tree: bd0c61a73513a978b924173e4ddd76e048a69eb6 [path history] [tgz]
  1. zxcrypt/
  2. BUILD.gn
  3. build_info_allowlist_eng.txt
  4. component_event_provider_allowlist_eng.txt
  5. component_manager_policy.json5
  6. debug_resource_allowlist_eng.txt
  7. deprecated_ambient_replace_as_executable_allowlist_eng.txt
  8. deprecated_misc_storage_allowlist_eng.txt
  9. deprecated_shell_allowlist_eng.txt
  10. durable_data_allowlist_eng.txt
  11. factory_data_allowlist_eng.txt
  12. hub_allowlist_eng.txt
  13. hypervisor_resource_allowlist_eng.txt
  14. info_resource_allowlist_eng.txt
  15. ioport_resource_allowlist_eng.txt
  16. irq_resource_allowlist_eng.txt
  17. mmio_resource_allowlist_eng.txt
  18. OWNERS
  19. package_cache_allowlist_eng.txt
  20. package_resolver_allowlist_eng.txt
  21. pkgfs_non_static_pkgs_allowlist_eng.txt
  22. pkgfs_versions_allowlist_eng.txt
  23. README.md
  24. root_job_allowlist_eng.txt
  25. root_resource_allowlist_eng.txt
  26. smc_resource_allowlist_eng.txt
  27. system_updater_allowlist_eng.txt
  28. vmex_resource_allowlist_eng.txt
  29. weave_signer_allowlist_eng.txt
src/security/policy/README.md

Runtime Allowlist Policies

This directory contains a set of allowlists that are read by the appmgr to limit which components can access certain services and features at runtime. This runtime enforcement enables the appmgr to block the launch of unauthorized components from requesting the RootResource service or the deprecated_ambient_replace_as_executable feature.

All allowlists in this directory are postfixed with _eng to indicate that they are intended for engineering builds. This means they may include additional components required for debugging and testing that are not required by a user build.