Home
last modified time | relevance | path

Searched refs:older (Results 1 – 25 of 34) sorted by relevance

12

/system/tools/aidl/
Daidl_checkapi.cpp66 static bool have_compatible_annotations(const AidlAnnotatable& older, in have_compatible_annotations() argument
68 set<AidlAnnotation> olderAnnotations = get_strict_annotations(older); in have_compatible_annotations()
72 const string from = older.ToString().empty() ? "(empty)" : older.ToString(); in have_compatible_annotations()
80 static bool are_compatible_types(const AidlTypeSpecifier& older, const AidlTypeSpecifier& newer) { in are_compatible_types() argument
82 if (older.ToString() != newer.ToString()) { in are_compatible_types()
83 AIDL_ERROR(newer) << "Type changed: " << older.ToString() << " to " << newer.ToString() << "."; in are_compatible_types()
86 compatible &= have_compatible_annotations(older, newer); in are_compatible_types()
90 static bool are_compatible_interfaces(const AidlInterface& older, const AidlInterface& newer) { in are_compatible_interfaces() argument
92 compatible &= have_compatible_annotations(older, newer); in are_compatible_interfaces()
99 for (const auto& old_m : older.AsInterface()->GetMethods()) { in are_compatible_interfaces()
[all …]
/system/sepolicy/prebuilts/api/27.0/private/compat/26.0/
D26.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
30 ;; older policy, but that should not remain accessible to vendor policy.
/system/sepolicy/prebuilts/api/28.0/private/compat/27.0/
D27.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
130 ;; older policy, but that should not remain accessible to vendor policy.
/system/sepolicy/private/compat/30.0/
D30.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
/system/sepolicy/prebuilts/api/28.0/private/compat/26.0/
D26.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
152 ;; older policy, but that should not remain accessible to vendor policy.
/system/sepolicy/prebuilts/api/30.0/private/compat/27.0/
D27.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
200 ;; older policy, but that should not remain accessible to vendor policy.
/system/sepolicy/prebuilts/api/29.0/private/compat/27.0/
D27.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
194 ;; older policy, but that should not remain accessible to vendor policy.
/system/sepolicy/private/compat/26.0/
D26.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
230 ;; older policy, but that should not remain accessible to vendor policy.
/system/sepolicy/prebuilts/api/30.0/private/compat/26.0/
D26.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
222 ;; older policy, but that should not remain accessible to vendor policy.
/system/sepolicy/prebuilts/api/29.0/private/compat/26.0/
D26.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
216 ;; older policy, but that should not remain accessible to vendor policy.
/system/sepolicy/private/compat/27.0/
D27.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
250 ;; older policy, but that should not remain accessible to vendor policy.
/system/core/debuggerd/seccomp_policy/
Dcrash_dump.policy.def39 libminijail on vendor partitions older than P does not have constants from <sys/mman.h>.
/system/sepolicy/prebuilts/api/30.0/private/compat/29.0/
D29.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
/system/sepolicy/private/compat/29.0/
D29.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
/system/sepolicy/prebuilts/api/30.0/private/compat/28.0/
D28.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
/system/sepolicy/private/compat/28.0/
D28.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
/system/sepolicy/prebuilts/api/29.0/private/compat/28.0/
D28.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
/system/sepolicy/prebuilts/api/28.0/public/
Dupdate_engine_common.te12 # the update to an older version (channel change) or incompatible version
/system/sepolicy/prebuilts/api/26.0/public/
Dupdate_engine_common.te12 # the update to an older version (channel change) or incompatible version
/system/sepolicy/prebuilts/api/27.0/public/
Dupdate_engine_common.te12 # the update to an older version (channel change) or incompatible version
/system/sepolicy/prebuilts/api/29.0/public/
Dupdate_engine_common.te24 # the update to an older version (channel change) or incompatible version
/system/core/fs_mgr/libsnapshot/update_engine/
Dupdate_metadata.proto27 // It is okay that this file is older than
/system/update_engine/
DREADME.md176 downgrade the installed image to an older version. It is very similar to a
177 normal system update, except that an older update payload is downloaded and
240 (especially if it's a much older version) and is securely verifiable. This
360 major version should be done with utmost care because older clients do not know
550 can correctly be applied to older devices that run older versions of the update
552 proto file might break older clients. Or passing operations that are not
553 understood in older clients will break them. Whenever changing anything in the
554 payload generation process, ask yourself this question: Would it work on older
558 to accept an older update payload. Normally this happens using a full payload,
565 * How can the change be implemented that five years from now older clients
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Dupdate_engine_common.te24 # the update to an older version (channel change) or incompatible version
/system/sepolicy/public/
Dupdate_engine_common.te24 # the update to an older version (channel change) or incompatible version

12