Searched refs:all (Results 1 – 25 of 904) sorted by relevance
12345678910>>...37
/system/linkerconfig/testdata/ |
D | prepare_root.sh | 20 all= 34 --all) 35 all=yes 57 if [ ! -z $bootstrap ] && [ ! -z $all ]; then 64 elif [ ! -z $all ]; then
|
/system/sepolicy/private/ |
D | seapp_contexts | 105 # levelFrom (string; one of none, all, app, or user) 118 # levelFrom=all determines the level from both UID and user ID. 121 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 132 # regular expressions exists on all input and output selectors. Neverallow 133 # rules are never output to the built seapp_contexts file. Like all keywords, 134 # neverallows are case-insensitive. A neverallow is asserted when all key value 182 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 184 …rue name=com.android.DeviceAsWebcam domain=device_as_webcam type=system_app_data_file levelFrom=all 190 user=secure_element seinfo=platform domain=secure_element levelFrom=all 192 user=shared_relro domain=shared_relro levelFrom=all [all …]
|
D | rkpd_app.te | 18 # Grant access to the normal services that are available to all apps 22 # access is granted to all other apps already (e.g. untrusted_app_all).
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | seapp_contexts | 93 # levelFrom (string; one of none, all, app, or user) 106 # levelFrom=all determines the level from both UID and user ID. 109 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 120 # regular expressions exists on all input and output selectors. Neverallow 121 # rules are never output to the built seapp_contexts file. Like all keywords, 122 # neverallows are case-insensitive. A neverallow is asserted when all key value 170 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 172 …rue name=com.android.DeviceAsWebcam domain=device_as_webcam type=system_app_data_file levelFrom=all 176 user=secure_element seinfo=platform domain=secure_element levelFrom=all 178 user=shared_relro domain=shared_relro levelFrom=all [all …]
|
D | rkpd_app.te | 17 # Grant access to the normal services that are available to all apps 21 # access is granted to all other apps already (e.g. untrusted_app_all).
|
/system/sepolicy/prebuilts/api/202404/private/ |
D | seapp_contexts | 105 # levelFrom (string; one of none, all, app, or user) 118 # levelFrom=all determines the level from both UID and user ID. 121 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 132 # regular expressions exists on all input and output selectors. Neverallow 133 # rules are never output to the built seapp_contexts file. Like all keywords, 134 # neverallows are case-insensitive. A neverallow is asserted when all key value 182 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 184 …rue name=com.android.DeviceAsWebcam domain=device_as_webcam type=system_app_data_file levelFrom=all 190 user=secure_element seinfo=platform domain=secure_element levelFrom=all 192 user=shared_relro domain=shared_relro levelFrom=all [all …]
|
D | rkpd_app.te | 18 # Grant access to the normal services that are available to all apps 22 # access is granted to all other apps already (e.g. untrusted_app_all).
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | seapp_contexts | 70 # levelFrom (string; one of none, all, app, or user) 83 # levelFrom=all determines the level from both UID and user ID. 86 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 97 # regular expressions exists on all input and output selectors. Neverallow 98 # rules are never output to the built seapp_contexts file. Like all keywords, 99 # neverallows are case-insensitive. A neverallow is asserted when all key value 144 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 145 …App=true name=com.android.remoteprovisioner domain=remote_prov_app type=app_data_file levelFrom=all 150 user=secure_element seinfo=platform domain=secure_element levelFrom=all 152 user=shared_relro domain=shared_relro levelFrom=all [all …]
|
/system/tools/aidl/ |
D | permission.cpp | 33 if (const auto& all = std::get_if<AllOf>(&expr); all) { in AsJavaAnnotation() local 34 return all->JavaAnnotation(); in AsJavaAnnotation()
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 89 # levelFrom=all determines the level from both UID and user ID. 92 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 103 # regular expressions exists on all input and output selectors. Neverallow 104 # rules are never output to the built seapp_contexts file. Like all keywords, 105 # neverallows are case-insensitive. A neverallow is asserted when all key value 145 …er=_app isPrivApp=true name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 146 …App=true name=com.android.remoteprovisioner domain=remote_prov_app type=app_data_file levelFrom=all 151 user=secure_element seinfo=platform domain=secure_element levelFrom=all 153 user=shared_relro domain=shared_relro levelFrom=all [all …]
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 89 # levelFrom=all determines the level from both UID and user ID. 92 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 103 # regular expressions exists on all input and output selectors. Neverallow 104 # rules are never output to the built seapp_contexts file. Like all keywords, 105 # neverallows are case-insensitive. A neverallow is asserted when all key value 145 …er=_app isPrivApp=true name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 146 …App=true name=com.android.remoteprovisioner domain=remote_prov_app type=app_data_file levelFrom=all 151 user=secure_element seinfo=platform domain=secure_element levelFrom=all 153 user=shared_relro domain=shared_relro levelFrom=all [all …]
|
/system/chre/build/ |
D | common.mk | 21 .PHONY: all 22 all: 28 MAKECMDGOALS = all
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=all determines the level from both UID and user ID. 91 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 102 # regular expressions exists on all input and output selectors. Neverallow 103 # rules are never output to the built seapp_contexts file. Like all keywords, 104 # neverallows are case-insensitive. A neverallow is asserted when all key value 144 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 147 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file 149 user=secure_element seinfo=platform domain=secure_element levelFrom=all 158 user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/apex/tests/testdata/vendorapex/ |
D | foo.apex.all.ready.rc | 1 on property:apex.all.ready=true 2 setprop vendor.test.apex.all.ready triggered
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=all determines the level from both UID and user ID. 91 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 102 # regular expressions exists on all input and output selectors. Neverallow 103 # rules are never output to the built seapp_contexts file. Like all keywords, 104 # neverallows are case-insensitive. A neverallow is asserted when all key value 143 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 146 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file 148 user=secure_element seinfo=platform domain=secure_element levelFrom=all 153 user=_isolated domain=isolated_app levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/tools/hidl/scripts/ |
D | hidl2aidl-all-interfaces.sh | 8 function hidl2aidl-all-interfaces-main() { 26 hidl2aidl-all-interfaces-main
|
D | hal-queries.sh | 37 function all-interfaces() { 77 comm -3 <(all-interfaces "$package_root" "$package") <(current-interfaces "$package_root") 102 all-interfaces "$ANDROID_BUILD_TOP/$path" "$root"
|
/system/chre/external/ |
D | googletest.mk | 18 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLETEST_PATH)/src/gtest-all.cc 23 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLEMOCK_PATH)/src/gmock-all.cc
|
/system/extras/tests/timetest/ |
D | Android.bp | 7 // all of the 'license_kinds' from "system_extras_tests_license" 16 "-fstack-protector-all",
|
/system/sepolicy/public/ |
D | app.te | 2 ### Domain for all zygote spawned apps 4 ### This file is the base policy for all zygote spawned apps.
|
/system/netd/client/ |
D | Android.bp | 19 // all of the 'license_kinds' from "system_netd_license" 75 recover: ["all"], 100 recover: ["all"],
|
/system/memory/libmemunreachable/ |
D | README.md | 6 …detector. It uses an imprecise mark-and-sweep garbage collector pass over all native memory, repo… 44 When enabling backtracing on all allocations, it is possible to have 78 the backtrace\_min\_size and backtrace\_max\_size options to cover all 137 …6. *Original process*: Allocations are re-enabled using `malloc_enable()`, but all threads are sti… 138 …ormal `fork()`. The sweeper process has a copy of all memory from the original process, including… 139 8. Collection process releases all threads from `ptrace` and exits 141 …10. *Sweeper process*: A list of all active allocations is produced by examining the memory mappin… 142 …11. A list of all roots is produced from globals (.data and .bss sections of binaries), and regist… 164 - `malloc enable()`: re-enable allocations in all threads.
|
/system/tools/aidl/metadata/ |
D | Android.bp | 1 // build time C++ available list of all AIDL interfaces in the tree 5 // all of the 'license_kinds' from "system_tools_aidl_license"
|
12345678910>>...37