Home
last modified time | relevance | path

Searched refs:untrusted (Results 1 – 25 of 167) sorted by relevance

1234567

/aosp12/system/sepolicy/prebuilts/api/30.0/private/
H A Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
27 # Do not allow untrusted apps to register services.
32 # Do not allow untrusted apps to use VendorBinder
36 # Do not allow untrusted apps to connect to the property service
78 # and an untrusted app is allowed fork permission to itself.
81 # Do not allow untrusted apps to hard link to any files.
82 # In particular, if an untrusted app links to other app data
85 # bugs, so we want to ensure untrusted apps never have this
124 # Do not allow untrusted apps access to /cache
209 # Do not allow untrusted apps access to preloads data files
[all …]
H A Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
20 ### Note that rules that should apply to all untrusted apps must be in app.te or also
57 # Allow traceur to pass file descriptors through a content provider to untrusted apps
61 # untrusted apps should not be able to open trace data files, they should depend
103 # Allow untrusted apps to interact with gpuservice
128 # Allow untrusted apps read / execute access to /vendor/app for there can
144 # allow untrusted apps to use UDP sockets provided by the system server but not
/aosp12/system/sepolicy/prebuilts/api/31.0/private/
H A Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
30 # Do not allow untrusted apps to register services.
35 # Do not allow untrusted apps to use VendorBinder
39 # Do not allow untrusted apps to connect to the property service
84 # and an untrusted app is allowed fork permission to itself.
87 # Do not allow untrusted apps to hard link to any files.
88 # In particular, if an untrusted app links to other app data
91 # bugs, so we want to ensure untrusted apps never have this
130 # Do not allow untrusted apps access to /cache
194 # Do not allow untrusted apps access to preloads data files
[all …]
H A Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
58 # Allow traceur to pass file descriptors through a content provider to untrusted apps
62 # untrusted apps should not be able to open trace data files, they should depend
67 # neverallow untrusted apps accessing debugfs_tracing
124 # Allow untrusted apps read / execute access to /vendor/app for there can
140 # allow untrusted apps to use UDP sockets provided by the system server but not
/aosp12/system/sepolicy/prebuilts/api/32.0/private/
H A Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
30 # Do not allow untrusted apps to register services.
35 # Do not allow untrusted apps to use VendorBinder
39 # Do not allow untrusted apps to connect to the property service
84 # and an untrusted app is allowed fork permission to itself.
87 # Do not allow untrusted apps to hard link to any files.
88 # In particular, if an untrusted app links to other app data
91 # bugs, so we want to ensure untrusted apps never have this
130 # Do not allow untrusted apps access to /cache
194 # Do not allow untrusted apps access to preloads data files
[all …]
H A Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
58 # Allow traceur to pass file descriptors through a content provider to untrusted apps
62 # untrusted apps should not be able to open trace data files, they should depend
67 # neverallow untrusted apps accessing debugfs_tracing
124 # Allow untrusted apps read / execute access to /vendor/app for there can
140 # allow untrusted apps to use UDP sockets provided by the system server but not
/aosp12/system/sepolicy/private/
H A Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
30 # Do not allow untrusted apps to register services.
35 # Do not allow untrusted apps to use VendorBinder
39 # Do not allow untrusted apps to connect to the property service
84 # and an untrusted app is allowed fork permission to itself.
87 # Do not allow untrusted apps to hard link to any files.
88 # In particular, if an untrusted app links to other app data
91 # bugs, so we want to ensure untrusted apps never have this
130 # Do not allow untrusted apps access to /cache
194 # Do not allow untrusted apps access to preloads data files
[all …]
H A Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
58 # Allow traceur to pass file descriptors through a content provider to untrusted apps
62 # untrusted apps should not be able to open trace data files, they should depend
67 # neverallow untrusted apps accessing debugfs_tracing
124 # Allow untrusted apps read / execute access to /vendor/app for there can
140 # allow untrusted apps to use UDP sockets provided by the system server but not
/aosp12/system/sepolicy/prebuilts/api/28.0/private/
H A Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
25 # Do not allow untrusted apps to register services.
30 # Do not allow untrusted apps to use VendorBinder
51 # and an untrusted app is allowed fork permission to itself.
54 # Do not allow untrusted apps to hard link to any files.
55 # In particular, if an untrusted app links to other app data
58 # bugs, so we want to ensure untrusted apps never have this
85 # Do not allow untrusted apps access to /cache
108 # No untrusted component should be touching /dev/fuse
111 # Do not allow untrusted apps to directly open tun_device
[all …]
H A Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
44 # Allow traceur to pass file descriptors through a content provider to untrusted apps
48 # untrusted apps should not be able to open trace data files, they should depend
110 # Allow untrusted apps read / execute access to /vendor/app for there can
124 # allow untrusted apps to use UDP sockets provided by the system server but not
H A Duntrusted_app_27.te4 ### This file defines the rules for untrusted apps running with
7 ### This file defines the rules for untrusted apps.
/aosp12/system/sepolicy/prebuilts/api/27.0/private/
H A Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
24 # Do not allow untrusted apps to register services.
29 # Do not allow untrusted apps to use VendorBinder
46 # and an untrusted app is allowed fork permission to itself.
49 # Do not allow untrusted apps to hard link to any files.
50 # In particular, if an untrusted app links to other app data
53 # bugs, so we want to ensure untrusted apps never have this
74 # Do not allow untrusted apps access to /cache
99 # No untrusted component should be touching /dev/fuse
102 # Do not allow untrusted apps to directly open tun_device
[all …]
H A Duntrusted_app.te4 ### This file defines the rules for untrusted apps.
27 # allow untrusted apps to use UDP sockets provided by the system server but not
/aosp12/system/sepolicy/prebuilts/api/26.0/private/
H A Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
19 # Do not allow untrusted apps to register services.
24 # Do not allow untrusted apps to use VendorBinder
41 # and an untrusted app is allowed fork permission to itself.
44 # Do not allow untrusted apps to hard link to any files.
45 # In particular, if an untrusted app links to other app data
48 # bugs, so we want to ensure untrusted apps never have this
69 # Do not allow untrusted apps access to /cache
94 # No untrusted component should be touching /dev/fuse
97 # Do not allow untrusted apps to directly open tun_device
[all …]
/aosp12/system/sepolicy/prebuilts/api/29.0/private/
H A Dapp_neverallows.te2 ### neverallow rules for untrusted app domains
25 # Do not allow untrusted apps to register services.
30 # Do not allow untrusted apps to use VendorBinder
34 # Do not allow untrusted apps to connect to the property service
77 # and an untrusted app is allowed fork permission to itself.
80 # Do not allow untrusted apps to hard link to any files.
81 # In particular, if an untrusted app links to other app data
84 # bugs, so we want to ensure untrusted apps never have this
115 # Do not allow untrusted apps access to /cache
140 # No untrusted component should be touching /dev/fuse
[all …]
H A Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
20 ### Note that rules that should apply to all untrusted apps must be in app.te or also
57 # Allow traceur to pass file descriptors through a content provider to untrusted apps
61 # untrusted apps should not be able to open trace data files, they should depend
104 # Allow untrusted apps to interact with gpuservice
137 # Allow untrusted apps read / execute access to /vendor/app for there can
155 # allow untrusted apps to use UDP sockets provided by the system server but not
H A Duntrusted_app_27.te4 ### This file defines the rules for untrusted apps running with
7 ### This file defines the rules for untrusted apps.
/aosp12/system/sepolicy/prebuilts/api/30.0/public/
H A Duntrusted_app.te19 # This file defines the rules for untrusted apps running with
22 # This file defines the rules for untrusted apps running with
25 # This file defines the rules for untrusted apps running with
28 # This file defines the rules for untrusted apps running with
H A Dhwservice.te2 # access from untrusted apps is prohibited.
64 # These are directly accessible from untrusted apps.
78 # untrusted app access in mind.
/aosp12/system/sepolicy/prebuilts/api/31.0/public/
H A Duntrusted_app.te19 # This file defines the rules for untrusted apps running with
22 # This file defines the rules for untrusted apps running with
25 # This file defines the rules for untrusted apps running with
28 # This file defines the rules for untrusted apps running with
H A Dhwservice.te2 # access from untrusted apps is prohibited.
63 # These are directly accessible from untrusted apps.
77 # untrusted app access in mind.
/aosp12/system/sepolicy/prebuilts/api/32.0/public/
H A Duntrusted_app.te19 # This file defines the rules for untrusted apps running with
22 # This file defines the rules for untrusted apps running with
25 # This file defines the rules for untrusted apps running with
28 # This file defines the rules for untrusted apps running with
H A Dhwservice.te2 # access from untrusted apps is prohibited.
63 # These are directly accessible from untrusted apps.
77 # untrusted app access in mind.
/aosp12/system/sepolicy/public/
H A Duntrusted_app.te19 # This file defines the rules for untrusted apps running with
22 # This file defines the rules for untrusted apps running with
25 # This file defines the rules for untrusted apps running with
28 # This file defines the rules for untrusted apps running with
H A Dhwservice.te2 # access from untrusted apps is prohibited.
63 # These are directly accessible from untrusted apps.
77 # untrusted app access in mind.

1234567