Home
last modified time | relevance | path

Searched refs:when (Results 1 – 25 of 511) sorted by relevance

12345678910>>...21

/system/sepolicy/prebuilts/api/28.0/public/
Dgatekeeperd.te8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process.
9 ### These rules should eventually be granted only when needed.
16 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process.
17 ### These rules should eventually be granted only when needed.
/system/sepolicy/prebuilts/api/27.0/public/
Dgatekeeperd.te8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process.
9 ### These rules should eventually be granted only when needed.
16 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process.
17 ### These rules should eventually be granted only when needed.
Dvdc.te5 # We also transition into this domain from dumpstate, when
13 # vdc sends information back to dumpstate when "adb bugreport" is used
/system/sepolicy/prebuilts/api/29.0/public/
Dgatekeeperd.te8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process.
9 ### These rules should eventually be granted only when needed.
15 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process.
16 ### These rules should eventually be granted only when needed.
/system/sepolicy/public/
Dgatekeeperd.te8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process.
9 ### These rules should eventually be granted only when needed.
15 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process.
16 ### These rules should eventually be granted only when needed.
/system/sepolicy/prebuilts/api/26.0/public/
Dgatekeeperd.te8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process.
9 ### These rules should eventually be granted only when needed.
16 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process.
17 ### These rules should eventually be granted only when needed.
Dvdc.te5 # We also transition into this domain from dumpstate, when
13 # vdc sends information back to dumpstate when "adb bugreport" is used
/system/sepolicy/prebuilts/api/31.0/public/
Dgatekeeperd.te8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process.
9 ### These rules should eventually be granted only when needed.
15 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process.
16 ### These rules should eventually be granted only when needed.
/system/sepolicy/prebuilts/api/30.0/public/
Dgatekeeperd.te8 ### Rules needed when Gatekeeper HAL runs inside gatekeeperd process.
9 ### These rules should eventually be granted only when needed.
15 ### Rules needed when Gatekeeper HAL runs outside of gatekeeperd process.
16 ### These rules should eventually be granted only when needed.
/system/sepolicy/prebuilts/api/29.0/private/
Dvold.te5 # Switch to more restrictive domains when executing common tools
10 # domain when working with untrusted block devices
17 # from accidentally writing when the mount point isn't present.
/system/sepolicy/prebuilts/api/26.0/private/
Dvold.te6 # Switch to more restrictive domains when executing common tools
11 # domain when working with untrusted block devices
18 # from accidentally writing when the mount point isn't present.
Ddomain.te1 # Transition to crash_dump when /system/bin/crash_dump* is executed.
2 # This occurs when the process crashes.
/system/sepolicy/prebuilts/api/30.0/private/
Dvold.te5 # Switch to more restrictive domains when executing common tools
10 # domain when working with untrusted block devices
17 # from accidentally writing when the mount point isn't present.
Dsimpleperf.te1 # Domain used when running /system/bin/simpleperf to profile a specific app.
24 # Allow /proc/<pid> access for the target app (for example, when trying to
28 # Suppress denial logspam when simpleperf is trying to find a matching process
/system/sepolicy/prebuilts/api/28.0/private/
Dvold.te5 # Switch to more restrictive domains when executing common tools
10 # domain when working with untrusted block devices
17 # from accidentally writing when the mount point isn't present.
/system/sepolicy/prebuilts/api/27.0/private/
Dvold.te6 # Switch to more restrictive domains when executing common tools
11 # domain when working with untrusted block devices
18 # from accidentally writing when the mount point isn't present.
Ddomain.te1 # Transition to crash_dump when /system/bin/crash_dump* is executed.
2 # This occurs when the process crashes.
/system/bt/gd/cert/
Dcert_self_test_lib.py30 from cert.behavior import when, wait_until
379 when(thing).test_request(anything()).then().increment_count()
392 when(thing).test_request(anything()).then().increment_count()
405 when(thing).test_request(anything()).then(times=3).increment_count()
418 when(thing).test_request(anything()).always().increment_count()
432 when(thing).test_request(lambda obj: obj == "B").always().increment_count()
446 when(thing).test_request(anything()).then().increment_count().increment_count()
460 when(thing).test_request(lambda obj: obj == "B").then(times=1).increment_count()
461 when(thing).test_request(lambda obj: obj == "C").always().increment_count()
477 when(thing).test_request(anything()).then().increment_count()
[all …]
/system/extras/ANRdaemon/
DREADME2 activity when CPU usage is very high. The daemon uses debugfs underlying for
19 Known issue: in the systrace output, anrdaemon will show up when the trace is
20 not running. This is because the daemon process turns off tracing when CPU usage
23 when the CPU usage becomes high and the daemon process turn on tracing again,
25 daemon process to some other process. Due to this artifact, when the raw trace
/system/libhidl/transport/manager/1.2/
DIClientCallback.hal21 * This is called when there is a transition between having >= 1 clients and having 0 clients
30 * true - when there are >= 1 clients. This must be called as soon as IServiceManager::get
32 * false - when there are 0 clients. This may be delayed if it is thought that another
/system/sepolicy/prebuilts/api/31.0/private/
Dvold.te5 # Switch to more restrictive domains when executing common tools
10 # domain when working with untrusted block devices
17 # from accidentally writing when the mount point isn't present.
Dsimpleperf.te1 # Domain used when running /system/bin/simpleperf to profile a specific app.
24 # Allow /proc/<pid> access for the target app (for example, when trying to
28 # Suppress denial logspam when simpleperf is trying to find a matching process
/system/sepolicy/private/
Dvold.te5 # Switch to more restrictive domains when executing common tools
10 # domain when working with untrusted block devices
17 # from accidentally writing when the mount point isn't present.
Dsimpleperf.te1 # Domain used when running /system/bin/simpleperf to profile a specific app.
24 # Allow /proc/<pid> access for the target app (for example, when trying to
28 # Suppress denial logspam when simpleperf is trying to find a matching process
/system/iorap/
DAndroid.bp223 // Pretty print when ubsan detects a problem.
230 */ // don't use the diag when you want it to crash.
314 // Furthermore, we need this regardless to avoid linking errors when linking
323 // We only put this to avoid linking errors when building iorapd.
360 // Pretty print when ubsan detects a problem.
367 */ // don't use the diag when you want it to crash.
395 // Furthermore, we need this regardless to avoid linking errors when linking
407 // We only put this to avoid linking errors when building iorapd.
444 // Pretty print when ubsan detects a problem.
451 */ // don't use the diag when you want it to crash.
[all …]

12345678910>>...21