Searched refs:even (Results 1 – 25 of 138) sorted by relevance
123456
/system/core/adb/proto/ |
D | Android.bp | 45 // This needs to be visible to minadbd, even though it's removed via exclude_shared_libs. 99 // This needs to be visible to minadbd, even though it's removed via exclude_shared_libs.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | vold.te | 10 # For a handful of probing tools, we choose an even more restrictive
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | vold.te | 9 # For a handful of probing tools, we choose an even more restrictive
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | vold.te | 9 # For a handful of probing tools, we choose an even more restrictive
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | vold.te | 10 # For a handful of probing tools, we choose an even more restrictive
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | vold.te | 9 # For a handful of probing tools, we choose an even more restrictive
|
/system/sepolicy/private/ |
D | vold.te | 9 # For a handful of probing tools, we choose an even more restrictive
|
/system/media/camera/docs/ |
D | README.md | 7 C code, Java code, and even XML itself (as a sanity check).
|
/system/sepolicy/ |
D | NOTICE | 19 limitation will apply even if NSA has been advised of the possibility
|
/system/bpf/bpfloader/ |
D | bpfloader.rc | 37 # memlock data before bpfloader even gets a chance to run, it would fail 54 # capability is not even checked by the kernel's bpf system call.
|
/system/core/init/test_service/ |
D | README.md | 15 The service accepts any even number of arguments on the command line
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | crash_dump.te | 13 # which will result in an audit log even when it's allowed to trace.
|
D | hal_neverallows.te | 24 # have multiple HALs in it (or even all of them) with the subsequent policy of
|
/system/core/adb/ |
D | SOCKET-ACTIVATION.txt | 33 control port), even after adb kill-server kills the server.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | crash_dump.te | 13 # which will result in an audit log even when it's allowed to trace.
|
D | hal_neverallows.te | 23 # have multiple HALs in it (or even all of them) with the subsequent policy of
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | crash_dump.te | 5 # which will result in an audit log even when it's allowed to trace.
|
D | hal_neverallows.te | 30 # have multiple HALs in it (or even all of them) with the subsequent policy of
|
/system/vold/ |
D | Utils.cpp | 455 bool even = true; in HexToStr() local 482 if (even) { in HexToStr() 489 even = !even; in HexToStr() 491 return even ? OK : -EINVAL; in HexToStr()
|
/system/libsysprop/srcs/android/sysprop/ |
D | ContactsProperties.sysprop | 46 # This should be used sparingly; even though there are data still available, the UI
|
/system/sepolicy/public/ |
D | crash_dump.te | 5 # which will result in an audit log even when it's allowed to trace.
|
D | hal_neverallows.te | 32 # have multiple HALs in it (or even all of them) with the subsequent policy of
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | crash_dump.te | 5 # which will result in an audit log even when it's allowed to trace.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | crash_dump.te | 5 # which will result in an audit log even when it's allowed to trace.
|
/system/core/adb/pairing_connection/ |
D | Android.bp | 45 // This needs to be visible to minadbd, even though it's removed via exclude_shared_libs.
|
123456