Lines Matching refs:Do
30 # Do not allow untrusted apps to register services.
35 # Do not allow untrusted apps to use VendorBinder
39 # Do not allow untrusted apps to connect to the property service
68 # Do not allow untrusted apps to invoke dex2oat. This was historically required
77 # Do not allow untrusted apps to be assigned mlstrustedsubject.
87 # Do not allow untrusted apps to hard link to any files.
95 # Do not allow untrusted apps to access network MAC address file
98 # Do not allow any write access to files in /sys
130 # Do not allow untrusted apps access to /cache
134 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
158 # Do not allow untrusted apps to directly open the tun_device
194 # Do not allow untrusted apps access to preloads data files
201 # Do not permit untrusted apps to perform actions on HwBinder service_manager
205 # Do not permit access from apps which host arbitrary code to the protected services