Home
last modified time | relevance | path

Searched refs:vendor (Results 1 – 25 of 95) sorted by relevance

1234

/system/sepolicy/vendor/
Dfile_contexts4 /(vendor|system/vendor)/bin/hw/android\.hardware\.audio@2\.0-service u:object_r:hal_audio_…
5 /(vendor|system/vendor)/bin/hw/android\.hardware\.bluetooth@1\.0-service u:object_r:hal_blueto…
6 /(vendor|system/vendor)/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service u:object_r:h…
7 /(vendor|system/vendor)/bin/hw/android\.hardware\.boot@1\.0-service u:object_r:hal_bootct…
8 /(vendor|system/vendor)/bin/hw/android\.hardware\.camera\.provider@2\.4-service u:object_r…
9 /(vendor|system/vendor)/bin/hw/android\.hardware\.configstore@1\.0-service u:object_r:hal_config…
10 /(vendor|system/vendor)/bin/hw/android\.hardware\.contexthub@1\.0-service u:object_r:hal_contex…
11 /(vendor|system/vendor)/bin/hw/android\.hardware\.drm@1\.0-service u:object_r:hal_drm_de…
12 /(vendor|system/vendor)/bin/hw/android\.hardware\.dumpstate@1\.0-service u:object_r:hal_dumpst…
13 /(vendor|system/vendor)/bin/hw/android\.hardware\.gatekeeper@1\.0-service u:object_r:hal_gateke…
[all …]
Dvendor_modprobe.te3 # For the use of /vendor/bin/modprobe from vendor init.rc fragments
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
8 # transfer binder objects to other processes (TODO b/35870313 limit this to vendor-only)
/system/tools/hidl/test/vendor/1.0/
DAndroid.bp4 name: "tests.vendor@1.0_hal",
12 name: "tests.vendor@1.0_genc++",
14 …terfaces -randroid.hidl:system/libhidl/transport -rtests:system/tools/hidl/test/ tests.vendor@1.0",
16 ":tests.vendor@1.0_hal",
19 "tests/vendor/1.0/types.cpp",
20 "tests/vendor/1.0/VendorAll.cpp",
25 name: "tests.vendor@1.0_genc++_headers",
27 …terfaces -randroid.hidl:system/libhidl/transport -rtests:system/tools/hidl/test/ tests.vendor@1.0",
29 ":tests.vendor@1.0_hal",
32 "tests/vendor/1.0/types.h",
[all …]
DAndroid.mk8 LOCAL_MODULE := tests.vendor-V1.0-java
23 GEN := $(intermediates)/tests/vendor/V1_0/Bar.java
34 tests.vendor@1.0::types.Bar
43 GEN := $(intermediates)/tests/vendor/V1_0/Foo.java
54 tests.vendor@1.0::types.Foo
63 GEN := $(intermediates)/tests/vendor/V1_0/FooToo.java
74 tests.vendor@1.0::types.FooToo
83 GEN := $(intermediates)/tests/vendor/V1_0/IVendor.java
94 tests.vendor@1.0::IVendor
105 LOCAL_MODULE := tests.vendor-V1.0-java-static
[all …]
Dupdate-base.sh12 -o system/tools/hidl/test/vendor/1.0/vendor-base.h \
13 tests.vendor@1.0
Dupdate-makefile.sh7 hidl-gen -Lmakefile $options tests.vendor@1.0;
8 hidl-gen -Landroidbp $options tests.vendor@1.0;
/system/core/rootdir/etc/
Dld.config.txt9 dir.vendor = /vendor/bin/
17 # Framework-side code runs in this namespace. Anything from /vendor partition
21 namespace.default.search.paths = /system/${LIB}:/vendor/${LIB}
22 namespace.default.permitted.paths = /system/${LIB}:/vendor/${LIB}
24 …asan.search.paths = /data/asan/system/${LIB}:/system/${LIB}:/data/asan/vendor/${LIB}:/vendor/${LIB}
25 …n.permitted.paths = /data/asan/system/${LIB}:/system/${LIB}:/data/asan/vendor/${LIB}:/vendor/${LIB}
27 # TODO(b/37013858): remove all dependencies to /vendor/lib from system processes
40 # SP-HAL(Sameprocess-HAL)s are the only vendor libraries that are allowed to be
52 namespace.sphal.search.paths = /vendor/${LIB}/egl:/vendor/${LIB}/hw:/vendor/${LIB}
53 namespace.sphal.permitted.paths = /vendor/${LIB}
[all …]
Dld.config.legacy.txt9 dir.legacy = /vendor
14 namespace.default.search.paths = /system/${LIB}:/vendor/${LIB}
15 …asan.search.paths = /data/asan/system/${LIB}:/system/${LIB}:/data/asan/vendor/${LIB}:/vendor/${LIB}
/system/sepolicy/public/
Dvendor_toolbox.te1 # Toolbox installation for vendor binaries / scripts
2 # Non-vendor processes are not allowed to execute the binary
6 # Do not allow domains to transition to vendor toolbox
9 # Do not allow non-vendor domains to transition
10 # to vendor toolbox except for the whitelisted domains.
Dvendor_shell.te1 # vendor shell MUST never run as interactive or login shell.
2 # vendor shell CAN never be traisitioned to by any process, so it is
Didmap.te13 # Allow apps access to /vendor/app
16 # Allow apps access to /vendor/overlay
Dattributes32 # All types in /data, not in /data/vendor
34 # All types in /vendor
127 # All core domains (as opposed to vendor/device-specific domains)
133 # All vendor domains which violate the requirement of not using Binder
137 # All vendor domains which violate the requirement of not using sockets for
142 # All vendor domains which violate the requirement of not executing
283 # HwBinder services offered across the core-vendor boundary
286 # system and vendor images. For example, it should be possible to move a service
287 # from one core domain to another, without having to update the vendor image
Dotapreopt_chroot.te10 # This is required to mount /vendor.
13 # Mounting /vendor can have this side-effect. Ignore denial.
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
/system/bt/vendor_libs/test_vendor_lib/scripts/
Dbuild_and_run.sh52 VENDOR_SYMBOLS_REL=/symbols/system/vendor/lib
56 TEST_VENDOR_LIB=test-vendor.so
58 VENDOR_LIB=libbt-vendor.so
108 adb push ${VENDOR_SYMBOLS_ABS}/${VENDOR_LIB} /vendor/lib
/system/sepolicy/private/
Dfile_contexts_asan3 /data/asan/vendor/lib(/.*)? u:object_r:system_file:s0
4 /data/asan/vendor/lib64(/.*)? u:object_r:system_file:s0
Dfile_contexts273 /(vendor|system/vendor)(/.*)? u:object_r:vendor_file:s0
274 /(vendor|system/vendor)/bin/sh u:object_r:vendor_shell_exec:s0
275 /(vendor|system/vendor)/bin/toybox_vendor u:object_r:vendor_toolbox_exec:s0
276 /(vendor|system/vendor)/etc(/.*)? u:object_r:vendor_configs_file:s0
278 /(vendor|system/vendor)/lib(64)?/egl(/.*)? u:object_r:same_process_hal_file:s0
280 /(vendor|system/vendor)/lib(64)?/vndk-sp(/.*)? u:object_r:vndk_sp_file:s0
282 # TODO: b/36790901 move this to /vendor/etc
283 /(vendor|system/vendor)/manifest.xml u:object_r:vendor_configs_file:s0
284 /(vendor|system/vendor)/compatibility_matrix.xml u:object_r:vendor_configs_file:s0
285 /(vendor|system/vendor)/app(/.*)? u:object_r:vendor_app_file:s0
[all …]
/system/chre/util/include/chre/util/nanoapp/
Dapp_id.h48 constexpr uint64_t makeNanoappId(uint64_t vendor, uint32_t appNumber) { in makeNanoappId() argument
49 return ((vendor & CHRE_VENDOR_ID_MASK) | (appNumber & ~CHRE_VENDOR_ID_MASK)); in makeNanoappId()
/system/chre/
DAndroid.bp19 vendor: true,
39 vendor: true,
59 vendor: true,
/system/tools/hidl/test/
DAndroid.bp2 "vendor/1.0",
8 vendor: true,
53 vendor: true,
/system/sepolicy/
DCleanSpec.mk69 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/nonplat_property_contexts)
70 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/mapping_sepolicy.cil)
72 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/precompiled_sepolicy.plat.sha256)
/system/chre/host/common/
Dhost_protocol_host.cc83 const char *vendor = getStringFromByteVector(resp->vendor()); in decodeMessageFromChre() local
87 name, vendor, toolchain, resp->platform_version(), in decodeMessageFromChre()
/system/bt/main/
Dbte_conf.cc52 record.vendor = in bte_load_did_conf()
80 LOG_DEBUG(LOG_TAG, " vendorId = %04x", record.vendor); in bte_load_did_conf()
/system/bt/test/rootcanal/
Dandroid.hardware.bluetooth@1.0-service.sim.rc1 service bluetooth-1-0 /vendor/bin/hw/android.hardware.bluetooth@1.0-service.sim

1234