Searched refs:as (Results 1 – 25 of 578) sorted by relevance
12345678910>>...24
/system/tools/aidl/ |
D | aidl_to_cpp_common.h | 60 std::vector<T> Append(std::vector<T> as, const std::vector<T>& bs) { in Append() argument 61 as.insert(as.end(), bs.begin(), bs.end()); in Append() 62 return as; in Append() 66 std::vector<T> Append(std::vector<T>&& as, std::vector<T>&& bs) { in Append() argument 67 std::vector<T> appended = std::move(as); in Append()
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | runas.te | 12 # run-as reads package information. 15 # run-as checks and changes to the app data dir. 19 # run-as switches to the app UID/GID. 22 # run-as switches to the app security context. 35 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
D | untrusted_app_25.te | 10 ### value as determined from mac_permissions.xml. In current AOSP, this 11 ### domain is assigned to all non-system apps as well as to any system apps
|
D | untrusted_app.te | 10 ### value as determined from mac_permissions.xml. In current AOSP, this 11 ### domain is assigned to all non-system apps as well as to any system apps
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | runas.te | 13 # run-as reads package information. 16 # run-as checks and changes to the app data dir. 20 # run-as switches to the app UID/GID. 23 # run-as switches to the app security context. 36 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
D | untrusted_app_25.te | 10 ### value as determined from mac_permissions.xml. In current AOSP, this 11 ### domain is assigned to all non-system apps as well as to any system apps
|
D | untrusted_app.te | 10 ### value as determined from mac_permissions.xml. In current AOSP, this 11 ### domain is assigned to all non-system apps as well as to any system apps
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | runas.te | 13 # run-as reads package information. 20 # run-as checks and changes to the app data dir. 24 # run-as switches to the app UID/GID. 27 # run-as switches to the app security context. 40 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
D | untrusted_app.te | 10 ### value as determined from mac_permissions.xml. In current AOSP, this 11 ### domain is assigned to all non-system apps as well as to any system apps
|
/system/sepolicy/private/ |
D | simpleperf.te | 3 # simpleperf_app_runner (with shell as its origin). Certain other domains 12 # consistent if simpleperf is marked as an app domain as well (as, for example, 13 # it will then see the same set of system libraries as the app). 30 # the same domain as their respective processes, most of which this domain is
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | simpleperf.te | 3 # simpleperf_app_runner (with shell as its origin). Certain other domains 12 # consistent if simpleperf is marked as an app domain as well (as, for example, 13 # it will then see the same set of system libraries as the app). 30 # the same domain as their respective processes, most of which this domain is
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | runas.te | 13 # run-as reads package information. 21 # run-as checks and changes to the app data dir. 25 # run-as switches to the app UID/GID. 28 # run-as switches to the app security context. 41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
D | untrusted_app.te | 10 ### value as determined from mac_permissions.xml. In current AOSP, this 11 ### domain is assigned to all non-system apps as well as to any system apps
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | runas.te | 13 # run-as reads package information. 21 # run-as checks and changes to the app data dir. 25 # run-as switches to the app UID/GID. 28 # run-as switches to the app security context. 41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
/system/sepolicy/public/ |
D | runas.te | 13 # run-as reads package information. 21 # run-as checks and changes to the app data dir. 25 # run-as switches to the app UID/GID. 28 # run-as switches to the app security context. 41 # run-as cannot have capabilities other than CAP_SETUID and CAP_SETGID
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
/system/bt/doc/ |
D | network_ports.md | 4 It should be used as a reference and as a mechanism to avoid port
|
/system/extras/simpleperf/demo/SimpleperfExampleWithNative/app/ |
D | CMakeLists.txt | 8 # Creates and names a library, sets it as either STATIC 16 # Sets the library as a shared library. 22 # Searches for a specified prebuilt library and stores the path as a 36 # can link multiple libraries, such as libraries you define in this
|
/system/sepolicy/ |
D | NOTICE | 6 non-commercially developed program that may contain "bugs" (as that 7 term is used in the industry) and that it may not function as intended. 8 The software is licensed "as is". NSA makes no, and hereby expressly
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | untrusted_app.te | 11 ### value as determined from mac_permissions.xml. In current AOSP, this 12 ### domain is assigned to all non-system apps as well as to any system apps
|
12345678910>>...24