Home
last modified time | relevance | path

Searched refs:apps (Results 1 – 24 of 24) sorted by relevance

/system/sepolicy/
Disolated_app.te4 ### This file defines the rules for isolated apps. An "isolated
40 # Isolated apps should not directly open app data files themselves.
50 # Isolated apps can only access three services,
59 # Isolated apps shouldn't be able to access the driver directly.
Duntrusted_app.te2 ### Untrusted apps.
4 ### This file defines the rules for untrusted apps.
12 ### domain is assigned to all non-system apps as well as to any system apps
28 # Some apps ship with shared libraries and binaries that they write out
38 # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm
43 # TODO: Long term, we don't want apps probing into shell data files.
122 # Do not allow untrusted apps to register services.
186 -app_data_file # The apps sandbox itself
187 -media_rw_data_file # Internal storage. Known that apps can
Dapp.te2 ### Domain for all zygote spawned apps
4 ### This file is the base policy for all zygote spawned apps.
7 ### zygote spawned apps should be added here.
47 # Allow apps to create and write method traces in /data/misc/trace.
64 # Communication with other apps via fifos
87 # Access to OEM provided data and apps
99 # Execute dex2oat when apps call dexclassloader
118 # Allow apps to send dump information to dumpstate
146 # So allow all apps to read from /dev/xt_qtaguid.
157 # Perform binder IPC to other apps.
[all …]
Dattributes76 # services which should be available to all but isolated apps
95 # All domains used for apps.
98 # All domains used for apps with network access.
101 # All domains used for apps with bluetooth access.
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
14 # Some apps ship with shared libraries and binaries that they write out
22 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm
113 # Do not allow privileged apps to register services.
118 # Do not allow privileged apps to connect to the property service
Dioctl_macros1 # socket ioctls allowed to unprivileged apps
14 # socket ioctls never allowed to unprivileged apps
Dshared_relro.te1 # Process which creates/updates shared RELRO files to be used by other apps.
Dautoplay_app.te2 ### AutoPlay apps.
4 ### This file defines the security policy for apps with the autoplay
Dfile.te85 # /data/app - user-installed apps
88 # /data/app-private - forward-locked apps
167 # /data/data subdirectory for system UID apps.
174 # Type for /cache/backup_stage/* (fd interchange with apps)
Dmls108 # Presently commented out, as apps are expected to call one another.
109 # This would only make sense if apps were assigned categories
Dplatform_app.te37 # This is a performance optimization that allows platform apps to bypass the FUSE layer
Ddevice.te21 # GPU (used by most UI apps)
Dinstalld.te87 # Upgrade from before system_app_data_file was used for system UID apps.
Dseapp_contexts12 # isAutoPlayApp=true will match apps marked by PackageManager as AutoPlay
Dsystem_server.te84 # Kill apps.
87 # Set scheduling info for apps.
216 # tun device used for 3rd party vpn apps
DREADME2 It defines the domains and types for the AOSP services and apps common to
Dfile_contexts355 # General backup/restore interchange with apps
362 # General backup/restore interchange with apps
Dte_macros94 # Allow a base set of permissions required for all apps.
Dinit.te302 # Never read/follow symlinks created by shell or untrusted apps.
/system/sepolicy/tools/
Dpost_process_mac_perms65 apps = [transform(i) for i in files if condition(i)]
68 for app in apps:
DREADME44 containing apps is searched and the certs from those apps are added to the
/system/extras/ANRdaemon/
DANRdaemon.cpp90 static const char *apps = ""; variable
301 dfs_set_property(tag, apps, true); in start()
542 apps = optarg; in get_options()
/system/extras/memory_replay/dumps/
DREADME2 the memory allocations of a set of apps.
/system/core/rootdir/
Dinit.rc88 # Symlink to keep legacy apps working in multi-user world
97 mkdir /dev/memcg/apps/ 0755 system system
204 # net_bw_stats grants access to other apps' detailed tagged-socket stats.