Lines Matching refs:untrusted
2 ### neverallow rules for untrusted app domains
24 # Do not allow untrusted apps to register services.
29 # Do not allow untrusted apps to use VendorBinder
33 # Do not allow untrusted apps to connect to the property service
39 # Do not allow untrusted apps to be assigned mlstrustedsubject.
46 # and an untrusted app is allowed fork permission to itself.
49 # Do not allow untrusted apps to hard link to any files.
50 # In particular, if an untrusted app links to other app data
53 # bugs, so we want to ensure untrusted apps never have this
57 # Do not allow untrusted apps to access network MAC address file
74 # Do not allow untrusted apps access to /cache
78 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
99 # No untrusted component should be touching /dev/fuse
102 # Do not allow untrusted apps to directly open tun_device
116 # Do not allow untrusted apps access to preloads data files
123 # Do not permit untrusted apps to perform actions on HwBinder service_manager
214 # SELinux is not an API for untrusted apps to use