Home
last modified time | relevance | path

Searched refs:arbitrary (Results 1 – 25 of 40) sorted by relevance

12

/system/sepolicy/prebuilts/api/26.0/public/
Dtombstoned.te5 # Write to arbitrary pipes given to us.
/system/sepolicy/prebuilts/api/30.0/private/
Dsystem_suspend.te16 # To resolve arbitrary sysfs paths from /sys/class/wakeup/* symlinks.
Dboringssl_self_test.te10 # should never be read or written. To avoid giving arbitrary processes access to /dev/boringssl
Dapp_neverallows.te220 # Do not permit access from apps which host arbitrary code to the protected HwBinder
/system/sepolicy/prebuilts/api/29.0/public/
Dtombstoned.te5 # Write to arbitrary pipes given to us.
/system/sepolicy/public/
Dtombstoned.te5 # Write to arbitrary pipes given to us.
/system/sepolicy/prebuilts/api/30.0/public/
Dtombstoned.te5 # Write to arbitrary pipes given to us.
/system/sepolicy/prebuilts/api/31.0/public/
Dtombstoned.te5 # Write to arbitrary pipes given to us.
/system/sepolicy/prebuilts/api/27.0/public/
Dtombstoned.te5 # Write to arbitrary pipes given to us.
/system/sepolicy/prebuilts/api/28.0/public/
Dtombstoned.te5 # Write to arbitrary pipes given to us.
/system/sepolicy/prebuilts/api/31.0/private/
Dsystem_suspend.te17 # To resolve arbitrary sysfs paths from /sys/class/wakeup/* symlinks.
Dboringssl_self_test.te10 # should never be read or written. To avoid giving arbitrary processes access to /dev/boringssl
/system/chre/apps/test/common/proto/
Dping_test.proto24 // Payload is arbitrary.
/system/sepolicy/private/
Dsystem_suspend.te17 # To resolve arbitrary sysfs paths from /sys/class/wakeup/* symlinks.
Dboringssl_self_test.te10 # should never be read or written. To avoid giving arbitrary processes access to /dev/boringssl
/system/media/audio_utils/tests/
Dmetadata_tests.cpp279 auto arbitrary = data[ARBITRARY]; in TEST() local
280 ASSERT_EQ(0, arbitrary.i0); in TEST()
281 ASSERT_EQ(2, arbitrary.v1[1]); in TEST()
282 ASSERT_EQ(4, arbitrary.p2.first); in TEST()
/system/sepolicy/
DREADME48 Additionally, OEMs can specify BOARD_SEPOLICY_M4DEFS to pass arbitrary m4
68 as well as mapping a public base16 signing key with an arbitrary seinfo
80 Is a helper script for mapping arbitrary tags in the signature stanzas of
/system/core/rootdir/
Dueventd.rc27 # sysfs attributes, not on arbitrary paths.
/system/netd/tests/benchmarks/
DREADME.md42 <td>Field that the benchmark can fill with an arbitrary string.
/system/nvram/
DREADME.md5 spaces that can hold arbitrary data blobs of limited size. Access restrictions
/system/apex/
Dpylintrc28 # Allow loading of arbitrary C extensions. Extensions are imported into the
29 # active Python interpreter and may run arbitrary code.
34 # run arbitrary code
/system/update_engine/
Dpylintrc41 # Allow loading of arbitrary C extensions. Extensions are imported into the
42 # active Python interpreter and may run arbitrary code.
47 # run arbitrary code
/system/tools/mkbootimg/
Dpylintrc27 # Allow loading of arbitrary C extensions. Extensions are imported into the
28 # active Python interpreter and may run arbitrary code.
/system/sepolicy/prebuilts/api/26.0/private/
Dapp_neverallows.te122 # Do not permit access from apps which host arbitrary code to HwBinder services,
/system/sepolicy/prebuilts/api/27.0/private/
Dapp_neverallows.te127 # Do not permit access from apps which host arbitrary code to HwBinder services,

12