Home
last modified time | relevance | path

Searched refs:apps (Results 1 – 25 of 53) sorted by relevance

123

/device/mediatek/wembley-sepolicy/neverallows/non_plat/
Dapp_neverallows.te17 # Do not permit untrusted apps to perform actions on HwBinder service_manager
21 # Do not permit access from apps which host arbitrary code to HwBinder services.
25 # HwBinder services either operate at a level below that of apps (e.g., HALs)
42 # by surfaceflinger Binder service, which apps are permitted to access
44 # Binder service which apps were permitted to access.
64 # Restrict *Binder access from apps to HAL domains. We can only do this on full
65 # Treble devices where *Binder communications between apps and HALs are tightly
/device/mediatek/wembley-sepolicy/neverallows/plat_public/
Dapp_neverallows.te17 # Do not permit untrusted apps to perform actions on HwBinder service_manager
21 # Do not permit access from apps which host arbitrary code to HwBinder services.
25 # HwBinder services either operate at a level below that of apps (e.g., HALs)
42 # by surfaceflinger Binder service, which apps are permitted to access
44 # Binder service which apps were permitted to access.
64 # Restrict *Binder access from apps to HAL domains. We can only do this on full
65 # Treble devices where *Binder communications between apps and HALs are tightly
/device/mediatek/wembley-sepolicy/neverallows/plat_private/
Dapp_neverallows.te17 # Do not permit untrusted apps to perform actions on HwBinder service_manager
21 # Do not permit access from apps which host arbitrary code to HwBinder services.
25 # HwBinder services either operate at a level below that of apps (e.g., HALs)
42 # by surfaceflinger Binder service, which apps are permitted to access
44 # Binder service which apps were permitted to access.
64 # Restrict *Binder access from apps to HAL domains. We can only do this on full
65 # Treble devices where *Binder communications between apps and HALs are tightly
/device/generic/vulkan-cereal/third-party/angle/src/android_system_settings/src/com/android/angle/common/
DReceiver.java113 JSONArray apps = rule.optJSONArray("Applications"); in parsePackageNames() local
114 if (apps == null) in parsePackageNames()
119 for (int j = 0; j < apps.length(); j++) in parsePackageNames()
121 JSONObject app = apps.optJSONObject(j); in parsePackageNames()
/device/google/sunfish-sepolicy/vendor/google/
Dgoogle_camera_app.te14 # Some apps ship with shared libraries and binaries that they write out
47 # Untrusted apps need to be able to send a SIGCHLD to runas_app
51 # allow untrusted apps to use UDP sockets provided by the system server but not
/device/google/redbull-sepolicy/vendor/google/
Dgoogle_camera_app.te14 # Some apps ship with shared libraries and binaries that they write out
47 # Untrusted apps need to be able to send a SIGCHLD to runas_app
51 # allow untrusted apps to use UDP sockets provided by the system server but not
/device/google/coral-sepolicy/vendor/google/
Dgoogle_camera_app.te14 # Some apps ship with shared libraries and binaries that they write out
49 # Untrusted apps need to be able to send a SIGCHLD to runas_app
53 # allow untrusted apps to use UDP sockets provided by the system server but not
/device/google/contexthub/util/nanoapp_cmd/
Dnanoapp_cmd.c192 struct App apps[32]; variable
227 struct App *currApp = &apps[appCount++]; in parseInstalledAppInfo()
242 if (apps[i].id == appId) { in findApp()
243 return &apps[i]; in findApp()
/device/generic/vulkan-cereal/third-party/angle/doc/
DDevSetupAndroid.md77 …ES-app), in [groups](#ANGLE-for-multiple-OpenGL-ES-apps), or [globally](#ANGLE-for-all-OpenGL-ES-a…
117 ## ANGLE for *multiple* OpenGL ES apps
123 ## ANGLE for *all* OpenGL ES apps
/device/google/contexthub/contexthubhal/
DNanohubHidlAdapter.cpp255 std::vector<HubAppInfo> apps; in handleOsMessage() local
267 apps.push_back(app); in handleOsMessage()
271 cb->handleAppsInfo(apps); in handleOsMessage()
/device/google/cuttlefish/guest/hals/nfc/
DOWNERS1 include platform/packages/apps/Nfc:/OWNERS
/device/google/tangorpro-sepolicy/system_ext/private/
Dplatform_app.te1 # Allow platform apps to access system_update_service (e.g. check if update info is available).
/device/google/cuttlefish/shared/auto/
Ddevice_vendor.mk133 BOARD_SEPOLICY_DIRS += packages/services/Car/cpp/evs/apps/sepolicy/private
135 BOARD_SEPOLICY_DIRS += packages/services/Car/cpp/evs/apps/sepolicy/cartelemetry
/device/mediatek/wembley-sepolicy/plat_private/
DREADME3 It extend the domains and types for the AOSP services and apps common to
/device/linaro/dragonboard/sepolicy/
Dapp.te1 # Few system/untrusted_app_xx apps eg. deskclock,
/device/google/gs201-sepolicy/whitechapel_pro/
Dseapp_contexts67 user=_app seinfo=CameraFishfood name=com.google.android.apps.googlecamera.fishfood domain=google_ca…
70 user=_app seinfo=CameraEng name=com.google.android.apps.googlecamera.fishfood domain=debug_camera_a…
/device/generic/common/mgsi/
Dmgsi_system_user.prop7 # TODO(b/120679683): disable RescueParty before all problem apps solved
Dmgsi_system.prop10 # TODO(b/120679683): disable RescueParty before all problem apps solved
/device/google/trout/agl_services_build/yocto-layer/meta-google/
DREADME.md12 First copy this directory to `ROOT_OF_AGL_BSP/apps/apps_proc`
/device/google/sunfish-sepolicy/vendor/qcom/common/
Dhal_qseecom.te8 #Allow hal_qseecom client domain apps to find hwservice
/device/google/redbull-sepolicy/vendor/qcom/common/
Dhal_qseecom.te8 #Allow hal_qseecom client domain apps to find hwservice
/device/google/coral-sepolicy/vendor/qcom/common/
Dhal_qseecom.te8 #Allow hal_qseecom client domain apps to find hwservice
/device/generic/goldfish/car/
Dsdk_car_portrait_x86_64.mk43 $(call inherit-product, packages/services/Car/car_product/car_ui_portrait/apps/car_ui_portrait_apps…
/device/generic/vulkan-cereal/third-party/angle/src/tests/test_utils/
Dangle_test_instantiate_apple.mm19 // Consider move it to a common source code accessible to both libANGLE and test apps.
/device/generic/vulkan-cereal/protocols/vulkan/appendices/
DVK_FUCHSIA_external_memory.txt20 Vulkan apps may wish to export or import device memory handles to or from

123