Lines Matching refs:Do
27 # Do not allow untrusted apps to register services.
32 # Do not allow untrusted apps to use VendorBinder
36 # Do not allow untrusted apps to connect to the property service
62 # Do not allow untrusted apps to invoke dex2oat. This was historically required
71 # Do not allow untrusted apps to be assigned mlstrustedsubject.
81 # Do not allow untrusted apps to hard link to any files.
89 # Do not allow untrusted apps to access network MAC address file
92 # Do not allow any write access to files in /sys
124 # Do not allow untrusted apps access to /cache
128 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
152 # Do not allow untrusted apps to directly open the tun_device
209 # Do not allow untrusted apps access to preloads data files
216 # Do not permit untrusted apps to perform actions on HwBinder service_manager
220 # Do not permit access from apps which host arbitrary code to the protected HwBinder