Searched refs:reads (Results 1 – 25 of 77) sorted by relevance
1234
/system/extras/boottime_tools/io_analysis/ |
D | check_io_trace.py | 53 self.reads = [] #(start time, RwEvent) 101 self.reads.append((start_time, event)) 145 if len(self.reads) > 0: 146 total_read_time = self.reads[-1][0] + self.reads[-1][1].latency - self.reads[0][0] 158 for (time, event) in self.reads:
|
D | check_verity.py | 77 self.reads = [] # all events in start time 94 self.reads.append(event) 116 io, verity, total, blocks = self.dump_list ("total,", self.reads)
|
D | check_file_read.py | 363 reads = accesses_per_inodes.get(pending.inode, [[], [], []]) 364 reads[0].append(offset + pending.lblk) 365 reads[1].append(valid_access_size) 366 reads[2].append(pending.process_name) 367 accesses_per_inodes[pending.inode] = reads 417 reads, writes, num_files = self.dump_partition(DEVICE_TO_PARTITION[d], \ 419 total_reads += reads 421 summaries.append((DEVICE_TO_PARTITION[d], reads, writes, num_files))
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | radio.te | 7 # Telephony code contains time / time zone detection logic so it reads the associated properties.
|
D | ephemeral_app.te | 92 # Avoid reads from generically labeled /proc files 100 # Avoid reads to proc_net, it contains too much device wide information about
|
/system/sepolicy/private/ |
D | radio.te | 7 # Telephony code contains time / time zone detection logic so it reads the associated properties.
|
D | ephemeral_app.te | 92 # Avoid reads from generically labeled /proc files 100 # Avoid reads to proc_net, it contains too much device wide information about
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | atrace.te | 14 # atrace reads the files in /sys/kernel/debug/tracing/
|
D | ephemeral_app.te | 58 # Avoid reads from generically labeled /proc files 66 # Avoid reads to proc_net, it contains too much device wide information about
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | ephemeral_app.te | 60 # Avoid reads from generically labeled /proc files 68 # Avoid reads to proc_net, it contains too much device wide information about
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | ephemeral_app.te | 71 # Avoid reads from generically labeled /proc files 79 # Avoid reads to proc_net, it contains too much device wide information about
|
/system/sepolicy/public/ |
D | uncrypt.te | 38 # uncrypt reads /proc/cmdline
|
D | simpleperf_app_runner.te | 9 # simpleperf_app_runner reads package information.
|
D | runas.te | 13 # run-as reads package information.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | uncrypt.te | 38 # uncrypt reads /proc/cmdline
|
D | simpleperf_app_runner.te | 9 # simpleperf_app_runner reads package information.
|
D | runas.te | 13 # run-as reads package information.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | wificond.te | 26 # wificond also reads pid files out of this directory
|
D | runas.te | 12 # run-as reads package information.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | wificond.te | 26 # wificond also reads pid files out of this directory
|
D | runas.te | 13 # run-as reads package information.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | uncrypt.te | 41 # uncrypt reads /proc/cmdline
|
D | runas.te | 13 # run-as reads package information.
|
/system/bt/stack/a2dp/ |
D | a2dp_vendor_aptx_hd_encoder.cc | 409 for (uint32_t reads = 0, offset = 0; reads < framing_params->pcm_reads; in a2dp_vendor_aptx_hd_send_frames() local 410 reads++, offset += in a2dp_vendor_aptx_hd_send_frames()
|
D | a2dp_vendor_aptx_encoder.cc | 422 for (uint32_t reads = 0, offset = 0; reads < framing_params->pcm_reads; in a2dp_vendor_aptx_send_frames() local 423 reads++, offset += in a2dp_vendor_aptx_send_frames()
|
1234