/system/memory/libmemunreachable/ |
D | ScopedDisableMalloc.h | 33 ~DisableMallocGuard() { Enable(); } in ~DisableMallocGuard() 42 void Enable() { in Enable() function 65 ~ScopedDisableMalloc() { disable_malloc_.Enable(); } in ~ScopedDisableMalloc() 79 ~ScopedDisableMallocTimeout() { Enable(); } in ~ScopedDisableMallocTimeout() 83 void Enable() { in Enable() function 84 disable_malloc_.Enable(); in Enable() 91 disable_malloc_.Enable(); in Disable()
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls. 4 # Enable open permission check. 7 # Enable separate security classes for 14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls. 4 # Enable open permission check. 7 # Enable separate security classes for 14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls. 4 # Enable open permission check. 7 # Enable separate security classes for 14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
|
D | isolated_compute_app.te | 20 # Enable access to hardware services for camera functionalilites
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls. 4 # Enable open permission check. 7 # Enable separate security classes for 14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls. 4 # Enable open permission check. 7 # Enable separate security classes for 14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
|
/system/sepolicy/microdroid/system/private/ |
D | policy_capabilities | 1 # Enable new networking controls. 4 # Enable open permission check. 7 # Enable separate security classes for 14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
|
/system/sepolicy/prebuilts/api/202404/private/ |
D | policy_capabilities | 1 # Enable new networking controls. 4 # Enable open permission check. 7 # Enable separate security classes for 14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
|
D | isolated_compute_app.te | 20 # Enable access to hardware services for camera functionalilites
|
/system/sepolicy/private/ |
D | policy_capabilities | 1 # Enable new networking controls. 4 # Enable open permission check. 7 # Enable separate security classes for 14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
|
D | isolated_compute_app.te | 20 # Enable access to hardware services for camera functionalilites
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls. 4 # Enable open permission check. 7 # Enable separate security classes for 14 # Enable NoNewPrivileges support. Requires libsepol 2.7+
|
/system/chre/platform/zephyr/ |
D | Kconfig | 26 bool "Enable CHRE assertions" 32 bool "Enable audio support" 38 bool "Enable GNSS support" 44 bool "Enable sensor support" 50 bool "Enable WiFi support"
|
/system/chre/ |
D | chre_flags.aconfig | 74 description: "Enable the reliable message APIs" 81 description: "Enable support for reliable messages in CHRE" 88 description: "Enable duplicate detection for reliable messages in the Context Hub Service" 95 description: "Enable retries for reliable messages in the Context Hub Service"
|
/system/logging/logd/ |
D | README.property | 4 ro.logd.auditd bool true Enable selinux audit daemon 8 persist.logd.security bool false Enable security buffer. 10 ro.logd.kernel bool svelte+ Enable klogd daemon 13 logd.logpersistd string persist Enable logpersist daemon, "logcatd" 19 persist.logd.logpersistd string Enable logpersist daemon, "logcatd"
|
/system/media/camera/ |
D | Android.bp | 48 // Enable assert()
|
/system/extras/profcollectd/libprofcollectd/ |
D | Android.bp | 64 // Enable 'test' feature for more verbose logging and the logging trace provider.
|
/system/libcppbor/include/cppbor/ |
D | cppbor.h | 620 template <typename... Args, typename Enable> 627 template <typename T, typename Enable> 700 template <typename... Args, typename Enable> 736 template <typename Key, typename Enable> 964 template <typename T, typename V, typename Enable = void> 973 template <typename T, typename V, typename Enable = void> 983 template <typename T, typename Enable = void>
|
/system/core/fs_mgr/libsnapshot/android/snapshot/ |
D | snapshot.proto | 112 // Enable multi-threaded compression 115 // Enable batching for COW writes 230 // Enable direct reads from source device
|
/system/gsid/ |
D | gsi_tool.cpp | 53 static int Enable(sp<IGsiService> gsid, int argc, char** argv); 64 {"enable", Enable}, 658 static int Enable(sp<IGsiService> gsid, int argc, char** argv) { in Enable() function
|
/system/memory/libmemunreachable/tests/ |
D | HeapWalker_test.cpp | 94 disable_malloc_.Enable(); in TEST_F()
|
/system/core/init/ |
D | service.h | 90 Result<void> Enable();
|
/system/chre/chpp/ |
D | Android.bp | 54 // Enable assert (i.e. CHPP_ASSERT, ...)
|
/system/extras/app-launcher/ |
D | README | 15 5) Enable wifi and connect to a network (ex. GoogleGuest).
|