Home
last modified time | relevance | path

Searched refs:allowed (Results 1 – 25 of 179) sorted by relevance

12345678

/system/hwservicemanager/
DAccessControl.cpp100 bool allowed = false; in checkPermission() local
107 allowed = (selinux_check_access(source.sid.c_str(), targetContext, "hwservice_manager", in checkPermission()
110 return allowed; in checkPermission()
115 bool allowed = false; in checkPermission() local
123 allowed = checkPermission(source, targetContext, perm, interface); in checkPermission()
127 return allowed; in checkPermission()
/system/apex/apexd/
Dapex_shim.cpp215 auto allowed = ReadSha512(system_apex_path); in ValidateUpdate() local
216 if (!allowed.Ok()) { in ValidateUpdate()
217 return allowed.ErrorStatus(); in ValidateUpdate()
223 auto it = std::find(allowed->begin(), allowed->end(), *actual); in ValidateUpdate()
224 if (it == allowed->end()) { in ValidateUpdate()
/system/chre/core/
Dtimer_pool.cc161 bool allowed; in isNewTimerAllowedLocked() local
163 allowed = (mNumNanoappTimers < kMaxNanoappTimers); in isNewTimerAllowedLocked()
170 allowed = (numSystemTimers < kMaxSystemTimers); in isNewTimerAllowedLocked()
173 return allowed; in isNewTimerAllowedLocked()
/system/update_engine/client_library/
Dclient_dbus.cc105 bool DBusUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument
106 return proxy_->SetUpdateOverCellularPermission(allowed, nullptr); in SetUpdateOverCellularPermission()
110 bool* allowed) const { in GetUpdateOverCellularPermission()
111 return proxy_->GetUpdateOverCellularPermission(allowed, nullptr); in GetUpdateOverCellularPermission()
Dclient_binder.cc100 bool BinderUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument
101 return service_->SetUpdateOverCellularPermission(allowed).isOk(); in SetUpdateOverCellularPermission()
105 bool* allowed) const { in GetUpdateOverCellularPermission()
106 return service_->GetUpdateOverCellularPermission(allowed).isOk(); in GetUpdateOverCellularPermission()
Dclient_dbus.h56 bool SetUpdateOverCellularPermission(bool allowed) override;
57 bool GetUpdateOverCellularPermission(bool* allowed) const override;
Dclient_binder.h62 bool SetUpdateOverCellularPermission(bool allowed) override;
63 bool GetUpdateOverCellularPermission(bool* allowed) const override;
/system/update_engine/client_library/include/update_engine/
Dclient.h88 virtual bool SetUpdateOverCellularPermission(bool allowed) = 0;
89 virtual bool GetUpdateOverCellularPermission(bool* allowed) const = 0;
/system/update_engine/
Dupdate_engine_client.cc358 bool allowed = FLAGS_update_over_cellular == "yes"; in ProcessFlags() local
359 if (!allowed && FLAGS_update_over_cellular != "no") { in ProcessFlags()
363 if (!client_->SetUpdateOverCellularPermission(allowed)) { in ProcessFlags()
372 bool allowed; in ProcessFlags() local
374 if (!client_->GetUpdateOverCellularPermission(&allowed)) { in ProcessFlags()
380 << (allowed ? "ENABLED" : "DISABLED"); in ProcessFlags()
/system/sepolicy/prebuilts/api/29.0/private/
Drecovery_refresh.te5 # recovery_refresh is not allowed to write anywhere
Drecovery_persist.te5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
Dllkd.te35 # live lock watchdog process allowed to look through /proc/
42 # live lock watchdog process allowed to dump process trace and
/system/sepolicy/private/
Drecovery_refresh.te5 # recovery_refresh is not allowed to write anywhere
Drecovery_persist.te5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
Dllkd.te35 # live lock watchdog process allowed to look through /proc/
42 # live lock watchdog process allowed to dump process trace and
/system/sepolicy/prebuilts/api/27.0/private/
Drecovery_refresh.te5 # recovery_refresh is not allowed to write anywhere
Drecovery_persist.te5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
/system/sepolicy/prebuilts/api/26.0/private/
Drecovery_refresh.te5 # recovery_refresh is not allowed to write anywhere
Drecovery_persist.te5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
/system/sepolicy/prebuilts/api/28.0/private/
Drecovery_refresh.te5 # recovery_refresh is not allowed to write anywhere
Drecovery_persist.te5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
/system/sepolicy/prebuilts/api/28.0/public/
Dlmkd.te38 # live lock watchdog process allowed to look through /proc/
42 # live lock watchdog process allowed to dump process trace and
/system/sepolicy/public/
Dadbd.te6 # Only init is allowed to enter the adbd domain via exec()
/system/sepolicy/prebuilts/api/29.0/public/
Dadbd.te6 # Only init is allowed to enter the adbd domain via exec()
/system/tools/aidl/build/
Dmessage_check_equality.txt4 Above AIDL file(s) has changed and this is NEVER allowed on a release platform

12345678