Searched refs:apps (Results 1 – 25 of 307) sorted by relevance
12345678910>>...13
/system/chre/apps/ |
D | apps.mk | 11 include apps/ash_world/ash_world.mk 12 include apps/audio_world/audio_world.mk 13 include apps/gnss_world/gnss_world.mk 14 include apps/hello_world/hello_world.mk 15 include apps/host_awake_world/host_awake_world.mk 16 include apps/message_world/message_world.mk 17 include apps/sensor_world/sensor_world.mk 18 include apps/spammer/spammer.mk 19 include apps/timer_world/timer_world.mk 20 include apps/unload_tester/unload_tester.mk [all …]
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | untrusted_app.te | 2 ### Untrusted apps. 11 ### domain is assigned to all non-system apps as well as to any system apps 19 # This file defines the rules for untrusted apps running with 22 # This file defines the rules for untrusted apps running with 25 # This file defines the rules for untrusted apps running with 28 # This file defines the rules for untrusted apps running with
|
/system/sepolicy/public/ |
D | untrusted_app.te | 2 ### Untrusted apps. 11 ### domain is assigned to all non-system apps as well as to any system apps 19 # This file defines the rules for untrusted apps running with 22 # This file defines the rules for untrusted apps running with 25 # This file defines the rules for untrusted apps running with 28 # This file defines the rules for untrusted apps running with
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | app_neverallows.te | 25 # Do not allow untrusted apps to register services. 30 # Do not allow untrusted apps to use VendorBinder 34 # Do not allow untrusted apps to connect to the property service 40 # net.dns properties are not a public API. Temporarily exempt pre-Oreo apps, 41 # but otherwise disallow untrusted apps from reading this property. 44 # Do not allow untrusted apps to be assigned mlstrustedsubject. 54 # Do not allow untrusted apps to hard link to any files. 58 # bugs, so we want to ensure untrusted apps never have this 62 # Do not allow untrusted apps to access network MAC address file 85 # Do not allow untrusted apps access to /cache [all …]
|
D | untrusted_app_all.te | 5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps, 6 ### untrusted_v2_app for fully installed v2 apps). 14 ### attribute is assigned to all non-system apps as well as to any system apps 21 ### Note that rules that should apply to all untrusted apps must be in app.te or also 27 # Some apps ship with shared libraries and binaries that they write out 39 # TODO: Long term, we don't want apps probing into shell data files. 44 # Allow traceur to pass file descriptors through a content provider to untrusted apps 48 # untrusted apps should not be able to open trace data files, they should depend 105 # Allow apps to view preloaded media content 110 # Allow untrusted apps read / execute access to /vendor/app for there can [all …]
|
D | untrusted_app.te | 2 ### Untrusted apps. 4 ### This file defines the rules for untrusted apps. 12 ### domain is assigned to all non-system apps as well as to any system apps
|
D | untrusted_app_27.te | 4 ### This file defines the rules for untrusted apps running with 7 ### This file defines the rules for untrusted apps. 15 ### domain is assigned to all non-system apps as well as to any system apps
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | app_neverallows.te | 25 # Do not allow untrusted apps to register services. 30 # Do not allow untrusted apps to use VendorBinder 34 # Do not allow untrusted apps to connect to the property service 40 # net.dns properties are not a public API. Temporarily exempt pre-Oreo apps, 41 # but otherwise disallow untrusted apps from reading this property. 50 # Block calling execve() on files in an apps home directory. 61 # Do not allow untrusted apps to invoke dex2oat. This was historically required 63 # Exempt legacy apps (targetApi<=28) for compatibility. 70 # Do not allow untrusted apps to be assigned mlstrustedsubject. 80 # Do not allow untrusted apps to hard link to any files. [all …]
|
D | technical_debt.cil | 8 ; Apps, except isolated apps, are clients of Allocator HAL 15 ; Apps, except isolated apps, are clients of OMX-related services 19 ; Apps, except isolated apps, are clients of Codec2-related services 23 ; Apps, except isolated apps, are clients of Configstore HAL 28 ; Apps, except isolated apps, are clients of Graphics Allocator HAL 33 ; Apps, except isolated apps, are clients of Cas HAL 43 ; Apps, except isolated apps, are clients of Neuralnetworks HAL 58 ; Apps, except isolated apps, are clients of BufferHub HAL
|
D | untrusted_app_all.te | 5 ### ephemeral_app for instant apps. 13 ### attribute is assigned to all non-system apps as well as to any system apps 20 ### Note that rules that should apply to all untrusted apps must be in app.te or also 23 # Some apps ship with shared libraries and binaries that they write out 52 # TODO: Long term, we don't want apps probing into shell data files. 57 # Allow traceur to pass file descriptors through a content provider to untrusted apps 61 # untrusted apps should not be able to open trace data files, they should depend 104 # Allow untrusted apps to interact with gpuservice 124 # Untrusted apps need to be able to send a SIGCHLD to runas_app 132 # Allow apps to view preloaded media content [all …]
|
D | untrusted_app.te | 2 ### Untrusted apps. 4 ### This file defines the rules for untrusted apps. 12 ### domain is assigned to all non-system apps as well as to any system apps
|
/system/sepolicy/private/ |
D | app_neverallows.te | 27 # Do not allow untrusted apps to register services. 32 # Do not allow untrusted apps to use VendorBinder 36 # Do not allow untrusted apps to connect to the property service 42 # net.dns properties are not a public API. Disallow untrusted apps from reading this property. 51 # Block calling execve() on files in an apps home directory. 62 # Do not allow untrusted apps to invoke dex2oat. This was historically required 64 # Exempt legacy apps (targetApi<=28) for compatibility. 71 # Do not allow untrusted apps to be assigned mlstrustedsubject. 81 # Do not allow untrusted apps to hard link to any files. 85 # bugs, so we want to ensure untrusted apps never have this [all …]
|
D | untrusted_app.te | 2 ### Untrusted apps. 4 ### This file defines the rules for untrusted apps running with 7 ### See public/untrusted_app.te for more information about which apps are
|
D | technical_debt.cil | 8 ; Apps, except isolated apps, are clients of Allocator HAL 15 ; Apps, except isolated apps, are clients of OMX-related services 19 ; Apps, except isolated apps, are clients of Codec2-related services 23 ; Apps, except isolated apps, are clients of Drm-related services 27 ; Apps, except isolated apps, are clients of Configstore HAL 32 ; Apps, except isolated apps, are clients of Graphics Allocator HAL 37 ; Apps, except isolated apps, are clients of Cas HAL 47 ; Apps, except isolated apps, are clients of Neuralnetworks HAL 62 ; Apps, except isolated apps, are clients of BufferHub HAL
|
D | untrusted_app_all.te | 5 ### ephemeral_app for instant apps. 13 ### attribute is assigned to all non-system apps as well as to any system apps 20 ### Note that rules that should apply to all untrusted apps must be in app.te or also 23 # Some apps ship with shared libraries and binaries that they write out 52 # TODO: Long term, we don't want apps probing into shell data files. 57 # Allow traceur to pass file descriptors through a content provider to untrusted apps 61 # untrusted apps should not be able to open trace data files, they should depend 111 # Untrusted apps need to be able to send a SIGCHLD to runas_app 119 # Allow apps to view preloaded media content 124 # Allow untrusted apps read / execute access to /vendor/app for there can [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | app_neverallows.te | 27 # Do not allow untrusted apps to register services. 32 # Do not allow untrusted apps to use VendorBinder 36 # Do not allow untrusted apps to connect to the property service 42 # net.dns properties are not a public API. Disallow untrusted apps from reading this property. 51 # Block calling execve() on files in an apps home directory. 62 # Do not allow untrusted apps to invoke dex2oat. This was historically required 64 # Exempt legacy apps (targetApi<=28) for compatibility. 71 # Do not allow untrusted apps to be assigned mlstrustedsubject. 81 # Do not allow untrusted apps to hard link to any files. 85 # bugs, so we want to ensure untrusted apps never have this [all …]
|
D | untrusted_app.te | 2 ### Untrusted apps. 4 ### This file defines the rules for untrusted apps running with 7 ### See public/untrusted_app.te for more information about which apps are
|
D | technical_debt.cil | 8 ; Apps, except isolated apps, are clients of Allocator HAL 15 ; Apps, except isolated apps, are clients of OMX-related services 19 ; Apps, except isolated apps, are clients of Codec2-related services 23 ; Apps, except isolated apps, are clients of Drm-related services 27 ; Apps, except isolated apps, are clients of Configstore HAL 32 ; Apps, except isolated apps, are clients of Graphics Allocator HAL 37 ; Apps, except isolated apps, are clients of Cas HAL 47 ; Apps, except isolated apps, are clients of Neuralnetworks HAL 62 ; Apps, except isolated apps, are clients of BufferHub HAL
|
D | untrusted_app_all.te | 5 ### ephemeral_app for instant apps. 13 ### attribute is assigned to all non-system apps as well as to any system apps 20 ### Note that rules that should apply to all untrusted apps must be in app.te or also 23 # Some apps ship with shared libraries and binaries that they write out 52 # TODO: Long term, we don't want apps probing into shell data files. 57 # Allow traceur to pass file descriptors through a content provider to untrusted apps 61 # untrusted apps should not be able to open trace data files, they should depend 103 # Allow untrusted apps to interact with gpuservice 115 # Untrusted apps need to be able to send a SIGCHLD to runas_app 123 # Allow apps to view preloaded media content [all …]
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | app_neverallows.te | 24 # Do not allow untrusted apps to register services. 29 # Do not allow untrusted apps to use VendorBinder 33 # Do not allow untrusted apps to connect to the property service 39 # Do not allow untrusted apps to be assigned mlstrustedsubject. 49 # Do not allow untrusted apps to hard link to any files. 53 # bugs, so we want to ensure untrusted apps never have this 57 # Do not allow untrusted apps to access network MAC address file 74 # Do not allow untrusted apps access to /cache 78 # Do not allow untrusted apps to create/unlink files outside of its sandbox, 89 -app_data_file # The apps sandbox itself [all …]
|
D | untrusted_app.te | 2 ### Untrusted apps. 4 ### This file defines the rules for untrusted apps. 12 ### domain is assigned to all non-system apps as well as to any system apps 27 # allow untrusted apps to use UDP sockets provided by the system server but not 32 # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm
|
D | untrusted_app_all.te | 5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps, 6 ### untrusted_v2_app for fully installed v2 apps). 14 ### attribute is assigned to all non-system apps as well as to any system apps 21 ### Note that rules that should apply to all untrusted apps must be in app.te or also 27 # Some apps ship with shared libraries and binaries that they write out 39 # TODO: Long term, we don't want apps probing into shell data files. 97 # Allow apps to view preloaded media content 102 # Allow untrusted apps read / execute access to /vendor/app for there can 103 # be pre-installed vendor apps that package a library within themselves. 105 # apps.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | app_neverallows.te | 19 # Do not allow untrusted apps to register services. 24 # Do not allow untrusted apps to use VendorBinder 28 # Do not allow untrusted apps to connect to the property service 34 # Do not allow untrusted apps to be assigned mlstrustedsubject. 44 # Do not allow untrusted apps to hard link to any files. 48 # bugs, so we want to ensure untrusted apps never have this 52 # Do not allow untrusted apps to access network MAC address file 69 # Do not allow untrusted apps access to /cache 73 # Do not allow untrusted apps to create/unlink files outside of its sandbox, 84 -app_data_file # The apps sandbox itself [all …]
|
D | untrusted_app.te | 2 ### Untrusted apps. 4 ### This file defines the rules for untrusted apps. 12 ### domain is assigned to all non-system apps as well as to any system apps 28 # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm
|
D | untrusted_app_all.te | 5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps, 6 ### untrusted_v2_app for fully installed v2 apps). 14 ### attribute is assigned to all non-system apps as well as to any system apps 21 ### Note that rules that should apply to all untrusted apps must be in app.te or also 27 # Some apps ship with shared libraries and binaries that they write out 39 # TODO: Long term, we don't want apps probing into shell data files. 95 # Allow apps to view preloaded media content 100 # Allow untrusted apps read / execute access to /vendor/app for there can 101 # be pre-installed vendor apps that package a library within themselves. 103 # apps.
|
12345678910>>...13