Searched refs:whitelist (Results 1 – 12 of 12) sorted by relevance
15 file called `hash.txt` with a whitelist of SHA512 hashes of versions shim
965 bool whitelist = false; in prune() local983 if (!whitelist && busy) kickMe(oldest, id, pruneRows); in prune()989 whitelist = true; in prune()999 if (whitelist && (pruneRows > 0)) { in prune()
70 references, where '~' prefix means to blacklist otherwise whitelist. For
19 # userdebug only until we nail down the blacklist/whitelist.
198 # Restrict all domains to a whitelist for common socket types. Additional200 # defaults for all processes. Note that granting this whitelist to domain does205 # default whitelist for unix sockets.210 # Note that granting this whitelist to domain does226 # All socket ioctls must be restricted to a whitelist.725 # except for the ones whitelist here.
198 # Restrict all domains to a whitelist for common socket types. Additional200 # defaults for all processes. Note that granting this whitelist to domain does205 # default whitelist for unix sockets.210 # Note that granting this whitelist to domain does229 # All socket ioctls must be restricted to a whitelist.721 # except for the ones whitelist here.
263 # Restrict all domains to a whitelist for common socket types. Additional265 # defaults for all processes. Note that granting this whitelist to domain does270 # default whitelist for unix sockets.275 # Note that granting this whitelist to domain does291 # this whitelist to domain does not grant the ioctl permission to334 # sockets must be restricted to a whitelist.954 # except for the ones whitelist here.
260 # Restrict all domains to a whitelist for common socket types. Additional262 # defaults for all processes. Note that granting this whitelist to domain does267 # default whitelist for unix sockets.272 # Note that granting this whitelist to domain does291 # All socket ioctls must be restricted to a whitelist.1000 # except for the ones whitelist here.
48 extension-pkg-whitelist=