/system/core/init/ |
D | property_service.cpp | 134 const ucred* cr; member 141 if (!d || !d->name || !d->cr) { in PropertyAuditCallback() 146 snprintf(buf, len, "property=%s pid=%d uid=%d gid=%d", d->name, d->cr->pid, d->cr->uid, in PropertyAuditCallback() 147 d->cr->gid); in PropertyAuditCallback() 169 ucred cr = {.pid = 0, .uid = 0, .gid = 0}; in CanReadProperty() local 170 audit_data.cr = &cr; in CanReadProperty() 178 const char* source_context, const ucred& cr) { in CheckMacPerms() argument 186 audit_data.cr = &cr; in CheckMacPerms() 482 const std::string& source_context, const ucred& cr) { in CheckControlPropertyPerms() argument 496 … if (CheckMacPerms(control_string_legacy, target_context_legacy, source_context.c_str(), cr)) { in CheckControlPropertyPerms() [all …]
|
/system/extras/bootctl/ |
D | bootctl.cpp | 94 static int handle_return(CommandResult cr, const char* errStr) { in handle_return() argument 95 if (!cr.IsOk()) { in handle_return() 96 fprintf(stderr, errStr, cr.errMsg.c_str()); in handle_return() 98 } else if (!cr.success) { in handle_return() 99 fprintf(stderr, errStr, cr.errMsg.c_str()); in handle_return() 117 const auto cr = module->SetActiveBootSlot(slot_number); in do_set_active_boot_slot() local 118 return handle_return(cr, "Error setting active boot slot: %s\n"); in do_set_active_boot_slot() 122 const auto cr = module->MarkSlotUnbootable(slot_number); in do_set_slot_as_unbootable() local 123 return handle_return(cr, "Error setting slot as unbootable: %s\n"); in do_set_slot_as_unbootable()
|
/system/core/fs_mgr/libsnapshot/ |
D | snapshotctl.cpp | 313 auto cr = hal->SetActiveBootSlot(target_slot_number); in ApplyUpdate() local 314 if (!cr.IsOk()) { in ApplyUpdate() 315 LOG(ERROR) << "Could not set active boot slot: " << cr.errMsg; in ApplyUpdate() 750 auto cr = hal->SetActiveBootSlot(target_slot_number); in CreateTestUpdate() local 751 if (!cr.IsOk()) { in CreateTestUpdate() 752 std::cerr << "Could not set active boot slot: " << cr.errMsg; in CreateTestUpdate()
|
/system/core/debuggerd/tombstoned/ |
D | tombstoned.cpp | 390 ucred cr = {}; in crash_request_cb() local 391 socklen_t len = sizeof(cr); in crash_request_cb() 392 int ret = getsockopt(sockfd, SOL_SOCKET, SO_PEERCRED, &cr, &len); in crash_request_cb() 398 crash->crash_pid = cr.pid; in crash_request_cb()
|
/system/core/libsystem/include/system/ |
D | graphics.h | 87 void *cr; member
|
/system/extras/simpleperf/ |
D | cmd_dumprecord.cpp | 429 void DumpRecordCommand::ProcessCallChainRecord(const CallChainRecord& cr) { in ProcessCallChainRecord() argument 431 for (size_t i = 0; i < cr.ip_nr; ++i) { in ProcessCallChainRecord() 432 SymbolInfo s = GetSymbolInfo(cr.pid, cr.tid, cr.ips[i], false); in ProcessCallChainRecord()
|
D | cmd_record_test.cpp | 1449 CommRecord* cr = static_cast<CommRecord*>(r.get()); in TEST() local 1450 if (strcmp(cr->comm, "sleep") == 0) { in TEST()
|
/system/nfc/src/rust/nci/ |
D | nci.rs | 218 cr: 0, in send_packet() 228 cr: 0, in send_packet()
|
/system/vold/ |
D | Checkpoint.cpp | 177 auto cr = module->MarkBootSuccessful(); in cp_commitChanges() local 178 if (!cr.success) in cp_commitChanges() 179 return error(EINVAL, "Error marking booted successfully: " + std::string(cr.errMsg)); in cp_commitChanges()
|
/system/nfc/src/ |
D | nci_packets.pdl | 105 cr : 8,
|
/system/nfc/tools/casimir/src/ |
D | controller.rs | 1298 cr: 0, in nfcee_mode_set() 1481 cr: 0, in rf_conn_data() 1555 cr: 0, in hci_conn_data() 1852 cr: 1, // TODO(henrichataing): credit based control flow in data_packet()
|
D | nci_packets.pdl | 159 cr : 2,
|
/system/timezone/output_data/android/ |
D | tzids.prototxt | 628 isoCode: "cr"
|
/system/timezone/input_data/android/ |
D | countryzones.txt | 1141 isoCode:"cr"
|
/system/core/libutils/abi-dumps/arm64/source-based/ |
D | libutils.so.lsdump | 13086 "field_name" : "cr",
|
/system/core/libutils/abi-dumps/arm_arm64/source-based/ |
D | libutils.so.lsdump | 13126 "field_name" : "cr",
|