Home
last modified time | relevance | path

Searched refs:Vendor (Results 1 – 25 of 38) sorted by relevance

12

/system/linkerconfig/contents/section/
Dvendor.cc34 ctx.SetCurrentSection(SectionType::Vendor); in BuildVendorSection()
38 namespaces.emplace_back(BuildVndkNamespace(ctx, VndkUserPartition::Vendor)); in BuildVendorSection()
Dapexdefault.cc59 BuildVndkNamespace(ctx, VndkUserPartition::Vendor)); in BuildApexDefaultSection()
69 std::bind(BuildVndkNamespace, ctx, VndkUserPartition::Vendor), in BuildApexDefaultSection()
Dunrestricted.cc43 namespaces.emplace_back(BuildVndkNamespace(ctx, VndkUserPartition::Vendor)); in BuildUnrestrictedSection()
Dsystem.cc39 namespaces.emplace_back(BuildVndkNamespace(ctx, VndkUserPartition::Vendor)); in BuildSystemSection()
/system/linkerconfig/contents/tests/configuration/
Dvndk_test.cc52 vendor_context.SetCurrentSection(SectionType::Vendor); in TEST()
53 auto vndk_ns = BuildVndkNamespace(vendor_context, VndkUserPartition::Vendor); in TEST()
/system/linkerconfig/contents/namespace/
Dvndk.cc73 vndk_user == VndkUserPartition::Vendor) { in BuildVndkNamespace()
98 if (vndk_user == VndkUserPartition::Vendor) { in BuildVndkNamespace()
/system/tools/hidl/test/cpp_impl_test/
DAndroid.bp19 "Vendor.h",
41 "Vendor.cpp",
/system/bt/doc/
Ddirectory_layout.md29 * vnd - *Vendor* - Vendor specific APIs - *to be integrated into rest of stack ?*.
/system/linkerconfig/contents/include/linkerconfig/
Dnamespacebuilder.h27 Vendor, enumerator
Dcontext.h35 Vendor, enumerator
/system/sepolicy/prebuilts/api/28.0/public/
Dvendor_init.te7 # Vendor init shouldn't communicate with any vendor process, nor most system processes.
149 # Vendor init can read properties
152 # Vendor init can perform operations on trusted and security Extended Attributes
Dperfprofd.te75 # Vendor libraries.
77 # Vendor apps.
/system/sepolicy/prebuilts/api/30.0/public/
Dvendor_init.te179 # Vendor init can read properties
182 # Vendor init can perform operations on trusted and security Extended Attributes
192 # Everything is labeled as rootfs in recovery mode. Vendor init has to execute
257 # Vendor init shouldn't communicate with any vendor process, nor most system processes.
/system/sepolicy/public/
Dvendor_init.te180 # Vendor init can read properties
183 # Vendor init can perform operations on trusted and security Extended Attributes
193 # Everything is labeled as rootfs in recovery mode. Vendor init has to execute
256 # Vendor init shouldn't communicate with any vendor process, nor most system processes.
Ddomain.te242 # Vendor components need access to /dara/vendor
655 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
729 # Vendor domains are not permitted to initiate communications to core domain sockets
749 # Vendor domains are not permitted to initiate create/open sockets owned by core domains
799 # Vendor domains may directly access file in /data/vendor by path, but may only
1408 # Vendor domian must not have access to /mnt/product.
/system/sepolicy/prebuilts/api/29.0/public/
Dvendor_init.te174 # Vendor init can read properties
177 # Vendor init can perform operations on trusted and security Extended Attributes
187 # Everything is labeled as rootfs in recovery mode. Vendor init has to execute
256 # Vendor init shouldn't communicate with any vendor process, nor most system processes.
Dperfprofd.te75 # Vendor libraries.
77 # Vendor apps.
Ddomain.te224 # /data has the label system_data_file. Vendor components need the search
653 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
733 # Vendor domains are not permitted to initiate communications to core domain sockets
752 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets
762 # Vendor domains are not permitted to initiate create/open sockets owned by core domains
812 # Vendor domains may directly access file in /data/vendor by path, but may only
1382 # Vendor domian must not have access to /mnt/product.
/system/linkerconfig/contents/context/
Dcontext.cc39 return current_section_ == SectionType::Vendor; in IsVendorSection()
/system/tools/sysprop/
Dsysprop.proto29 Vendor = 1; enumerator
DCommon.cpp61 case sysprop::Vendor: in GenerateDefaultPropName()
170 case sysprop::Vendor: in ValidateProp()
/system/sepolicy/private/
Dboringssl_self_test.te30 # Vendor boringssl_self_test domain
/system/sepolicy/prebuilts/api/30.0/private/
Dboringssl_self_test.te30 # Vendor boringssl_self_test domain
/system/sepolicy/prebuilts/api/27.0/public/
Ddomain.te161 # /data has the label system_data_file. Vendor components need the search
531 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
603 # Vendor domains are not permitted to initiate communications to core domain sockets
620 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets
628 # Vendor domains are not permitted to initiate create/open sockets owned by core domains
/system/sepolicy/prebuilts/api/26.0/public/
Ddomain.te161 # /data has the label system_data_file. Vendor components need the search
528 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
602 # Vendor domains are not permitted to initiate communications to core domain sockets
620 # Vendor domains (except netdomain) are not permitted to initiate communications to netd sockets
628 # Vendor domains are not permitted to initiate create/open sockets owned by core domains

12