Home
last modified time | relevance | path

Searched refs:all (Results 1 – 25 of 479) sorted by relevance

12345678910>>...20

/system/extras/simpleperf/
DAndroid.mk21 $(filter-out scripts/update.py,$(call all-named-files-under,*.py,scripts)) \
25 $(call all-named-files-under,*,scripts/script_testdata) \
26 $(call all-named-files-under,*.js,scripts) \
27 $(call all-named-files-under,*.css,scripts) \
28 $(call all-named-files-under,*,doc) \
29 $(call all-named-files-under,app-profiling.apk,demo) \
30 $(call all-named-files-under,*.so,demo) \
31 $(call all-cpp-files-under,demo) \
32 $(call all-java-files-under,demo) \
33 $(call all-named-files-under,*.kt,demo) \
/system/chre/build/
Dcommon.mk21 .PHONY: all
22 all:
28 MAKECMDGOALS = all
/system/chre/external/
Dexternal.mk22 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLETEST_PATH)/src/gtest-all.cc
27 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLEMOCK_PATH)/src/gmock-all.cc
/system/sepolicy/prebuilts/api/28.0/private/
Dseapp_contexts50 # levelFrom (string; one of none, all, app, or user)
55 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
62 # regular expressions exists on all input and output selectors. Neverallow
63 # rules are never output to the built seapp_contexts file. Like all keywords,
64 # neverallows are case-insensitive. A neverallow is asserted when all key value
102 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
106 user=secure_element seinfo=platform domain=secure_element levelFrom=all
111 user=_isolated domain=isolated_app levelFrom=all
114 user=_app isV2App=true isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all
116 user=_app minTargetSdkVersion=28 domain=untrusted_app type=app_data_file levelFrom=all
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/sepolicy/prebuilts/api/29.0/private/
Dseapp_contexts76 # levelFrom (string; one of none, all, app, or user)
88 # levelFrom=all determines the level from both UID and user ID.
91 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
102 # regular expressions exists on all input and output selectors. Neverallow
103 # rules are never output to the built seapp_contexts file. Like all keywords,
104 # neverallows are case-insensitive. A neverallow is asserted when all key value
143 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
146 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file
148 user=secure_element seinfo=platform domain=secure_element levelFrom=all
157 user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all
[all …]
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/sepolicy/private/
Dseapp_contexts76 # levelFrom (string; one of none, all, app, or user)
88 # levelFrom=all determines the level from both UID and user ID.
91 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
102 # regular expressions exists on all input and output selectors. Neverallow
103 # rules are never output to the built seapp_contexts file. Like all keywords,
104 # neverallows are case-insensitive. A neverallow is asserted when all key value
143 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
146 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file
148 user=secure_element seinfo=platform domain=secure_element levelFrom=all
157 user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all
[all …]
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/update_engine/scripts/
Dpaycheck.py174 if all(args.dst_part_paths) or all(args.out_dst_part_paths):
175 if all(args.src_part_paths):
252 if all(args.dst_part_paths) or all(args.out_dst_part_paths):
263 if all(args.out_dst_part_paths):
278 if all(args.dst_part_paths):
/system/bt/
DBUILD.gn18 # file, and recursively load all dependencies until all dependencies are either
23 # This pulls in main/BUILD.gn and all of its dependencies.
/system/core/libnativeloader/test/
DAndroid.mk43 LOCAL_SRC_FILES := $(call all-java-files-under, src)
53 LOCAL_SRC_FILES := $(call all-java-files-under, src)
/system/core/fs_mgr/
Dfs_mgr_remount.cpp198 android::fs_mgr::Fstab all; in main() local
204 all.emplace_back(entry); in main()
235 it = std::find_if(all.begin(), all.end(), find_part); in main()
236 if (it == all.end()) { in main()
247 partitions = all; in main()
/system/core/libmemunreachable/
DREADME.md6 …detector. It uses an imprecise mark-and-sweep garbage collector pass over all native memory, repo…
63 …6. *Original process*: Allocations are re-enabled using `malloc_enable()`, but all threads are sti…
64 …ormal `fork()`. The sweeper process has a copy of all memory from the original process, including…
65 8. Collection process releases all threads from `ptrace` and exits
67 …10. *Sweeper process*: A list of all active allocations is produced by examining the memory mappin…
68 …11. A list of all roots is produced from globals (.data and .bss sections of binaries), and regist…
90 - `malloc enable()`: re-enable allocations in all threads.
/system/sepolicy/prebuilts/api/26.0/private/
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
10 ### directory). The untrusted_app_all attribute is assigned to all default
14 ### attribute is assigned to all non-system apps as well as to any system apps
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
62 # allow cts to query all services
81 # in /data/misc/perfprofd/. GMS core will need to list all
/system/sepolicy/prebuilts/api/27.0/private/
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
10 ### directory). The untrusted_app_all attribute is assigned to all default
14 ### attribute is assigned to all non-system apps as well as to any system apps
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
65 # allow cts to query all services
83 # in /data/misc/perfprofd/. GMS core will need to list all
/system/extras/
DAndroid.mk17 include $(all-subdir-makefiles)
/system/bt/tools/
DAndroid.mk.disabled1 include $(call all-subdir-makefiles)
/system/extras/tests/
DAndroid.mk1 include $(call all-subdir-makefiles)
/system/libhidl/transport/memory/1.0/
DIMemory.hal22 * Notify that you are about to use all of this memory.
37 * Notify that you are about to start reading all of this memory.
52 * Must commit all previous update's and updateAll's.
/system/hardware/interfaces/net/netd/testutils/
DAndroid.bp16 // Utility code common for all HAL versions.
34 // Common build settings for all HAL versions.
/system/timezone/
DAndroid.mk18 include $(call all-makefiles-under,$(LOCAL_PATH))
/system/sepolicy/tools/
DAndroid.mk3 include $(call all-makefiles-under,$(LOCAL_PATH))

12345678910>>...20