Searched refs:when (Results 1 – 25 of 511) sorted by relevance
12345678910>>...21
/system/sepolicy/prebuilts/api/28.0/public/ |
D | gatekeeperd.te | 8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process. 9 ### These rules should eventually be granted only when needed. 16 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process. 17 ### These rules should eventually be granted only when needed.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | gatekeeperd.te | 8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process. 9 ### These rules should eventually be granted only when needed. 16 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process. 17 ### These rules should eventually be granted only when needed.
|
D | vdc.te | 5 # We also transition into this domain from dumpstate, when 13 # vdc sends information back to dumpstate when "adb bugreport" is used
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | gatekeeperd.te | 8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process. 9 ### These rules should eventually be granted only when needed. 15 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process. 16 ### These rules should eventually be granted only when needed.
|
/system/sepolicy/public/ |
D | gatekeeperd.te | 8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process. 9 ### These rules should eventually be granted only when needed. 15 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process. 16 ### These rules should eventually be granted only when needed.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | gatekeeperd.te | 8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process. 9 ### These rules should eventually be granted only when needed. 16 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process. 17 ### These rules should eventually be granted only when needed.
|
D | vdc.te | 5 # We also transition into this domain from dumpstate, when 13 # vdc sends information back to dumpstate when "adb bugreport" is used
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | gatekeeperd.te | 8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process. 9 ### These rules should eventually be granted only when needed. 15 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process. 16 ### These rules should eventually be granted only when needed.
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | gatekeeperd.te | 8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process. 9 ### These rules should eventually be granted only when needed. 15 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process. 16 ### These rules should eventually be granted only when needed.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | vold.te | 5 # Switch to more restrictive domains when executing common tools 10 # domain when working with untrusted block devices 17 # from accidentally writing when the mount point isn't present.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | vold.te | 6 # Switch to more restrictive domains when executing common tools 11 # domain when working with untrusted block devices 18 # from accidentally writing when the mount point isn't present.
|
D | domain.te | 1 # Transition to crash_dump when /system/bin/crash_dump* is executed. 2 # This occurs when the process crashes.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | vold.te | 5 # Switch to more restrictive domains when executing common tools 10 # domain when working with untrusted block devices 17 # from accidentally writing when the mount point isn't present.
|
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 28 # Suppress denial logspam when simpleperf is trying to find a matching process
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | vold.te | 5 # Switch to more restrictive domains when executing common tools 10 # domain when working with untrusted block devices 17 # from accidentally writing when the mount point isn't present.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | vold.te | 6 # Switch to more restrictive domains when executing common tools 11 # domain when working with untrusted block devices 18 # from accidentally writing when the mount point isn't present.
|
D | domain.te | 1 # Transition to crash_dump when /system/bin/crash_dump* is executed. 2 # This occurs when the process crashes.
|
/system/bt/gd/cert/ |
D | cert_self_test_lib.py | 30 from cert.behavior import when, wait_until 379 when(thing).test_request(anything()).then().increment_count() 392 when(thing).test_request(anything()).then().increment_count() 405 when(thing).test_request(anything()).then(times=3).increment_count() 418 when(thing).test_request(anything()).always().increment_count() 432 when(thing).test_request(lambda obj: obj == "B").always().increment_count() 446 when(thing).test_request(anything()).then().increment_count().increment_count() 460 when(thing).test_request(lambda obj: obj == "B").then(times=1).increment_count() 461 when(thing).test_request(lambda obj: obj == "C").always().increment_count() 477 when(thing).test_request(anything()).then().increment_count() [all …]
|
/system/extras/ANRdaemon/ |
D | README | 2 activity when CPU usage is very high. The daemon uses debugfs underlying for 19 Known issue: in the systrace output, anrdaemon will show up when the trace is 20 not running. This is because the daemon process turns off tracing when CPU usage 23 when the CPU usage becomes high and the daemon process turn on tracing again, 25 daemon process to some other process. Due to this artifact, when the raw trace
|
/system/libhidl/transport/manager/1.2/ |
D | IClientCallback.hal | 21 * This is called when there is a transition between having >= 1 clients and having 0 clients 30 * true - when there are >= 1 clients. This must be called as soon as IServiceManager::get 32 * false - when there are 0 clients. This may be delayed if it is thought that another
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | vold.te | 5 # Switch to more restrictive domains when executing common tools 10 # domain when working with untrusted block devices 17 # from accidentally writing when the mount point isn't present.
|
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 28 # Suppress denial logspam when simpleperf is trying to find a matching process
|
/system/sepolicy/private/ |
D | vold.te | 5 # Switch to more restrictive domains when executing common tools 10 # domain when working with untrusted block devices 17 # from accidentally writing when the mount point isn't present.
|
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 28 # Suppress denial logspam when simpleperf is trying to find a matching process
|
/system/iorap/ |
D | Android.bp | 223 // Pretty print when ubsan detects a problem. 230 */ // don't use the diag when you want it to crash. 314 // Furthermore, we need this regardless to avoid linking errors when linking 323 // We only put this to avoid linking errors when building iorapd. 360 // Pretty print when ubsan detects a problem. 367 */ // don't use the diag when you want it to crash. 395 // Furthermore, we need this regardless to avoid linking errors when linking 407 // We only put this to avoid linking errors when building iorapd. 444 // Pretty print when ubsan detects a problem. 451 */ // don't use the diag when you want it to crash. [all …]
|
12345678910>>...21