Home
last modified time | relevance | path

Searched refs:Vendor (Results 1 – 23 of 23) sorted by relevance

/system/bt/doc/
Ddirectory_layout.md29 * vnd - *Vendor* - Vendor specific APIs - *to be integrated into rest of stack ?*.
/system/sepolicy/prebuilts/api/28.0/public/
Dvendor_init.te7 # Vendor init shouldn't communicate with any vendor process, nor most system processes.
149 # Vendor init can read properties
152 # Vendor init can perform operations on trusted and security Extended Attributes
Dperfprofd.te75 # Vendor libraries.
77 # Vendor apps.
Ddomain.te220 # /data has the label system_data_file. Vendor components need the search
647 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
727 # Vendor domains are not permitted to initiate communications to core domain sockets
746 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets
756 # Vendor domains are not permitted to initiate create/open sockets owned by core domains
805 # Vendor domains may directly access file in /data/vendor by path, but may only
/system/sepolicy/prebuilts/api/29.0/public/
Dvendor_init.te174 # Vendor init can read properties
177 # Vendor init can perform operations on trusted and security Extended Attributes
187 # Everything is labeled as rootfs in recovery mode. Vendor init has to execute
256 # Vendor init shouldn't communicate with any vendor process, nor most system processes.
Dperfprofd.te75 # Vendor libraries.
77 # Vendor apps.
Ddomain.te224 # /data has the label system_data_file. Vendor components need the search
653 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
733 # Vendor domains are not permitted to initiate communications to core domain sockets
752 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets
762 # Vendor domains are not permitted to initiate create/open sockets owned by core domains
812 # Vendor domains may directly access file in /data/vendor by path, but may only
1382 # Vendor domian must not have access to /mnt/product.
Dfile.te167 # Vendor cgroups description file under /vendor/etc/cgroups.json
171 # Vendor task profiles file under /vendor/etc/task_profiles.json
/system/sepolicy/public/
Dvendor_init.te174 # Vendor init can read properties
177 # Vendor init can perform operations on trusted and security Extended Attributes
187 # Everything is labeled as rootfs in recovery mode. Vendor init has to execute
256 # Vendor init shouldn't communicate with any vendor process, nor most system processes.
Dperfprofd.te75 # Vendor libraries.
77 # Vendor apps.
Ddomain.te224 # /data has the label system_data_file. Vendor components need the search
653 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
733 # Vendor domains are not permitted to initiate communications to core domain sockets
752 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets
762 # Vendor domains are not permitted to initiate create/open sockets owned by core domains
812 # Vendor domains may directly access file in /data/vendor by path, but may only
1382 # Vendor domian must not have access to /mnt/product.
Dfile.te167 # Vendor cgroups description file under /vendor/etc/cgroups.json
171 # Vendor task profiles file under /vendor/etc/task_profiles.json
/system/tools/sysprop/
Dsysprop.proto29 Vendor = 1; enumerator
DCommon.cpp58 case sysprop::Vendor: in GenerateDefaultPropName()
151 case sysprop::Vendor: in ValidateProp()
/system/sepolicy/prebuilts/api/26.0/public/
Ddomain.te161 # /data has the label system_data_file. Vendor components need the search
528 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
602 # Vendor domains are not permitted to initiate communications to core domain sockets
620 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets
628 # Vendor domains are not permitted to initiate create/open sockets owned by core domains
/system/sepolicy/prebuilts/api/27.0/public/
Ddomain.te161 # /data has the label system_data_file. Vendor components need the search
531 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
603 # Vendor domains are not permitted to initiate communications to core domain sockets
620 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets
628 # Vendor domains are not permitted to initiate create/open sockets owned by core domains
/system/chre/
DREADME.md206 * Vendor-specific nanoapps could be specified in the variant
/system/tools/hidl/build/
Dhidl_interface.go308 Vendor *bool member
/system/sepolicy/private/
Dfile_contexts332 # Vendor files
413 # Vendor files from /(product|system/product)/vendor_overlay
/system/sepolicy/prebuilts/api/29.0/private/
Dfile_contexts332 # Vendor files
413 # Vendor files from /(product|system/product)/vendor_overlay
/system/sepolicy/prebuilts/api/27.0/private/
Dfile_contexts278 # Vendor files
/system/sepolicy/prebuilts/api/26.0/private/
Dfile_contexts271 # Vendor files
/system/sepolicy/prebuilts/api/28.0/private/
Dfile_contexts298 # Vendor files