Lines Matching refs:Do
25 # Do not allow untrusted apps to register services.
30 # Do not allow untrusted apps to use VendorBinder
34 # Do not allow untrusted apps to connect to the property service
61 # Do not allow untrusted apps to invoke dex2oat. This was historically required
70 # Do not allow untrusted apps to be assigned mlstrustedsubject.
80 # Do not allow untrusted apps to hard link to any files.
88 # Do not allow untrusted apps to access network MAC address file
91 # Do not allow any write access to files in /sys
115 # Do not allow untrusted apps access to /cache
119 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
143 # Do not allow untrusted apps to directly open the tun_device
197 # Do not allow untrusted apps access to preloads data files
204 # Do not permit untrusted apps to perform actions on HwBinder service_manager
208 # Do not permit access from apps which host arbitrary code to HwBinder services,