 2021-07-01 10:28:37 +0200 | [diff] [blame] | 92 | # (8) fromRunAs=true before fromRunAs=false. |
Inseob Kim | 7bb1b5d | 2023-07-21 18:20:10 +0900 | [diff] [blame] | 93 | # (9) Platform seapp_contexts files (system, system_ext, product) before |
| 94 | # vendor seapp_contexts files (vendor, odm). |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 95 | # (A fixed selector is more specific than a prefix, i.e. ending in *, and a |
| 96 | # longer prefix is more specific than a shorter prefix.) |
| 97 | # Apps are checked against entries in precedence order until the first match, |
| 98 | # regardless of their order in this file. |
| 99 | # |
| 100 | # Duplicate entries, i.e. with identical input selectors, are not allowed. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 101 | # |
| 102 | # Outputs: |
Michael Peck | f54b362 | 2017-02-14 09:48:57 -0800 | [diff] [blame] | 103 | # domain (string) |
| 104 | # type (string) |
| 105 | # levelFrom (string; one of none, all, app, or user) |
| 106 | # level (string) |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 107 | # |
| 108 | # domain= determines the label to be used for the app process; entries |
| 109 | # without domain= are ignored for this purpose. |
| 110 | # type= specifies the label to be used for the app data directory; entries |
Alan Stokes | f8ad339 | 2020-10-27 17:35:33 +0000 | [diff] [blame] | 111 | # without type= are ignored for this purpose. The label specified must |
| 112 | # have the app_data_file_type attribute. |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 113 | # levelFrom and level are used to determine the level (sensitivity + categories) |
| 114 | # for MLS/MCS. |
| 115 | # levelFrom=none omits the level. |
| 116 | # levelFrom=app determines the level from the process UID. |
| 117 | # levelFrom=user determines the level from the user ID. |
| 118 | # levelFrom=all determines the level from both UID and user ID. |
Nick Kralevich | 795add5 | 2019-04-16 15:56:33 -0700 | [diff] [blame] | 119 | # |
Stephen Smalley | 3808414 | 2012-11-28 10:46:18 -0500 | [diff] [blame] | 120 | # levelFrom=user is only supported for _app or _isolated UIDs. |
| 121 | # levelFrom=app or levelFrom=all is only supported for _app UIDs. |
Nick Kralevich | 4be3190 | 2014-07-01 13:59:50 -0700 | [diff] [blame] | 122 | # level may be used to specify a fixed level for any UID. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 123 | # |
William Roberts | 81e1f90 | 2015-06-03 21:57:47 -0700 | [diff] [blame] | 124 | # |
| 125 | # Neverallow Assertions |
Alan Stokes | 6b576bd | 2019-01-31 15:16:01 +0000 | [diff] [blame] | 126 | # Additional compile time assertion checks for the rules in this file can be |
| 127 | # added as well. The assertion |
William Roberts | 81e1f90 | 2015-06-03 21:57:47 -0700 | [diff] [blame] | 128 | # rules are lines beginning with the keyword neverallow. Full support for PCRE |
| 129 | # regular expressions exists on all input and output selectors. Neverallow |
| 130 | # rules are never output to the built seapp_contexts file. Like all keywords, |
| 131 | # neverallows are case-insensitive. A neverallow is asserted when all key value |
| 132 | # inputs are matched on a key value rule line. |
| 133 | # |
| 134 | |
Alan Stokes | 665c295 | 2021-11-26 11:39:02 +0000 | [diff] [blame] | 135 | # only the system server can be assigned the system_server domains |
William Roberts | 81e1f90 | 2015-06-03 21:57:47 -0700 | [diff] [blame] | 136 | neverallow isSystemServer=false domain=system_server |
Alan Stokes | 665c295 | 2021-11-26 11:39:02 +0000 | [diff] [blame] | 137 | neverallow isSystemServer=false domain=system_server_startup |
William Roberts | 81e1f90 | 2015-06-03 21:57:47 -0700 | [diff] [blame] | 138 | neverallow isSystemServer="" domain=system_server |
Alan Stokes | 665c295 | 2021-11-26 11:39:02 +0000 | [diff] [blame] | 139 | neverallow isSystemServer="" domain=system_server_startup |
William Roberts | 81e1f90 | 2015-06-03 21:57:47 -0700 | [diff] [blame] | 140 | |
| 141 | # system domains should never be assigned outside of system uid |
| 142 | neverallow user=((?!system).)* domain=system_app |
| 143 | neverallow user=((?!system).)* type=system_app_data_file |
| 144 | |
Ashwini Oruganti | 04f771d | 2019-10-31 15:45:00 -0700 | [diff] [blame] | 145 | # any non priv-app with a non-known uid with a specified name should have a specified |
| 146 | # seinfo |
| 147 | neverallow user=_app isPrivApp=false name=.* seinfo="" |
| 148 | neverallow user=_app isPrivApp=false name=.* seinfo=default |
William Roberts | 81e1f90 | 2015-06-03 21:57:47 -0700 | [diff] [blame] | 149 | |
| 150 | # neverallow shared relro to any other domain |
| 151 | # and neverallow any other uid into shared_relro |
| 152 | neverallow user=shared_relro domain=((?!shared_relro).)* |
| 153 | neverallow user=((?!shared_relro).)* domain=shared_relro |
| 154 | |
| 155 | # neverallow non-isolated uids into isolated_app domain |
| 156 | # and vice versa |
Charles Chen | 3070492 | 2023-01-15 05:41:42 +0000 | [diff] [blame] | 157 | neverallow user=_isolated isIsolatedComputeApp=false domain=((?!isolated_app).)* |
William Roberts | 81e1f90 | 2015-06-03 21:57:47 -0700 | [diff] [blame] | 158 | neverallow user=((?!_isolated).)* domain=isolated_app |
| 159 | |
Charles Chen | 3070492 | 2023-01-15 05:41:42 +0000 | [diff] [blame] | 160 | # neverallow isolatedComputeApp into domains other than isolated_compute_app |
| 161 | neverallow user=_isolated isIsolatedComputeApp=true domain=((?!isolated_compute_app).)* |
| 162 | |
William Roberts | 81e1f90 | 2015-06-03 21:57:47 -0700 | [diff] [blame] | 163 | # uid shell should always be in shell domain, however non-shell |
| 164 | # uid's can be in shell domain |
| 165 | neverallow user=shell domain=((?!shell).)* |
| 166 | |
Max Bires | 77d41f7 | 2018-01-24 21:17:18 +0000 | [diff] [blame] | 167 | # only the package named com.android.shell can run in the shell domain |
| 168 | neverallow domain=shell name=((?!com\.android\.shell).)* |
| 169 | neverallow user=shell name=((?!com\.android\.shell).)* |
| 170 | |
Chad Brubaker | 06cf31e | 2016-10-06 13:15:44 -0700 | [diff] [blame] | 171 | # Ephemeral Apps must run in the ephemeral_app domain |
| 172 | neverallow isEphemeralApp=true domain=((?!ephemeral_app).)* |
Jeff Vander Stoep | 400d3ac | 2015-10-30 12:43:19 -0700 | [diff] [blame] | 173 | |
Nick Kralevich | caf42d6 | 2018-10-04 10:57:29 -0700 | [diff] [blame] | 174 | isSystemServer=true domain=system_server_startup |
| 175 | |
Mugdha Lakhani | 2ae45c5 | 2023-04-28 09:22:15 +0000 | [diff] [blame] | 176 | # sdksandbox must run in an sdksandbox domain |
| 177 | neverallow user=_sdksandbox domain=((?!sdk_sandbox).)* |
RafayKamran | f3bdc0b | 2021-11-03 16:08:04 +0000 | [diff] [blame] | 178 | |
Kevin Jeon | 4241e00 | 2022-01-26 22:32:40 +0000 | [diff] [blame] | 179 | user=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all |
William Roberts | 92dfa31 | 2014-09-29 10:29:48 -0700 | [diff] [blame] | 180 | user=system seinfo=platform domain=system_app type=system_app_data_file |
Avichal Rakesh | e092924 | 2023-01-23 23:49:50 -0800 | [diff] [blame] | 181 | user=system seinfo=platform isPrivApp=true name=com.android.DeviceAsWebcam domain=device_as_webcam type=system_app_data_file levelFrom=all |
Roopa Sattiraju | f227d0d | 2022-03-28 14:39:42 -0700 | [diff] [blame] | 182 | user=bluetooth seinfo=bluetooth domain=bluetooth type=bluetooth_data_file |
markchien | 48c600f | 2020-11-26 09:55:56 +0800 | [diff] [blame] | 183 | user=network_stack seinfo=network_stack domain=network_stack type=radio_data_file |
Roshan Pius | 23a929d | 2023-11-03 17:39:43 -0700 | [diff] [blame] | 184 | # NFC stack signed with platform cert needed for maintaining backwards comptibility for -next release config. |
William Roberts | 92dfa31 | 2014-09-29 10:29:48 -0700 | [diff] [blame] | 185 | user=nfc seinfo=platform domain=nfc type=nfc_data_file |
Roshan Pius | 23a929d | 2023-11-03 17:39:43 -0700 | [diff] [blame] | 186 | user=nfc seinfo=nfc domain=nfc type=nfc_data_file |
Ruchi Kandoi | 8a2b4a7 | 2018-01-04 10:33:20 -0800 | [diff] [blame] | 187 | user=secure_element seinfo=platform domain=secure_element levelFrom=all |
William Roberts | 92dfa31 | 2014-09-29 10:29:48 -0700 | [diff] [blame] | 188 | user=radio seinfo=platform domain=radio type=radio_data_file |
Alan Stokes | c7229c7 | 2020-09-24 13:46:46 +0100 | [diff] [blame] | 189 | user=shared_relro domain=shared_relro levelFrom=all |
Max Bires | 77d41f7 | 2018-01-24 21:17:18 +0000 | [diff] [blame] | 190 | user=shell seinfo=platform domain=shell name=com.android.shell type=shell_data_file |
Robert Sesek | bacb19b | 2018-01-30 10:54:33 -0500 | [diff] [blame] | 191 | user=webview_zygote seinfo=webview_zygote domain=webview_zygote |
Martijn Coenen | d40dfdc | 2020-06-08 20:31:33 +0200 | [diff] [blame] | 192 | user=_isolated domain=isolated_app levelFrom=user |
Charles Chen | bc965c9 | 2023-01-29 12:04:20 +0000 | [diff] [blame] | 193 | user=_isolated isIsolatedComputeApp=true domain=isolated_compute_app levelFrom=user |
Mugdha Lakhani | 2ae45c5 | 2023-04-28 09:22:15 +0000 | [diff] [blame] | 194 | user=_sdksandbox domain=sdk_sandbox_34 type=sdk_sandbox_data_file levelFrom=all |
Mugdha Lakhani | 49075f9 | 2023-05-07 17:41:57 +0000 | [diff] [blame] | 195 | user=_sdksandbox isSdkSandboxNext=true domain=sdk_sandbox_next type=sdk_sandbox_data_file levelFrom=all |
Sandro Montanari | 4db0e27 | 2023-10-19 15:00:55 +0000 | [diff] [blame] | 196 | user=_sdksandbox isSdkSandboxAudit=true domain=sdk_sandbox_audit type=sdk_sandbox_data_file levelFrom=all |
Martijn Coenen | d40dfdc | 2020-06-08 20:31:33 +0200 | [diff] [blame] | 197 | user=_app seinfo=app_zygote domain=app_zygote levelFrom=user |
Jeff Vander Stoep | fcf12fd | 2020-04-22 15:26:02 +0200 | [diff] [blame] | 198 | user=_app seinfo=media domain=mediaprovider type=app_data_file levelFrom=user |
Stephen Smalley | a833763 | 2014-09-11 14:07:28 -0400 | [diff] [blame] | 199 | user=_app seinfo=platform domain=platform_app type=app_data_file levelFrom=user |
Nick Kralevich | 795add5 | 2019-04-16 15:56:33 -0700 | [diff] [blame] | 200 | user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all |
Nick Kralevich | 5d17551 | 2018-09-12 12:30:32 -0700 | [diff] [blame] | 201 | user=_app isPrivApp=true domain=priv_app type=privapp_data_file levelFrom=user |
Ashwini Oruganti | 04f771d | 2019-10-31 15:45:00 -0700 | [diff] [blame] | 202 | user=_app isPrivApp=true name=com.google.android.permissioncontroller domain=permissioncontroller_app type=privapp_data_file levelFrom=all |
Jeff Vander Stoep | fcf12fd | 2020-04-22 15:26:02 +0200 | [diff] [blame] | 203 | user=_app seinfo=media isPrivApp=true name=com.android.providers.media.module domain=mediaprovider_app type=privapp_data_file levelFrom=all |
Krishang Garodia | caf7984 | 2023-02-09 17:31:47 +0000 | [diff] [blame] | 204 | user=_app seinfo=media isPrivApp=true name=com.android.providers.media.module:* domain=mediaprovider_app type=privapp_data_file levelFrom=all |
Martijn Coenen | e3f1d5a | 2020-01-30 16:52:45 +0100 | [diff] [blame] | 205 | user=_app isPrivApp=true name=com.google.android.providers.media.module domain=mediaprovider_app type=privapp_data_file levelFrom=all |
Krishang Garodia | caf7984 | 2023-02-09 17:31:47 +0000 | [diff] [blame] | 206 | user=_app isPrivApp=true name=com.google.android.providers.media.module:* domain=mediaprovider_app type=privapp_data_file levelFrom=all |
Ashwini Oruganti | b3bffe8 | 2020-06-15 11:14:04 -0700 | [diff] [blame] | 207 | user=_app seinfo=platform isPrivApp=true name=com.android.permissioncontroller domain=permissioncontroller_app type=privapp_data_file levelFrom=all |
Ashwini Oruganti | c77ff37 | 2019-11-14 14:00:30 -0800 | [diff] [blame] | 208 | user=_app isPrivApp=true name=com.android.vzwomatrigger domain=vzwomatrigger_app type=privapp_data_file levelFrom=all |
Alan Stokes | 12de184 | 2023-06-08 11:24:56 +0100 | [diff] [blame] | 209 | user=_app isPrivApp=true name=com.android.rkpdapp domain=rkpdapp type=privapp_data_file levelFrom=all |
| 210 | user=_app isPrivApp=true name=com.google.android.rkpdapp domain=rkpdapp type=privapp_data_file levelFrom=all |
Ashwini Oruganti | c46a7bc | 2019-10-29 14:13:20 -0700 | [diff] [blame] | 211 | user=_app isPrivApp=true name=com.google.android.gms domain=gmscore_app type=privapp_data_file levelFrom=user |
| 212 | user=_app isPrivApp=true name=com.google.android.gms.* domain=gmscore_app type=privapp_data_file levelFrom=user |
| 213 | user=_app isPrivApp=true name=com.google.android.gms:* domain=gmscore_app type=privapp_data_file levelFrom=user |
Ashwini Oruganti | efc3bdb | 2020-04-22 10:22:45 -0700 | [diff] [blame] | 214 | user=_app isPrivApp=true name=com.google.android.gsf domain=gmscore_app type=privapp_data_file levelFrom=user |
Yuyang Huang | cfdea5f | 2023-01-18 16:52:43 +0900 | [diff] [blame] | 215 | user=_app minTargetSdkVersion=34 domain=untrusted_app type=app_data_file levelFrom=all |
| 216 | user=_app minTargetSdkVersion=32 domain=untrusted_app_32 type=app_data_file levelFrom=all |
Bram Bonné | ea5460a | 2021-05-12 14:19:24 +0200 | [diff] [blame] | 217 | user=_app minTargetSdkVersion=30 domain=untrusted_app_30 type=app_data_file levelFrom=all |
Jeff Vander Stoep | 1f7ae8e | 2020-01-20 10:14:48 +0100 | [diff] [blame] | 218 | user=_app minTargetSdkVersion=29 domain=untrusted_app_29 type=app_data_file levelFrom=all |
Yabin Cui | 5dc2c8c | 2018-11-02 11:12:43 -0700 | [diff] [blame] | 219 | user=_app minTargetSdkVersion=28 domain=untrusted_app_27 type=app_data_file levelFrom=all |
Jeff Vander Stoep | 6231b4d | 2017-12-17 20:55:12 -0800 | [diff] [blame] | 220 | user=_app minTargetSdkVersion=26 domain=untrusted_app_27 type=app_data_file levelFrom=user |
Jeff Vander Stoep | bacb6d7 | 2017-02-13 13:33:27 -0800 | [diff] [blame] | 221 | user=_app domain=untrusted_app_25 type=app_data_file levelFrom=user |
Yabin Cui | 770a4f6 | 2019-01-07 16:37:24 -0800 | [diff] [blame] | 222 | user=_app minTargetSdkVersion=28 fromRunAs=true domain=runas_app levelFrom=all |
| 223 | user=_app fromRunAs=true domain=runas_app levelFrom=user |
Jeongik Cha | 77a3ca6 | 2024-04-09 15:02:28 +0900 | [diff] [blame] | 224 | user=_app isPrivApp=true name=com.android.virtualization.vmlauncher domain=vmlauncher_app type=privapp_data_file levelFrom=all |
Jeongik Cha | f256b80 | 2024-04-29 16:17:27 +0900 | [diff] [blame] | 225 | user=_app isPrivApp=true name=com.google.android.virtualization.vmlauncher domain=vmlauncher_app type=privapp_data_file levelFrom=all |