/system/tools/aidl/ |
D | aidl_checkapi.cpp | 66 static bool have_compatible_annotations(const AidlAnnotatable& older, in have_compatible_annotations() argument 68 set<AidlAnnotation> olderAnnotations = get_strict_annotations(older); in have_compatible_annotations() 72 const string from = older.ToString().empty() ? "(empty)" : older.ToString(); in have_compatible_annotations() 80 static bool are_compatible_types(const AidlTypeSpecifier& older, const AidlTypeSpecifier& newer) { in are_compatible_types() argument 82 if (older.ToString() != newer.ToString()) { in are_compatible_types() 83 AIDL_ERROR(newer) << "Type changed: " << older.ToString() << " to " << newer.ToString() << "."; in are_compatible_types() 86 compatible &= have_compatible_annotations(older, newer); in are_compatible_types() 90 static bool are_compatible_interfaces(const AidlInterface& older, const AidlInterface& newer) { in are_compatible_interfaces() argument 92 compatible &= have_compatible_annotations(older, newer); in are_compatible_interfaces() 99 for (const auto& old_m : older.AsInterface()->GetMethods()) { in are_compatible_interfaces() [all …]
|
/system/sepolicy/prebuilts/api/27.0/private/compat/26.0/ |
D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 30 ;; older policy, but that should not remain accessible to vendor policy.
|
/system/sepolicy/prebuilts/api/28.0/private/compat/27.0/ |
D | 27.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 130 ;; older policy, but that should not remain accessible to vendor policy.
|
/system/sepolicy/private/compat/30.0/ |
D | 30.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to
|
/system/sepolicy/prebuilts/api/28.0/private/compat/26.0/ |
D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 152 ;; older policy, but that should not remain accessible to vendor policy.
|
/system/sepolicy/prebuilts/api/30.0/private/compat/27.0/ |
D | 27.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 200 ;; older policy, but that should not remain accessible to vendor policy.
|
/system/sepolicy/prebuilts/api/29.0/private/compat/27.0/ |
D | 27.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 194 ;; older policy, but that should not remain accessible to vendor policy.
|
/system/sepolicy/private/compat/26.0/ |
D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 230 ;; older policy, but that should not remain accessible to vendor policy.
|
/system/sepolicy/prebuilts/api/30.0/private/compat/26.0/ |
D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 222 ;; older policy, but that should not remain accessible to vendor policy.
|
/system/sepolicy/prebuilts/api/29.0/private/compat/26.0/ |
D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 216 ;; older policy, but that should not remain accessible to vendor policy.
|
/system/sepolicy/private/compat/27.0/ |
D | 27.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 250 ;; older policy, but that should not remain accessible to vendor policy.
|
/system/core/debuggerd/seccomp_policy/ |
D | crash_dump.policy.def | 39 libminijail on vendor partitions older than P does not have constants from <sys/mman.h>.
|
/system/sepolicy/prebuilts/api/30.0/private/compat/29.0/ |
D | 29.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to
|
/system/sepolicy/private/compat/29.0/ |
D | 29.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to
|
/system/sepolicy/prebuilts/api/30.0/private/compat/28.0/ |
D | 28.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to
|
/system/sepolicy/private/compat/28.0/ |
D | 28.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to
|
/system/sepolicy/prebuilts/api/29.0/private/compat/28.0/ |
D | 28.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | update_engine_common.te | 12 # the update to an older version (channel change) or incompatible version
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | update_engine_common.te | 12 # the update to an older version (channel change) or incompatible version
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | update_engine_common.te | 12 # the update to an older version (channel change) or incompatible version
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | update_engine_common.te | 24 # the update to an older version (channel change) or incompatible version
|
/system/core/fs_mgr/libsnapshot/update_engine/ |
D | update_metadata.proto | 27 // It is okay that this file is older than
|
/system/update_engine/ |
D | README.md | 176 downgrade the installed image to an older version. It is very similar to a 177 normal system update, except that an older update payload is downloaded and 240 (especially if it's a much older version) and is securely verifiable. This 360 major version should be done with utmost care because older clients do not know 550 can correctly be applied to older devices that run older versions of the update 552 proto file might break older clients. Or passing operations that are not 553 understood in older clients will break them. Whenever changing anything in the 554 payload generation process, ask yourself this question: Would it work on older 558 to accept an older update payload. Normally this happens using a full payload, 565 * How can the change be implemented that five years from now older clients [all …]
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | update_engine_common.te | 24 # the update to an older version (channel change) or incompatible version
|
/system/sepolicy/public/ |
D | update_engine_common.te | 24 # the update to an older version (channel change) or incompatible version
|