Home
last modified time | relevance | path

Searched refs:have (Results 1 – 25 of 429) sorted by relevance

12345678910>>...18

/system/sepolicy/prebuilts/api/26.0/private/
Dpostinstall_dexopt.te4 # We have to manually transition, as we don't have an entrypoint.
/system/sepolicy/prebuilts/api/27.0/private/
Dpostinstall_dexopt.te4 # We have to manually transition, as we don't have an entrypoint.
/system/sepolicy/prebuilts/api/28.0/private/
Dpostinstall_dexopt.te4 # We have to manually transition, as we don't have an entrypoint.
/system/sepolicy/private/compat/30.0/
D30.0.ignore.cil1 ;; new_objects - a collection of types that have been introduced that have no
/system/sepolicy/prebuilts/api/28.0/public/
Dhal_neverallows.te1 # only HALs responsible for network hardware should have privileged
14 # NOTE: HALs for automotive devices have an exemption from this rule because in
15 # a car it is common to have external modules and HALs need to communicate to
30 # have multiple HALs in it (or even all of them) with the subsequent policy of
/system/sepolicy/public/
Dhal_neverallows.te1 # only HALs responsible for network hardware should have privileged
15 # NOTE: HALs for automotive devices have an exemption from this rule because in
16 # a car it is common to have external modules and HALs need to communicate to
32 # have multiple HALs in it (or even all of them) with the subsequent policy of
/system/sepolicy/prebuilts/api/29.0/public/
Dhal_neverallows.te1 # only HALs responsible for network hardware should have privileged
14 # NOTE: HALs for automotive devices have an exemption from this rule because in
15 # a car it is common to have external modules and HALs need to communicate to
30 # have multiple HALs in it (or even all of them) with the subsequent policy of
Dflags_health_check.te24 # configurable flags have been reset during booting. Mistakenly modified by unrelated components can
29 # have been reset during current booting. Mistakenly modified by unrelated components can
/system/sepolicy/prebuilts/api/30.0/public/
Dhal_neverallows.te1 # only HALs responsible for network hardware should have privileged
15 # NOTE: HALs for automotive devices have an exemption from this rule because in
16 # a car it is common to have external modules and HALs need to communicate to
32 # have multiple HALs in it (or even all of them) with the subsequent policy of
Dflags_health_check.te28 # configurable flags have been reset during booting. Mistakenly modified by unrelated components can
33 # have been reset during current booting. Mistakenly modified by unrelated components can
/system/chre/apps/chqts/src/
DAndroid.bp15 // While it's arguably overkill to have unit test for our testing code,
17 // difficult to test. To the extent that we have platform-independent
18 // code here, it seems a long-term time saver to have Linux tests for
/system/sepolicy/prebuilts/api/27.0/private/compat/26.0/
D26.0.ignore.cil1 ;; new_objects - a collection of types that have been introduced that have no
/system/libbase/
DREADME.md13 the ideal is to have both.
19 If you have a routine that's really useful in your project,
38 Code here is also expected to have good test coverage.
/system/sepolicy/prebuilts/api/30.0/private/compat/29.0/
D29.0.ignore.cil1 ;; new_objects - a collection of types that have been introduced that have no
/system/sepolicy/private/compat/29.0/
D29.0.ignore.cil1 ;; new_objects - a collection of types that have been introduced that have no
/system/sepolicy/prebuilts/api/30.0/private/
Drs.te1 # Any files which would have been created as app_data_file
32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
Dboringssl_self_test.te14 # Due to build skew, the version of libcrypto in /vendor may have a different hash than
16 # which also have permission to write to the same files in /dev/boringssl. In the case where
17 # vendor and system libcrypto have the same hash, there will be a race to create the file,
40 # Marker files, common to both domains, indicating KAT have been performed on a particular libcrypto
/system/sepolicy/prebuilts/api/29.0/private/
Drs.te1 # Any files which would have been created as app_data_file
32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
/system/sepolicy/private/
Drs.te1 # Any files which would have been created as app_data_file
32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
Dboringssl_self_test.te14 # Due to build skew, the version of libcrypto in /vendor may have a different hash than
16 # which also have permission to write to the same files in /dev/boringssl. In the case where
17 # vendor and system libcrypto have the same hash, there will be a race to create the file,
40 # Marker files, common to both domains, indicating KAT have been performed on a particular libcrypto
/system/core/janitors/
DOWNERS1 # OWNERS file for projects that don't really have owners so much as volunteer janitors.
/system/sepolicy/prebuilts/api/30.0/private/compat/28.0/
D28.0.ignore.cil1 ;; new_objects - a collection of types that have been introduced that have no
/system/libhidl/transport/allocator/1.0/
DIAllocator.hal25 * Return memory must have instance name corresponding to this type of memory.
34 * Return memory must have instance name corresponding to this type of memory.
/system/sepolicy/private/compat/28.0/
D28.0.ignore.cil1 ;; new_objects - a collection of types that have been introduced that have no
/system/sepolicy/prebuilts/api/28.0/private/compat/27.0/
D27.0.ignore.cil1 ;; new_objects - a collection of types that have been introduced that have no

12345678910>>...18