/frameworks/av/apex/ |
D | ld.config.txt | 28 namespace.default.permitted.paths = /system/${LIB} 29 namespace.default.asan.permitted.paths = /system/${LIB} 53 # Add /apex/... path to the permitted paths because linker uses realpath(3) 61 namespace.platform.permitted.paths = /apex/com.android.runtime/${LIB}/bionic 62 namespace.platform.asan.permitted.paths = /apex/com.android.runtime/${LIB}/bionic 77 namespace.sphal.permitted.paths = /odm/${LIB} 78 namespace.sphal.permitted.paths += /vendor/${LIB} 79 namespace.sphal.permitted.paths += /vendor/${LIB}/hw 80 namespace.sphal.permitted.paths += /system/vendor/${LIB} 87 namespace.sphal.asan.permitted.paths = /data/asan/odm/${LIB} [all …]
|
/frameworks/base/core/java/com/android/internal/os/ |
D | WrapperInit.java | 199 if (data[0].permitted != data[0].inheritable || in preserveCapabilities() 200 data[1].permitted != data[1].inheritable) { in preserveCapabilities() 201 data[0] = new StructCapUserData(data[0].effective, data[0].permitted, in preserveCapabilities() 202 data[0].permitted); in preserveCapabilities() 203 data[1] = new StructCapUserData(data[1].effective, data[1].permitted, in preserveCapabilities() 204 data[1].permitted); in preserveCapabilities()
|
/frameworks/base/core/java/android/security/ |
D | NetworkSecurityPolicy.java | 91 public void setCleartextTrafficPermitted(boolean permitted) { in setCleartextTrafficPermitted() argument 92 FrameworkNetworkSecurityPolicy policy = new FrameworkNetworkSecurityPolicy(permitted); in setCleartextTrafficPermitted()
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/ |
D | RestrictedLockUtilsInternal.java | 265 boolean permitted = true; in checkIfInputMethodDisallowed() 267 permitted = dpm.isInputMethodPermittedByAdmin(admin.component, in checkIfInputMethodDisallowed() 278 if (!permitted && !permittedByProfileAdmin) { in checkIfInputMethodDisallowed() 280 } else if (!permitted) { in checkIfInputMethodDisallowed() 319 boolean permitted = true; in checkIfAccessibilityServiceDisallowed() 321 permitted = dpm.isAccessibilityServicePermittedByAdmin(admin.component, in checkIfAccessibilityServiceDisallowed() 332 if (!permitted && !permittedByProfileAdmin) { in checkIfAccessibilityServiceDisallowed() 334 } else if (!permitted) { in checkIfAccessibilityServiceDisallowed()
|
/frameworks/base/packages/Tethering/src/com/android/networkstack/tethering/ |
D | EntitlementManager.java | 441 final boolean permitted = isCellularUpstreamPermitted(config); in evaluateCellularPermission() 445 + " to " + permitted); in evaluateCellularPermission() 448 if (mLastCellularUpstreamPermitted != permitted) { in evaluateCellularPermission() 449 mLog.log("Cellular permission change: " + permitted); in evaluateCellularPermission() 454 if (permitted && mCurrentEntitlementResults.size() > 0) { in evaluateCellularPermission() 459 mLastCellularUpstreamPermitted = permitted; in evaluateCellularPermission()
|
/frameworks/native/cmds/dumpstate/ |
D | DumpstateInternal.cpp | 116 capdata[cap_syslog_index].permitted |= cap_syslog_mask; in DropRootUser() 122 capdata[cap_block_suspend_index].permitted |= cap_block_suspend_mask; in DropRootUser()
|
/frameworks/native/services/vr/performanced/ |
D | main.cpp | 54 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].permitted |= CAP_TO_MASK(CAP_SYS_NICE); in main()
|
/frameworks/base/native/webview/plat_support/ |
D | LICENSE | 4 // modification, are permitted provided that the following conditions are
|
/frameworks/base/obex/ |
D | NOTICE | 6 modification, are permitted provided that the following conditions are met:
|
/frameworks/base/core/jni/ |
D | com_android_internal_os_Zygote.cpp | 658 static void SetCapabilities(uint64_t permitted, uint64_t effective, uint64_t inheritable, in SetCapabilities() argument 669 capdata[0].permitted = permitted; in SetCapabilities() 670 capdata[1].permitted = permitted >> 32; in SetCapabilities() 676 "failed: %s", permitted, effective, inheritable, strerror(errno))); in SetCapabilities()
|
D | android_util_AssetManager.cpp | 149 capdata.effective = capdata.permitted; in NativeVerifySystemIdmaps()
|
/frameworks/native/opengl/tests/angeles/ |
D | license-BSD.txt | 10 modification, are permitted provided that the following conditions
|
D | license-LGPL.txt | 6 Everyone is permitted to copy and distribute verbatim copies 338 permitted, and provided that you do these two things: 409 so that distribution is permitted only in or among countries not thus
|
/frameworks/rs/tests/java_api/RSUnitTests/src/com/android/rs/unittest/ |
D | bitfield.rscript | 23 // one of these structures, it is permitted to inspect the common
|
/frameworks/compile/slang/lit-tests/padding/ |
D | bitfield.rscript | 29 // one of these structures, it is permitted to inspect the common
|
/frameworks/rs/tests/java_api/RSUnitTests/supportlibsrc_gen/com/android/rs/unittest/ |
D | bitfield.rscript | 25 // one of these structures, it is permitted to inspect the common
|
/frameworks/ml/nn/extensions/ |
D | README.md | 20 A list of Android apps and binaries permitted to use NNAPI vendor extensions is
|
/frameworks/ml/nn/runtime/ |
D | NOTICE | 538 permitted under the terms of Section 3.3). 688 * permitted above, be liable to You for any direct, indirect, * 837 modification, are permitted provided that the following conditions are met: 884 modification, are permitted provided that the following conditions are met:
|
/frameworks/compile/libbcc/ |
D | NOTICE | 284 * modification, are permitted provided that the following conditions
|
/frameworks/base/config/ |
D | hiddenapi-greylist-max-o.txt | 65453 Landroid/system/StructCapUserData;->permitted:I 112999 Lsun/security/x509/NameConstraintsExtension;->permitted:Lsun/security/x509/GeneralSubtrees;
|