/system/extras/simpleperf/ |
D | Android.mk | 21 $(filter-out scripts/update.py,$(call all-named-files-under,*.py,scripts)) \ 25 $(call all-named-files-under,*,scripts/script_testdata) \ 26 $(call all-named-files-under,*.js,scripts) \ 27 $(call all-named-files-under,*.css,scripts) \ 28 $(call all-named-files-under,*,doc) \ 29 $(call all-named-files-under,app-profiling.apk,demo) \ 30 $(call all-named-files-under,*.so,demo) \ 31 $(call all-cpp-files-under,demo) \ 32 $(call all-java-files-under,demo) \ 33 $(call all-named-files-under,*.kt,demo) \ [all …]
|
/system/bt/gd/packet/ |
D | packet_view_unittest.cc | 307 auto all = this->packet->begin(); in TYPED_TEST() local 308 size_t remaining = all.NumBytesRemaining(); in TYPED_TEST() 310 ASSERT_EQ(remaining, all.NumBytesRemaining()); in TYPED_TEST() 311 all++; in TYPED_TEST() 314 ASSERT_EQ(static_cast<size_t>(0), all.NumBytesRemaining()); in TYPED_TEST() 315 ASSERT_DEATH(*(all++), ""); in TYPED_TEST() 316 all++; in TYPED_TEST() 317 ASSERT_EQ(static_cast<size_t>(0), all.NumBytesRemaining()); in TYPED_TEST() 318 ASSERT_DEATH(*(all++), ""); in TYPED_TEST() 330 auto all = this->packet->begin(); in TYPED_TEST() local [all …]
|
/system/linkerconfig/testdata/ |
D | prepare_root.sh | 20 all= 34 --all) 35 all=yes 57 if [ ! -z $bootstrap ] && [ ! -z $all ]; then 64 elif [ ! -z $all ]; then
|
/system/chre/build/ |
D | common.mk | 21 .PHONY: all 22 all: 28 MAKECMDGOALS = all
|
/system/sepolicy/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=all determines the level from both UID and user ID. 91 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 102 # regular expressions exists on all input and output selectors. Neverallow 103 # rules are never output to the built seapp_contexts file. Like all keywords, 104 # neverallows are case-insensitive. A neverallow is asserted when all key value 144 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 147 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file 149 user=secure_element seinfo=platform domain=secure_element levelFrom=all 154 user=_isolated domain=isolated_app levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=all determines the level from both UID and user ID. 91 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 102 # regular expressions exists on all input and output selectors. Neverallow 103 # rules are never output to the built seapp_contexts file. Like all keywords, 104 # neverallows are case-insensitive. A neverallow is asserted when all key value 144 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 147 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file 149 user=secure_element seinfo=platform domain=secure_element levelFrom=all 154 user=_isolated domain=isolated_app levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=all determines the level from both UID and user ID. 91 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 102 # regular expressions exists on all input and output selectors. Neverallow 103 # rules are never output to the built seapp_contexts file. Like all keywords, 104 # neverallows are case-insensitive. A neverallow is asserted when all key value 143 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 146 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file 148 user=secure_element seinfo=platform domain=secure_element levelFrom=all 153 user=_isolated domain=isolated_app levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/chre/external/ |
D | external.mk | 22 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLETEST_PATH)/src/gtest-all.cc 27 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLEMOCK_PATH)/src/gmock-all.cc
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | seapp_contexts | 50 # levelFrom (string; one of none, all, app, or user) 55 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 62 # regular expressions exists on all input and output selectors. Neverallow 63 # rules are never output to the built seapp_contexts file. Like all keywords, 64 # neverallows are case-insensitive. A neverallow is asserted when all key value 102 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 106 user=secure_element seinfo=platform domain=secure_element levelFrom=all 111 user=_isolated domain=isolated_app levelFrom=all 114 user=_app isV2App=true isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all 116 user=_app minTargetSdkVersion=28 domain=untrusted_app type=app_data_file levelFrom=all
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/bt/ |
D | BUILD.gn | 18 # file, and recursively load all dependencies until all dependencies are either 23 # This pulls in main/BUILD.gn and all of its dependencies.
|
/system/tools/hidl/scripts/ |
D | hal-queries.sh | 37 function all-interfaces() { 77 comm -3 <(all-interfaces "$package_root" "$package") <(current-interfaces "$package_root") 102 all-interfaces "$ANDROID_BUILD_TOP/$path" "$root"
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 10 ### directory). The untrusted_app_all attribute is assigned to all default 14 ### attribute is assigned to all non-system apps as well as to any system apps 21 ### Note that rules that should apply to all untrusted apps must be in app.te or also 65 # allow cts to query all services 83 # in /data/misc/perfprofd/. GMS core will need to list all
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 10 ### directory). The untrusted_app_all attribute is assigned to all default 14 ### attribute is assigned to all non-system apps as well as to any system apps 21 ### Note that rules that should apply to all untrusted apps must be in app.te or also 62 # allow cts to query all services 81 # in /data/misc/perfprofd/. GMS core will need to list all
|
/system/memory/libmemunreachable/ |
D | README.md | 6 …detector. It uses an imprecise mark-and-sweep garbage collector pass over all native memory, repo… 63 …6. *Original process*: Allocations are re-enabled using `malloc_enable()`, but all threads are sti… 64 …ormal `fork()`. The sweeper process has a copy of all memory from the original process, including… 65 8. Collection process releases all threads from `ptrace` and exits 67 …10. *Sweeper process*: A list of all active allocations is produced by examining the memory mappin… 68 …11. A list of all roots is produced from globals (.data and .bss sections of binaries), and regist… 90 - `malloc enable()`: re-enable allocations in all threads.
|
/system/extras/ |
D | Android.mk | 17 include $(all-subdir-makefiles)
|
/system/core/fs_mgr/ |
D | fs_mgr_remount.cpp | 237 android::fs_mgr::Fstab all; in do_remount() local 243 all.emplace_back(entry); in do_remount() 274 it = std::find_if(all.begin(), all.end(), find_part); in do_remount() 275 if (it == all.end()) { in do_remount() 286 partitions = all; in do_remount()
|
/system/extras/tests/ |
D | Android.mk | 1 include $(call all-subdir-makefiles)
|
/system/bt/tools/ |
D | Android.mk.disabled | 1 include $(call all-subdir-makefiles)
|
/system/libhidl/transport/memory/1.0/ |
D | IMemory.hal | 22 * Notify that you are about to use all of this memory. 37 * Notify that you are about to start reading all of this memory. 52 * Must commit all previous update's and updateAll's.
|