Searched refs:vendor (Results 1 – 25 of 95) sorted by relevance
1234
/system/sepolicy/vendor/ |
D | file_contexts | 4 /(vendor|system/vendor)/bin/hw/android\.hardware\.audio@2\.0-service u:object_r:hal_audio_… 5 /(vendor|system/vendor)/bin/hw/android\.hardware\.bluetooth@1\.0-service u:object_r:hal_blueto… 6 /(vendor|system/vendor)/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service u:object_r:h… 7 /(vendor|system/vendor)/bin/hw/android\.hardware\.boot@1\.0-service u:object_r:hal_bootct… 8 /(vendor|system/vendor)/bin/hw/android\.hardware\.camera\.provider@2\.4-service u:object_r… 9 /(vendor|system/vendor)/bin/hw/android\.hardware\.configstore@1\.0-service u:object_r:hal_config… 10 /(vendor|system/vendor)/bin/hw/android\.hardware\.contexthub@1\.0-service u:object_r:hal_contex… 11 /(vendor|system/vendor)/bin/hw/android\.hardware\.drm@1\.0-service u:object_r:hal_drm_de… 12 /(vendor|system/vendor)/bin/hw/android\.hardware\.dumpstate@1\.0-service u:object_r:hal_dumpst… 13 /(vendor|system/vendor)/bin/hw/android\.hardware\.gatekeeper@1\.0-service u:object_r:hal_gateke… [all …]
|
D | vendor_modprobe.te | 3 # For the use of /vendor/bin/modprobe from vendor init.rc fragments
|
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes 8 # transfer binder objects to other processes (TODO b/35870313 limit this to vendor-only)
|
/system/tools/hidl/test/vendor/1.0/ |
D | Android.bp | 4 name: "tests.vendor@1.0_hal", 12 name: "tests.vendor@1.0_genc++", 14 …terfaces -randroid.hidl:system/libhidl/transport -rtests:system/tools/hidl/test/ tests.vendor@1.0", 16 ":tests.vendor@1.0_hal", 19 "tests/vendor/1.0/types.cpp", 20 "tests/vendor/1.0/VendorAll.cpp", 25 name: "tests.vendor@1.0_genc++_headers", 27 …terfaces -randroid.hidl:system/libhidl/transport -rtests:system/tools/hidl/test/ tests.vendor@1.0", 29 ":tests.vendor@1.0_hal", 32 "tests/vendor/1.0/types.h", [all …]
|
D | Android.mk | 8 LOCAL_MODULE := tests.vendor-V1.0-java 23 GEN := $(intermediates)/tests/vendor/V1_0/Bar.java 34 tests.vendor@1.0::types.Bar 43 GEN := $(intermediates)/tests/vendor/V1_0/Foo.java 54 tests.vendor@1.0::types.Foo 63 GEN := $(intermediates)/tests/vendor/V1_0/FooToo.java 74 tests.vendor@1.0::types.FooToo 83 GEN := $(intermediates)/tests/vendor/V1_0/IVendor.java 94 tests.vendor@1.0::IVendor 105 LOCAL_MODULE := tests.vendor-V1.0-java-static [all …]
|
D | update-base.sh | 12 -o system/tools/hidl/test/vendor/1.0/vendor-base.h \ 13 tests.vendor@1.0
|
D | update-makefile.sh | 7 hidl-gen -Lmakefile $options tests.vendor@1.0; 8 hidl-gen -Landroidbp $options tests.vendor@1.0;
|
/system/core/rootdir/etc/ |
D | ld.config.txt | 9 dir.vendor = /vendor/bin/ 17 # Framework-side code runs in this namespace. Anything from /vendor partition 21 namespace.default.search.paths = /system/${LIB}:/vendor/${LIB} 22 namespace.default.permitted.paths = /system/${LIB}:/vendor/${LIB} 24 …asan.search.paths = /data/asan/system/${LIB}:/system/${LIB}:/data/asan/vendor/${LIB}:/vendor/${LIB} 25 …n.permitted.paths = /data/asan/system/${LIB}:/system/${LIB}:/data/asan/vendor/${LIB}:/vendor/${LIB} 27 # TODO(b/37013858): remove all dependencies to /vendor/lib from system processes 40 # SP-HAL(Sameprocess-HAL)s are the only vendor libraries that are allowed to be 52 namespace.sphal.search.paths = /vendor/${LIB}/egl:/vendor/${LIB}/hw:/vendor/${LIB} 53 namespace.sphal.permitted.paths = /vendor/${LIB} [all …]
|
D | ld.config.legacy.txt | 9 dir.legacy = /vendor 14 namespace.default.search.paths = /system/${LIB}:/vendor/${LIB} 15 …asan.search.paths = /data/asan/system/${LIB}:/system/${LIB}:/data/asan/vendor/${LIB}:/vendor/${LIB}
|
/system/sepolicy/public/ |
D | vendor_toolbox.te | 1 # Toolbox installation for vendor binaries / scripts 2 # Non-vendor processes are not allowed to execute the binary 6 # Do not allow domains to transition to vendor toolbox 9 # Do not allow non-vendor domains to transition 10 # to vendor toolbox except for the whitelisted domains.
|
D | vendor_shell.te | 1 # vendor shell MUST never run as interactive or login shell. 2 # vendor shell CAN never be traisitioned to by any process, so it is
|
D | idmap.te | 13 # Allow apps access to /vendor/app 16 # Allow apps access to /vendor/overlay
|
D | attributes | 32 # All types in /data, not in /data/vendor 34 # All types in /vendor 127 # All core domains (as opposed to vendor/device-specific domains) 133 # All vendor domains which violate the requirement of not using Binder 137 # All vendor domains which violate the requirement of not using sockets for 142 # All vendor domains which violate the requirement of not executing 283 # HwBinder services offered across the core-vendor boundary 286 # system and vendor images. For example, it should be possible to move a service 287 # from one core domain to another, without having to update the vendor image
|
D | otapreopt_chroot.te | 10 # This is required to mount /vendor. 13 # Mounting /vendor can have this side-effect. Ignore denial.
|
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
/system/bt/vendor_libs/test_vendor_lib/scripts/ |
D | build_and_run.sh | 52 VENDOR_SYMBOLS_REL=/symbols/system/vendor/lib 56 TEST_VENDOR_LIB=test-vendor.so 58 VENDOR_LIB=libbt-vendor.so 108 adb push ${VENDOR_SYMBOLS_ABS}/${VENDOR_LIB} /vendor/lib
|
/system/sepolicy/private/ |
D | file_contexts_asan | 3 /data/asan/vendor/lib(/.*)? u:object_r:system_file:s0 4 /data/asan/vendor/lib64(/.*)? u:object_r:system_file:s0
|
D | file_contexts | 273 /(vendor|system/vendor)(/.*)? u:object_r:vendor_file:s0 274 /(vendor|system/vendor)/bin/sh u:object_r:vendor_shell_exec:s0 275 /(vendor|system/vendor)/bin/toybox_vendor u:object_r:vendor_toolbox_exec:s0 276 /(vendor|system/vendor)/etc(/.*)? u:object_r:vendor_configs_file:s0 278 /(vendor|system/vendor)/lib(64)?/egl(/.*)? u:object_r:same_process_hal_file:s0 280 /(vendor|system/vendor)/lib(64)?/vndk-sp(/.*)? u:object_r:vndk_sp_file:s0 282 # TODO: b/36790901 move this to /vendor/etc 283 /(vendor|system/vendor)/manifest.xml u:object_r:vendor_configs_file:s0 284 /(vendor|system/vendor)/compatibility_matrix.xml u:object_r:vendor_configs_file:s0 285 /(vendor|system/vendor)/app(/.*)? u:object_r:vendor_app_file:s0 [all …]
|
/system/chre/util/include/chre/util/nanoapp/ |
D | app_id.h | 48 constexpr uint64_t makeNanoappId(uint64_t vendor, uint32_t appNumber) { in makeNanoappId() argument 49 return ((vendor & CHRE_VENDOR_ID_MASK) | (appNumber & ~CHRE_VENDOR_ID_MASK)); in makeNanoappId()
|
/system/chre/ |
D | Android.bp | 19 vendor: true, 39 vendor: true, 59 vendor: true,
|
/system/tools/hidl/test/ |
D | Android.bp | 2 "vendor/1.0", 8 vendor: true, 53 vendor: true,
|
/system/sepolicy/ |
D | CleanSpec.mk | 69 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/nonplat_property_contexts) 70 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/mapping_sepolicy.cil) 72 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/precompiled_sepolicy.plat.sha256)
|
/system/chre/host/common/ |
D | host_protocol_host.cc | 83 const char *vendor = getStringFromByteVector(resp->vendor()); in decodeMessageFromChre() local 87 name, vendor, toolchain, resp->platform_version(), in decodeMessageFromChre()
|
/system/bt/main/ |
D | bte_conf.cc | 52 record.vendor = in bte_load_did_conf() 80 LOG_DEBUG(LOG_TAG, " vendorId = %04x", record.vendor); in bte_load_did_conf()
|
/system/bt/test/rootcanal/ |
D | android.hardware.bluetooth@1.0-service.sim.rc | 1 service bluetooth-1-0 /vendor/bin/hw/android.hardware.bluetooth@1.0-service.sim
|
1234