/external/sepolicy/ |
D | attributes | 57 # All domains that can override MLS restrictions. 65 # All domains used for apps. 68 # All domains used for apps with network access. 71 # All domains used for apps with bluetooth access. 74 # All domains used for binder service domains.
|
D | domain.te | 1 # Rules for all domains. 114 # Kernel and init never run anything without changing domains. 180 # with other UIDs to these whitelisted domains. 191 # Limit device node creation to these whitelisted domains. 200 # Limit raw I/O to these whitelisted domains. 238 # switching domains, there is never any need to setenforce again by init. 282 # Limit what domains can mount filesystems or change their mount flags. 283 # sdcard_type / vfat is exempt as a larger set of domains need 284 # this capability, including device-specific domains. 289 # outside the rootfs or /system partition except for a few whitelisted domains. [all …]
|
D | bluetooth.te | 20 # Other domains that can create and use bluetooth sockets. 25 # specific class defined. Consider taking to specific domains.
|
/external/chromium-trace/trace-viewer/third_party/WebOb/webob/ |
D | cookies.py | 648 domains=None, argument 656 self.domains = domains 678 self.domains, 705 def set_cookies(self, response, value, domains=_default, max_age=_default, argument 710 domains=domains, 719 def get_headers(self, value, domains=_default, max_age=_default, argument 734 domains=domains, 741 def _get_cookies(self, value, domains, max_age, path, secure, httponly): argument 757 if domains is _default: 758 domains = self.domains [all …]
|
/external/mesa3d/src/gallium/drivers/radeonsi/ |
D | r600_buffer.c | 122 uint32_t initial_domain, domains; in si_init_resource() local 129 domains = RADEON_DOMAIN_GTT; in si_init_resource() 132 domains = RADEON_DOMAIN_GTT | RADEON_DOMAIN_VRAM; in si_init_resource() 155 res->domains = domains; in si_init_resource()
|
D | r600_hw_context_priv.h | 42 return ctx->ws->cs_add_reloc(ctx->cs, rbo->cs_buf, usage, rbo->domains) * 4; in r600_context_bo_reloc()
|
/external/jetty/src/java/org/eclipse/jetty/util/ |
D | HostMap.java | 87 HashSet<String> domains = new HashSet<String>(); in getLazyMatches() local 89 domains.add(domain); in getLazyMatches() 99 if (domains.contains(entry.getKey())) in getLazyMatches()
|
/external/libdrm/nouveau/ |
D | pushbuf.c | 84 uint32_t *domains) in pushbuf_kref_fits() argument 97 if (*domains == NOUVEAU_GEM_DOMAIN_VRAM) { in pushbuf_kref_fits() 116 if ((*domains & NOUVEAU_GEM_DOMAIN_VRAM) && in pushbuf_kref_fits() 118 *domains &= NOUVEAU_GEM_DOMAIN_VRAM; in pushbuf_kref_fits() 159 uint32_t domains, domains_wr, domains_rd; in pushbuf_kref() local 161 domains = 0; in pushbuf_kref() 163 domains |= NOUVEAU_GEM_DOMAIN_VRAM; in pushbuf_kref() 165 domains |= NOUVEAU_GEM_DOMAIN_GART; in pushbuf_kref() 166 domains_wr = domains * !!(flags & NOUVEAU_BO_WR); in pushbuf_kref() 167 domains_rd = domains * !!(flags & NOUVEAU_BO_RD); in pushbuf_kref() [all …]
|
/external/mesa3d/src/gallium/drivers/r600/ |
D | r600_buffer.c | 202 uint32_t initial_domain, domains; in r600_init_resource() local 209 domains = RADEON_DOMAIN_GTT; in r600_init_resource() 212 domains = RADEON_DOMAIN_GTT | RADEON_DOMAIN_VRAM; in r600_init_resource() 235 res->domains = domains; in r600_init_resource()
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
D | manpage.py | 94 domains = None variable 96 global domains 97 if domains: 98 return domains 99 domains = [] 105 if domain in domains: 107 domains.append(domain) 110 if role[:-2] in domains or role == "system_r": 112 domains.append(role[:-2]) 114 domains.sort() [all …]
|
/external/libdrm/radeon/ |
D | radeon_bo_gem.c | 67 uint32_t domains, in bo_open() argument 82 bo->base.domains = domains; in bo_open() 105 args.initial_domain = bo->base.domains; in bo_open() 115 fprintf(stderr, " domains : %d\n", bo->base.domains); in bo_open() 388 bo->base.domains = RADEON_GEM_DOMAIN_GTT; in radeon_gem_bo_open_prime()
|
D | radeon_bo_int.h | 16 uint32_t domains; member 29 uint32_t domains,
|
D | radeon_bo.c | 49 uint32_t alignment, uint32_t domains, uint32_t flags) in radeon_bo_open() argument 52 bo = bom->funcs->bo_open(bom, handle, size, alignment, domains, flags); in radeon_bo_open()
|
/external/parameter-framework/tools/coverage/ |
D | aplog2coverage.sh | 64 --longoptions "help,domains:,ouput:,regexp:,parser_option:,force" \ 78 -d|--domains)
|
D | coverage.py | 731 def __init__(self, domains, criteria, ErrorsToIgnore=()): argument 733 self.domains = domains; 835 self.domains.operationOnChild(path, usedOperation) 881 self.domains = Domains("Domains") 882 self.domains.populate(dom) 883 self.addChild(self.domains) 1057 parser = ParsePFWlog(root.domains, root.criteria, commandLineArguments.errorToIgnore)
|
D | README.md | 25 remote-process <host> <port> getDomainsWithSettingsXML > domains.xml 45 $ aplog2coverage.sh -d domains.xml -e<some_regex> coverage.log -o coverageReport.html
|
/external/selinux/policycoreutils/sepolicy/sepolicy/help/ |
D | lockdown_permissive.txt | 4 Disabling the 'permissivedomains' module allows you to remove all permissive domains shipped with t… 10 Note if you disable the permissive domains module, you may see an increase in the denials in your l…
|
D | lockdown_unconfined.txt | 4 … have SELinux Policy defined for them, run as initrc_t or init_t. These domains are unconfined by… 6 Disabling the unconfined module will leave certain unconfined domains running on your system, speci…
|
/external/apache-harmony/security/src/test/api/java/tests/api/java/security/ |
D | DomainCombinerTest.java | 70 ProtectionDomain[] domains = new ProtectionDomain[] { new ProtectionDomain( in test_combine$Ljava_security_ProtectionDomain$Ljava_security_ProtectionDomain() local 73 AccessControlContext parent = new AccessControlContext(domains); in test_combine$Ljava_security_ProtectionDomain$Ljava_security_ProtectionDomain()
|
/external/chromium-trace/trace-viewer/third_party/webapp2/webapp2_extras/ |
D | i18n.py | 103 domains = None variable in I18nStore 129 self.domains = config['domains'] 187 self.domains) 193 def load_translations(self, dirname, locales, domains): argument 208 for domain in domains:
|
/external/selinux/sepolgen/src/sepolgen/ |
D | policygen.py | 85 self.domains = None 185 if not self.domains: 186 self.domains = seinfo(ATTRIBUTE, name="domain")[0]["types"] 190 if i not in self.domains:
|
/external/sepolicy/tools/sepolicy-analyze/ |
D | README | 23 or - the domains that would in fact have different accesses to the 51 Displays domains in the policy that are permissive, i.e. avc 52 denials are logged but not enforced for these domains. While 53 permissive domains can be helpful during development, they
|
/external/mesa3d/src/gallium/winsys/radeon/drm/ |
D | radeon_drm_cs.c | 250 enum radeon_bo_domain domains, in radeon_add_reloc() argument 256 enum radeon_bo_domain rd = usage & RADEON_USAGE_READ ? domains : 0; in radeon_add_reloc() 257 enum radeon_bo_domain wd = usage & RADEON_USAGE_WRITE ? domains : 0; in radeon_add_reloc() 317 enum radeon_bo_domain domains) in radeon_drm_cs_add_reloc() argument 323 unsigned index = radeon_add_reloc(cs->csc, bo, usage, domains, &added_domains); in radeon_drm_cs_add_reloc()
|
/external/parameter-framework/tools/xmlGenerator/ |
D | README.md | 35 A domain group can contain other domain groups and domains. Those inner domains 58 will create the domains : 62 all configurations inside the `Codec.Configure.*` domains) 202 [--add-domains XML_DOMAIN_FILE [XML_DOMAIN_FILE ...]]
|
/external/selinux/policycoreutils/gui/ |
D | domainsPage.py | 71 self.domains=get_all_entrypoint_domains() 88 for domain in self.domains:
|