Searched refs:likely (Results 1 – 21 of 21) sorted by relevance
/system/apex/tests/ |
D | README.md | 4 therefore will not likely succeed on a pure AOSP build.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | update_engine_common.te | 36 # Access is also granted to proc:file, but it is likely unneeded
|
D | domain.te | 529 # services which can change any time framework/core is updated, breakage is likely. 803 # that, even assuming only non-buggy and non-malicious code, it is very likely
|
/system/libhidl/transport/manager/1.0/ |
D | IServiceManager.hal | 43 * WARNING: This function is for libhidl/HwBinder use only. You are likely 65 * WARNING: This function is for libhidl/HwBinder use only. You are likely
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | update_engine_common.te | 42 # Access is also granted to proc:file, but it is likely unneeded
|
D | domain.te | 532 # services which can change any time framework/core is updated, breakage is likely. 796 # that, even assuming only non-buggy and non-malicious code, it is very likely
|
/system/extras/libfec/ |
D | fec_private.h | 173 #define likely(x) __builtin_expect(!!(x), 1) macro
|
D | fec_read.cpp | 136 if (likely(interleaved < e->start) && !is_zero(f, interleaved)) { in __ecc_read() 332 if (likely(f->hashtree().check_block_hash_with_index(curr, data))) { in verity_read()
|
/system/bpf/bpfloader/ |
D | bpfloader.rc | 21 # Enable the eBPF JIT -- but do note that on 64-bit kernels it is likely
|
/system/sepolicy/private/ |
D | property.te | 65 # likely that the policy is using r_file_perms directly instead of
|
/system/extras/simpleperf/doc/ |
D | README.md | 122 3. Old Android versions are likely to be shipped with old kernels (< 3.18), 124 4. Old Android versions are likely to be shipped with Arm32 chips. In Arm32
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | property.te | 131 # likely that the policy is using r_file_perms directly instead of
|
D | domain.te | 654 # services which can change any time framework/core is updated, breakage is likely. 1099 # that, even assuming only non-buggy and non-malicious code, it is very likely
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | property.te | 296 # likely that the policy is using r_file_perms directly instead of
|
D | domain.te | 649 # services which can change any time framework/core is updated, breakage is likely. 1093 # that, even assuming only non-buggy and non-malicious code, it is very likely
|
/system/core/libunwindstack/ |
D | AndroidVersions.md | 83 Since the new ops are not likely to be used very often, this allows
|
/system/extras/ioblame/ |
D | README | 85 the app/pid that did the original write (since the write most likely
|
/system/core/shell_and_utilities/ |
D | README.md | 29 and how usable it was likely to be.
|
/system/sepolicy/public/ |
D | domain.te | 656 # services which can change any time framework/core is updated, breakage is likely. 1117 # that, even assuming only non-buggy and non-malicious code, it is very likely
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | domain.te | 648 # services which can change any time framework/core is updated, breakage is likely. 1100 # that, even assuming only non-buggy and non-malicious code, it is very likely
|
/system/core/fastboot/ |
D | README.md | 345 provide transfer rates of ~2MB/s. Over WiFi it will likely be significantly
|