Home
last modified time | relevance | path

Searched refs:untrusted (Results 1 – 8 of 8) sorted by relevance

/system/sepolicy/
Dblkid_untrusted.te1 # blkid for untrusted block devices
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
Duntrusted_app.te4 ### This file defines the rules for untrusted apps.
122 # Do not allow untrusted apps to register services.
Dvold.te23 # domain when working with untrusted block devices
Dinit.te302 # Never read/follow symlinks created by shell or untrusted apps.
Dapp.te258 # device traffic. Do not allow untrusted app to directly open tun_device
Ddomain.te587 # Profiles contain untrusted data and profman parses that. We should only run
/system/vold/
DUtils.cpp186 std::string& fsUuid, std::string& fsLabel, bool untrusted) { in readMetadata() argument
204 status_t res = ForkExecvp(cmd, output, untrusted ? sBlkidUntrustedContext : sBlkidContext); in readMetadata()