Home
last modified time | relevance | path

Searched refs:untrusted (Results 1 – 16 of 16) sorted by relevance

/system/sepolicy/private/
Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
19 # Do not allow untrusted apps to register services.
24 # Do not allow untrusted apps to use VendorBinder
28 # Do not allow untrusted apps to connect to the property service
34 # Do not allow untrusted apps to be assigned mlstrustedsubject.
41 # and an untrusted app is allowed fork permission to itself.
44 # Do not allow untrusted apps to hard link to any files.
45 # In particular, if an untrusted app links to other app data
48 # bugs, so we want to ensure untrusted apps never have this
52 # Do not allow untrusted apps to access network MAC address file
[all …]
Dvold.te11 # domain when working with untrusted block devices
Dblkid_untrusted.te1 # blkid for untrusted block devices
Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
100 # Allow untrusted apps read / execute access to /vendor/app for there can
Duntrusted_app.te4 ### This file defines the rules for untrusted apps.
Duntrusted_app_25.te4 ### This file defines the rules for untrusted apps running with
Dwebview_zygote.te2 # isolated_app processes for rendering untrusted web content.
Dapp.te323 # device traffic. Do not allow untrusted app to directly open tun_device
/system/sepolicy/public/
Dblkid_untrusted.te1 # blkid for untrusted block devices
Dwebview_zygote.te2 # isolated_app processes for rendering untrusted web content.
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
Dattributes147 # hwservices that are accessible from untrusted applications
Dinit.te417 # Never read/follow symlinks created by shell or untrusted apps.
Dte_macros179 # Allow a base set of permissions required for all untrusted apps.
Ddomain.te998 # Profiles contain untrusted data and profman parses that. We should only run
/system/vold/
DUtils.cpp186 std::string& fsUuid, std::string& fsLabel, bool untrusted) { in readMetadata() argument
204 status_t res = ForkExecvp(cmd, output, untrusted ? sBlkidUntrustedContext : sBlkidContext); in readMetadata()