Searched refs:sanitized (Results 1 – 20 of 20) sorted by relevance
/system/sepolicy/public/ |
D | asan_extract.te | 31 # Restorecon will actually already try to run with sanitized libraries (libpackagelistparser).
|
D | file.te | 540 # asanwrapper (run a sanitized app_process, to be used with wrap properties)
|
D | domain.te | 333 # Under ASAN, processes will try to read /data, as the sanitized libraries are there.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | asan_extract.te | 31 # Restorecon will actually already try to run with sanitized libraries (libpackagelistparser).
|
D | file.te | 337 # asanwrapper (run a sanitized app_process, to be used with wrap properties)
|
D | domain.te | 222 # Under ASAN, processes will try to read /data, as the sanitized libraries are there.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | asan_extract.te | 31 # Restorecon will actually already try to run with sanitized libraries (libpackagelistparser).
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | asan_extract.te | 31 # Restorecon will actually already try to run with sanitized libraries (libpackagelistparser).
|
D | file.te | 490 # asanwrapper (run a sanitized app_process, to be used with wrap properties)
|
D | domain.te | 320 # Under ASAN, processes will try to read /data, as the sanitized libraries are there.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | asan_extract.te | 31 # Restorecon will actually already try to run with sanitized libraries (libpackagelistparser).
|
D | file.te | 398 # asanwrapper (run a sanitized app_process, to be used with wrap properties)
|
D | domain.te | 284 # Under ASAN, processes will try to read /data, as the sanitized libraries are there.
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | asan_extract.te | 31 # Restorecon will actually already try to run with sanitized libraries (libpackagelistparser).
|
D | file.te | 536 # asanwrapper (run a sanitized app_process, to be used with wrap properties)
|
D | domain.te | 320 # Under ASAN, processes will try to read /data, as the sanitized libraries are there.
|
/system/tools/hidl/utils/include/hidl-util/ |
D | FQName.h | 223 std::vector<std::string> getPackageAndVersionComponents(bool sanitized) const;
|
/system/tools/hidl/ |
D | Coordinator.h | 106 status_t getPackagePath(const FQName& fqName, bool relative, bool sanitized,
|
D | Coordinator.cpp | 415 status_t Coordinator::getPackagePath(const FQName& fqName, bool relative, bool sanitized, in getPackagePath() argument 433 components.push_back(sanitized ? fqName.sanitizedVersion() : fqName.version()); in getPackagePath()
|
/system/tools/hidl/utils/ |
D | FQName.cpp | 486 std::vector<std::string> FQName::getPackageAndVersionComponents(bool sanitized) const { in getPackageAndVersionComponents() 490 if (sanitized) { in getPackageAndVersionComponents()
|