Searched refs:allowed (Results 1 - 2 of 2) sorted by relevance
/system/core/debuggerd/ |
H A D | debuggerd.cpp | 154 bool allowed = false; local 176 allowed = (selinux_check_access(scon, tcon, tclass, perm, NULL) == 0); 181 return allowed; 239 // However, system is only allowed to collect backtraces but cannot dump tombstones. 250 // No one else is allowed to dump arbitrary processes. 365 ALOGE("debuggerd: Not allowed to redirect action %d to 32 bit debuggerd\n",
|
/system/security/keystore/ |
H A D | keystore.cpp | 277 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm, local 280 return allowed; 318 * Returns true if the callingUid is allowed to interact in the targetUid's 1193 // The HAL allowed the import, reget the key to have the "fresh" 2784 * uids are allowed to act on their own (ie: clearing all entries for a 2858 * allowed. Any parameter that keystore adds itself should be disallowed here.
|
Completed in 73 milliseconds