Home
last modified time | relevance | path

Searched refs:all (Results 1 – 25 of 904) sorted by relevance

12345678910>>...37

/system/linkerconfig/testdata/
Dprepare_root.sh20 all=
34 --all)
35 all=yes
57 if [ ! -z $bootstrap ] && [ ! -z $all ]; then
64 elif [ ! -z $all ]; then
/system/sepolicy/private/
Dseapp_contexts105 # levelFrom (string; one of none, all, app, or user)
118 # levelFrom=all determines the level from both UID and user ID.
121 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
132 # regular expressions exists on all input and output selectors. Neverallow
133 # rules are never output to the built seapp_contexts file. Like all keywords,
134 # neverallows are case-insensitive. A neverallow is asserted when all key value
182 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
184 …rue name=com.android.DeviceAsWebcam domain=device_as_webcam type=system_app_data_file levelFrom=all
190 user=secure_element seinfo=platform domain=secure_element levelFrom=all
192 user=shared_relro domain=shared_relro levelFrom=all
[all …]
Drkpd_app.te18 # Grant access to the normal services that are available to all apps
22 # access is granted to all other apps already (e.g. untrusted_app_all).
/system/sepolicy/prebuilts/api/34.0/private/
Dseapp_contexts93 # levelFrom (string; one of none, all, app, or user)
106 # levelFrom=all determines the level from both UID and user ID.
109 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
120 # regular expressions exists on all input and output selectors. Neverallow
121 # rules are never output to the built seapp_contexts file. Like all keywords,
122 # neverallows are case-insensitive. A neverallow is asserted when all key value
170 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
172 …rue name=com.android.DeviceAsWebcam domain=device_as_webcam type=system_app_data_file levelFrom=all
176 user=secure_element seinfo=platform domain=secure_element levelFrom=all
178 user=shared_relro domain=shared_relro levelFrom=all
[all …]
Drkpd_app.te17 # Grant access to the normal services that are available to all apps
21 # access is granted to all other apps already (e.g. untrusted_app_all).
/system/sepolicy/prebuilts/api/202404/private/
Dseapp_contexts105 # levelFrom (string; one of none, all, app, or user)
118 # levelFrom=all determines the level from both UID and user ID.
121 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
132 # regular expressions exists on all input and output selectors. Neverallow
133 # rules are never output to the built seapp_contexts file. Like all keywords,
134 # neverallows are case-insensitive. A neverallow is asserted when all key value
182 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
184 …rue name=com.android.DeviceAsWebcam domain=device_as_webcam type=system_app_data_file levelFrom=all
190 user=secure_element seinfo=platform domain=secure_element levelFrom=all
192 user=shared_relro domain=shared_relro levelFrom=all
[all …]
Drkpd_app.te18 # Grant access to the normal services that are available to all apps
22 # access is granted to all other apps already (e.g. untrusted_app_all).
/system/sepolicy/prebuilts/api/33.0/private/
Dseapp_contexts70 # levelFrom (string; one of none, all, app, or user)
83 # levelFrom=all determines the level from both UID and user ID.
86 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
97 # regular expressions exists on all input and output selectors. Neverallow
98 # rules are never output to the built seapp_contexts file. Like all keywords,
99 # neverallows are case-insensitive. A neverallow is asserted when all key value
144 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
145 …App=true name=com.android.remoteprovisioner domain=remote_prov_app type=app_data_file levelFrom=all
150 user=secure_element seinfo=platform domain=secure_element levelFrom=all
152 user=shared_relro domain=shared_relro levelFrom=all
[all …]
/system/tools/aidl/
Dpermission.cpp33 if (const auto& all = std::get_if<AllOf>(&expr); all) { in AsJavaAnnotation() local
34 return all->JavaAnnotation(); in AsJavaAnnotation()
/system/sepolicy/prebuilts/api/32.0/private/
Dseapp_contexts76 # levelFrom (string; one of none, all, app, or user)
89 # levelFrom=all determines the level from both UID and user ID.
92 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
103 # regular expressions exists on all input and output selectors. Neverallow
104 # rules are never output to the built seapp_contexts file. Like all keywords,
105 # neverallows are case-insensitive. A neverallow is asserted when all key value
145 …er=_app isPrivApp=true name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
146 …App=true name=com.android.remoteprovisioner domain=remote_prov_app type=app_data_file levelFrom=all
151 user=secure_element seinfo=platform domain=secure_element levelFrom=all
153 user=shared_relro domain=shared_relro levelFrom=all
[all …]
/system/sepolicy/prebuilts/api/31.0/private/
Dseapp_contexts76 # levelFrom (string; one of none, all, app, or user)
89 # levelFrom=all determines the level from both UID and user ID.
92 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
103 # regular expressions exists on all input and output selectors. Neverallow
104 # rules are never output to the built seapp_contexts file. Like all keywords,
105 # neverallows are case-insensitive. A neverallow is asserted when all key value
145 …er=_app isPrivApp=true name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
146 …App=true name=com.android.remoteprovisioner domain=remote_prov_app type=app_data_file levelFrom=all
151 user=secure_element seinfo=platform domain=secure_element levelFrom=all
153 user=shared_relro domain=shared_relro levelFrom=all
[all …]
/system/chre/build/
Dcommon.mk21 .PHONY: all
22 all:
28 MAKECMDGOALS = all
/system/sepolicy/prebuilts/api/30.0/private/
Dseapp_contexts76 # levelFrom (string; one of none, all, app, or user)
88 # levelFrom=all determines the level from both UID and user ID.
91 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
102 # regular expressions exists on all input and output selectors. Neverallow
103 # rules are never output to the built seapp_contexts file. Like all keywords,
104 # neverallows are case-insensitive. A neverallow is asserted when all key value
144 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
147 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file
149 user=secure_element seinfo=platform domain=secure_element levelFrom=all
158 user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all
[all …]
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/apex/tests/testdata/vendorapex/
Dfoo.apex.all.ready.rc1 on property:apex.all.ready=true
2 setprop vendor.test.apex.all.ready triggered
/system/sepolicy/prebuilts/api/29.0/private/
Dseapp_contexts76 # levelFrom (string; one of none, all, app, or user)
88 # levelFrom=all determines the level from both UID and user ID.
91 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
102 # regular expressions exists on all input and output selectors. Neverallow
103 # rules are never output to the built seapp_contexts file. Like all keywords,
104 # neverallows are case-insensitive. A neverallow is asserted when all key value
143 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
146 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file
148 user=secure_element seinfo=platform domain=secure_element levelFrom=all
153 user=_isolated domain=isolated_app levelFrom=all
[all …]
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/tools/hidl/scripts/
Dhidl2aidl-all-interfaces.sh8 function hidl2aidl-all-interfaces-main() {
26 hidl2aidl-all-interfaces-main
Dhal-queries.sh37 function all-interfaces() {
77 comm -3 <(all-interfaces "$package_root" "$package") <(current-interfaces "$package_root")
102 all-interfaces "$ANDROID_BUILD_TOP/$path" "$root"
/system/chre/external/
Dgoogletest.mk18 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLETEST_PATH)/src/gtest-all.cc
23 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLEMOCK_PATH)/src/gmock-all.cc
/system/extras/tests/timetest/
DAndroid.bp7 // all of the 'license_kinds' from "system_extras_tests_license"
16 "-fstack-protector-all",
/system/sepolicy/public/
Dapp.te2 ### Domain for all zygote spawned apps
4 ### This file is the base policy for all zygote spawned apps.
/system/netd/client/
DAndroid.bp19 // all of the 'license_kinds' from "system_netd_license"
75 recover: ["all"],
100 recover: ["all"],
/system/memory/libmemunreachable/
DREADME.md6 …detector. It uses an imprecise mark-and-sweep garbage collector pass over all native memory, repo…
44 When enabling backtracing on all allocations, it is possible to have
78 the backtrace\_min\_size and backtrace\_max\_size options to cover all
137 …6. *Original process*: Allocations are re-enabled using `malloc_enable()`, but all threads are sti…
138 …ormal `fork()`. The sweeper process has a copy of all memory from the original process, including…
139 8. Collection process releases all threads from `ptrace` and exits
141 …10. *Sweeper process*: A list of all active allocations is produced by examining the memory mappin…
142 …11. A list of all roots is produced from globals (.data and .bss sections of binaries), and regist…
164 - `malloc enable()`: re-enable allocations in all threads.
/system/tools/aidl/metadata/
DAndroid.bp1 // build time C++ available list of all AIDL interfaces in the tree
5 // all of the 'license_kinds' from "system_tools_aidl_license"

12345678910>>...37