/external/sepolicy/ |
radio.te | 2 type radio, domain;
|
sdcardd.te | 1 type sdcardd, domain;
|
unconfined.te | 5 allow unconfineddomain domain:process *; 6 allow unconfineddomain domain:fd *; 7 allow unconfineddomain domain:dir r_dir_perms; 8 allow unconfineddomain domain:lnk_file r_file_perms; 9 allow unconfineddomain domain:{ fifo_file file } rw_file_perms; 10 allow unconfineddomain domain:socket_class_set *; 11 allow unconfineddomain domain:ipc_class_set *; 12 allow unconfineddomain domain:key *; 21 allow unconfineddomain domain:peer recv; 22 allow unconfineddomain domain:binder { call transfer set_context_mgr } [all...] |
bluetoothd.te | 2 type bluetoothd, domain;
|
clatd.te | 2 type clatd, domain;
|
drmserver.te | 2 type drmserver, domain;
|
mediaserver.te | 2 type mediaserver, domain;
|
mtp.te | 2 type mtp, domain;
|
servicemanager.te | 2 type servicemanager, domain;
|
su.te | 1 type su, domain;
|
debuggerd.te | 2 type debuggerd, domain;
|
kernel.te | 2 type kernel, domain;
|
ppp.te | 2 type ppp, domain;
|
/device/lge/mako/sepolicy/ |
hci_init.te | 1 type hci_init, domain;
|
/external/chromium_org/chrome/browser/policy/ |
policy_service.cc | 13 PolicyNamespace::PolicyNamespace(PolicyDomain domain, 15 : domain(domain), 19 : domain(other.domain), 25 domain = other.domain; 31 return domain < other.domain || 32 (domain == other.domain && component_id < other.component_id) [all...] |
/external/chromium_org/chrome/test/chromedriver/js/ |
add_cookie.js | 6 * Test whether the given domain is valid for a cookie. 8 * @param {string} domain Domain for a cookie. 9 * @return {boolean} True if the domain is valid, otherwise false. 11 function isDomainValid(domain) { 14 document.cookie = dummyCookie + '; domain=' + domain; 27 * If domain is not specified, default to document.domain, otherwise remove its 30 * Validate name, value, domain and path of the cookie in the same way as th [all...] |
/external/chromium_org/ppapi/shared_impl/ |
file_path.cc | 14 PepperFilePath::PepperFilePath(Domain domain, const base::FilePath& path) 15 : domain_(domain),
|
/external/kernel-headers/original/asm-arm/ |
domain.h | 2 * linux/include/asm-arm/domain.h 14 * Domain numbers 16 * DOMAIN_IO - domain 2 includes all IO only 17 * DOMAIN_USER - domain 1 includes all user memory only 18 * DOMAIN_KERNEL - domain 0 includes all kernel memory only 20 * The domain numbering depends on whether we support 36 physical 23 * be set for domain 0. We could just default to DOMAIN_IO as zero, 44 * Domain types 58 "mcr p15, 0, %0, c3, c0 @ set domain" \ 65 unsigned int domain = thread->cpu_domain; [all...] |
/bionic/libc/arch-x86/include/machine/ |
internal_types.h | 2 /* Public domain */
|
/development/ndk/platforms/android-9/arch-x86/include/machine/ |
internal_types.h | 2 /* Public domain */
|
/device/asus/grouper/sepolicy/ |
btmacreader.te | 1 type btmacreader, domain;
|
sensors_config.te | 4 type sensors_config, domain;
|
/external/chromium_org/third_party/angle_dx11/src/third_party/murmurhash/ |
LICENSE | 2 // domain. The author hereby disclaims copyright to this source code
|
/external/markdown/MarkdownTest/Tests_2004/ |
Yuri-Email.text-out | 10 "mailto:yuri@domain.org">yuri@domain.org</a>, etc.</p> 13 <li><a href="mailto:yuri@domain.org">yuri@domain.org</a></li>
|
Yuri-Email.text-res | 10 "mailto:yuri@domain.org">yuri@domain.org</a>, etc.</p> 13 <li><a href="mailto:yuri@domain.org">yuri@domain.org</a></li>
|