Home
last modified time | relevance | path

Searched refs:Do (Results 1 – 25 of 1038) sorted by relevance

12345678910>>...42

/aosp12/frameworks/rs/script_api/include/
H A Drs_graphics.rsh39 * DEPRECATED. Do not use.
66 * DEPRECATED. Do not use.
92 * DEPRECATED. Do not use.
113 * DEPRECATED. Do not use.
140 * DEPRECATED. Do not use.
165 * DEPRECATED. Do not use.
183 * DEPRECATED. Do not use.
201 * DEPRECATED. Do not use.
219 * DEPRECATED. Do not use.
237 * DEPRECATED. Do not use.
[all …]
/aosp12/frameworks/rs/tests/java_api/RSTest_CompatLibLegacy/src/com/android/rs/test/
H A Dfp_mad.rscript11 // Do ~1 billion ops
34 // Do ~1 billion ops
57 // Do ~10 M ops
71 // Do ~10 M ops
85 // Do ~10 M ops
99 // Do ~100 M ops
110 // Do ~100 M ops
125 // Do ~100 M ops
/aosp12/frameworks/rs/tests/java_api/RsTest_11/src/com/android/rs/test/
H A Dfp_mad.rscript11 // Do ~1 billion ops
34 // Do ~1 billion ops
57 // Do ~10 M ops
71 // Do ~10 M ops
85 // Do ~10 M ops
99 // Do ~100 M ops
110 // Do ~100 M ops
125 // Do ~100 M ops
/aosp12/frameworks/rs/tests/java_api/RsTest_14/src/com/android/rs/test/
H A Dfp_mad.rscript11 // Do ~1 billion ops
34 // Do ~1 billion ops
57 // Do ~10 M ops
71 // Do ~10 M ops
85 // Do ~10 M ops
99 // Do ~100 M ops
110 // Do ~100 M ops
125 // Do ~100 M ops
/aosp12/frameworks/rs/tests/java_api/RsTest_16/src/com/android/rs/test/
H A Dfp_mad.rscript11 // Do ~1 billion ops
34 // Do ~1 billion ops
57 // Do ~10 M ops
71 // Do ~10 M ops
85 // Do ~10 M ops
99 // Do ~100 M ops
110 // Do ~100 M ops
125 // Do ~100 M ops
/aosp12/hardware/interfaces/neuralnetworks/
H A DTEST_MAPPING25 // Do not use any sample driver except sample-all in order to reduce
36 // Do not use any sample driver except sample-all in order to reduce
49 // Do not use any sample driver except sample-all in order to reduce
60 // Do not use any sample driver except sample-all in order to reduce
71 // Do not use any sample driver except sample-all in order to reduce
/aosp12/system/sepolicy/prebuilts/api/30.0/private/
H A Dapp_neverallows.te27 # Do not allow untrusted apps to register services.
32 # Do not allow untrusted apps to use VendorBinder
36 # Do not allow untrusted apps to connect to the property service
71 # Do not allow untrusted apps to be assigned mlstrustedsubject.
81 # Do not allow untrusted apps to hard link to any files.
89 # Do not allow untrusted apps to access network MAC address file
92 # Do not allow any write access to files in /sys
124 # Do not allow untrusted apps access to /cache
128 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
152 # Do not allow untrusted apps to directly open the tun_device
[all …]
/aosp12/frameworks/rs/tests/java_api/RSUnitTests/src/com/android/rs/unittest/
H A Dfp_mad.rscript27 // Do ~1 billion ops
50 // Do ~1 billion ops
73 // Do ~10 M ops
87 // Do ~10 M ops
101 // Do ~10 M ops
115 // Do ~100 M ops
126 // Do ~100 M ops
141 // Do ~100 M ops
/aosp12/frameworks/rs/tests/java_api/RSUnitTests/supportlibsrc_gen/com/android/rs/unittest/
H A Dfp_mad.rscript29 // Do ~1 billion ops
52 // Do ~1 billion ops
75 // Do ~10 M ops
89 // Do ~10 M ops
103 // Do ~10 M ops
117 // Do ~100 M ops
128 // Do ~100 M ops
143 // Do ~100 M ops
/aosp12/system/sepolicy/prebuilts/api/28.0/private/
H A Dapp_neverallows.te25 # Do not allow untrusted apps to register services.
30 # Do not allow untrusted apps to use VendorBinder
34 # Do not allow untrusted apps to connect to the property service
44 # Do not allow untrusted apps to be assigned mlstrustedsubject.
54 # Do not allow untrusted apps to hard link to any files.
62 # Do not allow untrusted apps to access network MAC address file
65 # Do not allow any write access to files in /sys
85 # Do not allow untrusted apps access to /cache
89 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
111 # Do not allow untrusted apps to directly open tun_device
[all …]
/aosp12/system/sepolicy/prebuilts/api/31.0/private/
H A Dapp_neverallows.te30 # Do not allow untrusted apps to register services.
35 # Do not allow untrusted apps to use VendorBinder
39 # Do not allow untrusted apps to connect to the property service
77 # Do not allow untrusted apps to be assigned mlstrustedsubject.
87 # Do not allow untrusted apps to hard link to any files.
95 # Do not allow untrusted apps to access network MAC address file
98 # Do not allow any write access to files in /sys
130 # Do not allow untrusted apps access to /cache
134 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
158 # Do not allow untrusted apps to directly open the tun_device
[all …]
/aosp12/system/sepolicy/prebuilts/api/32.0/private/
H A Dapp_neverallows.te30 # Do not allow untrusted apps to register services.
35 # Do not allow untrusted apps to use VendorBinder
39 # Do not allow untrusted apps to connect to the property service
77 # Do not allow untrusted apps to be assigned mlstrustedsubject.
87 # Do not allow untrusted apps to hard link to any files.
95 # Do not allow untrusted apps to access network MAC address file
98 # Do not allow any write access to files in /sys
130 # Do not allow untrusted apps access to /cache
134 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
158 # Do not allow untrusted apps to directly open the tun_device
[all …]
/aosp12/system/sepolicy/private/
H A Dapp_neverallows.te30 # Do not allow untrusted apps to register services.
35 # Do not allow untrusted apps to use VendorBinder
39 # Do not allow untrusted apps to connect to the property service
77 # Do not allow untrusted apps to be assigned mlstrustedsubject.
87 # Do not allow untrusted apps to hard link to any files.
95 # Do not allow untrusted apps to access network MAC address file
98 # Do not allow any write access to files in /sys
130 # Do not allow untrusted apps access to /cache
134 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
158 # Do not allow untrusted apps to directly open the tun_device
[all …]
/aosp12/system/sepolicy/prebuilts/api/27.0/private/
H A Dapp_neverallows.te24 # Do not allow untrusted apps to register services.
29 # Do not allow untrusted apps to use VendorBinder
33 # Do not allow untrusted apps to connect to the property service
39 # Do not allow untrusted apps to be assigned mlstrustedsubject.
49 # Do not allow untrusted apps to hard link to any files.
57 # Do not allow untrusted apps to access network MAC address file
74 # Do not allow untrusted apps access to /cache
78 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
102 # Do not allow untrusted apps to directly open tun_device
116 # Do not allow untrusted apps access to preloads data files
[all …]
/aosp12/system/sepolicy/prebuilts/api/26.0/private/
H A Dapp_neverallows.te19 # Do not allow untrusted apps to register services.
24 # Do not allow untrusted apps to use VendorBinder
28 # Do not allow untrusted apps to connect to the property service
34 # Do not allow untrusted apps to be assigned mlstrustedsubject.
44 # Do not allow untrusted apps to hard link to any files.
52 # Do not allow untrusted apps to access network MAC address file
69 # Do not allow untrusted apps access to /cache
73 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
97 # Do not allow untrusted apps to directly open tun_device
111 # Do not allow untrusted apps access to preloads data files
[all …]
/aosp12/system/sepolicy/prebuilts/api/29.0/private/
H A Dapp_neverallows.te25 # Do not allow untrusted apps to register services.
30 # Do not allow untrusted apps to use VendorBinder
34 # Do not allow untrusted apps to connect to the property service
70 # Do not allow untrusted apps to be assigned mlstrustedsubject.
80 # Do not allow untrusted apps to hard link to any files.
88 # Do not allow untrusted apps to access network MAC address file
91 # Do not allow any write access to files in /sys
115 # Do not allow untrusted apps access to /cache
119 # Do not allow untrusted apps to create/unlink files outside of its sandbox,
143 # Do not allow untrusted apps to directly open the tun_device
[all …]
/aosp12/build/make/core/
H A Dtarget_test_internal.mk21 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH when building test $(LOCAL_MODULE))
25 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH_32 when building test $(LOCAL_MODULE))
29 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH_64 when building test $(LOCAL_MODULE))
H A Dfuzz_test.mk27 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH when building test $(LOCAL_MODULE))
31 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH_32 when building test $(LOCAL_MODULE))
35 $(error $(LOCAL_PATH): Do not set LOCAL_MODULE_PATH_64 when building test $(LOCAL_MODULE))
/aosp12/system/media/camera/docs/
H A Dndk_camera_metadata_tags.mako29 * Do not remove methods.
30 * Do not change method signatures.
31 * Do not change the value of constants.
32 * Do not change the size of any of the classes defined in here.
33 * Do not reference types that are not part of the NDK.
34 * Do not #include files that aren't part of the NDK.
/aosp12/art/test/1948-obsolete-const-method-handle/
H A Dexpected-stdout.txt1 Do nothing
5 Do nothing
/aosp12/packages/services/Car/
H A DCPPLINT.cfg3 # Do not enforce including header files in both .h and .cpp.
5 # Do not check access modifier indentation.
/aosp12/system/sepolicy/prebuilts/api/26.0/public/
H A Dvendor_toolbox.te6 # Do not allow domains to transition to vendor toolbox
9 # Do not allow non-vendor domains to transition
/aosp12/system/sepolicy/prebuilts/api/27.0/public/
H A Dvendor_toolbox.te6 # Do not allow domains to transition to vendor toolbox
9 # Do not allow non-vendor domains to transition
/aosp12/system/sepolicy/prebuilts/api/28.0/public/
H A Dvendor_toolbox.te6 # Do not allow domains to transition to vendor toolbox
9 # Do not allow non-vendor domains to transition
/aosp12/system/sepolicy/prebuilts/api/29.0/public/
H A Dvendor_toolbox.te6 # Do not allow domains to transition to vendor toolbox
9 # Do not allow non-vendor domains to transition

12345678910>>...42