Home
last modified time | relevance | path

Searched refs:give (Results 1 – 25 of 429) sorted by relevance

12345678910>>...18

/aosp12/system/sepolicy/prebuilts/api/28.0/private/
H A Dnetd.te14 # give netd permission to setup iptables rule with xt_bpf
H A Ddexoptanalyzer.te6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
/aosp12/system/chre/doc/
H A Dcontributing.md5 provide more reference code for others and give the CHRE team better insight
/aosp12/frameworks/base/packages/BackupEncryption/proto/
H A Dbackup_chunks_metadata.proto47 // not give any information about the order. However, we use this mode for key value backups
88 // blob in its correct order. (The chunk order is randomized so as to give the server less
114 // give the server less information about which parts of the backup are changing over time.) This
/aosp12/hardware/qcom/data/ipacfg-mgr/msm8998/ipanat/test/
H A DREADME.txt18 4. if we just give command "ipanattest", runs test suite 1 time with 100 entries (non separate)
/aosp12/hardware/qcom/sdm845/data/ipacfg-mgr/ipanat/test/
H A DREADME.txt18 4. if we just give command "ipanattest", runs test suite 1 time with 100 entries (non separate)
/aosp12/system/sepolicy/prebuilts/api/27.0/public/
H A Dracoon.te20 # XXX: should we give ip-up-vpn its own label (currently racoon domain)
/aosp12/system/sepolicy/prebuilts/api/26.0/public/
H A Dracoon.te20 # XXX: should we give ip-up-vpn its own label (currently racoon domain)
/aosp12/system/sepolicy/prebuilts/api/28.0/public/
H A Dracoon.te20 # XXX: should we give ip-up-vpn its own label (currently racoon domain)
/aosp12/hardware/qcom/sm8150/data/ipacfg-mgr/ipanat/test/
H A DREADME.txt18 4. if we just give command "ipanattest", runs test suite 1 time with 100 entries (non separate)
/aosp12/system/sepolicy/prebuilts/api/30.0/public/
H A Dracoon.te21 # XXX: should we give ip-up-vpn its own label (currently racoon domain)
/aosp12/system/sepolicy/prebuilts/api/29.0/public/
H A Dracoon.te21 # XXX: should we give ip-up-vpn its own label (currently racoon domain)
/aosp12/system/sepolicy/prebuilts/api/31.0/public/
H A Dracoon.te22 # XXX: should we give ip-up-vpn its own label (currently racoon domain)
/aosp12/system/sepolicy/prebuilts/api/32.0/public/
H A Dracoon.te22 # XXX: should we give ip-up-vpn its own label (currently racoon domain)
/aosp12/system/sepolicy/public/
H A Dracoon.te22 # XXX: should we give ip-up-vpn its own label (currently racoon domain)
/aosp12/system/sepolicy/prebuilts/api/29.0/private/
H A Dnetd.te11 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
H A Dviewcompiler.te7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
H A Ddexoptanalyzer.te7 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
/aosp12/system/sepolicy/prebuilts/api/30.0/private/
H A Dnetd.te12 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
H A Dviewcompiler.te7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
/aosp12/system/sepolicy/prebuilts/api/31.0/private/
H A Dviewcompiler.te7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
/aosp12/system/sepolicy/prebuilts/api/32.0/private/
H A Dviewcompiler.te7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
/aosp12/system/sepolicy/private/
H A Dviewcompiler.te7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
/aosp12/system/sepolicy/prebuilts/api/26.0/private/
H A Ddexoptanalyzer.te6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
/aosp12/system/sepolicy/prebuilts/api/27.0/private/
H A Ddexoptanalyzer.te6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their

12345678910>>...18