Home
last modified time | relevance | path

Searched refs:apps (Results 1 – 25 of 307) sorted by relevance

12345678910>>...13

/system/chre/apps/
Dapps.mk11 include apps/ash_world/ash_world.mk
12 include apps/audio_world/audio_world.mk
13 include apps/gnss_world/gnss_world.mk
14 include apps/hello_world/hello_world.mk
15 include apps/host_awake_world/host_awake_world.mk
16 include apps/message_world/message_world.mk
17 include apps/sensor_world/sensor_world.mk
18 include apps/spammer/spammer.mk
19 include apps/timer_world/timer_world.mk
20 include apps/unload_tester/unload_tester.mk
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Duntrusted_app.te2 ### Untrusted apps.
11 ### domain is assigned to all non-system apps as well as to any system apps
19 # This file defines the rules for untrusted apps running with
22 # This file defines the rules for untrusted apps running with
25 # This file defines the rules for untrusted apps running with
28 # This file defines the rules for untrusted apps running with
/system/sepolicy/public/
Duntrusted_app.te2 ### Untrusted apps.
11 ### domain is assigned to all non-system apps as well as to any system apps
19 # This file defines the rules for untrusted apps running with
22 # This file defines the rules for untrusted apps running with
25 # This file defines the rules for untrusted apps running with
28 # This file defines the rules for untrusted apps running with
/system/sepolicy/prebuilts/api/28.0/private/
Dapp_neverallows.te25 # Do not allow untrusted apps to register services.
30 # Do not allow untrusted apps to use VendorBinder
34 # Do not allow untrusted apps to connect to the property service
40 # net.dns properties are not a public API. Temporarily exempt pre-Oreo apps,
41 # but otherwise disallow untrusted apps from reading this property.
44 # Do not allow untrusted apps to be assigned mlstrustedsubject.
54 # Do not allow untrusted apps to hard link to any files.
58 # bugs, so we want to ensure untrusted apps never have this
62 # Do not allow untrusted apps to access network MAC address file
85 # Do not allow untrusted apps access to /cache
[all …]
Duntrusted_app_all.te5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps,
6 ### untrusted_v2_app for fully installed v2 apps).
14 ### attribute is assigned to all non-system apps as well as to any system apps
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
27 # Some apps ship with shared libraries and binaries that they write out
39 # TODO: Long term, we don't want apps probing into shell data files.
44 # Allow traceur to pass file descriptors through a content provider to untrusted apps
48 # untrusted apps should not be able to open trace data files, they should depend
105 # Allow apps to view preloaded media content
110 # Allow untrusted apps read / execute access to /vendor/app for there can
[all …]
Duntrusted_app.te2 ### Untrusted apps.
4 ### This file defines the rules for untrusted apps.
12 ### domain is assigned to all non-system apps as well as to any system apps
Duntrusted_app_27.te4 ### This file defines the rules for untrusted apps running with
7 ### This file defines the rules for untrusted apps.
15 ### domain is assigned to all non-system apps as well as to any system apps
/system/sepolicy/prebuilts/api/29.0/private/
Dapp_neverallows.te25 # Do not allow untrusted apps to register services.
30 # Do not allow untrusted apps to use VendorBinder
34 # Do not allow untrusted apps to connect to the property service
40 # net.dns properties are not a public API. Temporarily exempt pre-Oreo apps,
41 # but otherwise disallow untrusted apps from reading this property.
50 # Block calling execve() on files in an apps home directory.
61 # Do not allow untrusted apps to invoke dex2oat. This was historically required
63 # Exempt legacy apps (targetApi<=28) for compatibility.
70 # Do not allow untrusted apps to be assigned mlstrustedsubject.
80 # Do not allow untrusted apps to hard link to any files.
[all …]
Dtechnical_debt.cil8 ; Apps, except isolated apps, are clients of Allocator HAL
15 ; Apps, except isolated apps, are clients of OMX-related services
19 ; Apps, except isolated apps, are clients of Codec2-related services
23 ; Apps, except isolated apps, are clients of Configstore HAL
28 ; Apps, except isolated apps, are clients of Graphics Allocator HAL
33 ; Apps, except isolated apps, are clients of Cas HAL
43 ; Apps, except isolated apps, are clients of Neuralnetworks HAL
58 ; Apps, except isolated apps, are clients of BufferHub HAL
Duntrusted_app_all.te5 ### ephemeral_app for instant apps.
13 ### attribute is assigned to all non-system apps as well as to any system apps
20 ### Note that rules that should apply to all untrusted apps must be in app.te or also
23 # Some apps ship with shared libraries and binaries that they write out
52 # TODO: Long term, we don't want apps probing into shell data files.
57 # Allow traceur to pass file descriptors through a content provider to untrusted apps
61 # untrusted apps should not be able to open trace data files, they should depend
104 # Allow untrusted apps to interact with gpuservice
124 # Untrusted apps need to be able to send a SIGCHLD to runas_app
132 # Allow apps to view preloaded media content
[all …]
Duntrusted_app.te2 ### Untrusted apps.
4 ### This file defines the rules for untrusted apps.
12 ### domain is assigned to all non-system apps as well as to any system apps
/system/sepolicy/private/
Dapp_neverallows.te27 # Do not allow untrusted apps to register services.
32 # Do not allow untrusted apps to use VendorBinder
36 # Do not allow untrusted apps to connect to the property service
42 # net.dns properties are not a public API. Disallow untrusted apps from reading this property.
51 # Block calling execve() on files in an apps home directory.
62 # Do not allow untrusted apps to invoke dex2oat. This was historically required
64 # Exempt legacy apps (targetApi<=28) for compatibility.
71 # Do not allow untrusted apps to be assigned mlstrustedsubject.
81 # Do not allow untrusted apps to hard link to any files.
85 # bugs, so we want to ensure untrusted apps never have this
[all …]
Duntrusted_app.te2 ### Untrusted apps.
4 ### This file defines the rules for untrusted apps running with
7 ### See public/untrusted_app.te for more information about which apps are
Dtechnical_debt.cil8 ; Apps, except isolated apps, are clients of Allocator HAL
15 ; Apps, except isolated apps, are clients of OMX-related services
19 ; Apps, except isolated apps, are clients of Codec2-related services
23 ; Apps, except isolated apps, are clients of Drm-related services
27 ; Apps, except isolated apps, are clients of Configstore HAL
32 ; Apps, except isolated apps, are clients of Graphics Allocator HAL
37 ; Apps, except isolated apps, are clients of Cas HAL
47 ; Apps, except isolated apps, are clients of Neuralnetworks HAL
62 ; Apps, except isolated apps, are clients of BufferHub HAL
Duntrusted_app_all.te5 ### ephemeral_app for instant apps.
13 ### attribute is assigned to all non-system apps as well as to any system apps
20 ### Note that rules that should apply to all untrusted apps must be in app.te or also
23 # Some apps ship with shared libraries and binaries that they write out
52 # TODO: Long term, we don't want apps probing into shell data files.
57 # Allow traceur to pass file descriptors through a content provider to untrusted apps
61 # untrusted apps should not be able to open trace data files, they should depend
111 # Untrusted apps need to be able to send a SIGCHLD to runas_app
119 # Allow apps to view preloaded media content
124 # Allow untrusted apps read / execute access to /vendor/app for there can
[all …]
/system/sepolicy/prebuilts/api/30.0/private/
Dapp_neverallows.te27 # Do not allow untrusted apps to register services.
32 # Do not allow untrusted apps to use VendorBinder
36 # Do not allow untrusted apps to connect to the property service
42 # net.dns properties are not a public API. Disallow untrusted apps from reading this property.
51 # Block calling execve() on files in an apps home directory.
62 # Do not allow untrusted apps to invoke dex2oat. This was historically required
64 # Exempt legacy apps (targetApi<=28) for compatibility.
71 # Do not allow untrusted apps to be assigned mlstrustedsubject.
81 # Do not allow untrusted apps to hard link to any files.
85 # bugs, so we want to ensure untrusted apps never have this
[all …]
Duntrusted_app.te2 ### Untrusted apps.
4 ### This file defines the rules for untrusted apps running with
7 ### See public/untrusted_app.te for more information about which apps are
Dtechnical_debt.cil8 ; Apps, except isolated apps, are clients of Allocator HAL
15 ; Apps, except isolated apps, are clients of OMX-related services
19 ; Apps, except isolated apps, are clients of Codec2-related services
23 ; Apps, except isolated apps, are clients of Drm-related services
27 ; Apps, except isolated apps, are clients of Configstore HAL
32 ; Apps, except isolated apps, are clients of Graphics Allocator HAL
37 ; Apps, except isolated apps, are clients of Cas HAL
47 ; Apps, except isolated apps, are clients of Neuralnetworks HAL
62 ; Apps, except isolated apps, are clients of BufferHub HAL
Duntrusted_app_all.te5 ### ephemeral_app for instant apps.
13 ### attribute is assigned to all non-system apps as well as to any system apps
20 ### Note that rules that should apply to all untrusted apps must be in app.te or also
23 # Some apps ship with shared libraries and binaries that they write out
52 # TODO: Long term, we don't want apps probing into shell data files.
57 # Allow traceur to pass file descriptors through a content provider to untrusted apps
61 # untrusted apps should not be able to open trace data files, they should depend
103 # Allow untrusted apps to interact with gpuservice
115 # Untrusted apps need to be able to send a SIGCHLD to runas_app
123 # Allow apps to view preloaded media content
[all …]
/system/sepolicy/prebuilts/api/27.0/private/
Dapp_neverallows.te24 # Do not allow untrusted apps to register services.
29 # Do not allow untrusted apps to use VendorBinder
33 # Do not allow untrusted apps to connect to the property service
39 # Do not allow untrusted apps to be assigned mlstrustedsubject.
49 # Do not allow untrusted apps to hard link to any files.
53 # bugs, so we want to ensure untrusted apps never have this
57 # Do not allow untrusted apps to access network MAC address file
74 # Do not allow untrusted apps access to /cache
78 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
89 -app_data_file # The apps sandbox itself
[all …]
Duntrusted_app.te2 ### Untrusted apps.
4 ### This file defines the rules for untrusted apps.
12 ### domain is assigned to all non-system apps as well as to any system apps
27 # allow untrusted apps to use UDP sockets provided by the system server but not
32 # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm
Duntrusted_app_all.te5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps,
6 ### untrusted_v2_app for fully installed v2 apps).
14 ### attribute is assigned to all non-system apps as well as to any system apps
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
27 # Some apps ship with shared libraries and binaries that they write out
39 # TODO: Long term, we don't want apps probing into shell data files.
97 # Allow apps to view preloaded media content
102 # Allow untrusted apps read / execute access to /vendor/app for there can
103 # be pre-installed vendor apps that package a library within themselves.
105 # apps.
/system/sepolicy/prebuilts/api/26.0/private/
Dapp_neverallows.te19 # Do not allow untrusted apps to register services.
24 # Do not allow untrusted apps to use VendorBinder
28 # Do not allow untrusted apps to connect to the property service
34 # Do not allow untrusted apps to be assigned mlstrustedsubject.
44 # Do not allow untrusted apps to hard link to any files.
48 # bugs, so we want to ensure untrusted apps never have this
52 # Do not allow untrusted apps to access network MAC address file
69 # Do not allow untrusted apps access to /cache
73 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
84 -app_data_file # The apps sandbox itself
[all …]
Duntrusted_app.te2 ### Untrusted apps.
4 ### This file defines the rules for untrusted apps.
12 ### domain is assigned to all non-system apps as well as to any system apps
28 # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm
Duntrusted_app_all.te5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps,
6 ### untrusted_v2_app for fully installed v2 apps).
14 ### attribute is assigned to all non-system apps as well as to any system apps
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
27 # Some apps ship with shared libraries and binaries that they write out
39 # TODO: Long term, we don't want apps probing into shell data files.
95 # Allow apps to view preloaded media content
100 # Allow untrusted apps read / execute access to /vendor/app for there can
101 # be pre-installed vendor apps that package a library within themselves.
103 # apps.

12345678910>>...13