/system/sepolicy/prebuilts/api/31.0/public/ |
D | update_engine.te | 1 # Domain for update_engine daemon. 2 type update_engine, domain, update_engine_common; 5 net_domain(update_engine); 7 # Following permissions are needed for update_engine. 8 allow update_engine self:process { setsched }; 9 allow update_engine self:global_capability_class_set { fowner sys_admin }; 14 dontaudit update_engine self:global_capability_class_set fsetid; 16 allow update_engine kmsg_device:chr_file { getattr w_file_perms }; 17 allow update_engine update_engine_exec:file rx_file_perms; 18 wakelock_use(update_engine); [all …]
|
D | apexd.te | 8 neverallow { domain -init -apexd -system_server -update_engine } apex_service:service_manager find; 9 neverallow { domain -init -apexd -system_server -servicemanager -update_engine } apexd:binder call;
|
/system/sepolicy/prebuilts/api/34.0/public/ |
D | update_engine.te | 1 # Domain for update_engine daemon. 2 type update_engine, domain, update_engine_common; 5 net_domain(update_engine); 7 # Following permissions are needed for update_engine. 8 allow update_engine self:process { setsched }; 9 allow update_engine self:global_capability_class_set { fowner sys_admin }; 14 dontaudit update_engine self:global_capability_class_set fsetid; 16 allow update_engine kmsg_device:chr_file { getattr w_file_perms }; 17 allow update_engine update_engine_exec:file rx_file_perms; 18 wakelock_use(update_engine); [all …]
|
D | apexd.te | 8 neverallow { domain -init -apexd -system_server -update_engine } apex_service:service_manager find; 9 neverallow { domain -init -apexd -system_server -servicemanager -update_engine } apexd:binder call;
|
/system/sepolicy/prebuilts/api/33.0/public/ |
D | update_engine.te | 1 # Domain for update_engine daemon. 2 type update_engine, domain, update_engine_common; 5 net_domain(update_engine); 7 # Following permissions are needed for update_engine. 8 allow update_engine self:process { setsched }; 9 allow update_engine self:global_capability_class_set { fowner sys_admin }; 14 dontaudit update_engine self:global_capability_class_set fsetid; 16 allow update_engine kmsg_device:chr_file { getattr w_file_perms }; 17 allow update_engine update_engine_exec:file rx_file_perms; 18 wakelock_use(update_engine); [all …]
|
D | apexd.te | 8 neverallow { domain -init -apexd -system_server -update_engine } apex_service:service_manager find; 9 neverallow { domain -init -apexd -system_server -servicemanager -update_engine } apexd:binder call;
|
/system/sepolicy/public/ |
D | update_engine.te | 1 # Domain for update_engine daemon. 2 type update_engine, domain, update_engine_common; 5 net_domain(update_engine); 7 # Following permissions are needed for update_engine. 8 allow update_engine self:process { setsched }; 9 allow update_engine self:global_capability_class_set { fowner sys_admin }; 14 dontaudit update_engine self:global_capability_class_set fsetid; 16 allow update_engine kmsg_device:chr_file { getattr w_file_perms }; 17 allow update_engine update_engine_exec:file rx_file_perms; 18 wakelock_use(update_engine); [all …]
|
D | apexd.te | 8 neverallow { domain -init -apexd -system_server -update_engine } apex_service:service_manager find; 9 neverallow { domain -init -apexd -system_server -servicemanager -update_engine } apexd:binder call;
|
/system/sepolicy/prebuilts/api/32.0/public/ |
D | update_engine.te | 1 # Domain for update_engine daemon. 2 type update_engine, domain, update_engine_common; 5 net_domain(update_engine); 7 # Following permissions are needed for update_engine. 8 allow update_engine self:process { setsched }; 9 allow update_engine self:global_capability_class_set { fowner sys_admin }; 14 dontaudit update_engine self:global_capability_class_set fsetid; 16 allow update_engine kmsg_device:chr_file { getattr w_file_perms }; 17 allow update_engine update_engine_exec:file rx_file_perms; 18 wakelock_use(update_engine); [all …]
|
D | apexd.te | 8 neverallow { domain -init -apexd -system_server -update_engine } apex_service:service_manager find; 9 neverallow { domain -init -apexd -system_server -servicemanager -update_engine } apexd:binder call;
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | update_engine.te | 1 # Domain for update_engine daemon. 2 type update_engine, domain, update_engine_common; 5 net_domain(update_engine); 7 # Following permissions are needed for update_engine. 8 allow update_engine self:process { setsched }; 9 allow update_engine self:global_capability_class_set { fowner sys_admin }; 14 dontaudit update_engine self:global_capability_class_set fsetid; 16 allow update_engine kmsg_device:chr_file { getattr w_file_perms }; 17 allow update_engine update_engine_exec:file rx_file_perms; 18 wakelock_use(update_engine); [all …]
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | update_engine.te | 1 # Domain for update_engine daemon. 2 type update_engine, domain, update_engine_common; 5 net_domain(update_engine); 7 # Following permissions are needed for update_engine. 8 allow update_engine self:process { setsched }; 9 allow update_engine self:global_capability_class_set { fowner sys_admin }; 14 dontaudit update_engine self:global_capability_class_set fsetid; 16 allow update_engine kmsg_device:chr_file { getattr w_file_perms }; 17 allow update_engine update_engine_exec:file rx_file_perms; 18 wakelock_use(update_engine); [all …]
|
/system/sepolicy/private/ |
D | update_engine.te | 1 typeattribute update_engine coredomain; 3 init_daemon_domain(update_engine); 6 allow update_engine gsi_service:service_manager find; 7 binder_call(update_engine, gsid) 10 set_prop(update_engine, ctl_gsid_prop) 13 set_prop(update_engine, ctl_snapuserd_prop) 16 set_prop(update_engine, ota_prop) 19 get_prop(update_engine, gsid_prop) 21 # Allow update_engine to call the callback function provided by GKI update hook. 22 binder_call(update_engine, gki_apex_prepostinstall) [all …]
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | update_engine.te | 1 typeattribute update_engine coredomain; 3 init_daemon_domain(update_engine); 6 allow update_engine gsi_service:service_manager find; 7 binder_call(update_engine, gsid) 10 set_prop(update_engine, ctl_gsid_prop) 13 set_prop(update_engine, ctl_snapuserd_prop) 16 set_prop(update_engine, ota_prop) 19 get_prop(update_engine, gsid_prop) 21 # Allow update_engine to call the callback function provided by GKI update hook. 22 binder_call(update_engine, gki_apex_prepostinstall) [all …]
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | update_engine.te | 1 typeattribute update_engine coredomain; 3 init_daemon_domain(update_engine); 6 allow update_engine gsi_service:service_manager find; 7 binder_call(update_engine, gsid) 10 set_prop(update_engine, ctl_gsid_prop) 13 set_prop(update_engine, ctl_snapuserd_prop) 16 set_prop(update_engine, ota_prop) 19 get_prop(update_engine, gsid_prop) 21 # Allow update_engine to call the callback function provided by GKI update hook. 22 binder_call(update_engine, gki_apex_prepostinstall) [all …]
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | update_engine.te | 1 typeattribute update_engine coredomain; 3 init_daemon_domain(update_engine); 6 allow update_engine gsi_service:service_manager find; 7 binder_call(update_engine, gsid) 10 set_prop(update_engine, ctl_gsid_prop) 13 set_prop(update_engine, ctl_snapuserd_prop) 16 set_prop(update_engine, ota_prop) 19 get_prop(update_engine, gsid_prop) 21 # Allow update_engine to call the callback function provided by GKI update hook. 22 binder_call(update_engine, gki_apex_prepostinstall) [all …]
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | update_engine.te | 1 typeattribute update_engine coredomain; 3 init_daemon_domain(update_engine); 6 allow update_engine gsi_service:service_manager find; 7 binder_call(update_engine, gsid) 10 set_prop(update_engine, ctl_gsid_prop) 13 set_prop(update_engine, ctl_snapuserd_prop) 16 set_prop(update_engine, ota_prop) 19 get_prop(update_engine, gsid_prop) 21 # Allow update_engine to call the callback function provided by GKI update hook. 22 binder_call(update_engine, gki_apex_prepostinstall) [all …]
|
/system/update_engine/ |
D | update_status_utils.cc | 24 using update_engine::UpdateEngineStatus; 25 using update_engine::UpdateStatus; 42 namespace update_engine { namespace 68 return update_engine::kUpdateStatusIdle; in UpdateStatusToString() 70 return update_engine::kUpdateStatusCheckingForUpdate; in UpdateStatusToString() 72 return update_engine::kUpdateStatusUpdateAvailable; in UpdateStatusToString() 74 return update_engine::kUpdateStatusNeedPermissionToUpdate; in UpdateStatusToString() 76 return update_engine::kUpdateStatusDownloading; in UpdateStatusToString() 78 return update_engine::kUpdateStatusVerifying; in UpdateStatusToString() 80 return update_engine::kUpdateStatusFinalizing; in UpdateStatusToString() [all …]
|
D | update_engine.rc | 1 service update_engine /system/bin/update_engine --logtostderr --logtofile --foreground 9 enable update_engine
|
D | update_status_utils.h | 26 const char* UpdateStatusToString(const update_engine::UpdateStatus& status); 29 const update_engine::UpdateEngineStatus& status);
|
D | .gitignore | 7 /update_engine.dbusclient.h 8 /update_engine.dbusserver.h
|
D | update_status_utils_unittest.cc | 30 update_engine::UpdateEngineStatus update_engine_status = { in TEST() 32 .status = update_engine::UpdateStatus::CHECKING_FOR_UPDATE, in TEST()
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | update_engine.te | 1 typeattribute update_engine coredomain; 3 init_daemon_domain(update_engine); 6 allow update_engine gsi_service:service_manager find; 7 binder_call(update_engine, gsid)
|
/system/update_engine/client-headers/ |
D | BUILD.gn | 23 # update_engine client library generated headers. Used by other daemons and 24 # by the update_engine_client console program to interact with update_engine. 28 mock_output_file = "include/update_engine/dbus-proxy-mocks.h" 29 proxy_output_file = "include/update_engine/dbus-proxies.h" 30 proxy_path_in_mocks = "update_engine/dbus-proxies.h"
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | update_engine.te | 1 typeattribute update_engine coredomain; 3 init_daemon_domain(update_engine);
|