Home
last modified time | relevance | path

Searched refs:write (Results 1 – 25 of 1558) sorted by relevance

12345678910>>...63

/system/tools/aidl/build/
Daidl_rust_glue.py32 output_file.write(indent)
33 output_file.write("pub mod %s {\n" % input_name)
37 output_file.write(indent)
38 output_file.write(" ")
39 output_file.write(l)
41 output_file.write(indent)
42 output_file.write("}\n")
45 output_file.write(indent)
46 output_file.write("pub mod %s {\n" % name)
48 output_file.write(indent)
[all …]
/system/tools/aidl/tests/golden_output/aidl-test-interface-rust-source/gen/android/aidl/tests/
DStructuredParcelable.rs128 subparcel.write(&self.r#shouldContainThreeFs)?; in write_to_parcel()
129 subparcel.write(&self.r#f)?; in write_to_parcel()
130 subparcel.write(&self.r#shouldBeJerry)?; in write_to_parcel()
131 subparcel.write(&self.r#shouldBeByteBar)?; in write_to_parcel()
132 subparcel.write(&self.r#shouldBeIntBar)?; in write_to_parcel()
133 subparcel.write(&self.r#shouldBeLongBar)?; in write_to_parcel()
134 subparcel.write(&self.r#shouldContainTwoByteFoos)?; in write_to_parcel()
135 subparcel.write(&self.r#shouldContainTwoIntFoos)?; in write_to_parcel()
136 subparcel.write(&self.r#shouldContainTwoLongFoos)?; in write_to_parcel()
137 subparcel.write(&self.r#stringDefaultsToFoo)?; in write_to_parcel()
[all …]
DFixedSize.rs60 subparcel.write(&self.r#booleanValue)?; in write_to_parcel()
61 subparcel.write(&self.r#byteValue)?; in write_to_parcel()
62 subparcel.write(&self.r#charValue)?; in write_to_parcel()
63 subparcel.write(&self.r#intValue)?; in write_to_parcel()
64 subparcel.write(&self.r#longValue)?; in write_to_parcel()
65 subparcel.write(&self.r#floatValue)?; in write_to_parcel()
66 subparcel.write(&self.r#doubleValue)?; in write_to_parcel()
67 subparcel.write(&self.r#enumValue)?; in write_to_parcel()
68 subparcel.write(&self.r#parcelableValue)?; in write_to_parcel()
132 parcel.write(&0i32)?; in write_to_parcel()
[all …]
DUnion.rs23 parcel.write(&0i32)?; in write_to_parcel()
24 parcel.write(v) in write_to_parcel()
27 parcel.write(&1i32)?; in write_to_parcel()
28 parcel.write(v) in write_to_parcel()
31 parcel.write(&2i32)?; in write_to_parcel()
32 parcel.write(v) in write_to_parcel()
35 parcel.write(&3i32)?; in write_to_parcel()
36 parcel.write(v) in write_to_parcel()
39 parcel.write(&4i32)?; in write_to_parcel()
40 parcel.write(v) in write_to_parcel()
[all …]
DParcelableForToString.rs61 subparcel.write(&self.r#intValue)?; in write_to_parcel()
62 subparcel.write(&self.r#intArray)?; in write_to_parcel()
63 subparcel.write(&self.r#longValue)?; in write_to_parcel()
64 subparcel.write(&self.r#longArray)?; in write_to_parcel()
65 subparcel.write(&self.r#doubleValue)?; in write_to_parcel()
66 subparcel.write(&self.r#doubleArray)?; in write_to_parcel()
67 subparcel.write(&self.r#floatValue)?; in write_to_parcel()
68 subparcel.write(&self.r#floatArray)?; in write_to_parcel()
69 subparcel.write(&self.r#byteValue)?; in write_to_parcel()
70 subparcel.write(&self.r#byteArray)?; in write_to_parcel()
[all …]
/system/core/rootdir/
Dinit.usb.rc33 write /sys/class/android_usb/android0/enable 0
34 write /sys/class/android_usb/android0/bDeviceClass 0
41 write /sys/class/android_usb/android0/enable 0
42 write /sys/class/android_usb/android0/idVendor 18d1
43 write /sys/class/android_usb/android0/idProduct 4EE7
44 write /sys/class/android_usb/android0/functions ${sys.usb.config}
45 write /sys/class/android_usb/android0/enable 1
51 write /sys/class/android_usb/android0/enable 0
52 write /sys/class/android_usb/android0/idVendor 18d1
53 write /sys/class/android_usb/android0/idProduct 2d00
[all …]
Dinit.usb.configfs.rc2 write /config/usb_gadget/g1/UDC "none"
5 write /config/usb_gadget/g1/bDeviceClass 0
6 write /config/usb_gadget/g1/bDeviceSubClass 0
7 write /config/usb_gadget/g1/bDeviceProtocol 0
21 write /config/usb_gadget/g1/configs/b.1/strings/0x409/configuration "adb"
23 write /config/usb_gadget/g1/UDC ${sys.usb.controller}
27 write /config/usb_gadget/g1/configs/b.1/strings/0x409/configuration "mtp"
29 write /config/usb_gadget/g1/UDC ${sys.usb.controller}
36 write /config/usb_gadget/g1/configs/b.1/strings/0x409/configuration "mtp_adb"
39 write /config/usb_gadget/g1/UDC ${sys.usb.controller}
[all …]
/system/tools/mkbootimg/
Dmkbootimg.py88 f.write(pack(str(pad) + 'x'))
120 args.output.write(pack(f'{BOOT_MAGIC_SIZE}s', BOOT_MAGIC.encode()))
122 args.output.write(pack('I', filesize(args.kernel)))
124 args.output.write(pack('I', filesize(args.ramdisk)))
126 args.output.write(pack('I', (args.os_version << 11) | args.os_patch_level))
127 args.output.write(pack('I', boot_header_size))
129 args.output.write(pack('4I', 0, 0, 0, 0))
131 args.output.write(pack('I', args.header_version))
132 args.output.write(pack(f'{BOOT_ARGS_SIZE + BOOT_EXTRA_ARGS_SIZE}s',
139 args.output.write(pack('I', boot_signature_size))
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/34.0/public/
Dapp.te22 neverallow appdomain dev_type:blk_file { read write };
25 neverallow { untrusted_app isolated_app shell } graphics_device:chr_file { read write };
28 { read write };
30 { read write };
31 neverallow appdomain tee_device:chr_file { read write };
47 domain:netlink_kobject_uevent_socket { write append };
50 neverallow appdomain socket_device:sock_file write;
53 neverallow appdomain adbd_socket:sock_file write;
54 neverallow { appdomain -radio } rild_socket:sock_file write;
73 # Read or write access to /proc/pid entries for any non-app domain.
[all …]
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/public/
Dapp.te22 neverallow appdomain dev_type:blk_file { read write };
25 neverallow { untrusted_app isolated_app shell } graphics_device:chr_file { read write };
28 { read write };
30 { read write };
31 neverallow appdomain tee_device:chr_file { read write };
47 domain:netlink_kobject_uevent_socket { write append };
50 neverallow appdomain socket_device:sock_file write;
53 neverallow appdomain adbd_socket:sock_file write;
54 neverallow { appdomain -radio } rild_socket:sock_file write;
73 # Read or write access to /proc/pid entries for any non-app domain.
[all …]
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/30.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/33.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dapp.te22 neverallow appdomain dev_type:blk_file { read write };
32 }:chr_file { read write };
35 neverallow { untrusted_app isolated_app shell } graphics_device:chr_file { read write };
38 { read write };
40 { read write };
41 neverallow appdomain tee_device:chr_file { read write };
57 domain:netlink_kobject_uevent_socket { write append };
60 neverallow appdomain socket_device:sock_file write;
63 neverallow appdomain adbd_socket:sock_file write;
64 neverallow { appdomain -radio } rild_socket:sock_file write;
[all …]
/system/sepolicy/prebuilts/api/32.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/31.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/34.0/private/
Dgpuservice.te29 allow gpuservice shell:fifo_file write;
35 allow gpuservice adbd:unix_stream_socket { read write getattr };
38 allow gpuservice devpts:chr_file { read write getattr };
42 allow gpuservice dumpstate:fifo_file write;
52 allow gpuservice self:perf_event { cpu kernel open write };
53 neverallow gpuservice self:perf_event ~{ cpu kernel open write };
56 # Write is needed to open read/write bpf maps.
57 allow gpuservice fs_bpf:file { read write };
59 # Needed for enabling bpf programs and accessing bpf maps (read-only and read/write).
64 # Needed for enabling write access to persist.graphics.egl from developer option switch UI, through…
Dincident.te12 # allow incident to communicate with dumpstate, and write incident report to
15 allow incident dumpstate:unix_stream_socket { read write };
16 allow incident shell_data_file:file write;
19 allow incident devpts:chr_file { read write };
21 # allow incident to communicate use, read and write over the adb
24 allow incident adbd:unix_stream_socket { read write };
34 allow incident incidentd:fifo_file write;
/system/sepolicy/private/
Dgpuservice.te29 allow gpuservice shell:fifo_file write;
35 allow gpuservice adbd:unix_stream_socket { read write getattr };
38 allow gpuservice devpts:chr_file { read write getattr };
42 allow gpuservice dumpstate:fifo_file write;
52 allow gpuservice self:perf_event { cpu kernel open write };
53 neverallow gpuservice self:perf_event ~{ cpu kernel open write };
56 # Write is needed to open read/write bpf maps.
57 allow gpuservice fs_bpf:file { read write };
59 # Needed for enabling bpf programs and accessing bpf maps (read-only and read/write).
64 # Needed for enabling write access to persist.graphics.egl from developer option switch UI, through…
/system/tools/aidl/tests/golden_output/aidl-test-fixedsizearray-rust-source/gen/android/aidl/fixedsizearray/
DFixedSizeArrayExample.rs125 subparcel.write(&self.r#int2x3)?; in write_to_parcel()
126 subparcel.write(&self.r#boolArray)?; in write_to_parcel()
127 subparcel.write(&self.r#byteArray)?; in write_to_parcel()
128 subparcel.write(&self.r#charArray)?; in write_to_parcel()
129 subparcel.write(&self.r#intArray)?; in write_to_parcel()
130 subparcel.write(&self.r#longArray)?; in write_to_parcel()
131 subparcel.write(&self.r#floatArray)?; in write_to_parcel()
132 subparcel.write(&self.r#doubleArray)?; in write_to_parcel()
133 subparcel.write(&self.r#stringArray)?; in write_to_parcel()
134 subparcel.write(&self.r#byteEnumArray)?; in write_to_parcel()
[all …]
/system/sepolicy/prebuilts/api/32.0/private/
Dincident.te12 # allow incident to communicate with dumpstate, and write incident report to
15 allow incident dumpstate:unix_stream_socket { read write };
16 allow incident shell_data_file:file write;
19 allow incident devpts:chr_file { read write };
21 # allow incident to communicate use, read and write over the adb
24 allow incident adbd:unix_stream_socket { read write };
34 allow incident incidentd:fifo_file write;
/system/sepolicy/prebuilts/api/30.0/private/
Dincident.te12 # allow incident to communicate with dumpstate, and write incident report to
15 allow incident dumpstate:unix_stream_socket { read write };
16 allow incident shell_data_file:file write;
19 allow incident devpts:chr_file { read write };
21 # allow incident to communicate use, read and write over the adb
24 allow incident adbd:unix_stream_socket { read write };
34 allow incident incidentd:fifo_file write;
/system/sepolicy/prebuilts/api/31.0/private/
Dincident.te12 # allow incident to communicate with dumpstate, and write incident report to
15 allow incident dumpstate:unix_stream_socket { read write };
16 allow incident shell_data_file:file write;
19 allow incident devpts:chr_file { read write };
21 # allow incident to communicate use, read and write over the adb
24 allow incident adbd:unix_stream_socket { read write };
34 allow incident incidentd:fifo_file write;

12345678910>>...63