The document contains audit logs recording security permissions for processes running in an untrusted app container on Android. It shows:
1) Initially, some processes like gboard_prop and sysfs are denied permissions.
2) Then init processes like run_init01.sh and initlinker32 are granted execute permissions for files to launch the app.
3) As the app loads, permissions are granted for processes like zygote, system_server and the app's activities to access files, ashmem and other resources needed to run.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
46 views
Log
The document contains audit logs recording security permissions for processes running in an untrusted app container on Android. It shows:
1) Initially, some processes like gboard_prop and sysfs are denied permissions.
2) Then init processes like run_init01.sh and initlinker32 are granted execute permissions for files to launch the app.
3) As the app loads, permissions are granted for processes like zygote, system_server and the app's activities to access files, ashmem and other resources needed to run.