Home
last modified time | relevance | path

Searched refs:untrusted (Results 1 – 25 of 83) sorted by relevance

1234

/system/sepolicy/prebuilts/api/28.0/private/
Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
25 # Do not allow untrusted apps to register services.
30 # Do not allow untrusted apps to use VendorBinder
34 # Do not allow untrusted apps to connect to the property service
41 # but otherwise disallow untrusted apps from reading this property.
44 # Do not allow untrusted apps to be assigned mlstrustedsubject.
51 # and an untrusted app is allowed fork permission to itself.
54 # Do not allow untrusted apps to hard link to any files.
55 # In particular, if an untrusted app links to other app data
58 # bugs, so we want to ensure untrusted apps never have this
[all …]
Duntrusted_app_27.te4 ### This file defines the rules for untrusted apps running with
7 ### This file defines the rules for untrusted apps.
Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
44 # Allow traceur to pass file descriptors through a content provider to untrusted apps
48 # untrusted apps should not be able to open trace data files, they should depend
110 # Allow untrusted apps read / execute access to /vendor/app for there can
124 # allow untrusted apps to use UDP sockets provided by the system server but not
/system/sepolicy/prebuilts/api/27.0/private/
Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
24 # Do not allow untrusted apps to register services.
29 # Do not allow untrusted apps to use VendorBinder
33 # Do not allow untrusted apps to connect to the property service
39 # Do not allow untrusted apps to be assigned mlstrustedsubject.
46 # and an untrusted app is allowed fork permission to itself.
49 # Do not allow untrusted apps to hard link to any files.
50 # In particular, if an untrusted app links to other app data
53 # bugs, so we want to ensure untrusted apps never have this
57 # Do not allow untrusted apps to access network MAC address file
[all …]
Duntrusted_app.te4 ### This file defines the rules for untrusted apps.
27 # allow untrusted apps to use UDP sockets provided by the system server but not
/system/sepolicy/prebuilts/api/26.0/private/
Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
19 # Do not allow untrusted apps to register services.
24 # Do not allow untrusted apps to use VendorBinder
28 # Do not allow untrusted apps to connect to the property service
34 # Do not allow untrusted apps to be assigned mlstrustedsubject.
41 # and an untrusted app is allowed fork permission to itself.
44 # Do not allow untrusted apps to hard link to any files.
45 # In particular, if an untrusted app links to other app data
48 # bugs, so we want to ensure untrusted apps never have this
52 # Do not allow untrusted apps to access network MAC address file
[all …]
Dvold.te11 # domain when working with untrusted block devices
/system/sepolicy/private/
Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
25 # Do not allow untrusted apps to register services.
30 # Do not allow untrusted apps to use VendorBinder
34 # Do not allow untrusted apps to connect to the property service
41 # but otherwise disallow untrusted apps from reading this property.
61 # Do not allow untrusted apps to invoke dex2oat. This was historically required
70 # Do not allow untrusted apps to be assigned mlstrustedsubject.
77 # and an untrusted app is allowed fork permission to itself.
80 # Do not allow untrusted apps to hard link to any files.
81 # In particular, if an untrusted app links to other app data
[all …]
Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
20 ### Note that rules that should apply to all untrusted apps must be in app.te or also
57 # Allow traceur to pass file descriptors through a content provider to untrusted apps
61 # untrusted apps should not be able to open trace data files, they should depend
104 # Allow untrusted apps to interact with gpuservice
137 # Allow untrusted apps read / execute access to /vendor/app for there can
155 # allow untrusted apps to use UDP sockets provided by the system server but not
Duntrusted_app_27.te4 ### This file defines the rules for untrusted apps running with
7 ### This file defines the rules for untrusted apps.
Dvold.te10 # domain when working with untrusted block devices
/system/sepolicy/prebuilts/api/29.0/private/
Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
25 # Do not allow untrusted apps to register services.
30 # Do not allow untrusted apps to use VendorBinder
34 # Do not allow untrusted apps to connect to the property service
41 # but otherwise disallow untrusted apps from reading this property.
61 # Do not allow untrusted apps to invoke dex2oat. This was historically required
70 # Do not allow untrusted apps to be assigned mlstrustedsubject.
77 # and an untrusted app is allowed fork permission to itself.
80 # Do not allow untrusted apps to hard link to any files.
81 # In particular, if an untrusted app links to other app data
[all …]
Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
20 ### Note that rules that should apply to all untrusted apps must be in app.te or also
57 # Allow traceur to pass file descriptors through a content provider to untrusted apps
61 # untrusted apps should not be able to open trace data files, they should depend
104 # Allow untrusted apps to interact with gpuservice
137 # Allow untrusted apps read / execute access to /vendor/app for there can
155 # allow untrusted apps to use UDP sockets provided by the system server but not
Duntrusted_app_27.te4 ### This file defines the rules for untrusted apps running with
7 ### This file defines the rules for untrusted apps.
Dvold.te10 # domain when working with untrusted block devices
/system/sepolicy/prebuilts/api/28.0/public/
Dblkid_untrusted.te1 # blkid for untrusted block devices
Dwebview_zygote.te2 # isolated_app processes for rendering untrusted web content.
/system/sepolicy/prebuilts/api/29.0/public/
Dblkid_untrusted.te1 # blkid for untrusted block devices
Dwebview_zygote.te2 # isolated_app processes for rendering untrusted web content.
/system/sepolicy/public/
Dblkid_untrusted.te1 # blkid for untrusted block devices
Dwebview_zygote.te2 # isolated_app processes for rendering untrusted web content.
/system/sepolicy/prebuilts/api/26.0/public/
Dblkid_untrusted.te1 # blkid for untrusted block devices
Dwebview_zygote.te2 # isolated_app processes for rendering untrusted web content.
/system/sepolicy/prebuilts/api/27.0/public/
Dblkid_untrusted.te1 # blkid for untrusted block devices
Dwebview_zygote.te2 # isolated_app processes for rendering untrusted web content.

1234