Home
last modified time | relevance | path

Searched refs:as (Results 1 – 25 of 782) sorted by relevance

12345678910>>...32

/system/sepolicy/private/
Dsimpleperf.te3 # simpleperf_app_runner (with shell as its origin). Certain other domains
21 # consistent if simpleperf is marked as an app domain as well (as, for example,
22 # it will then see the same set of system libraries as the app).
38 # profiler runs as when executed by the app. The signals are used to control
44 # the same domain as their respective processes, most of which this domain is
/system/sepolicy/prebuilts/api/34.0/private/
Dsimpleperf.te3 # simpleperf_app_runner (with shell as its origin). Certain other domains
21 # consistent if simpleperf is marked as an app domain as well (as, for example,
22 # it will then see the same set of system libraries as the app).
38 # profiler runs as when executed by the app. The signals are used to control
44 # the same domain as their respective processes, most of which this domain is
/system/sepolicy/prebuilts/api/33.0/private/
Dsimpleperf.te3 # simpleperf_app_runner (with shell as its origin). Certain other domains
21 # consistent if simpleperf is marked as an app domain as well (as, for example,
22 # it will then see the same set of system libraries as the app).
38 # profiler runs as when executed by the app. The signals are used to control
44 # the same domain as their respective processes, most of which this domain is
/system/sepolicy/prebuilts/api/30.0/private/
Dsimpleperf.te3 # simpleperf_app_runner (with shell as its origin). Certain other domains
12 # consistent if simpleperf is marked as an app domain as well (as, for example,
13 # it will then see the same set of system libraries as the app).
30 # the same domain as their respective processes, most of which this domain is
/system/sepolicy/prebuilts/api/32.0/private/
Dsimpleperf.te3 # simpleperf_app_runner (with shell as its origin). Certain other domains
12 # consistent if simpleperf is marked as an app domain as well (as, for example,
13 # it will then see the same set of system libraries as the app).
30 # the same domain as their respective processes, most of which this domain is
/system/sepolicy/prebuilts/api/31.0/private/
Dsimpleperf.te3 # simpleperf_app_runner (with shell as its origin). Certain other domains
12 # consistent if simpleperf is marked as an app domain as well (as, for example,
13 # it will then see the same set of system libraries as the app).
30 # the same domain as their respective processes, most of which this domain is
/system/chre/apps/nearby/location/lbs/contexthub/nanoapps/nearby/
DREADME8 the discovery notification as soon as a user turns on the screen.
18 applications above (Fast Pair, Presence, as well as Offload Extension).
/system/sepolicy/prebuilts/api/32.0/public/
Drunas.te13 # run-as reads package information.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/prebuilts/api/34.0/public/
Drunas.te13 # run-as reads package information.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/prebuilts/api/29.0/public/
Drunas.te13 # run-as reads package information.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/prebuilts/api/33.0/public/
Drunas.te13 # run-as reads package information.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/public/
Drunas.te13 # run-as reads package information.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/prebuilts/api/30.0/public/
Drunas.te13 # run-as reads package information.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/prebuilts/api/31.0/public/
Drunas.te13 # run-as reads package information.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/tools/aidl/
Daidl_to_cpp_common.h73 std::vector<T> Append(std::vector<T> as, const std::vector<T>& bs) { in Append() argument
74 as.insert(as.end(), bs.begin(), bs.end()); in Append()
75 return as; in Append()
79 std::vector<T> Append(std::vector<T>&& as, std::vector<T>&& bs) { in Append() argument
80 std::vector<T> appended = std::move(as); in Append()
/system/bpf/bpfloader/
Dbpfloader.rc2 # However, on some hardware it's started from post-fs-data as well, which is just
9 # programs shipped as part of apex mainline modules)
12 # At the same time we want to be as early as possible to reduce races and thus
32 # Actually only 8MiB would be needed if bpfloader ran as its own uid.
55 # As such we simply use 1GiB as a reasonable approximation of infinity.
69 # 4. as the device is booting up capture bpfloader logs via:
74 # will take care of capturing logs as early as possible
/system/extras/simpleperf/demo/SimpleperfExampleCpp/app/src/main/cpp/
DCMakeLists.txt12 # Creates and names a library, sets it as either STATIC
20 # Sets the library as a shared library.
26 # Searches for a specified prebuilt library and stores the path as a
40 # can link multiple libraries, such as libraries you define in this
/system/chre/chpp/
DREADME.md11 …nly used sensors and peripherals, and also allows vendor-specific services as necessary. CHPP allo…
19 …otocol is designed such that endpoints can both provide services and serve as clients of remote se…
33 …h a 4-byte packet footer. Defined as a structure (ChppTransportHeader in transport.h), the CHPP tr…
50as the packet start delimiter. If the receiving side is not actively within a packet, it assumes a…
54 Up to 8 flags are supported as a bitmap as follows
70 … A non-zero explicit NACK code indicates an explicit NACK. The code provides the reason as follows:
82 - 0x1: Reset. The reset code is used at bootup to indicate that readiness, as well as to reset the …
85 - 0x2 Reset-ack. Similar to reset, but sent as a response to reset, as described above.
90 The ack may be sent as part of a packet with or without a payload. In the latter case, the payload …
137 …serial interface. The data is provided through a pointer to *buf, with its length specified as len.
[all …]

12345678910>>...32