Home
last modified time | relevance | path

Searched refs:which (Results 1 – 25 of 576) sorted by relevance

12345678910>>...24

/system/logging/liblog/
Devent_tag_map.cpp64 for (size_t which = 0; which < NUM_MAPS; ++which) { in ~EventTagMap() local
65 if (mapAddr[which]) { in ~EventTagMap()
66 munmap(mapAddr[which], mapLen[which]); in ~EventTagMap()
67 mapAddr[which] = 0; in ~EventTagMap()
222 static int parseMapLines(EventTagMap* map, size_t which) { in parseMapLines() argument
223 const char* cp = static_cast<char*>(map->mapAddr[which]); in parseMapLines()
224 size_t len = map->mapLen[which]; in parseMapLines()
231 which, len); in parseMapLines()
233 if (which) { // do not propagate errors for other files in parseMapLines()
253 if (!which || (errno != EMLINK)) { in parseMapLines()
[all …]
/system/core/libcutils/
Dfs_config.cpp242 static int fs_config_open(int dir, int which, const char* target_out_path) { in fs_config_open() argument
253 if (asprintf(&name, "%.*s%s", (int)len, target_out_path, conf[which][dir]) != -1) { in fs_config_open()
259 fd = TEMP_FAILURE_RETRY(open(conf[which][dir], O_RDONLY | O_BINARY)); in fs_config_open()
322 size_t which, plen; in fs_config() local
330 for (which = 0; which < (sizeof(conf) / sizeof(conf[0])); ++which) { in fs_config()
333 int fd = fs_config_open(dir, which, target_out_path); in fs_config()
341 ALOGE("%s len is corrupted", conf[which][dir]); in fs_config()
346 ALOGE("%s out of memory", conf[which][dir]); in fs_config()
351 ALOGE("%s prefix is truncated", conf[which][dir]); in fs_config()
357 ALOGE("%s is corrupted", conf[which][dir]); in fs_config()
/system/nvram/messages/tests/
Dnvram_messages_test.cpp44 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); in TEST()
69 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); in TEST()
101 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); in TEST()
126 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); in TEST()
139 EXPECT_EQ(COMMAND_GET_SPACE_INFO, decoded.payload.which()); in TEST()
163 EXPECT_EQ(COMMAND_GET_SPACE_INFO, decoded.payload.which()); in TEST()
189 EXPECT_EQ(COMMAND_DELETE_SPACE, decoded.payload.which()); in TEST()
210 EXPECT_EQ(COMMAND_DELETE_SPACE, decoded.payload.which()); in TEST()
221 EXPECT_EQ(COMMAND_DISABLE_CREATE, decoded.payload.which()); in TEST()
234 EXPECT_EQ(COMMAND_DISABLE_CREATE, decoded.payload.which()); in TEST()
[all …]
/system/bt/build/toolchain/clang/
Dget_clang_suffix.py7 def which(cmd): function
16 clang_path = which("clang++")
36 clang_path = which("clang++-" + clang_version_str)
/system/sepolicy/prebuilts/api/26.0/private/
Ddexoptanalyzer.te5 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
7 # own label, which differs from other labels created by other processes.
25 # Allow testing /data/user/0 which symlinks to /data/data
/system/bt/build/
Dinstall_deps.sh7 clang_path=`which clang`
25 clang_path=`which clang-$clang_version`
52 gn_path=`which gn`
/system/sepolicy/prebuilts/api/28.0/private/
Ddexoptanalyzer.te5 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
7 # own label, which differs from other labels created by other processes.
29 # Allow testing /data/user/0 which symlinks to /data/data
/system/sepolicy/prebuilts/api/27.0/private/
Ddexoptanalyzer.te5 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
7 # own label, which differs from other labels created by other processes.
29 # Allow testing /data/user/0 which symlinks to /data/data
/system/sepolicy/prebuilts/api/29.0/private/
Ddexoptanalyzer.te6 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
7 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
8 # own label, which differs from other labels created by other processes.
31 # Allow testing /data/user/0 which symlinks to /data/data
Dviewcompiler.te6 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
8 # own label, which differs from other labels created by other processes.
/system/sepolicy/prebuilts/api/31.0/private/
Ddexoptanalyzer.te10 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
11 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
12 # own label, which differs from other labels created by other processes.
34 # Use devpts and fd from odsign (which exec()'s odrefresh)
48 # Allow testing /data/user/0 which symlinks to /data/data
Dviewcompiler.te6 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
8 # own label, which differs from other labels created by other processes.
/system/sepolicy/private/
Ddexoptanalyzer.te10 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
11 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
12 # own label, which differs from other labels created by other processes.
34 # Use devpts and fd from odsign (which exec()'s odrefresh)
48 # Allow testing /data/user/0 which symlinks to /data/data
Dviewcompiler.te6 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
8 # own label, which differs from other labels created by other processes.
/system/timezone/testing/data/test3/output_data/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/timezone/output_data/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/timezone/testing/data/test2/output_data/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/timezone/testing/data/test1/output_data/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/timezone/input_tools/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/timezone/input_data/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/sepolicy/prebuilts/api/30.0/private/
Ddexoptanalyzer.te10 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
11 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
12 # own label, which differs from other labels created by other processes.
38 # Allow testing /data/user/0 which symlinks to /data/data
Dviewcompiler.te6 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
8 # own label, which differs from other labels created by other processes.
/system/update_engine/
Dpylintrc51 # optimizer, which will apply various small optimizations. For instance, it can
115 # Python expression which should return a note less than 10 (10 is the highest
116 # note). You have access to the variables errors warning, statement which
148 # List of module names for which member attributes should not be checked
154 # List of classes names for which member attributes should not be checked
159 # List of members which are set dynamically and missed by pylint inference
205 # List of strings which can identify a callback function by name. A callback
265 # Good variable names which should always be accepted, separated by a comma
268 # Bad variable names which should always be refused, separated by a comma
278 # Regular expression which should only match correct function names.
[all …]
/system/sepolicy/prebuilts/api/31.0/public/
Dhwservice.te1 # hwservice types. By default most of the HALs are protected_hwservice, which means
65 # of the client and thus have the same access as the client domain in which
67 # - coredomain_hwservice: are considered safer than ordinary hwservices which
72 # by surfaceflinger Binder service, which apps are permitted to access
74 # Binder service which apps were permitted to access.
99 # It does not make sense to register or lookup something which is not a
/system/sepolicy/public/
Dhwservice.te1 # hwservice types. By default most of the HALs are protected_hwservice, which means
65 # of the client and thus have the same access as the client domain in which
67 # - coredomain_hwservice: are considered safer than ordinary hwservices which
72 # by surfaceflinger Binder service, which apps are permitted to access
74 # Binder service which apps were permitted to access.
99 # It does not make sense to register or lookup something which is not a

12345678910>>...24