Home
last modified time | relevance | path

Searched refs:update_engine (Results 1 – 25 of 175) sorted by relevance

1234567

/system/sepolicy/prebuilts/api/31.0/public/
Dupdate_engine.te1 # Domain for update_engine daemon.
2 type update_engine, domain, update_engine_common;
5 net_domain(update_engine);
7 # Following permissions are needed for update_engine.
8 allow update_engine self:process { setsched };
9 allow update_engine self:global_capability_class_set { fowner sys_admin };
14 dontaudit update_engine self:global_capability_class_set fsetid;
16 allow update_engine kmsg_device:chr_file { getattr w_file_perms };
17 allow update_engine update_engine_exec:file rx_file_perms;
18 wakelock_use(update_engine);
[all …]
Dapexd.te8 neverallow { domain -init -apexd -system_server -update_engine } apex_service:service_manager find;
9 neverallow { domain -init -apexd -system_server -servicemanager -update_engine } apexd:binder call;
/system/sepolicy/prebuilts/api/34.0/public/
Dupdate_engine.te1 # Domain for update_engine daemon.
2 type update_engine, domain, update_engine_common;
5 net_domain(update_engine);
7 # Following permissions are needed for update_engine.
8 allow update_engine self:process { setsched };
9 allow update_engine self:global_capability_class_set { fowner sys_admin };
14 dontaudit update_engine self:global_capability_class_set fsetid;
16 allow update_engine kmsg_device:chr_file { getattr w_file_perms };
17 allow update_engine update_engine_exec:file rx_file_perms;
18 wakelock_use(update_engine);
[all …]
Dapexd.te8 neverallow { domain -init -apexd -system_server -update_engine } apex_service:service_manager find;
9 neverallow { domain -init -apexd -system_server -servicemanager -update_engine } apexd:binder call;
/system/sepolicy/prebuilts/api/33.0/public/
Dupdate_engine.te1 # Domain for update_engine daemon.
2 type update_engine, domain, update_engine_common;
5 net_domain(update_engine);
7 # Following permissions are needed for update_engine.
8 allow update_engine self:process { setsched };
9 allow update_engine self:global_capability_class_set { fowner sys_admin };
14 dontaudit update_engine self:global_capability_class_set fsetid;
16 allow update_engine kmsg_device:chr_file { getattr w_file_perms };
17 allow update_engine update_engine_exec:file rx_file_perms;
18 wakelock_use(update_engine);
[all …]
Dapexd.te8 neverallow { domain -init -apexd -system_server -update_engine } apex_service:service_manager find;
9 neverallow { domain -init -apexd -system_server -servicemanager -update_engine } apexd:binder call;
/system/sepolicy/public/
Dupdate_engine.te1 # Domain for update_engine daemon.
2 type update_engine, domain, update_engine_common;
5 net_domain(update_engine);
7 # Following permissions are needed for update_engine.
8 allow update_engine self:process { setsched };
9 allow update_engine self:global_capability_class_set { fowner sys_admin };
14 dontaudit update_engine self:global_capability_class_set fsetid;
16 allow update_engine kmsg_device:chr_file { getattr w_file_perms };
17 allow update_engine update_engine_exec:file rx_file_perms;
18 wakelock_use(update_engine);
[all …]
Dapexd.te8 neverallow { domain -init -apexd -system_server -update_engine } apex_service:service_manager find;
9 neverallow { domain -init -apexd -system_server -servicemanager -update_engine } apexd:binder call;
/system/sepolicy/prebuilts/api/32.0/public/
Dupdate_engine.te1 # Domain for update_engine daemon.
2 type update_engine, domain, update_engine_common;
5 net_domain(update_engine);
7 # Following permissions are needed for update_engine.
8 allow update_engine self:process { setsched };
9 allow update_engine self:global_capability_class_set { fowner sys_admin };
14 dontaudit update_engine self:global_capability_class_set fsetid;
16 allow update_engine kmsg_device:chr_file { getattr w_file_perms };
17 allow update_engine update_engine_exec:file rx_file_perms;
18 wakelock_use(update_engine);
[all …]
Dapexd.te8 neverallow { domain -init -apexd -system_server -update_engine } apex_service:service_manager find;
9 neverallow { domain -init -apexd -system_server -servicemanager -update_engine } apexd:binder call;
/system/sepolicy/prebuilts/api/29.0/public/
Dupdate_engine.te1 # Domain for update_engine daemon.
2 type update_engine, domain, update_engine_common;
5 net_domain(update_engine);
7 # Following permissions are needed for update_engine.
8 allow update_engine self:process { setsched };
9 allow update_engine self:global_capability_class_set { fowner sys_admin };
14 dontaudit update_engine self:global_capability_class_set fsetid;
16 allow update_engine kmsg_device:chr_file { getattr w_file_perms };
17 allow update_engine update_engine_exec:file rx_file_perms;
18 wakelock_use(update_engine);
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Dupdate_engine.te1 # Domain for update_engine daemon.
2 type update_engine, domain, update_engine_common;
5 net_domain(update_engine);
7 # Following permissions are needed for update_engine.
8 allow update_engine self:process { setsched };
9 allow update_engine self:global_capability_class_set { fowner sys_admin };
14 dontaudit update_engine self:global_capability_class_set fsetid;
16 allow update_engine kmsg_device:chr_file { getattr w_file_perms };
17 allow update_engine update_engine_exec:file rx_file_perms;
18 wakelock_use(update_engine);
[all …]
/system/sepolicy/private/
Dupdate_engine.te1 typeattribute update_engine coredomain;
3 init_daemon_domain(update_engine);
6 allow update_engine gsi_service:service_manager find;
7 binder_call(update_engine, gsid)
10 set_prop(update_engine, ctl_gsid_prop)
13 set_prop(update_engine, ctl_snapuserd_prop)
16 set_prop(update_engine, ota_prop)
19 get_prop(update_engine, gsid_prop)
21 # Allow update_engine to call the callback function provided by GKI update hook.
22 binder_call(update_engine, gki_apex_prepostinstall)
[all …]
/system/sepolicy/prebuilts/api/34.0/private/
Dupdate_engine.te1 typeattribute update_engine coredomain;
3 init_daemon_domain(update_engine);
6 allow update_engine gsi_service:service_manager find;
7 binder_call(update_engine, gsid)
10 set_prop(update_engine, ctl_gsid_prop)
13 set_prop(update_engine, ctl_snapuserd_prop)
16 set_prop(update_engine, ota_prop)
19 get_prop(update_engine, gsid_prop)
21 # Allow update_engine to call the callback function provided by GKI update hook.
22 binder_call(update_engine, gki_apex_prepostinstall)
[all …]
/system/sepolicy/prebuilts/api/33.0/private/
Dupdate_engine.te1 typeattribute update_engine coredomain;
3 init_daemon_domain(update_engine);
6 allow update_engine gsi_service:service_manager find;
7 binder_call(update_engine, gsid)
10 set_prop(update_engine, ctl_gsid_prop)
13 set_prop(update_engine, ctl_snapuserd_prop)
16 set_prop(update_engine, ota_prop)
19 get_prop(update_engine, gsid_prop)
21 # Allow update_engine to call the callback function provided by GKI update hook.
22 binder_call(update_engine, gki_apex_prepostinstall)
[all …]
/system/sepolicy/prebuilts/api/32.0/private/
Dupdate_engine.te1 typeattribute update_engine coredomain;
3 init_daemon_domain(update_engine);
6 allow update_engine gsi_service:service_manager find;
7 binder_call(update_engine, gsid)
10 set_prop(update_engine, ctl_gsid_prop)
13 set_prop(update_engine, ctl_snapuserd_prop)
16 set_prop(update_engine, ota_prop)
19 get_prop(update_engine, gsid_prop)
21 # Allow update_engine to call the callback function provided by GKI update hook.
22 binder_call(update_engine, gki_apex_prepostinstall)
[all …]
/system/sepolicy/prebuilts/api/31.0/private/
Dupdate_engine.te1 typeattribute update_engine coredomain;
3 init_daemon_domain(update_engine);
6 allow update_engine gsi_service:service_manager find;
7 binder_call(update_engine, gsid)
10 set_prop(update_engine, ctl_gsid_prop)
13 set_prop(update_engine, ctl_snapuserd_prop)
16 set_prop(update_engine, ota_prop)
19 get_prop(update_engine, gsid_prop)
21 # Allow update_engine to call the callback function provided by GKI update hook.
22 binder_call(update_engine, gki_apex_prepostinstall)
[all …]
/system/update_engine/
Dupdate_status_utils.cc24 using update_engine::UpdateEngineStatus;
25 using update_engine::UpdateStatus;
42 namespace update_engine { namespace
68 return update_engine::kUpdateStatusIdle; in UpdateStatusToString()
70 return update_engine::kUpdateStatusCheckingForUpdate; in UpdateStatusToString()
72 return update_engine::kUpdateStatusUpdateAvailable; in UpdateStatusToString()
74 return update_engine::kUpdateStatusNeedPermissionToUpdate; in UpdateStatusToString()
76 return update_engine::kUpdateStatusDownloading; in UpdateStatusToString()
78 return update_engine::kUpdateStatusVerifying; in UpdateStatusToString()
80 return update_engine::kUpdateStatusFinalizing; in UpdateStatusToString()
[all …]
Dupdate_engine.rc1 service update_engine /system/bin/update_engine --logtostderr --logtofile --foreground
9 enable update_engine
Dupdate_status_utils.h26 const char* UpdateStatusToString(const update_engine::UpdateStatus& status);
29 const update_engine::UpdateEngineStatus& status);
D.gitignore7 /update_engine.dbusclient.h
8 /update_engine.dbusserver.h
Dupdate_status_utils_unittest.cc30 update_engine::UpdateEngineStatus update_engine_status = { in TEST()
32 .status = update_engine::UpdateStatus::CHECKING_FOR_UPDATE, in TEST()
/system/sepolicy/prebuilts/api/30.0/private/
Dupdate_engine.te1 typeattribute update_engine coredomain;
3 init_daemon_domain(update_engine);
6 allow update_engine gsi_service:service_manager find;
7 binder_call(update_engine, gsid)
/system/update_engine/client-headers/
DBUILD.gn23 # update_engine client library generated headers. Used by other daemons and
24 # by the update_engine_client console program to interact with update_engine.
28 mock_output_file = "include/update_engine/dbus-proxy-mocks.h"
29 proxy_output_file = "include/update_engine/dbus-proxies.h"
30 proxy_path_in_mocks = "update_engine/dbus-proxies.h"
/system/sepolicy/prebuilts/api/29.0/private/
Dupdate_engine.te1 typeattribute update_engine coredomain;
3 init_daemon_domain(update_engine);

1234567