Skip to content
Snippets Groups Projects
Select Git revision
  • 7611b608b5683d29d00eb7faf7109ad14733cf35
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

shared_app.te

Blame
    • Nick Kralevich's avatar
      623975fa
      Support forcing permissive domains to unconfined. · 623975fa
      Nick Kralevich authored
      Permissive domains are only intended for development.
      When a device launches, we want to ensure that all
      permissive domains are in, at a minimum, unconfined+enforcing.
      
      Add FORCE_PERMISSIVE_TO_UNCONFINED to Android.mk. During
      development, this flag is false, and permissive domains
      are allowed. When SELinux new feature development has been
      frozen immediately before release, this flag will be flipped
      to true. Any previously permissive domains will move into
      unconfined+enforcing.
      
      This will ensure that all SELinux domains have at least a
      minimal level of protection.
      
      Unconditionally enable this flag for all user builds.
      
      Change-Id: I1632f0da0022c80170d8eb57c82499ac13fd7858
      623975fa
      History
      Support forcing permissive domains to unconfined.
      Nick Kralevich authored
      Permissive domains are only intended for development.
      When a device launches, we want to ensure that all
      permissive domains are in, at a minimum, unconfined+enforcing.
      
      Add FORCE_PERMISSIVE_TO_UNCONFINED to Android.mk. During
      development, this flag is false, and permissive domains
      are allowed. When SELinux new feature development has been
      frozen immediately before release, this flag will be flipped
      to true. Any previously permissive domains will move into
      unconfined+enforcing.
      
      This will ensure that all SELinux domains have at least a
      minimal level of protection.
      
      Unconditionally enable this flag for all user builds.
      
      Change-Id: I1632f0da0022c80170d8eb57c82499ac13fd7858
    ddd.m 1.62 KiB
    classdef ddd < export.Data
        %DDD export 3D data
        %   
        
        properties
            x;
            y;
            z;
            xRange;
            yRange;
        end
    
        properties(Dependent)
           out; 
        end
        
        methods
            
            function obj = ddd(varargin)
               obj@export.Data('N', 60); 
               
               for arg=1:2:length(varargin)
                   obj.(varargin{arg}) = varargin{arg + 1}; 
               end
               
            end
            
            function xR = get.xRange(obj)
               if isempty(obj.xRange)
                  xR = [obj.x(1), obj.x(end)]; 
               else
                   xR = obj.xRange;
               end
            end
            
            function yR = get.yRange(obj)
               if isempty(obj.yRange)
                  yR = [obj.y(1), obj.y(end)];
               else
                   yR = obj.yRange;
               end
            end
            
            function set.z(obj, z)
               obj.z = squeeze(z); 
            end
            
            function out = get.out(obj)
                o.x = linspace(obj.xRange(1), obj.xRange(2), obj.N);
                o.y = linspace(obj.yRange(1), obj.yRange(2), obj.N);
                [o.x, o.y] = meshgrid(o.x, o.y);
                [grid.x, grid.y] = meshgrid(obj.x, obj.y);
                o.z = interp2(grid.x, grid.y, obj.z', o.x, o.y);
                out = [o.x(:), o.y(:), o.z(:)];            
            end
    
            function i = isempty(obj)
                i = isempty(obj.x) || isempty(obj.y) || isempty(obj.z);
            end
            
        end
    
        methods( Access = protected)
           function innerexport(obj)
                o = obj.out;
                save(obj.path, 'o',  '-ascii', '-tabs')
            end         
        end