Home
last modified time | relevance | path

Searched refs:Define (Results 1 – 25 of 37) sorted by relevance

12

/system/tools/hidl/c2hal/
DDefine.cpp25 Define::Define(const std::string &name, const std::string &slurp) in Define() function in android::Define
29 Define::~Define() { in ~Define()
33 Expression::Type Define::getExpressionType() const { in getExpressionType()
36 Expression *Define::getExpression() const { in getExpression()
39 void Define::setExpression(Expression* expression) { in setExpression()
43 void Define::generateSource(Formatter &out) const { in generateSource()
47 void Define::processContents(AST &ast) { in processContents()
DDefine.h29 struct Define : Declaration { struct
30 Define(const std::string &name, const std::string &slurp);
31 ~Define();
49 DISALLOW_COPY_AND_ASSIGN(Define); argument
DAST.h33 struct Define;
61 const Scope<Define *> &getDefinesScope() const;
62 Scope<Define *> &getDefinesScope();
78 Scope<Define *> mDefinesScope;
DAST.cpp110 const Scope<Define *> &AST::getDefinesScope() const { in getDefinesScope()
114 Scope<Define *> &AST::getDefinesScope() { in getDefinesScope()
204 if ((*it)->decType() == Define::type() && in isolateConstants()
205 ((Define *)*it)->getExpressionType() == ofType) { in isolateConstants()
207 Define* define = (Define *)*it; in isolateConstants()
DExpression.h28 struct Define;
DAndroid.bp31 "Define.cpp",
/system/sepolicy/microdroid/reqd_mask/
Daccess_vectors2 # Define common prefixes for access vectors
8 # Define a common prefix for file access vectors.
42 # Define a common prefix for socket access vectors.
73 # Define a common prefix for ipc access vectors.
90 # Define a common for capability access vectors.
147 # Define the access vectors.
153 # Define the access vector interpretation for file-related objects.
216 # Define the access vector interpretation for network-related objects.
272 # Define the access vector interpretation for process-related objects
317 # Define the access vector interpretation for ipc-related objects
[all …]
Dmls_macros32 # Define the ordering of the sensitivity levels (least to greatest)
/system/sepolicy/private/
Daccess_vectors2 # Define common prefixes for access vectors
8 # Define a common prefix for file access vectors.
42 # Define a common prefix for socket access vectors.
73 # Define a common prefix for ipc access vectors.
90 # Define a common for capability access vectors.
147 # Define the access vectors.
153 # Define the access vector interpretation for file-related objects.
216 # Define the access vector interpretation for network-related objects.
272 # Define the access vector interpretation for process-related objects
317 # Define the access vector interpretation for ipc-related objects
[all …]
Dinitial_sids4 # Define initial security identifiers
Dmls_macros32 # Define the ordering of the sensitivity levels (least to greatest)
Dfs_use21 # Define type_transition rules if you want per-domain types.
Dhal_neuralnetworks.te41 # Define sepolicy for NN AIDL HAL service
Dsimpleperf.te8 # Define apps that can be marked debuggable/profileable and be profiled by simpleperf.
Dsecurity_classes4 # Define the security object classes
/system/sepolicy/microdroid/system/private/
Daccess_vectors2 # Define common prefixes for access vectors
8 # Define a common prefix for file access vectors.
42 # Define a common prefix for socket access vectors.
73 # Define a common prefix for ipc access vectors.
90 # Define a common for capability access vectors.
147 # Define the access vectors.
153 # Define the access vector interpretation for file-related objects.
216 # Define the access vector interpretation for network-related objects.
272 # Define the access vector interpretation for process-related objects
317 # Define the access vector interpretation for ipc-related objects
[all …]
Dinitial_sids4 # Define initial security identifiers
Dmls_macros32 # Define the ordering of the sensitivity levels (least to greatest)
Dfs_use21 # Define type_transition rules if you want per-domain types.
/system/sepolicy/reqd_mask/
Daccess_vectors2 # Define common prefixes for access vectors
8 # Define a common prefix for file access vectors.
42 # Define a common prefix for socket access vectors.
73 # Define a common prefix for ipc access vectors.
90 # Define a common for capability access vectors.
147 # Define the access vectors.
153 # Define the access vector interpretation for file-related objects.
216 # Define the access vector interpretation for network-related objects.
272 # Define the access vector interpretation for process-related objects
317 # Define the access vector interpretation for ipc-related objects
[all …]
Dmls_macros32 # Define the ordering of the sensitivity levels (least to greatest)
Dsecurity_classes4 # Define the security object classes
/system/sepolicy/microdroid/system/public/
Dte_macros96 # Define types for endpoint and channel sockets.
830 # Define a property with given owner and scope
838 # Define a /system-owned property used only in /system
851 # Define a /system-owned property which can't be written outside /system
864 # Define a /system-owned property with no restrictions
870 # Define a /system-owned property which can only be written by vendor_init
882 # Define a /product-owned property used only in /product
895 # Define a /product-owned property which can't be written outside /product
908 # Define a /product-owned property with no restrictions
914 # Define a /vendor-owned property used only in /vendor
[all …]
/system/sepolicy/public/
Dte_macros96 # Define types for endpoint and channel sockets.
909 # Define a property with given owner and scope
917 # Define a /system-owned property used only in /system
930 # Define a /system-owned property which can't be written outside /system
943 # Define a /system-owned property with no restrictions
949 # Define a /system-owned property which can only be written by vendor_init
961 # Define a /product-owned property used only in /product
974 # Define a /product-owned property which can't be written outside /product
987 # Define a /product-owned property with no restrictions
993 # Define a /vendor-owned property used only in /vendor
[all …]
/system/core/debuggerd/seccomp_policy/
Dcrash_dump.policy.def56 Define values for PROT_READ, PROT_WRITE and PROT_MTE ourselves to maintain backwards compatibility.

12