Searched refs:loading (Results 1 – 25 of 99) sorted by relevance
1234
/system/core/libstats/socket_lazy/ |
D | Android.bp | 1 // Lazy loading version of libstatssocket that can be used by code
|
/system/core/libstats/pull_lazy/ |
D | Android.bp | 1 // Lazy loading version of libstatspull that can be used by code
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | nfc.te | 15 # SoundPool loading and playback
|
D | priv_app.te | 17 # Allow loading executable code from writable priv-app home 219 # Do not allow loading executable code from non-privileged 220 # application home directories. Code loading across a security boundary
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | nfc.te | 15 # SoundPool loading and playback
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | nfc.te | 17 # SoundPool loading and playback
|
D | priv_app.te | 17 # Allow loading executable code from writable priv-app home 169 # the Incremental File System, fill missing blocks and get the app status and loading progress 199 # Allow loading and deleting executable shared libraries 259 # Do not allow loading executable code from non-privileged 260 # application home directories. Code loading across a security boundary
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | nfc.te | 17 # SoundPool loading and playback
|
D | priv_app.te | 17 # Allow loading executable code from writable priv-app home 161 # the Incremental File System, fill missing blocks and get the app status and loading progress 196 # Allow loading and deleting executable shared libraries 261 # Do not allow loading executable code from non-privileged 262 # application home directories. Code loading across a security boundary
|
/system/sepolicy/private/ |
D | nfc.te | 17 # SoundPool loading and playback
|
D | priv_app.te | 17 # Allow loading executable code from writable priv-app home 161 # the Incremental File System, fill missing blocks and get the app status and loading progress 196 # Allow loading and deleting executable shared libraries 261 # Do not allow loading executable code from non-privileged 262 # application home directories. Code loading across a security boundary
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | nfc.te | 17 # SoundPool loading and playback
|
D | priv_app.te | 17 # Allow loading executable code from writable priv-app home 165 # the Incremental File System, fill missing blocks and get the app status and loading progress 195 # Allow loading and deleting executable shared libraries 255 # Do not allow loading executable code from non-privileged 256 # application home directories. Code loading across a security boundary
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | nfc.te | 17 # SoundPool loading and playback
|
D | priv_app.te | 17 # Allow loading executable code from writable priv-app home 165 # the Incremental File System, fill missing blocks and get the app status and loading progress 195 # Allow loading and deleting executable shared libraries 255 # Do not allow loading executable code from non-privileged 256 # application home directories. Code loading across a security boundary
|
/system/chre/platform/shared/idl/ |
D | host_messages.fbs | 116 /// Represents a request for loading a nanoapp. 118 /// For loading via a file, the following steps will be taken: 121 /// fragment_id and total_app_size are unused in this request. The loading 130 /// For loading via a buffer, loading may optionally be fragmented into multiple 163 /// Fields that are relevant for fragmented loading 165 /// fragments. For clients that do not support fragmented loading, the 178 /// If true and fragmented loading is requested, the LoadNanoappResponse
|
/system/chre/core/ |
D | chre_metrics.proto | 32 * Logs an event indicating that a nanoapp loading has failed at the HAL. 42 // Dynamic loading of a nanoapp (e.g. code download). 54 // Nanoapp did not have the right signing for loading.
|
/system/hardware/interfaces/net/netd/1.0/ |
D | INetd.hal | 21 * loading an implementation of the INetd HAL.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | update_engine.te | 32 # Don't allow kernel module loading, just silence the logs.
|
D | mediaextractor.te | 68 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
|
/system/core/init/ |
D | firmware_handler.cpp | 235 std::string loading = root + "/loading"; in ProcessFirmwareEvent() local 238 unique_fd loading_fd(open(loading.c_str(), O_WRONLY | O_CLOEXEC)); in ProcessFirmwareEvent()
|
/system/chre/doc/ |
D | nanoapp_overview.md | 51 before dynamic loading functionality is enabled. For example, the FeatureWorld 75 While the mechanism for loading prebuilt nanoapps is platform-specific, the CHRE 85 3. The platform layer of the CHRE framework handles the requests by loading, 119 Some platforms support loading nanoapps into multiple tiers of memory, for
|
/system/sepolicy/prebuilts/api/33.0/public/ |
D | mediaextractor.te | 71 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
|
/system/sepolicy/public/ |
D | mediaextractor.te | 70 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
|
/system/sepolicy/prebuilts/api/34.0/public/ |
D | mediaextractor.te | 70 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
|
1234