Home
last modified time | relevance | path

Searched refs:stable (Results 1 – 22 of 22) sorted by relevance

/system/core/fs_mgr/
DAndroid.bp114 // It does not have a stable interface.
127 // It does not have a stable interface.
137 // It does not have a stable interface.
/system/tools/aidl/build/
Dmessage_check_integrity.txt2 # ERROR: Modification detected of stable AIDL API file #
/system/media/audio_utils/include/audio_utils/
DBiquadFilter.h127 bool stable = (fabs(coefs[4]) < 1.0f && fabs(coefs[3]) < 1.0f + coefs[4]); in setCoefficients() local
137 return stable; in setCoefficients()
/system/core/adb/pairing_connection/
DAndroid.bp87 // ABI-stable.
168 // ABI-stable.
/system/connectivity/wificond/net/kernel-header-latest/
DREADME.txt5 external/kernel-headers has the headers from the stable kernel tree which is generally
/system/update_engine/
Domaha_request_params_unittest.cc217 int stable = params_.GetChannelIndex("stable-channel"); in TEST_F() local
220 EXPECT_LE(beta, stable); in TEST_F()
/system/update_engine/sample_images/
Dgenerate_images.sh127 CHROMEOS_RELEASE_DESCRIPTION=6946.63.0 (Official Build) stable-channel link
130 CHROMEOS_RELEASE_TRACK=stable-channel
/system/core/libstats/socket/
DAndroid.bp44 // enumerate stable entry points for APEX use
/system/chre/
DREADME.md76 - The stable API exposed to nanoapps
127 ``core``. This code must have a stable way to access the platform-specific
128 implementation of the common platform API. This is handled by providing a stable
/system/apex/tests/testdata/
Dld.config.txt51 # to the default namespace. This is possible since their ABI is stable across
/system/netd/server/
DAndroid.bp72 // Convenience build target for the version of the netd stable AIDL interface used by the platform.
/system/sepolicy/prebuilts/api/30.0/public/
Ddumpstate.te330 # Allow dumpstate to talk to these stable AIDL services over binder
Ddomain.te207 # This directory is considered to be a VNDK-stable
648 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
708 # to obtain an already established socket via some public/official/stable API and then exchange
838 # These functions are considered vndk-stable and thus must be allowed for
Dproperty_contexts418 # Using Sysprop as API. So the ro.surface_flinger.* are guaranteed to be API-stable
/system/sepolicy/public/
Ddumpstate.te327 # Allow dumpstate to talk to these stable AIDL services over binder
Ddomain.te218 # This directory is considered to be a VNDK-stable
655 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
715 # to obtain an already established socket via some public/official/stable API and then exchange
845 # These functions are considered vndk-stable and thus must be allowed for
/system/sepolicy/prebuilts/api/28.0/public/
Ddomain.te206 # This directory is considered to be a VNDK-stable
647 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
713 # to obtain an already established socket via some public/official/stable API and then exchange
851 # vndk-stable and thus must be allowed for all processes.
/system/sepolicy/prebuilts/api/29.0/public/
Ddomain.te205 # This directory is considered to be a VNDK-stable
653 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
719 # to obtain an already established socket via some public/official/stable API and then exchange
858 # These functions are considered vndk-stable and thus must be allowed for
Dproperty_contexts380 # Using Sysprop as API. So the ro.surface_flinger.* are guaranteed to be API-stable
/system/sepolicy/prebuilts/api/27.0/public/
Ddomain.te150 # This directory is considered to be a VNDK-stable
531 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
591 # to obtain an already established socket via some public/official/stable API and then exchange
/system/sepolicy/prebuilts/api/26.0/public/
Ddomain.te150 # This directory is considered to be a VNDK-stable
528 # Vendor apps are permited to use only stable public services. If they were to use arbitrary
590 # to obtain an already established socket via some public/official/stable API and then exchange
/system/apex/docs/
DREADME.md136 type can be updated depends on the platform and how stable the interfaces for