Home
last modified time | relevance | path

Searched refs:hold (Results 1 – 25 of 75) sorted by relevance

123

/system/logging/liblog/tests/
Dliblog_test.cpp1244 char hold[4][PROP_VALUE_MAX]; in TEST() local
1256 memset(hold, 0, sizeof(hold)); in TEST()
1258 property_get(key, hold[0], ""); in TEST()
1260 property_get(key + base_offset, hold[1], ""); in TEST()
1264 property_get(key, hold[2], ""); in TEST()
1266 property_get(key, hold[3], ""); in TEST()
1510 property_set(key, hold[0]); in TEST()
1511 property_set(key + base_offset, hold[1]); in TEST()
1514 property_set(key, hold[2]); in TEST()
1515 property_set(key + base_offset, hold[3]); in TEST()
/system/nvram/
DREADME.md5 spaces that can hold arbitrary data blobs of limited size. Access restrictions
/system/chre/chpp/
DQUICKSTART.md39 1. Allocate the transportContext and appContext structs that hold the state for each instance of th…
/system/sepolicy/prebuilts/api/29.0/private/
Dgsid.te65 # 1. fallocate a file large enough to hold the signed GSI
/system/bt/
DREADME.md65 $ mkdir build # Create a directory to hold the build output.
/system/logging/logcat/tests/
Dlogcat_test.cpp1315 char* hold = *list; in get_prune_rules() local
1327 if (hold) { in get_prune_rules()
1328 asprintf(list, "%s %s", hold, buf); in get_prune_rules()
1329 free(hold); in get_prune_rules()
/system/sepolicy/prebuilts/api/30.0/private/
Dgsid.te90 # 1. fallocate a file large enough to hold the signed GSI
/system/sepolicy/private/
Dgsid.te103 # 1. fallocate a file large enough to hold the signed GSI
/system/sepolicy/prebuilts/api/31.0/private/
Dgsid.te103 # 1. fallocate a file large enough to hold the signed GSI
/system/core/fs_mgr/libsnapshot/android/snapshot/
Dsnapshot.proto84 // This value is 0 if |cow_partition_size| is big enough to hold all changes
/system/extras/profcollectd/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/extras/tests/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/extras/squashfs_utils/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/extras/verity/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/core/libgrallocusage/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/extras/ext4_utils/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/security/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/extras/sane_schedstat/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/core/libcutils/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/extras/sound/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/extras/postinst/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/logging/liblog/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/extras/iotop/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/extras/libfscrypt/
DNOTICE185 defend, and hold each Contributor harmless for any liability
/system/extras/simpleperf/
DNOTICE185 defend, and hold each Contributor harmless for any liability

123