/system/hwservicemanager/ |
D | AccessControl.cpp | 100 bool allowed = false; in checkPermission() local 107 allowed = (selinux_check_access(source.sid.c_str(), targetContext, "hwservice_manager", in checkPermission() 110 return allowed; in checkPermission() 115 bool allowed = false; in checkPermission() local 123 allowed = checkPermission(source, targetContext, perm, interface); in checkPermission() 127 return allowed; in checkPermission()
|
/system/apex/apexd/ |
D | apex_shim.cpp | 215 auto allowed = ReadSha512(system_apex_path); in ValidateUpdate() local 216 if (!allowed.Ok()) { in ValidateUpdate() 217 return allowed.ErrorStatus(); in ValidateUpdate() 223 auto it = std::find(allowed->begin(), allowed->end(), *actual); in ValidateUpdate() 224 if (it == allowed->end()) { in ValidateUpdate()
|
/system/chre/core/ |
D | timer_pool.cc | 161 bool allowed; in isNewTimerAllowedLocked() local 163 allowed = (mNumNanoappTimers < kMaxNanoappTimers); in isNewTimerAllowedLocked() 170 allowed = (numSystemTimers < kMaxSystemTimers); in isNewTimerAllowedLocked() 173 return allowed; in isNewTimerAllowedLocked()
|
/system/update_engine/client_library/ |
D | client_dbus.cc | 105 bool DBusUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument 106 return proxy_->SetUpdateOverCellularPermission(allowed, nullptr); in SetUpdateOverCellularPermission() 110 bool* allowed) const { in GetUpdateOverCellularPermission() 111 return proxy_->GetUpdateOverCellularPermission(allowed, nullptr); in GetUpdateOverCellularPermission()
|
D | client_binder.cc | 100 bool BinderUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument 101 return service_->SetUpdateOverCellularPermission(allowed).isOk(); in SetUpdateOverCellularPermission() 105 bool* allowed) const { in GetUpdateOverCellularPermission() 106 return service_->GetUpdateOverCellularPermission(allowed).isOk(); in GetUpdateOverCellularPermission()
|
D | client_dbus.h | 56 bool SetUpdateOverCellularPermission(bool allowed) override; 57 bool GetUpdateOverCellularPermission(bool* allowed) const override;
|
D | client_binder.h | 62 bool SetUpdateOverCellularPermission(bool allowed) override; 63 bool GetUpdateOverCellularPermission(bool* allowed) const override;
|
/system/update_engine/client_library/include/update_engine/ |
D | client.h | 88 virtual bool SetUpdateOverCellularPermission(bool allowed) = 0; 89 virtual bool GetUpdateOverCellularPermission(bool* allowed) const = 0;
|
/system/update_engine/ |
D | update_engine_client.cc | 358 bool allowed = FLAGS_update_over_cellular == "yes"; in ProcessFlags() local 359 if (!allowed && FLAGS_update_over_cellular != "no") { in ProcessFlags() 363 if (!client_->SetUpdateOverCellularPermission(allowed)) { in ProcessFlags() 372 bool allowed; in ProcessFlags() local 374 if (!client_->GetUpdateOverCellularPermission(&allowed)) { in ProcessFlags() 380 << (allowed ? "ENABLED" : "DISABLED"); in ProcessFlags()
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
D | llkd.te | 35 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and
|
/system/sepolicy/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
D | llkd.te | 35 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | lmkd.te | 38 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and
|
/system/sepolicy/public/ |
D | adbd.te | 6 # Only init is allowed to enter the adbd domain via exec()
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | adbd.te | 6 # Only init is allowed to enter the adbd domain via exec()
|
/system/tools/aidl/build/ |
D | message_check_equality.txt | 4 Above AIDL file(s) has changed and this is NEVER allowed on a release platform
|