Home
last modified time | relevance | path

Searched refs:as (Results 1 – 25 of 578) sorted by relevance

12345678910>>...24

/system/tools/aidl/
Daidl_to_cpp_common.h60 std::vector<T> Append(std::vector<T> as, const std::vector<T>& bs) { in Append() argument
61 as.insert(as.end(), bs.begin(), bs.end()); in Append()
62 return as; in Append()
66 std::vector<T> Append(std::vector<T>&& as, std::vector<T>&& bs) { in Append() argument
67 std::vector<T> appended = std::move(as); in Append()
/system/sepolicy/prebuilts/api/26.0/public/
Drunas.te12 # run-as reads package information.
15 # run-as checks and changes to the app data dir.
19 # run-as switches to the app UID/GID.
22 # run-as switches to the app security context.
35 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
Duntrusted_app_25.te10 ### value as determined from mac_permissions.xml. In current AOSP, this
11 ### domain is assigned to all non-system apps as well as to any system apps
Duntrusted_app.te10 ### value as determined from mac_permissions.xml. In current AOSP, this
11 ### domain is assigned to all non-system apps as well as to any system apps
/system/sepolicy/prebuilts/api/27.0/public/
Drunas.te13 # run-as reads package information.
16 # run-as checks and changes to the app data dir.
20 # run-as switches to the app UID/GID.
23 # run-as switches to the app security context.
36 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
Duntrusted_app_25.te10 ### value as determined from mac_permissions.xml. In current AOSP, this
11 ### domain is assigned to all non-system apps as well as to any system apps
Duntrusted_app.te10 ### value as determined from mac_permissions.xml. In current AOSP, this
11 ### domain is assigned to all non-system apps as well as to any system apps
/system/sepolicy/prebuilts/api/28.0/public/
Drunas.te13 # run-as reads package information.
20 # run-as checks and changes to the app data dir.
24 # run-as switches to the app UID/GID.
27 # run-as switches to the app security context.
40 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
Duntrusted_app.te10 ### value as determined from mac_permissions.xml. In current AOSP, this
11 ### domain is assigned to all non-system apps as well as to any system apps
/system/sepolicy/private/
Dsimpleperf.te3 # simpleperf_app_runner (with shell as its origin). Certain other domains
12 # consistent if simpleperf is marked as an app domain as well (as, for example,
13 # it will then see the same set of system libraries as the app).
30 # the same domain as their respective processes, most of which this domain is
/system/sepolicy/prebuilts/api/30.0/private/
Dsimpleperf.te3 # simpleperf_app_runner (with shell as its origin). Certain other domains
12 # consistent if simpleperf is marked as an app domain as well (as, for example,
13 # it will then see the same set of system libraries as the app).
30 # the same domain as their respective processes, most of which this domain is
/system/sepolicy/prebuilts/api/29.0/public/
Drunas.te13 # run-as reads package information.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
Duntrusted_app.te10 ### value as determined from mac_permissions.xml. In current AOSP, this
11 ### domain is assigned to all non-system apps as well as to any system apps
/system/sepolicy/prebuilts/api/30.0/public/
Drunas.te13 # run-as reads package information.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/public/
Drunas.te13 # run-as reads package information.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/bt/doc/
Dnetwork_ports.md4 It should be used as a reference and as a mechanism to avoid port
/system/extras/simpleperf/demo/SimpleperfExampleWithNative/app/
DCMakeLists.txt8 # Creates and names a library, sets it as either STATIC
16 # Sets the library as a shared library.
22 # Searches for a specified prebuilt library and stores the path as a
36 # can link multiple libraries, such as libraries you define in this
/system/sepolicy/
DNOTICE6 non-commercially developed program that may contain "bugs" (as that
7 term is used in the industry) and that it may not function as intended.
8 The software is licensed "as is". NSA makes no, and hereby expressly
/system/sepolicy/prebuilts/api/29.0/private/
Duntrusted_app.te11 ### value as determined from mac_permissions.xml. In current AOSP, this
12 ### domain is assigned to all non-system apps as well as to any system apps

12345678910>>...24