Searched refs:untrusted (Results 1 – 8 of 8) sorted by relevance
1 # blkid for untrusted block devices
1 # Any fsck program run on untrusted block devices
4 ### This file defines the rules for untrusted apps.122 # Do not allow untrusted apps to register services.
23 # domain when working with untrusted block devices
302 # Never read/follow symlinks created by shell or untrusted apps.
258 # device traffic. Do not allow untrusted app to directly open tun_device
587 # Profiles contain untrusted data and profman parses that. We should only run
186 std::string& fsUuid, std::string& fsLabel, bool untrusted) { in readMetadata() argument204 status_t res = ForkExecvp(cmd, output, untrusted ? sBlkidUntrustedContext : sBlkidContext); in readMetadata()