/system/core/init/ |
D | action_manager.cpp | 28 for (const auto& action : actions_) { in CheckAllCommands() local 29 failures += action->CheckAllCommands(); in CheckAllCommands() 39 void ActionManager::AddAction(std::unique_ptr<Action> action) { in AddAction() argument 40 actions_.emplace_back(std::move(action)); in AddAction() 59 auto action = std::make_unique<Action>(true, nullptr, "<Builtin Action>", 0, name, in QueueBuiltinAction() local 61 action->AddCommand(std::move(func), {name}, 0); in QueueBuiltinAction() 63 event_queue_.emplace(action.get()); in QueueBuiltinAction() 64 actions_.emplace_back(std::move(action)); in QueueBuiltinAction() 72 for (const auto& action : actions_) { in ExecuteOneCommand() local 73 if (std::visit([&action](const auto& event) { return action->CheckEvent(event); }, in ExecuteOneCommand() [all …]
|
D | reboot_utils.cpp | 182 struct sigaction action; in InstallRebootSignalHandlers() local 183 memset(&action, 0, sizeof(action)); in InstallRebootSignalHandlers() 184 sigfillset(&action.sa_mask); in InstallRebootSignalHandlers() 185 action.sa_handler = [](int signal) { in InstallRebootSignalHandlers() 198 action.sa_flags = SA_RESTART; in InstallRebootSignalHandlers() 199 sigaction(SIGABRT, &action, nullptr); in InstallRebootSignalHandlers() 200 sigaction(SIGBUS, &action, nullptr); in InstallRebootSignalHandlers() 201 sigaction(SIGFPE, &action, nullptr); in InstallRebootSignalHandlers() 202 sigaction(SIGILL, &action, nullptr); in InstallRebootSignalHandlers() 203 sigaction(SIGSEGV, &action, nullptr); in InstallRebootSignalHandlers() [all …]
|
D | fscrypt_init_extensions.cpp | 139 bool FscryptSetDirectoryPolicy(const std::string& ref_basename, FscryptAction action, in FscryptSetDirectoryPolicy() argument 141 if (action == FscryptAction::kNone) { in FscryptSetDirectoryPolicy() 144 if (SetPolicyOn(ref_basename, dir) || action == FscryptAction::kAttempt) { in FscryptSetDirectoryPolicy() 147 if (action == FscryptAction::kDeleteIfNecessary) { in FscryptSetDirectoryPolicy()
|
/system/core/debuggerd/include/debuggerd/ |
D | handler.h | 64 static void __attribute__((__unused__)) debuggerd_register_handlers(struct sigaction* action) { in debuggerd_register_handlers() argument 70 sigaction(SIGABRT, action, nullptr); in debuggerd_register_handlers() 71 sigaction(SIGBUS, action, nullptr); in debuggerd_register_handlers() 72 sigaction(SIGFPE, action, nullptr); in debuggerd_register_handlers() 73 sigaction(SIGILL, action, nullptr); in debuggerd_register_handlers() 74 sigaction(SIGSEGV, action, nullptr); in debuggerd_register_handlers() 75 sigaction(SIGSTKFLT, action, nullptr); in debuggerd_register_handlers() 76 sigaction(SIGSYS, action, nullptr); in debuggerd_register_handlers() 77 sigaction(SIGTRAP, action, nullptr); in debuggerd_register_handlers() 80 sigaction(BIONIC_SIGNAL_DEBUGGER, action, nullptr); in debuggerd_register_handlers()
|
/system/update_engine/common/ |
D | action_unittest.cc | 62 auto action = std::make_unique<ActionTestAction>(); in TEST() local 63 auto action_ptr = action.get(); in TEST() 64 EXPECT_FALSE(action->in_pipe()); in TEST() 65 EXPECT_FALSE(action->out_pipe()); in TEST() 66 EXPECT_FALSE(action->processor()); in TEST() 67 EXPECT_FALSE(action->IsRunning()); in TEST() 70 action_processor.EnqueueAction(std::move(action)); in TEST()
|
D | mock_action_processor.h | 33 MOCK_METHOD1(EnqueueAction, void(AbstractAction* action)); 39 void EnqueueAction(std::unique_ptr<AbstractAction> action) override { in EnqueueAction() argument 40 EnqueueAction(action.get()); in EnqueueAction()
|
D | action_processor.cc | 37 void ActionProcessor::EnqueueAction(unique_ptr<AbstractAction> action) { in EnqueueAction() argument 38 action->SetProcessor(this); in EnqueueAction() 39 actions_.push_back(std::move(action)); in EnqueueAction()
|
/system/bt/stack/btm/ |
D | btm_ble_adv_filter.cc | 66 static uint8_t btm_ble_cs_update_pf_counter(tBTM_BLE_SCAN_COND_OP action, 149 uint8_t status, op_subcode, action, num_avail; in btm_flt_update_cb() local 152 STREAM_TO_UINT8(action, p); in btm_flt_update_cb() 164 cb.Run(num_avail, action, btm_status); in btm_flt_update_cb() 170 expected_ocf, action, status, num_avail); in btm_flt_update_cb() 173 btm_ble_cs_update_pf_counter(action, cond_type, NULL, num_avail); in btm_flt_update_cb() 176 action, cond_type, &btm_ble_adv_filt_cb.cur_filter_target, num_avail); in btm_flt_update_cb() 182 cb.Run(num_avail, action, btm_status); in btm_flt_update_cb() 272 static void BTM_LE_PF_local_name(tBTM_BLE_SCAN_COND_OP action, in BTM_LE_PF_local_name() argument 284 UINT8_TO_STREAM(p, action); in BTM_LE_PF_local_name() [all …]
|
/system/extras/verity/ |
D | build_verity_metadata.py | 93 parser_size.add_argument('partition_size', type=int, action='store', help='partition size') 98 parser_build.add_argument('metadata_image', action='store', help='metadata image') 99 parser_build.add_argument('root_hash', action='store', help='root hash') 100 parser_build.add_argument('salt', action='store', help='salt') 101 parser_build.add_argument('block_device', action='store', help='block device') 102 parser_build.add_argument('signer_path', action='store', help='verity signer path') 103 parser_build.add_argument('signing_key', action='store', help='verity signing key') 104 parser_build.add_argument('--signer_args', action='store', help='verity signer args') 105 parser_build.add_argument('--verity_disable', action='store_true',
|
/system/netd/server/ |
D | NetlinkHandler.cpp | 108 NetlinkEvent::Action action = evt->getAction(); in onEvent() local 110 if ((action == NetlinkEvent::Action::kAdd) || in onEvent() 111 (action == NetlinkEvent::Action::kLinkUp) || in onEvent() 112 (action == NetlinkEvent::Action::kLinkDown)) { in onEvent() 122 if (action == NetlinkEvent::Action::kAdd) { in onEvent() 124 } else if (action == NetlinkEvent::Action::kRemove) { in onEvent() 126 } else if (action == NetlinkEvent::Action::kChange) { in onEvent() 129 } else if (action == NetlinkEvent::Action::kLinkUp) { in onEvent() 131 } else if (action == NetlinkEvent::Action::kLinkDown) { in onEvent() 133 } else if (action == NetlinkEvent::Action::kAddressUpdated || in onEvent() [all …]
|
D | RouteController.cpp | 119 static const char* actionName(uint16_t action) { in actionName() argument 121 return ops[action % 4]; in actionName() 246 [[nodiscard]] static int modifyIpRule(uint16_t action, uint32_t priority, uint8_t ruleType, in modifyIpRule() argument 278 .action = ruleType, in modifyIpRule() 286 if (table == RT_TABLE_UNSPEC && rule.action == FR_ACT_TO_TBL && action != RTM_DELRULE) { in modifyIpRule() 316 uint16_t flags = (action == RTM_NEWRULE) ? NETLINK_RULE_CREATE_FLAGS : NETLINK_REQUEST_FLAGS; in modifyIpRule() 319 if (int ret = sendNetlinkRequest(action, flags, iov, ARRAY_SIZE(iov), nullptr)) { in modifyIpRule() 320 if (!(action == RTM_DELRULE && ret == -ENOENT && priority == RULE_PRIORITY_TETHERING)) { in modifyIpRule() 323 ALOGE("Error %s %s rule: %s", actionName(action), familyName(rule.family), in modifyIpRule() 333 [[nodiscard]] static int modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, in modifyIpRule() argument [all …]
|
D | RouteController.h | 191 static int modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission); 196 static int modifyRoute(uint16_t action, uint16_t flags, const char* interface, 199 static int modifyTetheredNetwork(uint16_t action, const char* inputInterface, 201 static int modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, 212 [[nodiscard]] int modifyIpRoute(uint16_t action, uint16_t flags, uint32_t table,
|
/system/update_engine/payload_consumer/ |
D | postinstall_runner_action_unittest.cc | 70 AbstractAction* action, in ActionCompleted() argument 72 if (action->Type() == PostinstallRunnerAction::StaticType()) { in ActionCompleted() 250 PostinstallRunnerAction action(&fake_boot_control_, &fake_hardware_); in TEST_F() local 252 action.set_delegate(&mock_delegate_); in TEST_F() 254 action.current_partition_ = 1; in TEST_F() 255 action.partition_weight_ = {1, 2, 5}; in TEST_F() 256 action.accumulated_weight_ = 1; in TEST_F() 257 action.total_weight_ = 8; in TEST_F() 261 action.ProcessProgressLine("global_progress 0.5"); in TEST_F() 267 action.ProcessProgressLine("global_progress 1.5"); in TEST_F() [all …]
|
/system/core/mini_keyctl/ |
D | mini_keyctl.cpp | 137 const std::string action = argv[1]; in main() local 139 if (action == "add") { in main() 146 } else if (action == "padd") { in main() 152 } else if (action == "restrict_keyring") { in main() 156 } else if (action == "unlink") { in main() 161 } else if (action == "security") { in main() 173 fprintf(stderr, "Unrecognized action: %s\n", action.c_str()); in main()
|
/system/bt/stack/avct/ |
D | avct_lcb.cc | 166 uint8_t action; in avct_lcb_event() local 180 action = state_table[event][i]; in avct_lcb_event() 181 if (action != AVCT_LCB_IGNORE) { in avct_lcb_event() 182 (*avct_lcb_action[action])(p_lcb, p_data); in avct_lcb_event() 201 uint8_t action; in avct_bcb_event() local 215 action = state_table[event][i]; in avct_bcb_event() 216 if (action != AVCT_LCB_IGNORE) { in avct_bcb_event() 217 (*avct_bcb_action[action])(p_bcb, p_data); in avct_bcb_event()
|
/system/sepolicy/tests/ |
D | check_prop_prefix.py | 39 parser.add_argument("--allowed-property-prefix", action="extend", nargs="*", 41 parser.add_argument("--allowed-context-prefix", action="extend", nargs="*", 43 parser.add_argument('--strict', action='store_true',
|
D | sepolicy_tests.py | 102 def take_action(self, action, dest, opt, value, values, parser): argument 103 if action == "extend": 106 Option.take_action(self, action, dest, opt, value, values, parser) 127 metavar="FILE", action="extend", type="string") 130 parser.add_option("-t", "--test", dest="test", action="extend",
|
/system/extras/profcollectd/ |
D | profcollectd.rs | 39 let action = &args[1]; in main() localVariable 40 match action.as_str() { in main()
|
D | profcollectctl.rs | 45 let action = &args[1]; in main() localVariable 46 match action.as_str() { in main()
|
/system/libbase/include/android-base/ |
D | silent_death_test.h | 37 struct sigaction64 action = {.sa_handler = SIG_DFL}; in SetUp() local 38 sigaction64(signo, &action, &previous_); in SetUp()
|
/system/libufdt/utils/src/ |
D | mkdtboimg.py | 602 parser.add_argument('--id', type=str, dest='id', action='store', 605 action='store', default=global_args.global_rev) 607 action='store', 610 action='store', 613 action='store', 616 action='store', 619 action='store', 778 action='store', default='dtb') 780 action='store', default=2048) 782 action='store', default=0) [all …]
|
/system/extras/simpleperf/scripts/inferno/ |
D | inferno.py | 256 record_group.add_argument('-du', '--dwarf_unwinding', action='store_true', help="""Perform 265 record_group.add_argument('--compile_java_code', action='store_true', 278 record_group.add_argument('-sc', '--skip_collection', action='store_true', help="""Skip data 280 record_group.add_argument('--system_wide', action='store_true', help='Profile system wide.') 288 report_group.add_argument('--embedded_flamegraph', action='store_true', help="""Generate 301 report_group.add_argument('--no_browser', action='store_true', help="""Don't open report 305 report_group.add_argument('--one-flamegraph', action='store_true', help="""Generate one 310 report_group.add_argument('--show_art_frames', action='store_true', 316 debug_group.add_argument('--disable_adb_root', action='store_true', help="""Force adb to run
|
/system/libvintf/analyze_matrix/ |
D | hals_for_release.py | 57 action="store_true") 61 action="store_true") 65 action="store_true") 66 parser.add_argument("--instances", "-i", action="store_true", 71 parser.add_argument("--verbose", "-v", action="store_true", help="Verbose mode") 168 action = "--instances" if args.instances else "--interfaces" 169 instances = Analyze(args.analyze_matrix, file, [action, "--requirement"]).split("\n")
|
/system/bt/doc/ |
D | power_management.md | 36 policy is determined by the greatest allowable power action defined across all 38 it's willing to go to into SNIFF and specifies that as an action, and say, a PAN 39 connection is up which specifies it is willing to go into SNIFF, but its action 54 The action constants are defined in `bta_api.h` and are defined as a series of 62 action that `bta_dm_pm_set_mode` will take, the connection will be removed 68 action is still the same, however -- SNIFF mode is attempted. There are 100 returns with no action taken. 104 there's no action to be performed (`BTA_DM_PM_NO_ACTION`), and if so, 105 returns with no action taken. 123 the first power management action didn't timeout (or was never attempted, [all …]
|
/system/bt/bta/pan/ |
D | bta_pan_main.cc | 164 uint8_t action; in bta_pan_sm_execute() local 180 action = state_table[event][i]; in bta_pan_sm_execute() 181 CHECK(action < BTA_PAN_MAX_ACTIONS); in bta_pan_sm_execute() 182 if (action == BTA_PAN_IGNORE) continue; in bta_pan_sm_execute() 183 (*bta_pan_action[action])(p_scb, p_data); in bta_pan_sm_execute()
|