Home
last modified time | relevance | path

Searched refs:Enable (Results 1 – 25 of 52) sorted by relevance

123

/system/memory/libmemunreachable/
DScopedDisableMalloc.h33 ~DisableMallocGuard() { Enable(); } in ~DisableMallocGuard()
42 void Enable() { in Enable() function
65 ~ScopedDisableMalloc() { disable_malloc_.Enable(); } in ~ScopedDisableMalloc()
79 ~ScopedDisableMallocTimeout() { Enable(); } in ~ScopedDisableMallocTimeout()
83 void Enable() { in Enable() function
84 disable_malloc_.Enable(); in Enable()
91 disable_malloc_.Enable(); in Disable()
/system/sepolicy/microdroid/system/private/
Dpolicy_capabilities1 # Enable new networking controls.
4 # Enable open permission check.
7 # Enable separate security classes for
14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
/system/sepolicy/prebuilts/api/33.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
4 # Enable open permission check.
7 # Enable separate security classes for
14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
/system/sepolicy/private/
Dpolicy_capabilities1 # Enable new networking controls.
4 # Enable open permission check.
7 # Enable separate security classes for
14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
Disolated_compute_app.te20 # Enable access to hardware services for camera functionalilites
/system/sepolicy/prebuilts/api/31.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
4 # Enable open permission check.
7 # Enable separate security classes for
14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
/system/sepolicy/prebuilts/api/34.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
4 # Enable open permission check.
7 # Enable separate security classes for
14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
Disolated_compute_app.te20 # Enable access to hardware services for camera functionalilites
/system/sepolicy/prebuilts/api/30.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
4 # Enable open permission check.
7 # Enable separate security classes for
14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
/system/sepolicy/prebuilts/api/32.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
4 # Enable open permission check.
7 # Enable separate security classes for
14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
/system/sepolicy/prebuilts/api/29.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
4 # Enable open permission check.
7 # Enable separate security classes for
14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
Dincidentd.te56 # Enable incidentd to get stack traces.
/system/chre/platform/zephyr/
DKconfig26 bool "Enable CHRE assertions"
32 bool "Enable audio support"
38 bool "Enable GNSS support"
44 bool "Enable sensor support"
50 bool "Enable WiFi support"
/system/logging/logd/
DREADME.property4 ro.logd.auditd bool true Enable selinux audit daemon
8 persist.logd.security bool false Enable security buffer.
10 ro.logd.kernel bool svelte+ Enable klogd daemon
11 logd.statistics bool svelte+ Enable logcat -S statistics.
15 logd.logpersistd string persist Enable logpersist daemon, "logcatd"
21 persist.logd.logpersistd string Enable logpersist daemon, "logcatd"
/system/media/camera/
DAndroid.bp50 // Enable assert()
/system/extras/profcollectd/libprofcollectd/
DAndroid.bp64 // Enable 'test' feature for more verbose logging and the logging trace provider.
/system/libcppbor/include/cppbor/
Dcppbor.h616 template <typename... Args, typename Enable>
623 template <typename T, typename Enable>
696 template <typename... Args, typename Enable>
732 template <typename Key, typename Enable>
960 template <typename T, typename V, typename Enable = void>
969 template <typename T, typename V, typename Enable = void>
979 template <typename T, typename Enable = void>
/system/gsid/
Dgsi_tool.cpp53 static int Enable(sp<IGsiService> gsid, int argc, char** argv);
64 {"enable", Enable},
658 static int Enable(sp<IGsiService> gsid, int argc, char** argv) { in Enable() function
/system/core/fs_mgr/libsnapshot/android/snapshot/
Dsnapshot.proto112 // Enable multi-threaded compression
115 // Enable batching for COW writes
/system/core/init/
Dservice.h89 Result<void> Enable();
/system/memory/libmemunreachable/tests/
DHeapWalker_test.cpp94 disable_malloc_.Enable(); in TEST_F()
/system/extras/app-launcher/
DREADME15 5) Enable wifi and connect to a network (ex. GoogleGuest).
/system/nvram/messages/include/nvram/messages/
Dproto.hpp115 template <typename Type, typename Enable = void>
/system/hardware/interfaces/net/netd/1.1/
DINetd.hal97 * Enable IP forwarding on the system. Client must disable forwarding when
/system/libziparchive/
DAndroid.bp38 // Enable -Wold-style-cast only for non-Windows targets. _islower_l,

123