/aosp12/system/tools/aidl/ |
H A D | aidl_checkapi.cpp | 64 auto older_file = older.GetLocation().GetFile(); in CheckEquality() 113 vector<string> olderAnnotations = get_strict_annotations(older); in have_compatible_annotations() 118 const string from = older.ToString().empty() ? "(empty)" : older.ToString(); in have_compatible_annotations() 128 if (older.Signature() != newer.Signature()) { in are_compatible_types() 133 compatible &= have_compatible_annotations(older, newer); in are_compatible_types() 145 for (const auto& old_c : older.GetConstantDeclarations()) { in are_compatible_constants() 176 for (const auto& old_m : older.AsInterface()->GetMethods()) { in are_compatible_interfaces() 250 const auto& old_fields = older.GetFields(); in are_compatible_parcelables() 266 if (older.GetCanonicalName() == "android.net.UidRangeParcel" && in are_compatible_parcelables() 346 if (older.GetCanonicalName() == exception.canonical && in are_compatible_parcelables() [all …]
|
/aosp12/build/soong/cmd/merge_zips/ |
H A D | merge_zips.go | 390 older *ManagedInputZip member 404 olderMiz := miz.older 406 if newerMiz.older != miz || olderMiz.newer != miz { 411 newerMiz.older = olderMiz 413 miz.older = nil 417 if olderMiz.newer != nil || olderMiz.older != nil { 420 oldOlderMiz := miz.older 424 miz.older = olderMiz 425 olderMiz.older = oldOlderMiz 436 head.older = head [all …]
|
/aosp12/system/sepolicy/prebuilts/api/27.0/private/compat/26.0/ |
H A D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 30 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/28.0/private/compat/27.0/ |
H A D | 27.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 130 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/28.0/private/compat/26.0/ |
H A D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 152 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/compat/27.0/ |
H A D | 27.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 194 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/compat/27.0/ |
H A D | 27.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 200 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/compat/26.0/ |
H A D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 216 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/compat/26.0/ |
H A D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 222 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/compat/26.0/ |
H A D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 231 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/compat/26.0/ |
H A D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 231 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/private/compat/26.0/ |
H A D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 231 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/compat/27.0/ |
H A D | 27.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 254 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/compat/27.0/ |
H A D | 27.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 254 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/private/compat/27.0/ |
H A D | 27.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 254 ;; older policy, but that should not remain accessible to vendor policy.
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/compat/31.0/ |
H A D | 31.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to
|
/aosp12/system/sepolicy/private/compat/31.0/ |
H A D | 31.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to
|
/aosp12/frameworks/av/media/libshmem/ |
H A D | README.md | 6 the use of shared memory and to integrate with legacy code that uses older facilities.
|
/aosp12/frameworks/ex/camera2/extensions/ |
H A D | README.android | 4 implementation. The stub includes extension API versions 1.2.0, 1.1.0 and older.
|
/aosp12/system/chre/doc/ |
H A D | compatibility.md | 76 or older implementation. This is done through a combination of runtime feature 111 on an older CHRE version. This may be the case for a nanoapp developed for a 141 API minor version that is 2 or more generations older. For example, a CHRE v1.4 194 CHRE `N-1` or older, or a suitable alternative must be devised. Likewise, 206 to return false on version `N` or older. 211 `N+1` or older at load time. Likewise, the NSL can remove compatibility code for
|
/aosp12/build/make/tools/docker/ |
H A D | README.md | 3 older branches that required 14.04 if you've upgraded to something newer.
|
/aosp12/packages/modules/Permission/PermissionController/ |
H A D | proguard.flags | 2 # Don't warn about those in case this app is linking against an older
|
/aosp12/system/core/debuggerd/seccomp_policy/ |
H A D | crash_dump.policy.def | 45 libminijail on vendor partitions older than P does not have constants from <sys/mman.h>.
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/compat/29.0/ |
H A D | 29.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/compat/29.0/ |
H A D | 29.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to
|