/system/hwservicemanager/ |
D | AccessControl.cpp | 82 bool allowed = false; in checkPermission() local 88 allowed = (selinux_check_access(context.get(), targetContext, "hwservice_manager", in checkPermission() 91 return allowed; in checkPermission() 96 bool allowed = false; in checkPermission() local 104 allowed = checkPermission(context, sourceAuditPid, targetContext, perm, interface); in checkPermission() 108 return allowed; in checkPermission()
|
/system/update_engine/client_library/ |
D | client_binder.cc | 94 bool BinderUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument 95 return service_->SetUpdateOverCellularPermission(allowed).isOk(); in SetUpdateOverCellularPermission() 99 bool* allowed) const { in GetUpdateOverCellularPermission() 100 return service_->GetUpdateOverCellularPermission(allowed).isOk(); in GetUpdateOverCellularPermission()
|
D | client_dbus.cc | 85 bool DBusUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument 86 return proxy_->SetUpdateOverCellularPermission(allowed, nullptr); in SetUpdateOverCellularPermission() 90 bool* allowed) const { in GetUpdateOverCellularPermission() 91 return proxy_->GetUpdateOverCellularPermission(allowed, nullptr); in GetUpdateOverCellularPermission()
|
D | client_dbus.h | 53 bool SetUpdateOverCellularPermission(bool allowed) override; 54 bool GetUpdateOverCellularPermission(bool* allowed) const override;
|
D | client_binder.h | 59 bool SetUpdateOverCellularPermission(bool allowed) override; 60 bool GetUpdateOverCellularPermission(bool* allowed) const override;
|
/system/update_engine/client_library/include/update_engine/ |
D | client.h | 75 virtual bool SetUpdateOverCellularPermission(bool allowed) = 0; 76 virtual bool GetUpdateOverCellularPermission(bool* allowed) const = 0;
|
/system/update_engine/ |
D | update_engine_client.cc | 329 bool allowed = FLAGS_update_over_cellular == "yes"; in ProcessFlags() local 330 if (!allowed && FLAGS_update_over_cellular != "no") { in ProcessFlags() 334 if (!client_->SetUpdateOverCellularPermission(allowed)) { in ProcessFlags() 343 bool allowed; in ProcessFlags() local 345 if (!client_->GetUpdateOverCellularPermission(&allowed)) { in ProcessFlags() 351 << (allowed ? "ENABLED" : "DISABLED"); in ProcessFlags()
|
/system/sepolicy/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
D | traced.te | 45 # subsequent neverallow. Currently only getattr and search are allowed. 58 # Only init is allowed to enter the traced domain via exec()
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
D | traced.te | 45 # subsequent neverallow. Currently only getattr and search are allowed. 58 # Only init is allowed to enter the traced domain via exec()
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
/system/sepolicy/public/ |
D | lmkd.te | 38 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and
|
D | ioctl_macros | 1 # socket ioctls allowed to unprivileged apps 14 # socket ioctls never allowed to unprivileged apps
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | lmkd.te | 38 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and
|
D | ioctl_macros | 1 # socket ioctls allowed to unprivileged apps 14 # socket ioctls never allowed to unprivileged apps
|
/system/security/keystore/ |
D | permissions.cpp | 138 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm, in keystore_selinux_check_access() local 141 return allowed; in keystore_selinux_check_access()
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | ioctl_macros | 1 # socket ioctls allowed to unprivileged apps 14 # socket ioctls never allowed to unprivileged apps
|
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | ioctl_macros | 1 # socket ioctls allowed to unprivileged apps 14 # socket ioctls never allowed to unprivileged apps
|