Lines Matching refs:rs
3 allow rs { app_data_file privapp_data_file }:dir ra_dir_perms;
4 allow rs app_exec_data_file:file create_file_perms;
5 type_transition rs app_data_file:file app_exec_data_file;
6 type_transition rs privapp_data_file:file app_exec_data_file;
9 allow rs system_data_file:lnk_file read;
12 allow rs { app_data_file privapp_data_file }:file r_file_perms;
13 allow rs { app_data_file privapp_data_file }:dir r_dir_perms;
16 allow rs { app_data_file privapp_data_file }:dir remove_name;
19 allow rs vendor_file:dir r_dir_perms;
20 r_dir_file(rs, vendor_overlay_file)
21 r_dir_file(rs, vendor_app_file)
24 r_dir_file(rs, apk_data_file)
26 allow rs gpu_device:chr_file rw_file_perms;
27 allow rs ion_device:chr_file r_file_perms;
28 allow rs same_process_hal_file:file { r_file_perms execute };
31 allow rs { untrusted_app_all ephemeral_app priv_app }:fd use;
33 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
35 neverallow rs rs:capability_class_set *;
36 neverallow { domain -appdomain } rs:process { dyntransition transition };
37 neverallow rs { domain -crash_dump }:process { dyntransition transition };
38 neverallow rs app_data_file:file_class_set ~r_file_perms;
39 # rs should never use network sockets
40 neverallow rs *:network_socket_class_set *;