Home
last modified time | relevance | path

Searched refs:allowed (Results 1 – 25 of 118) sorted by relevance

12345

/system/hwservicemanager/
DAccessControl.cpp82 bool allowed = false; in checkPermission() local
88 allowed = (selinux_check_access(context.get(), targetContext, "hwservice_manager", in checkPermission()
91 return allowed; in checkPermission()
96 bool allowed = false; in checkPermission() local
104 allowed = checkPermission(context, sourceAuditPid, targetContext, perm, interface); in checkPermission()
108 return allowed; in checkPermission()
/system/update_engine/client_library/
Dclient_binder.cc94 bool BinderUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument
95 return service_->SetUpdateOverCellularPermission(allowed).isOk(); in SetUpdateOverCellularPermission()
99 bool* allowed) const { in GetUpdateOverCellularPermission()
100 return service_->GetUpdateOverCellularPermission(allowed).isOk(); in GetUpdateOverCellularPermission()
Dclient_dbus.cc85 bool DBusUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument
86 return proxy_->SetUpdateOverCellularPermission(allowed, nullptr); in SetUpdateOverCellularPermission()
90 bool* allowed) const { in GetUpdateOverCellularPermission()
91 return proxy_->GetUpdateOverCellularPermission(allowed, nullptr); in GetUpdateOverCellularPermission()
Dclient_dbus.h53 bool SetUpdateOverCellularPermission(bool allowed) override;
54 bool GetUpdateOverCellularPermission(bool* allowed) const override;
Dclient_binder.h59 bool SetUpdateOverCellularPermission(bool allowed) override;
60 bool GetUpdateOverCellularPermission(bool* allowed) const override;
/system/update_engine/client_library/include/update_engine/
Dclient.h75 virtual bool SetUpdateOverCellularPermission(bool allowed) = 0;
76 virtual bool GetUpdateOverCellularPermission(bool* allowed) const = 0;
/system/update_engine/
Dupdate_engine_client.cc329 bool allowed = FLAGS_update_over_cellular == "yes"; in ProcessFlags() local
330 if (!allowed && FLAGS_update_over_cellular != "no") { in ProcessFlags()
334 if (!client_->SetUpdateOverCellularPermission(allowed)) { in ProcessFlags()
343 bool allowed; in ProcessFlags() local
345 if (!client_->GetUpdateOverCellularPermission(&allowed)) { in ProcessFlags()
351 << (allowed ? "ENABLED" : "DISABLED"); in ProcessFlags()
/system/sepolicy/private/
Drecovery_refresh.te5 # recovery_refresh is not allowed to write anywhere
Drecovery_persist.te5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
Dtraced.te45 # subsequent neverallow. Currently only getattr and search are allowed.
58 # Only init is allowed to enter the traced domain via exec()
/system/sepolicy/prebuilts/api/28.0/private/
Drecovery_refresh.te5 # recovery_refresh is not allowed to write anywhere
Drecovery_persist.te5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
Dtraced.te45 # subsequent neverallow. Currently only getattr and search are allowed.
58 # Only init is allowed to enter the traced domain via exec()
/system/sepolicy/prebuilts/api/27.0/private/
Drecovery_refresh.te5 # recovery_refresh is not allowed to write anywhere
Drecovery_persist.te5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
/system/sepolicy/prebuilts/api/26.0/private/
Drecovery_refresh.te5 # recovery_refresh is not allowed to write anywhere
Drecovery_persist.te5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
/system/sepolicy/public/
Dlmkd.te38 # live lock watchdog process allowed to look through /proc/
42 # live lock watchdog process allowed to dump process trace and
Dioctl_macros1 # socket ioctls allowed to unprivileged apps
14 # socket ioctls never allowed to unprivileged apps
/system/sepolicy/prebuilts/api/28.0/public/
Dlmkd.te38 # live lock watchdog process allowed to look through /proc/
42 # live lock watchdog process allowed to dump process trace and
Dioctl_macros1 # socket ioctls allowed to unprivileged apps
14 # socket ioctls never allowed to unprivileged apps
/system/security/keystore/
Dpermissions.cpp138 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm, in keystore_selinux_check_access() local
141 return allowed; in keystore_selinux_check_access()
/system/sepolicy/prebuilts/api/26.0/public/
Dioctl_macros1 # socket ioctls allowed to unprivileged apps
14 # socket ioctls never allowed to unprivileged apps
Dvendor_toolbox.te2 # Non-vendor processes are not allowed to execute the binary
/system/sepolicy/prebuilts/api/27.0/public/
Dioctl_macros1 # socket ioctls allowed to unprivileged apps
14 # socket ioctls never allowed to unprivileged apps

12345