Home
last modified time | relevance | path

Searched refs:loading (Results 1 – 25 of 62) sorted by relevance

123

/system/chre/platform/shared/idl/
Dhost_messages.fbs85 /// Represents a request for loading a nanoapp.
87 /// For loading via a file, the following steps will be taken:
90 /// fragment_id and total_app_size are unused in this request. The loading
99 /// For loading via a buffer, loading may optionally be fragmented into multiple
132 /// Fields that are relevant for fragmented loading
134 /// fragments. For clients that do not support fragmented loading, the
/system/sepolicy/prebuilts/api/26.0/private/
Dnfc.te15 # SoundPool loading and playback
/system/sepolicy/private/
Dnfc.te15 # SoundPool loading and playback
Dpriv_app.te17 # Allow loading executable code from writable priv-app home
213 # Do not allow loading executable code from non-privileged
214 # application home directories. Code loading across a security boundary
/system/sepolicy/prebuilts/api/30.0/private/
Dnfc.te15 # SoundPool loading and playback
Dpriv_app.te17 # Allow loading executable code from writable priv-app home
215 # Do not allow loading executable code from non-privileged
216 # application home directories. Code loading across a security boundary
Dephemeral_app.te33 # Allow loading and deleting shared libraries created by trusted system
/system/sepolicy/prebuilts/api/28.0/private/
Dnfc.te15 # SoundPool loading and playback
/system/sepolicy/prebuilts/api/27.0/private/
Dnfc.te15 # SoundPool loading and playback
/system/sepolicy/prebuilts/api/29.0/private/
Dnfc.te15 # SoundPool loading and playback
Dpriv_app.te20 # Allow loading executable code from writable priv-app home
246 # Do not allow loading executable code from non-privileged
247 # application home directories. Code loading across a security boundary
/system/core/init/
Dfirmware_handler.cpp190 std::string loading = root + "/loading"; in ProcessFirmwareEvent() local
193 unique_fd loading_fd(open(loading.c_str(), O_WRONLY | O_CLOEXEC)); in ProcessFirmwareEvent()
/system/sepolicy/prebuilts/api/27.0/public/
Dupdate_engine.te26 # Don't allow kernel module loading, just silence the logs.
/system/sepolicy/prebuilts/api/26.0/public/
Dupdate_engine.te26 # Don't allow kernel module loading, just silence the logs.
/system/bt/
DBUILD.gn17 # This is the root build file for GN. GN will start processing by loading this
/system/sepolicy/prebuilts/api/28.0/public/
Dupdate_engine.te37 # Don't allow kernel module loading, just silence the logs.
Dmediaextractor.te73 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
/system/sepolicy/prebuilts/api/29.0/public/
Dupdate_engine.te32 # Don't allow kernel module loading, just silence the logs.
Dmediaextractor.te68 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
/system/hardware/interfaces/net/netd/1.0/
DINetd.hal21 * loading an implementation of the INetd HAL.
/system/sepolicy/prebuilts/api/30.0/public/
Dmediaextractor.te71 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
Dupdate_engine.te32 # Don't allow kernel module loading, just silence the logs.
/system/sepolicy/public/
Dmediaextractor.te69 userdebug_or_eng(`-apk_data_file') # for loading media extractor plugins
Dupdate_engine.te32 # Don't allow kernel module loading, just silence the logs.
/system/hardware/interfaces/wifi/keystore/1.0/
DIKeystore.hal21 * loading an implementation of the Wi-Fi HAL. There must be at most one

123