Lines Matching refs:untrusted
2 ### neverallow rules for untrusted app domains
27 # Do not allow untrusted apps to register services.
32 # Do not allow untrusted apps to use VendorBinder
36 # Do not allow untrusted apps to connect to the property service
42 # net.dns properties are not a public API. Disallow untrusted apps from reading this property.
62 # Do not allow untrusted apps to invoke dex2oat. This was historically required
71 # Do not allow untrusted apps to be assigned mlstrustedsubject.
78 # and an untrusted app is allowed fork permission to itself.
81 # Do not allow untrusted apps to hard link to any files.
82 # In particular, if an untrusted app links to other app data
85 # bugs, so we want to ensure untrusted apps never have this
89 # Do not allow untrusted apps to access network MAC address file
124 # Do not allow untrusted apps access to /cache
128 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
149 # No untrusted component except mediaprovider_app should be touching /dev/fuse
152 # Do not allow untrusted apps to directly open the tun_device
209 # Do not allow untrusted apps access to preloads data files
216 # Do not permit untrusted apps to perform actions on HwBinder service_manager
239 # SELinux is not an API for untrusted apps to use