Lines Matching refs:domain

74 #       domain (string)
79 # domain= determines the label to be used for the app process; entries
80 # without domain= are ignored for this purpose.
108 # only the system server can be in system_server domain
109 neverallow isSystemServer=false domain=system_server
110 neverallow isSystemServer="" domain=system_server
113 neverallow user=((?!system).)* domain=system_app
121 # neverallow shared relro to any other domain
123 neverallow user=shared_relro domain=((?!shared_relro).)*
124 neverallow user=((?!shared_relro).)* domain=shared_relro
126 # neverallow non-isolated uids into isolated_app domain
128 neverallow user=_isolated domain=((?!isolated_app).)*
129 neverallow user=((?!_isolated).)* domain=isolated_app
131 # uid shell should always be in shell domain, however non-shell
132 # uid's can be in shell domain
133 neverallow user=shell domain=((?!shell).)*
135 # only the package named com.android.shell can run in the shell domain
136 neverallow domain=shell name=((?!com\.android\.shell).)*
139 # Ephemeral Apps must run in the ephemeral_app domain
140 neverallow isEphemeralApp=true domain=((?!ephemeral_app).)*
142 isSystemServer=true domain=system_server_startup
144 user=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=…
145 user=system seinfo=platform domain=system_app type=system_app_data_file
146 user=bluetooth seinfo=platform domain=bluetooth type=bluetooth_data_file
147 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file
148 user=nfc seinfo=platform domain=nfc type=nfc_data_file
149 user=secure_element seinfo=platform domain=secure_element levelFrom=all
150 user=radio seinfo=platform domain=radio type=radio_data_file
151 user=shared_relro domain=shared_relro
152 user=shell seinfo=platform domain=shell name=com.android.shell type=shell_data_file
153 user=webview_zygote seinfo=webview_zygote domain=webview_zygote
154 user=_isolated domain=isolated_app levelFrom=all
155 user=_app seinfo=app_zygote domain=app_zygote levelFrom=all
156 user=_app seinfo=media domain=mediaprovider type=app_data_file levelFrom=user
157 user=_app seinfo=platform domain=platform_app type=app_data_file levelFrom=user
158 user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all
159 user=_app minTargetSdkVersion=31 isPrivApp=true domain=priv_app type=privapp_data_file levelFrom=all
160 user=_app isPrivApp=true domain=priv_app type=privapp_data_file levelFrom=user
161 user=_app isPrivApp=true name=com.google.android.permissioncontroller domain=permissioncontroller_a…
162 user=_app seinfo=media isPrivApp=true name=com.android.providers.media.module domain=mediaprovider_…
163 user=_app isPrivApp=true name=com.google.android.providers.media.module domain=mediaprovider_app ty…
164 user=_app seinfo=platform isPrivApp=true name=com.android.permissioncontroller domain=permissioncon…
165 user=_app isPrivApp=true name=com.android.vzwomatrigger domain=vzwomatrigger_app type=privapp_data_…
166 user=_app isPrivApp=true name=com.google.android.gms domain=gmscore_app type=privapp_data_file leve…
167 user=_app isPrivApp=true name=com.google.android.gms.* domain=gmscore_app type=privapp_data_file le…
168 user=_app isPrivApp=true name=com.google.android.gms:* domain=gmscore_app type=privapp_data_file le…
169 user=_app isPrivApp=true name=com.google.android.gsf domain=gmscore_app type=privapp_data_file leve…
170 user=_app minTargetSdkVersion=30 domain=untrusted_app type=app_data_file levelFrom=all
171 user=_app minTargetSdkVersion=29 domain=untrusted_app_29 type=app_data_file levelFrom=all
172 user=_app minTargetSdkVersion=28 domain=untrusted_app_27 type=app_data_file levelFrom=all
173 user=_app minTargetSdkVersion=26 domain=untrusted_app_27 type=app_data_file levelFrom=user
174 user=_app domain=untrusted_app_25 type=app_data_file levelFrom=user
175 user=_app minTargetSdkVersion=28 fromRunAs=true domain=runas_app levelFrom=all
176 user=_app fromRunAs=true domain=runas_app levelFrom=user