Searched refs:all (Results 1 – 25 of 479) sorted by relevance
12345678910>>...20
/system/extras/simpleperf/ |
D | Android.mk | 21 $(filter-out scripts/update.py,$(call all-named-files-under,*.py,scripts)) \ 25 $(call all-named-files-under,*,scripts/script_testdata) \ 26 $(call all-named-files-under,*.js,scripts) \ 27 $(call all-named-files-under,*.css,scripts) \ 28 $(call all-named-files-under,*,doc) \ 29 $(call all-named-files-under,app-profiling.apk,demo) \ 30 $(call all-named-files-under,*.so,demo) \ 31 $(call all-cpp-files-under,demo) \ 32 $(call all-java-files-under,demo) \ 33 $(call all-named-files-under,*.kt,demo) \
|
/system/chre/build/ |
D | common.mk | 21 .PHONY: all 22 all: 28 MAKECMDGOALS = all
|
/system/chre/external/ |
D | external.mk | 22 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLETEST_PATH)/src/gtest-all.cc 27 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLEMOCK_PATH)/src/gmock-all.cc
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | seapp_contexts | 50 # levelFrom (string; one of none, all, app, or user) 55 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 62 # regular expressions exists on all input and output selectors. Neverallow 63 # rules are never output to the built seapp_contexts file. Like all keywords, 64 # neverallows are case-insensitive. A neverallow is asserted when all key value 102 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 106 user=secure_element seinfo=platform domain=secure_element levelFrom=all 111 user=_isolated domain=isolated_app levelFrom=all 114 user=_app isV2App=true isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all 116 user=_app minTargetSdkVersion=28 domain=untrusted_app type=app_data_file levelFrom=all
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=all determines the level from both UID and user ID. 91 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 102 # regular expressions exists on all input and output selectors. Neverallow 103 # rules are never output to the built seapp_contexts file. Like all keywords, 104 # neverallows are case-insensitive. A neverallow is asserted when all key value 143 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 146 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file 148 user=secure_element seinfo=platform domain=secure_element levelFrom=all 157 user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/sepolicy/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=all determines the level from both UID and user ID. 91 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 102 # regular expressions exists on all input and output selectors. Neverallow 103 # rules are never output to the built seapp_contexts file. Like all keywords, 104 # neverallows are case-insensitive. A neverallow is asserted when all key value 143 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 146 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file 148 user=secure_element seinfo=platform domain=secure_element levelFrom=all 157 user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/update_engine/scripts/ |
D | paycheck.py | 174 if all(args.dst_part_paths) or all(args.out_dst_part_paths): 175 if all(args.src_part_paths): 252 if all(args.dst_part_paths) or all(args.out_dst_part_paths): 263 if all(args.out_dst_part_paths): 278 if all(args.dst_part_paths):
|
/system/bt/ |
D | BUILD.gn | 18 # file, and recursively load all dependencies until all dependencies are either 23 # This pulls in main/BUILD.gn and all of its dependencies.
|
/system/core/libnativeloader/test/ |
D | Android.mk | 43 LOCAL_SRC_FILES := $(call all-java-files-under, src) 53 LOCAL_SRC_FILES := $(call all-java-files-under, src)
|
/system/core/fs_mgr/ |
D | fs_mgr_remount.cpp | 198 android::fs_mgr::Fstab all; in main() local 204 all.emplace_back(entry); in main() 235 it = std::find_if(all.begin(), all.end(), find_part); in main() 236 if (it == all.end()) { in main() 247 partitions = all; in main()
|
/system/core/libmemunreachable/ |
D | README.md | 6 …detector. It uses an imprecise mark-and-sweep garbage collector pass over all native memory, repo… 63 …6. *Original process*: Allocations are re-enabled using `malloc_enable()`, but all threads are sti… 64 …ormal `fork()`. The sweeper process has a copy of all memory from the original process, including… 65 8. Collection process releases all threads from `ptrace` and exits 67 …10. *Sweeper process*: A list of all active allocations is produced by examining the memory mappin… 68 …11. A list of all roots is produced from globals (.data and .bss sections of binaries), and regist… 90 - `malloc enable()`: re-enable allocations in all threads.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 10 ### directory). The untrusted_app_all attribute is assigned to all default 14 ### attribute is assigned to all non-system apps as well as to any system apps 21 ### Note that rules that should apply to all untrusted apps must be in app.te or also 62 # allow cts to query all services 81 # in /data/misc/perfprofd/. GMS core will need to list all
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 10 ### directory). The untrusted_app_all attribute is assigned to all default 14 ### attribute is assigned to all non-system apps as well as to any system apps 21 ### Note that rules that should apply to all untrusted apps must be in app.te or also 65 # allow cts to query all services 83 # in /data/misc/perfprofd/. GMS core will need to list all
|
/system/extras/ |
D | Android.mk | 17 include $(all-subdir-makefiles)
|
/system/bt/tools/ |
D | Android.mk.disabled | 1 include $(call all-subdir-makefiles)
|
/system/extras/tests/ |
D | Android.mk | 1 include $(call all-subdir-makefiles)
|
/system/libhidl/transport/memory/1.0/ |
D | IMemory.hal | 22 * Notify that you are about to use all of this memory. 37 * Notify that you are about to start reading all of this memory. 52 * Must commit all previous update's and updateAll's.
|
/system/hardware/interfaces/net/netd/testutils/ |
D | Android.bp | 16 // Utility code common for all HAL versions. 34 // Common build settings for all HAL versions.
|
/system/timezone/ |
D | Android.mk | 18 include $(call all-makefiles-under,$(LOCAL_PATH))
|
/system/sepolicy/tools/ |
D | Android.mk | 3 include $(call all-makefiles-under,$(LOCAL_PATH))
|
12345678910>>...20