Searched refs:apps (Results 1 – 24 of 24) sorted by relevance
4 ### This file defines the rules for isolated apps. An "isolated40 # Isolated apps should not directly open app data files themselves.50 # Isolated apps can only access three services,59 # Isolated apps shouldn't be able to access the driver directly.
2 ### Untrusted apps.4 ### This file defines the rules for untrusted apps.12 ### domain is assigned to all non-system apps as well as to any system apps28 # Some apps ship with shared libraries and binaries that they write out38 # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm43 # TODO: Long term, we don't want apps probing into shell data files.122 # Do not allow untrusted apps to register services.186 -app_data_file # The apps sandbox itself187 -media_rw_data_file # Internal storage. Known that apps can
2 ### Domain for all zygote spawned apps4 ### This file is the base policy for all zygote spawned apps.7 ### zygote spawned apps should be added here.47 # Allow apps to create and write method traces in /data/misc/trace.64 # Communication with other apps via fifos87 # Access to OEM provided data and apps99 # Execute dex2oat when apps call dexclassloader118 # Allow apps to send dump information to dumpstate146 # So allow all apps to read from /dev/xt_qtaguid.157 # Perform binder IPC to other apps.[all …]
76 # services which should be available to all but isolated apps95 # All domains used for apps.98 # All domains used for apps with network access.101 # All domains used for apps with bluetooth access.
2 ### A domain for further sandboxing privileged apps.14 # Some apps ship with shared libraries and binaries that they write out22 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm113 # Do not allow privileged apps to register services.118 # Do not allow privileged apps to connect to the property service
1 # socket ioctls allowed to unprivileged apps14 # socket ioctls never allowed to unprivileged apps
1 # Process which creates/updates shared RELRO files to be used by other apps.
2 ### AutoPlay apps.4 ### This file defines the security policy for apps with the autoplay
85 # /data/app - user-installed apps88 # /data/app-private - forward-locked apps167 # /data/data subdirectory for system UID apps.174 # Type for /cache/backup_stage/* (fd interchange with apps)
108 # Presently commented out, as apps are expected to call one another.109 # This would only make sense if apps were assigned categories
37 # This is a performance optimization that allows platform apps to bypass the FUSE layer
21 # GPU (used by most UI apps)
87 # Upgrade from before system_app_data_file was used for system UID apps.
12 # isAutoPlayApp=true will match apps marked by PackageManager as AutoPlay
84 # Kill apps.87 # Set scheduling info for apps.216 # tun device used for 3rd party vpn apps
2 It defines the domains and types for the AOSP services and apps common to
355 # General backup/restore interchange with apps362 # General backup/restore interchange with apps
94 # Allow a base set of permissions required for all apps.
302 # Never read/follow symlinks created by shell or untrusted apps.
65 apps = [transform(i) for i in files if condition(i)]68 for app in apps:
44 containing apps is searched and the certs from those apps are added to the
90 static const char *apps = ""; variable301 dfs_set_property(tag, apps, true); in start()542 apps = optarg; in get_options()
2 the memory allocations of a set of apps.
88 # Symlink to keep legacy apps working in multi-user world97 mkdir /dev/memcg/apps/ 0755 system system204 # net_bw_stats grants access to other apps' detailed tagged-socket stats.