/system/logging/liblog/ |
D | event_tag_map.cpp | 64 for (size_t which = 0; which < NUM_MAPS; ++which) { in ~EventTagMap() local 65 if (mapAddr[which]) { in ~EventTagMap() 66 munmap(mapAddr[which], mapLen[which]); in ~EventTagMap() 67 mapAddr[which] = 0; in ~EventTagMap() 222 static int parseMapLines(EventTagMap* map, size_t which) { in parseMapLines() argument 223 const char* cp = static_cast<char*>(map->mapAddr[which]); in parseMapLines() 224 size_t len = map->mapLen[which]; in parseMapLines() 231 which, len); in parseMapLines() 233 if (which) { // do not propagate errors for other files in parseMapLines() 253 if (!which || (errno != EMLINK)) { in parseMapLines() [all …]
|
/system/core/libcutils/ |
D | fs_config.cpp | 242 static int fs_config_open(int dir, int which, const char* target_out_path) { in fs_config_open() argument 253 if (asprintf(&name, "%.*s%s", (int)len, target_out_path, conf[which][dir]) != -1) { in fs_config_open() 259 fd = TEMP_FAILURE_RETRY(open(conf[which][dir], O_RDONLY | O_BINARY)); in fs_config_open() 322 size_t which, plen; in fs_config() local 330 for (which = 0; which < (sizeof(conf) / sizeof(conf[0])); ++which) { in fs_config() 333 int fd = fs_config_open(dir, which, target_out_path); in fs_config() 341 ALOGE("%s len is corrupted", conf[which][dir]); in fs_config() 346 ALOGE("%s out of memory", conf[which][dir]); in fs_config() 351 ALOGE("%s prefix is truncated", conf[which][dir]); in fs_config() 357 ALOGE("%s is corrupted", conf[which][dir]); in fs_config()
|
/system/nvram/messages/tests/ |
D | nvram_messages_test.cpp | 44 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); in TEST() 69 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); in TEST() 101 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); in TEST() 126 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); in TEST() 139 EXPECT_EQ(COMMAND_GET_SPACE_INFO, decoded.payload.which()); in TEST() 163 EXPECT_EQ(COMMAND_GET_SPACE_INFO, decoded.payload.which()); in TEST() 189 EXPECT_EQ(COMMAND_DELETE_SPACE, decoded.payload.which()); in TEST() 210 EXPECT_EQ(COMMAND_DELETE_SPACE, decoded.payload.which()); in TEST() 221 EXPECT_EQ(COMMAND_DISABLE_CREATE, decoded.payload.which()); in TEST() 234 EXPECT_EQ(COMMAND_DISABLE_CREATE, decoded.payload.which()); in TEST() [all …]
|
/system/bt/build/toolchain/clang/ |
D | get_clang_suffix.py | 7 def which(cmd): function 16 clang_path = which("clang++") 36 clang_path = which("clang++-" + clang_version_str)
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | dexoptanalyzer.te | 5 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 7 # own label, which differs from other labels created by other processes. 25 # Allow testing /data/user/0 which symlinks to /data/data
|
/system/bt/build/ |
D | install_deps.sh | 7 clang_path=`which clang` 25 clang_path=`which clang-$clang_version` 52 gn_path=`which gn`
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | dexoptanalyzer.te | 5 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 7 # own label, which differs from other labels created by other processes. 29 # Allow testing /data/user/0 which symlinks to /data/data
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | dexoptanalyzer.te | 5 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 7 # own label, which differs from other labels created by other processes. 29 # Allow testing /data/user/0 which symlinks to /data/data
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | dexoptanalyzer.te | 6 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 7 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 8 # own label, which differs from other labels created by other processes. 31 # Allow testing /data/user/0 which symlinks to /data/data
|
D | viewcompiler.te | 6 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their 8 # own label, which differs from other labels created by other processes.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | dexoptanalyzer.te | 10 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 11 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 12 # own label, which differs from other labels created by other processes. 34 # Use devpts and fd from odsign (which exec()'s odrefresh) 48 # Allow testing /data/user/0 which symlinks to /data/data
|
D | viewcompiler.te | 6 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their 8 # own label, which differs from other labels created by other processes.
|
/system/sepolicy/private/ |
D | dexoptanalyzer.te | 10 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 11 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 12 # own label, which differs from other labels created by other processes. 34 # Use devpts and fd from odsign (which exec()'s odrefresh) 48 # Allow testing /data/user/0 which symlinks to /data/data
|
D | viewcompiler.te | 6 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their 8 # own label, which differs from other labels created by other processes.
|
/system/timezone/testing/data/test3/output_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/output_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/testing/data/test2/output_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/testing/data/test1/output_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/input_tools/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/input_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | dexoptanalyzer.te | 10 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 11 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 12 # own label, which differs from other labels created by other processes. 38 # Allow testing /data/user/0 which symlinks to /data/data
|
D | viewcompiler.te | 6 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their 8 # own label, which differs from other labels created by other processes.
|
/system/update_engine/ |
D | pylintrc | 51 # optimizer, which will apply various small optimizations. For instance, it can 115 # Python expression which should return a note less than 10 (10 is the highest 116 # note). You have access to the variables errors warning, statement which 148 # List of module names for which member attributes should not be checked 154 # List of classes names for which member attributes should not be checked 159 # List of members which are set dynamically and missed by pylint inference 205 # List of strings which can identify a callback function by name. A callback 265 # Good variable names which should always be accepted, separated by a comma 268 # Bad variable names which should always be refused, separated by a comma 278 # Regular expression which should only match correct function names. [all …]
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | hwservice.te | 1 # hwservice types. By default most of the HALs are protected_hwservice, which means 65 # of the client and thus have the same access as the client domain in which 67 # - coredomain_hwservice: are considered safer than ordinary hwservices which 72 # by surfaceflinger Binder service, which apps are permitted to access 74 # Binder service which apps were permitted to access. 99 # It does not make sense to register or lookup something which is not a
|
/system/sepolicy/public/ |
D | hwservice.te | 1 # hwservice types. By default most of the HALs are protected_hwservice, which means 65 # of the client and thus have the same access as the client domain in which 67 # - coredomain_hwservice: are considered safer than ordinary hwservices which 72 # by surfaceflinger Binder service, which apps are permitted to access 74 # Binder service which apps were permitted to access. 99 # It does not make sense to register or lookup something which is not a
|