/system/hwservicemanager/ |
D | AccessControl.cpp | 100 bool allowed = false; in checkPermission() local 107 allowed = (selinux_check_access(source.sid.c_str(), targetContext, "hwservice_manager", in checkPermission() 110 return allowed; in checkPermission() 115 bool allowed = false; in checkPermission() local 123 allowed = checkPermission(source, targetContext, perm, interface); in checkPermission() 127 return allowed; in checkPermission()
|
/system/apex/apexd/ |
D | apex_shim.cpp | 168 auto allowed = GetAllowedHashes(system_apex_path); in ValidateUpdate() local 169 if (!allowed.ok()) { in ValidateUpdate() 170 return allowed.error(); in ValidateUpdate() 176 auto it = std::find(allowed->begin(), allowed->end(), *actual); in ValidateUpdate() 177 if (it == allowed->end()) { in ValidateUpdate()
|
/system/update_engine/client_library/include/update_engine/ |
D | client.h | 75 virtual bool SetUpdateOverCellularPermission(bool allowed) = 0; 76 virtual bool GetUpdateOverCellularPermission(bool* allowed) const = 0;
|
/system/update_engine/client_library/ |
D | client_dbus.cc | 116 bool DBusUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument 117 return proxy_->SetUpdateOverCellularPermission(allowed, nullptr); in SetUpdateOverCellularPermission() 121 bool* allowed) const { in GetUpdateOverCellularPermission() 122 return proxy_->GetUpdateOverCellularPermission(allowed, nullptr); in GetUpdateOverCellularPermission()
|
D | client_dbus.h | 55 bool SetUpdateOverCellularPermission(bool allowed) override; 56 bool GetUpdateOverCellularPermission(bool* allowed) const override;
|
/system/chre/core/ |
D | timer_pool.cc | 161 bool allowed; in isNewTimerAllowedLocked() local 163 allowed = (mNumNanoappTimers < kMaxNanoappTimers); in isNewTimerAllowedLocked() 170 allowed = (numSystemTimers < kMaxSystemTimers); in isNewTimerAllowedLocked() 173 return allowed; in isNewTimerAllowedLocked()
|
/system/update_engine/ |
D | update_engine_client.cc | 321 bool allowed = FLAGS_update_over_cellular == "yes"; in ProcessFlags() local 322 if (!allowed && FLAGS_update_over_cellular != "no") { in ProcessFlags() 326 if (!client_->SetUpdateOverCellularPermission(allowed)) { in ProcessFlags() 335 bool allowed; in ProcessFlags() local 337 if (!client_->GetUpdateOverCellularPermission(&allowed)) { in ProcessFlags() 343 << (allowed ? "ENABLED" : "DISABLED"); in ProcessFlags()
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
D | llkd.te | 35 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and
|
/system/sepolicy/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
D | llkd.te | 35 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
D | llkd.te | 35 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | recovery_refresh.te | 5 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 5 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
/system/tools/sysprop/ |
D | Common.cpp | 96 std::unordered_set<char> allowed{'_', '-', '.'}; in IsCorrectPropertyName() local 98 allowed.emplace('$'); in IsCorrectPropertyName() 100 return IsCorrectName(name, allowed); in IsCorrectPropertyName() 104 static std::unordered_set<char> allowed{'_', '-'}; in IsCorrectApiName() local 105 return IsCorrectName(name, allowed); in IsCorrectApiName()
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | lmkd.te | 38 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and
|
/system/sepolicy/public/ |
D | adbd.te | 6 # Only init is allowed to enter the adbd domain via exec()
|