Home
last modified time | relevance | path

Searched refs:whitelist (Results 1 – 12 of 12) sorted by relevance

/system/apex/shim/
DREADME.md15 file called `hash.txt` with a whitelist of SHA512 hashes of versions shim
/system/core/logd/
DLogBuffer.cpp965 bool whitelist = false; in prune() local
983 if (!whitelist && busy) kickMe(oldest, id, pruneRows); in prune()
989 whitelist = true; in prune()
999 if (whitelist && (pruneRows > 0)) { in prune()
DREADME.property70 references, where '~' prefix means to blacklist otherwise whitelist. For
/system/sepolicy/prebuilts/api/28.0/private/
Dtraced_probes.te19 # userdebug only until we nail down the blacklist/whitelist.
/system/sepolicy/prebuilts/api/29.0/private/
Dtraced_probes.te19 # userdebug only until we nail down the blacklist/whitelist.
/system/sepolicy/private/
Dtraced_probes.te19 # userdebug only until we nail down the blacklist/whitelist.
/system/sepolicy/prebuilts/api/26.0/public/
Ddomain.te198 # Restrict all domains to a whitelist for common socket types. Additional
200 # defaults for all processes. Note that granting this whitelist to domain does
205 # default whitelist for unix sockets.
210 # Note that granting this whitelist to domain does
226 # All socket ioctls must be restricted to a whitelist.
725 # except for the ones whitelist here.
/system/sepolicy/prebuilts/api/27.0/public/
Ddomain.te198 # Restrict all domains to a whitelist for common socket types. Additional
200 # defaults for all processes. Note that granting this whitelist to domain does
205 # default whitelist for unix sockets.
210 # Note that granting this whitelist to domain does
229 # All socket ioctls must be restricted to a whitelist.
721 # except for the ones whitelist here.
/system/sepolicy/public/
Ddomain.te263 # Restrict all domains to a whitelist for common socket types. Additional
265 # defaults for all processes. Note that granting this whitelist to domain does
270 # default whitelist for unix sockets.
275 # Note that granting this whitelist to domain does
291 # this whitelist to domain does not grant the ioctl permission to
334 # sockets must be restricted to a whitelist.
954 # except for the ones whitelist here.
/system/sepolicy/prebuilts/api/29.0/public/
Ddomain.te263 # Restrict all domains to a whitelist for common socket types. Additional
265 # defaults for all processes. Note that granting this whitelist to domain does
270 # default whitelist for unix sockets.
275 # Note that granting this whitelist to domain does
291 # this whitelist to domain does not grant the ioctl permission to
334 # sockets must be restricted to a whitelist.
954 # except for the ones whitelist here.
/system/sepolicy/prebuilts/api/28.0/public/
Ddomain.te260 # Restrict all domains to a whitelist for common socket types. Additional
262 # defaults for all processes. Note that granting this whitelist to domain does
267 # default whitelist for unix sockets.
272 # Note that granting this whitelist to domain does
291 # All socket ioctls must be restricted to a whitelist.
1000 # except for the ones whitelist here.
/system/update_engine/
Dpylintrc48 extension-pkg-whitelist=