Home
last modified time | relevance | path

Searched refs:loading (Results 1 – 25 of 99) sorted by relevance

1234

/system/core/libstats/socket_lazy/
DAndroid.bp1 // Lazy loading version of libstatssocket that can be used by code
/system/core/libstats/pull_lazy/
DAndroid.bp1 // Lazy loading version of libstatspull that can be used by code
/system/sepolicy/prebuilts/api/30.0/private/
Dnfc.te15 # SoundPool loading and playback
Dpriv_app.te17 # Allow loading executable code from writable priv-app home
219 # Do not allow loading executable code from non-privileged
220 # application home directories. Code loading across a security boundary
/system/sepolicy/prebuilts/api/29.0/private/
Dnfc.te15 # SoundPool loading and playback
/system/sepolicy/prebuilts/api/33.0/private/
Dnfc.te17 # SoundPool loading and playback
Dpriv_app.te17 # Allow loading executable code from writable priv-app home
169 # the Incremental File System, fill missing blocks and get the app status and loading progress
199 # Allow loading and deleting executable shared libraries
259 # Do not allow loading executable code from non-privileged
260 # application home directories. Code loading across a security boundary
/system/sepolicy/prebuilts/api/34.0/private/
Dnfc.te17 # SoundPool loading and playback
Dpriv_app.te17 # Allow loading executable code from writable priv-app home
161 # the Incremental File System, fill missing blocks and get the app status and loading progress
196 # Allow loading and deleting executable shared libraries
261 # Do not allow loading executable code from non-privileged
262 # application home directories. Code loading across a security boundary
/system/sepolicy/private/
Dnfc.te17 # SoundPool loading and playback
Dpriv_app.te17 # Allow loading executable code from writable priv-app home
161 # the Incremental File System, fill missing blocks and get the app status and loading progress
196 # Allow loading and deleting executable shared libraries
261 # Do not allow loading executable code from non-privileged
262 # application home directories. Code loading across a security boundary
/system/sepolicy/prebuilts/api/32.0/private/
Dnfc.te17 # SoundPool loading and playback
Dpriv_app.te17 # Allow loading executable code from writable priv-app home
165 # the Incremental File System, fill missing blocks and get the app status and loading progress
195 # Allow loading and deleting executable shared libraries
255 # Do not allow loading executable code from non-privileged
256 # application home directories. Code loading across a security boundary
/system/sepolicy/prebuilts/api/31.0/private/
Dnfc.te17 # SoundPool loading and playback
Dpriv_app.te17 # Allow loading executable code from writable priv-app home
165 # the Incremental File System, fill missing blocks and get the app status and loading progress
195 # Allow loading and deleting executable shared libraries
255 # Do not allow loading executable code from non-privileged
256 # application home directories. Code loading across a security boundary
/system/chre/platform/shared/idl/
Dhost_messages.fbs116 /// Represents a request for loading a nanoapp.
118 /// For loading via a file, the following steps will be taken:
121 /// fragment_id and total_app_size are unused in this request. The loading
130 /// For loading via a buffer, loading may optionally be fragmented into multiple
163 /// Fields that are relevant for fragmented loading
165 /// fragments. For clients that do not support fragmented loading, the
178 /// If true and fragmented loading is requested, the LoadNanoappResponse
/system/chre/core/
Dchre_metrics.proto32 * Logs an event indicating that a nanoapp loading has failed at the HAL.
42 // Dynamic loading of a nanoapp (e.g. code download).
54 // Nanoapp did not have the right signing for loading.
/system/hardware/interfaces/net/netd/1.0/
DINetd.hal21 * loading an implementation of the INetd HAL.
/system/sepolicy/prebuilts/api/29.0/public/
Dupdate_engine.te32 # Don't allow kernel module loading, just silence the logs.
Dmediaextractor.te68 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
/system/core/init/
Dfirmware_handler.cpp235 std::string loading = root + "/loading"; in ProcessFirmwareEvent() local
238 unique_fd loading_fd(open(loading.c_str(), O_WRONLY | O_CLOEXEC)); in ProcessFirmwareEvent()
/system/chre/doc/
Dnanoapp_overview.md51 before dynamic loading functionality is enabled. For example, the FeatureWorld
75 While the mechanism for loading prebuilt nanoapps is platform-specific, the CHRE
85 3. The platform layer of the CHRE framework handles the requests by loading,
119 Some platforms support loading nanoapps into multiple tiers of memory, for
/system/sepolicy/prebuilts/api/33.0/public/
Dmediaextractor.te71 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
/system/sepolicy/public/
Dmediaextractor.te70 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
/system/sepolicy/prebuilts/api/34.0/public/
Dmediaextractor.te70 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins

1234