/aosp12/frameworks/rs/script_api/include/ |
H A D | rs_graphics.rsh | 39 * DEPRECATED. Do not use. 66 * DEPRECATED. Do not use. 92 * DEPRECATED. Do not use. 113 * DEPRECATED. Do not use. 140 * DEPRECATED. Do not use. 165 * DEPRECATED. Do not use. 183 * DEPRECATED. Do not use. 201 * DEPRECATED. Do not use. 219 * DEPRECATED. Do not use. 237 * DEPRECATED. Do not use. [all …]
|
/aosp12/frameworks/rs/tests/java_api/RSTest_CompatLibLegacy/src/com/android/rs/test/ |
H A D | fp_mad.rscript | 11 // Do ~1 billion ops 34 // Do ~1 billion ops 57 // Do ~10 M ops 71 // Do ~10 M ops 85 // Do ~10 M ops 99 // Do ~100 M ops 110 // Do ~100 M ops 125 // Do ~100 M ops
|
/aosp12/frameworks/rs/tests/java_api/RsTest_11/src/com/android/rs/test/ |
H A D | fp_mad.rscript | 11 // Do ~1 billion ops 34 // Do ~1 billion ops 57 // Do ~10 M ops 71 // Do ~10 M ops 85 // Do ~10 M ops 99 // Do ~100 M ops 110 // Do ~100 M ops 125 // Do ~100 M ops
|
/aosp12/frameworks/rs/tests/java_api/RsTest_14/src/com/android/rs/test/ |
H A D | fp_mad.rscript | 11 // Do ~1 billion ops 34 // Do ~1 billion ops 57 // Do ~10 M ops 71 // Do ~10 M ops 85 // Do ~10 M ops 99 // Do ~100 M ops 110 // Do ~100 M ops 125 // Do ~100 M ops
|
/aosp12/frameworks/rs/tests/java_api/RsTest_16/src/com/android/rs/test/ |
H A D | fp_mad.rscript | 11 // Do ~1 billion ops 34 // Do ~1 billion ops 57 // Do ~10 M ops 71 // Do ~10 M ops 85 // Do ~10 M ops 99 // Do ~100 M ops 110 // Do ~100 M ops 125 // Do ~100 M ops
|
/aosp12/hardware/interfaces/neuralnetworks/ |
H A D | TEST_MAPPING | 25 // Do not use any sample driver except sample-all in order to reduce 36 // Do not use any sample driver except sample-all in order to reduce 49 // Do not use any sample driver except sample-all in order to reduce 60 // Do not use any sample driver except sample-all in order to reduce 71 // Do not use any sample driver except sample-all in order to reduce
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/ |
H A D | app_neverallows.te | 27 # Do not allow untrusted apps to register services. 32 # Do not allow untrusted apps to use VendorBinder 36 # Do not allow untrusted apps to connect to the property service 71 # Do not allow untrusted apps to be assigned mlstrustedsubject. 81 # Do not allow untrusted apps to hard link to any files. 89 # Do not allow untrusted apps to access network MAC address file 92 # Do not allow any write access to files in /sys 124 # Do not allow untrusted apps access to /cache 128 # Do not allow untrusted apps to create/unlink files outside of its sandbox, 152 # Do not allow untrusted apps to directly open the tun_device [all …]
|
/aosp12/frameworks/rs/tests/java_api/RSUnitTests/src/com/android/rs/unittest/ |
H A D | fp_mad.rscript | 27 // Do ~1 billion ops 50 // Do ~1 billion ops 73 // Do ~10 M ops 87 // Do ~10 M ops 101 // Do ~10 M ops 115 // Do ~100 M ops 126 // Do ~100 M ops 141 // Do ~100 M ops
|
/aosp12/frameworks/rs/tests/java_api/RSUnitTests/supportlibsrc_gen/com/android/rs/unittest/ |
H A D | fp_mad.rscript | 29 // Do ~1 billion ops 52 // Do ~1 billion ops 75 // Do ~10 M ops 89 // Do ~10 M ops 103 // Do ~10 M ops 117 // Do ~100 M ops 128 // Do ~100 M ops 143 // Do ~100 M ops
|
/aosp12/system/sepolicy/prebuilts/api/28.0/private/ |
H A D | app_neverallows.te | 25 # Do not allow untrusted apps to register services. 30 # Do not allow untrusted apps to use VendorBinder 34 # Do not allow untrusted apps to connect to the property service 44 # Do not allow untrusted apps to be assigned mlstrustedsubject. 54 # Do not allow untrusted apps to hard link to any files. 62 # Do not allow untrusted apps to access network MAC address file 65 # Do not allow any write access to files in /sys 85 # Do not allow untrusted apps access to /cache 89 # Do not allow untrusted apps to create/unlink files outside of its sandbox, 111 # Do not allow untrusted apps to directly open tun_device [all …]
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | app_neverallows.te | 30 # Do not allow untrusted apps to register services. 35 # Do not allow untrusted apps to use VendorBinder 39 # Do not allow untrusted apps to connect to the property service 77 # Do not allow untrusted apps to be assigned mlstrustedsubject. 87 # Do not allow untrusted apps to hard link to any files. 95 # Do not allow untrusted apps to access network MAC address file 98 # Do not allow any write access to files in /sys 130 # Do not allow untrusted apps access to /cache 134 # Do not allow untrusted apps to create/unlink files outside of its sandbox, 158 # Do not allow untrusted apps to directly open the tun_device [all …]
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | app_neverallows.te | 30 # Do not allow untrusted apps to register services. 35 # Do not allow untrusted apps to use VendorBinder 39 # Do not allow untrusted apps to connect to the property service 77 # Do not allow untrusted apps to be assigned mlstrustedsubject. 87 # Do not allow untrusted apps to hard link to any files. 95 # Do not allow untrusted apps to access network MAC address file 98 # Do not allow any write access to files in /sys 130 # Do not allow untrusted apps access to /cache 134 # Do not allow untrusted apps to create/unlink files outside of its sandbox, 158 # Do not allow untrusted apps to directly open the tun_device [all …]
|
/aosp12/system/sepolicy/private/ |
H A D | app_neverallows.te | 30 # Do not allow untrusted apps to register services. 35 # Do not allow untrusted apps to use VendorBinder 39 # Do not allow untrusted apps to connect to the property service 77 # Do not allow untrusted apps to be assigned mlstrustedsubject. 87 # Do not allow untrusted apps to hard link to any files. 95 # Do not allow untrusted apps to access network MAC address file 98 # Do not allow any write access to files in /sys 130 # Do not allow untrusted apps access to /cache 134 # Do not allow untrusted apps to create/unlink files outside of its sandbox, 158 # Do not allow untrusted apps to directly open the tun_device [all …]
|
/aosp12/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | app_neverallows.te | 24 # Do not allow untrusted apps to register services. 29 # Do not allow untrusted apps to use VendorBinder 33 # Do not allow untrusted apps to connect to the property service 39 # Do not allow untrusted apps to be assigned mlstrustedsubject. 49 # Do not allow untrusted apps to hard link to any files. 57 # Do not allow untrusted apps to access network MAC address file 74 # Do not allow untrusted apps access to /cache 78 # Do not allow untrusted apps to create/unlink files outside of its sandbox, 102 # Do not allow untrusted apps to directly open tun_device 116 # Do not allow untrusted apps access to preloads data files [all …]
|
/aosp12/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | app_neverallows.te | 19 # Do not allow untrusted apps to register services. 24 # Do not allow untrusted apps to use VendorBinder 28 # Do not allow untrusted apps to connect to the property service 34 # Do not allow untrusted apps to be assigned mlstrustedsubject. 44 # Do not allow untrusted apps to hard link to any files. 52 # Do not allow untrusted apps to access network MAC address file 69 # Do not allow untrusted apps access to /cache 73 # Do not allow untrusted apps to create/unlink files outside of its sandbox, 97 # Do not allow untrusted apps to directly open tun_device 111 # Do not allow untrusted apps access to preloads data files [all …]
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/ |
H A D | app_neverallows.te | 25 # Do not allow untrusted apps to register services. 30 # Do not allow untrusted apps to use VendorBinder 34 # Do not allow untrusted apps to connect to the property service 70 # Do not allow untrusted apps to be assigned mlstrustedsubject. 80 # Do not allow untrusted apps to hard link to any files. 88 # Do not allow untrusted apps to access network MAC address file 91 # Do not allow any write access to files in /sys 115 # Do not allow untrusted apps access to /cache 119 # Do not allow untrusted apps to create/unlink files outside of its sandbox, 143 # Do not allow untrusted apps to directly open the tun_device [all …]
|
/aosp12/build/make/core/ |
H A D | target_test_internal.mk | 21 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH when building test $(LOCAL_MODULE)) 25 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH_32 when building test $(LOCAL_MODULE)) 29 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH_64 when building test $(LOCAL_MODULE))
|
H A D | fuzz_test.mk | 27 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH when building test $(LOCAL_MODULE)) 31 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH_32 when building test $(LOCAL_MODULE)) 35 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH_64 when building test $(LOCAL_MODULE))
|
/aosp12/system/media/camera/docs/ |
H A D | ndk_camera_metadata_tags.mako | 29 * Do not remove methods. 30 * Do not change method signatures. 31 * Do not change the value of constants. 32 * Do not change the size of any of the classes defined in here. 33 * Do not reference types that are not part of the NDK. 34 * Do not #include files that aren't part of the NDK.
|
/aosp12/art/test/1948-obsolete-const-method-handle/ |
H A D | expected-stdout.txt | 1 Do nothing 5 Do nothing
|
/aosp12/packages/services/Car/ |
H A D | CPPLINT.cfg | 3 # Do not enforce including header files in both .h and .cpp. 5 # Do not check access modifier indentation.
|
/aosp12/system/sepolicy/prebuilts/api/26.0/public/ |
H A D | vendor_toolbox.te | 6 # Do not allow domains to transition to vendor toolbox 9 # Do not allow non-vendor domains to transition
|
/aosp12/system/sepolicy/prebuilts/api/27.0/public/ |
H A D | vendor_toolbox.te | 6 # Do not allow domains to transition to vendor toolbox 9 # Do not allow non-vendor domains to transition
|
/aosp12/system/sepolicy/prebuilts/api/28.0/public/ |
H A D | vendor_toolbox.te | 6 # Do not allow domains to transition to vendor toolbox 9 # Do not allow non-vendor domains to transition
|
/aosp12/system/sepolicy/prebuilts/api/29.0/public/ |
H A D | vendor_toolbox.te | 6 # Do not allow domains to transition to vendor toolbox 9 # Do not allow non-vendor domains to transition
|