/system/tools/aidl/build/ |
D | aidl_rust_glue.py | 32 output_file.write(indent) 33 output_file.write("pub mod %s {\n" % input_name) 37 output_file.write(indent) 38 output_file.write(" ") 39 output_file.write(l) 41 output_file.write(indent) 42 output_file.write("}\n") 45 output_file.write(indent) 46 output_file.write("pub mod %s {\n" % name) 48 output_file.write(indent) [all …]
|
/system/tools/aidl/tests/golden_output/aidl-test-interface-rust-source/gen/android/aidl/tests/ |
D | StructuredParcelable.rs | 128 subparcel.write(&self.r#shouldContainThreeFs)?; in write_to_parcel() 129 subparcel.write(&self.r#f)?; in write_to_parcel() 130 subparcel.write(&self.r#shouldBeJerry)?; in write_to_parcel() 131 subparcel.write(&self.r#shouldBeByteBar)?; in write_to_parcel() 132 subparcel.write(&self.r#shouldBeIntBar)?; in write_to_parcel() 133 subparcel.write(&self.r#shouldBeLongBar)?; in write_to_parcel() 134 subparcel.write(&self.r#shouldContainTwoByteFoos)?; in write_to_parcel() 135 subparcel.write(&self.r#shouldContainTwoIntFoos)?; in write_to_parcel() 136 subparcel.write(&self.r#shouldContainTwoLongFoos)?; in write_to_parcel() 137 subparcel.write(&self.r#stringDefaultsToFoo)?; in write_to_parcel() [all …]
|
D | FixedSize.rs | 60 subparcel.write(&self.r#booleanValue)?; in write_to_parcel() 61 subparcel.write(&self.r#byteValue)?; in write_to_parcel() 62 subparcel.write(&self.r#charValue)?; in write_to_parcel() 63 subparcel.write(&self.r#intValue)?; in write_to_parcel() 64 subparcel.write(&self.r#longValue)?; in write_to_parcel() 65 subparcel.write(&self.r#floatValue)?; in write_to_parcel() 66 subparcel.write(&self.r#doubleValue)?; in write_to_parcel() 67 subparcel.write(&self.r#enumValue)?; in write_to_parcel() 68 subparcel.write(&self.r#parcelableValue)?; in write_to_parcel() 132 parcel.write(&0i32)?; in write_to_parcel() [all …]
|
D | Union.rs | 23 parcel.write(&0i32)?; in write_to_parcel() 24 parcel.write(v) in write_to_parcel() 27 parcel.write(&1i32)?; in write_to_parcel() 28 parcel.write(v) in write_to_parcel() 31 parcel.write(&2i32)?; in write_to_parcel() 32 parcel.write(v) in write_to_parcel() 35 parcel.write(&3i32)?; in write_to_parcel() 36 parcel.write(v) in write_to_parcel() 39 parcel.write(&4i32)?; in write_to_parcel() 40 parcel.write(v) in write_to_parcel() [all …]
|
D | ParcelableForToString.rs | 61 subparcel.write(&self.r#intValue)?; in write_to_parcel() 62 subparcel.write(&self.r#intArray)?; in write_to_parcel() 63 subparcel.write(&self.r#longValue)?; in write_to_parcel() 64 subparcel.write(&self.r#longArray)?; in write_to_parcel() 65 subparcel.write(&self.r#doubleValue)?; in write_to_parcel() 66 subparcel.write(&self.r#doubleArray)?; in write_to_parcel() 67 subparcel.write(&self.r#floatValue)?; in write_to_parcel() 68 subparcel.write(&self.r#floatArray)?; in write_to_parcel() 69 subparcel.write(&self.r#byteValue)?; in write_to_parcel() 70 subparcel.write(&self.r#byteArray)?; in write_to_parcel() [all …]
|
/system/core/rootdir/ |
D | init.usb.rc | 33 write /sys/class/android_usb/android0/enable 0 34 write /sys/class/android_usb/android0/bDeviceClass 0 41 write /sys/class/android_usb/android0/enable 0 42 write /sys/class/android_usb/android0/idVendor 18d1 43 write /sys/class/android_usb/android0/idProduct 4EE7 44 write /sys/class/android_usb/android0/functions ${sys.usb.config} 45 write /sys/class/android_usb/android0/enable 1 51 write /sys/class/android_usb/android0/enable 0 52 write /sys/class/android_usb/android0/idVendor 18d1 53 write /sys/class/android_usb/android0/idProduct 2d00 [all …]
|
D | init.usb.configfs.rc | 2 write /config/usb_gadget/g1/UDC "none" 5 write /config/usb_gadget/g1/bDeviceClass 0 6 write /config/usb_gadget/g1/bDeviceSubClass 0 7 write /config/usb_gadget/g1/bDeviceProtocol 0 21 write /config/usb_gadget/g1/configs/b.1/strings/0x409/configuration "adb" 23 write /config/usb_gadget/g1/UDC ${sys.usb.controller} 27 write /config/usb_gadget/g1/configs/b.1/strings/0x409/configuration "mtp" 29 write /config/usb_gadget/g1/UDC ${sys.usb.controller} 36 write /config/usb_gadget/g1/configs/b.1/strings/0x409/configuration "mtp_adb" 39 write /config/usb_gadget/g1/UDC ${sys.usb.controller} [all …]
|
/system/tools/mkbootimg/ |
D | mkbootimg.py | 88 f.write(pack(str(pad) + 'x')) 120 args.output.write(pack(f'{BOOT_MAGIC_SIZE}s', BOOT_MAGIC.encode())) 122 args.output.write(pack('I', filesize(args.kernel))) 124 args.output.write(pack('I', filesize(args.ramdisk))) 126 args.output.write(pack('I', (args.os_version << 11) | args.os_patch_level)) 127 args.output.write(pack('I', boot_header_size)) 129 args.output.write(pack('4I', 0, 0, 0, 0)) 131 args.output.write(pack('I', args.header_version)) 132 args.output.write(pack(f'{BOOT_ARGS_SIZE + BOOT_EXTRA_ARGS_SIZE}s', 139 args.output.write(pack('I', boot_signature_size)) [all …]
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | dnsmasq.te | 18 allow dnsmasq netd:fifo_file { getattr read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { getattr read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/system/sepolicy/prebuilts/api/34.0/public/ |
D | app.te | 22 neverallow appdomain dev_type:blk_file { read write }; 25 neverallow { untrusted_app isolated_app shell } graphics_device:chr_file { read write }; 28 { read write }; 30 { read write }; 31 neverallow appdomain tee_device:chr_file { read write }; 47 domain:netlink_kobject_uevent_socket { write append }; 50 neverallow appdomain socket_device:sock_file write; 53 neverallow appdomain adbd_socket:sock_file write; 54 neverallow { appdomain -radio } rild_socket:sock_file write; 73 # Read or write access to /proc/pid entries for any non-app domain. [all …]
|
D | dnsmasq.te | 18 allow dnsmasq netd:fifo_file { getattr read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { getattr read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/system/sepolicy/public/ |
D | app.te | 22 neverallow appdomain dev_type:blk_file { read write }; 25 neverallow { untrusted_app isolated_app shell } graphics_device:chr_file { read write }; 28 { read write }; 30 { read write }; 31 neverallow appdomain tee_device:chr_file { read write }; 47 domain:netlink_kobject_uevent_socket { write append }; 50 neverallow appdomain socket_device:sock_file write; 53 neverallow appdomain adbd_socket:sock_file write; 54 neverallow { appdomain -radio } rild_socket:sock_file write; 73 # Read or write access to /proc/pid entries for any non-app domain. [all …]
|
D | dnsmasq.te | 18 allow dnsmasq netd:fifo_file { getattr read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { getattr read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | dnsmasq.te | 18 allow dnsmasq netd:fifo_file { getattr read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { getattr read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/system/sepolicy/prebuilts/api/33.0/public/ |
D | dnsmasq.te | 18 allow dnsmasq netd:fifo_file { getattr read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { getattr read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
D | app.te | 22 neverallow appdomain dev_type:blk_file { read write }; 32 }:chr_file { read write }; 35 neverallow { untrusted_app isolated_app shell } graphics_device:chr_file { read write }; 38 { read write }; 40 { read write }; 41 neverallow appdomain tee_device:chr_file { read write }; 57 domain:netlink_kobject_uevent_socket { write append }; 60 neverallow appdomain socket_device:sock_file write; 63 neverallow appdomain adbd_socket:sock_file write; 64 neverallow { appdomain -radio } rild_socket:sock_file write; [all …]
|
/system/sepolicy/prebuilts/api/32.0/public/ |
D | dnsmasq.te | 18 allow dnsmasq netd:fifo_file { getattr read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { getattr read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | dnsmasq.te | 18 allow dnsmasq netd:fifo_file { getattr read write }; 20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write }; 21 allow dnsmasq netd:netlink_nflog_socket { read write }; 22 allow dnsmasq netd:netlink_route_socket { read write }; 23 allow dnsmasq netd:unix_stream_socket { getattr read write }; 24 allow dnsmasq netd:unix_dgram_socket { read write }; 25 allow dnsmasq netd:udp_socket { read write };
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | gpuservice.te | 29 allow gpuservice shell:fifo_file write; 35 allow gpuservice adbd:unix_stream_socket { read write getattr }; 38 allow gpuservice devpts:chr_file { read write getattr }; 42 allow gpuservice dumpstate:fifo_file write; 52 allow gpuservice self:perf_event { cpu kernel open write }; 53 neverallow gpuservice self:perf_event ~{ cpu kernel open write }; 56 # Write is needed to open read/write bpf maps. 57 allow gpuservice fs_bpf:file { read write }; 59 # Needed for enabling bpf programs and accessing bpf maps (read-only and read/write). 64 # Needed for enabling write access to persist.graphics.egl from developer option switch UI, through…
|
D | incident.te | 12 # allow incident to communicate with dumpstate, and write incident report to 15 allow incident dumpstate:unix_stream_socket { read write }; 16 allow incident shell_data_file:file write; 19 allow incident devpts:chr_file { read write }; 21 # allow incident to communicate use, read and write over the adb 24 allow incident adbd:unix_stream_socket { read write }; 34 allow incident incidentd:fifo_file write;
|
/system/sepolicy/private/ |
D | gpuservice.te | 29 allow gpuservice shell:fifo_file write; 35 allow gpuservice adbd:unix_stream_socket { read write getattr }; 38 allow gpuservice devpts:chr_file { read write getattr }; 42 allow gpuservice dumpstate:fifo_file write; 52 allow gpuservice self:perf_event { cpu kernel open write }; 53 neverallow gpuservice self:perf_event ~{ cpu kernel open write }; 56 # Write is needed to open read/write bpf maps. 57 allow gpuservice fs_bpf:file { read write }; 59 # Needed for enabling bpf programs and accessing bpf maps (read-only and read/write). 64 # Needed for enabling write access to persist.graphics.egl from developer option switch UI, through…
|
/system/tools/aidl/tests/golden_output/aidl-test-fixedsizearray-rust-source/gen/android/aidl/fixedsizearray/ |
D | FixedSizeArrayExample.rs | 125 subparcel.write(&self.r#int2x3)?; in write_to_parcel() 126 subparcel.write(&self.r#boolArray)?; in write_to_parcel() 127 subparcel.write(&self.r#byteArray)?; in write_to_parcel() 128 subparcel.write(&self.r#charArray)?; in write_to_parcel() 129 subparcel.write(&self.r#intArray)?; in write_to_parcel() 130 subparcel.write(&self.r#longArray)?; in write_to_parcel() 131 subparcel.write(&self.r#floatArray)?; in write_to_parcel() 132 subparcel.write(&self.r#doubleArray)?; in write_to_parcel() 133 subparcel.write(&self.r#stringArray)?; in write_to_parcel() 134 subparcel.write(&self.r#byteEnumArray)?; in write_to_parcel() [all …]
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | incident.te | 12 # allow incident to communicate with dumpstate, and write incident report to 15 allow incident dumpstate:unix_stream_socket { read write }; 16 allow incident shell_data_file:file write; 19 allow incident devpts:chr_file { read write }; 21 # allow incident to communicate use, read and write over the adb 24 allow incident adbd:unix_stream_socket { read write }; 34 allow incident incidentd:fifo_file write;
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | incident.te | 12 # allow incident to communicate with dumpstate, and write incident report to 15 allow incident dumpstate:unix_stream_socket { read write }; 16 allow incident shell_data_file:file write; 19 allow incident devpts:chr_file { read write }; 21 # allow incident to communicate use, read and write over the adb 24 allow incident adbd:unix_stream_socket { read write }; 34 allow incident incidentd:fifo_file write;
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | incident.te | 12 # allow incident to communicate with dumpstate, and write incident report to 15 allow incident dumpstate:unix_stream_socket { read write }; 16 allow incident shell_data_file:file write; 19 allow incident devpts:chr_file { read write }; 21 # allow incident to communicate use, read and write over the adb 24 allow incident adbd:unix_stream_socket { read write }; 34 allow incident incidentd:fifo_file write;
|