/system/linkerconfig/contents/section/ |
D | vendor.cc | 34 ctx.SetCurrentSection(SectionType::Vendor); in BuildVendorSection() 38 namespaces.emplace_back(BuildVndkNamespace(ctx, VndkUserPartition::Vendor)); in BuildVendorSection()
|
D | apexdefault.cc | 59 BuildVndkNamespace(ctx, VndkUserPartition::Vendor)); in BuildApexDefaultSection() 69 std::bind(BuildVndkNamespace, ctx, VndkUserPartition::Vendor), in BuildApexDefaultSection()
|
D | unrestricted.cc | 43 namespaces.emplace_back(BuildVndkNamespace(ctx, VndkUserPartition::Vendor)); in BuildUnrestrictedSection()
|
D | system.cc | 39 namespaces.emplace_back(BuildVndkNamespace(ctx, VndkUserPartition::Vendor)); in BuildSystemSection()
|
/system/linkerconfig/contents/tests/configuration/ |
D | vndk_test.cc | 52 vendor_context.SetCurrentSection(SectionType::Vendor); in TEST() 53 auto vndk_ns = BuildVndkNamespace(vendor_context, VndkUserPartition::Vendor); in TEST()
|
/system/linkerconfig/contents/namespace/ |
D | vndk.cc | 73 vndk_user == VndkUserPartition::Vendor) { in BuildVndkNamespace() 98 if (vndk_user == VndkUserPartition::Vendor) { in BuildVndkNamespace()
|
/system/tools/hidl/test/cpp_impl_test/ |
D | Android.bp | 19 "Vendor.h", 41 "Vendor.cpp",
|
/system/bt/doc/ |
D | directory_layout.md | 29 * vnd - *Vendor* - Vendor specific APIs - *to be integrated into rest of stack ?*.
|
/system/linkerconfig/contents/include/linkerconfig/ |
D | namespacebuilder.h | 27 Vendor, enumerator
|
D | context.h | 35 Vendor, enumerator
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | vendor_init.te | 7 # Vendor init shouldn't communicate with any vendor process, nor most system processes. 149 # Vendor init can read properties 152 # Vendor init can perform operations on trusted and security Extended Attributes
|
D | perfprofd.te | 75 # Vendor libraries. 77 # Vendor apps.
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | vendor_init.te | 179 # Vendor init can read properties 182 # Vendor init can perform operations on trusted and security Extended Attributes 192 # Everything is labeled as rootfs in recovery mode. Vendor init has to execute 257 # Vendor init shouldn't communicate with any vendor process, nor most system processes.
|
/system/sepolicy/public/ |
D | vendor_init.te | 180 # Vendor init can read properties 183 # Vendor init can perform operations on trusted and security Extended Attributes 193 # Everything is labeled as rootfs in recovery mode. Vendor init has to execute 256 # Vendor init shouldn't communicate with any vendor process, nor most system processes.
|
D | domain.te | 242 # Vendor components need access to /dara/vendor 655 # Vendor apps are permited to use only stable public services. If they were to use arbitrary 729 # Vendor domains are not permitted to initiate communications to core domain sockets 749 # Vendor domains are not permitted to initiate create/open sockets owned by core domains 799 # Vendor domains may directly access file in /data/vendor by path, but may only 1408 # Vendor domian must not have access to /mnt/product.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | vendor_init.te | 174 # Vendor init can read properties 177 # Vendor init can perform operations on trusted and security Extended Attributes 187 # Everything is labeled as rootfs in recovery mode. Vendor init has to execute 256 # Vendor init shouldn't communicate with any vendor process, nor most system processes.
|
D | perfprofd.te | 75 # Vendor libraries. 77 # Vendor apps.
|
D | domain.te | 224 # /data has the label system_data_file. Vendor components need the search 653 # Vendor apps are permited to use only stable public services. If they were to use arbitrary 733 # Vendor domains are not permitted to initiate communications to core domain sockets 752 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets 762 # Vendor domains are not permitted to initiate create/open sockets owned by core domains 812 # Vendor domains may directly access file in /data/vendor by path, but may only 1382 # Vendor domian must not have access to /mnt/product.
|
/system/linkerconfig/contents/context/ |
D | context.cc | 39 return current_section_ == SectionType::Vendor; in IsVendorSection()
|
/system/tools/sysprop/ |
D | sysprop.proto | 29 Vendor = 1; enumerator
|
D | Common.cpp | 61 case sysprop::Vendor: in GenerateDefaultPropName() 170 case sysprop::Vendor: in ValidateProp()
|
/system/sepolicy/private/ |
D | boringssl_self_test.te | 30 # Vendor boringssl_self_test domain
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | boringssl_self_test.te | 30 # Vendor boringssl_self_test domain
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | domain.te | 161 # /data has the label system_data_file. Vendor components need the search 531 # Vendor apps are permited to use only stable public services. If they were to use arbitrary 603 # Vendor domains are not permitted to initiate communications to core domain sockets 620 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets 628 # Vendor domains are not permitted to initiate create/open sockets owned by core domains
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | domain.te | 161 # /data has the label system_data_file. Vendor components need the search 528 # Vendor apps are permited to use only stable public services. If they were to use arbitrary 602 # Vendor domains are not permitted to initiate communications to core domain sockets 620 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets 628 # Vendor domains are not permitted to initiate create/open sockets owned by core domains
|