Home
last modified time | relevance | path

Searched refs:likely (Results 1 – 21 of 21) sorted by relevance

/system/apex/tests/
DREADME.md4 therefore will not likely succeed on a pure AOSP build.
/system/sepolicy/prebuilts/api/26.0/public/
Dupdate_engine_common.te36 # Access is also granted to proc:file, but it is likely unneeded
Ddomain.te529 # services which can change any time framework/core is updated, breakage is likely.
803 # that, even assuming only non-buggy and non-malicious code, it is very likely
/system/libhidl/transport/manager/1.0/
DIServiceManager.hal43 * WARNING: This function is for libhidl/HwBinder use only. You are likely
65 * WARNING: This function is for libhidl/HwBinder use only. You are likely
/system/sepolicy/prebuilts/api/27.0/public/
Dupdate_engine_common.te42 # Access is also granted to proc:file, but it is likely unneeded
Ddomain.te532 # services which can change any time framework/core is updated, breakage is likely.
796 # that, even assuming only non-buggy and non-malicious code, it is very likely
/system/extras/libfec/
Dfec_private.h173 #define likely(x) __builtin_expect(!!(x), 1) macro
Dfec_read.cpp136 if (likely(interleaved < e->start) && !is_zero(f, interleaved)) { in __ecc_read()
332 if (likely(f->hashtree().check_block_hash_with_index(curr, data))) { in verity_read()
/system/bpf/bpfloader/
Dbpfloader.rc21 # Enable the eBPF JIT -- but do note that on 64-bit kernels it is likely
/system/sepolicy/private/
Dproperty.te65 # likely that the policy is using r_file_perms directly instead of
/system/extras/simpleperf/doc/
DREADME.md122 3. Old Android versions are likely to be shipped with old kernels (< 3.18),
124 4. Old Android versions are likely to be shipped with Arm32 chips. In Arm32
/system/sepolicy/prebuilts/api/29.0/public/
Dproperty.te131 # likely that the policy is using r_file_perms directly instead of
Ddomain.te654 # services which can change any time framework/core is updated, breakage is likely.
1099 # that, even assuming only non-buggy and non-malicious code, it is very likely
/system/sepolicy/prebuilts/api/30.0/public/
Dproperty.te296 # likely that the policy is using r_file_perms directly instead of
Ddomain.te649 # services which can change any time framework/core is updated, breakage is likely.
1093 # that, even assuming only non-buggy and non-malicious code, it is very likely
/system/core/libunwindstack/
DAndroidVersions.md83 Since the new ops are not likely to be used very often, this allows
/system/extras/ioblame/
DREADME85 the app/pid that did the original write (since the write most likely
/system/core/shell_and_utilities/
DREADME.md29 and how usable it was likely to be.
/system/sepolicy/public/
Ddomain.te656 # services which can change any time framework/core is updated, breakage is likely.
1117 # that, even assuming only non-buggy and non-malicious code, it is very likely
/system/sepolicy/prebuilts/api/28.0/public/
Ddomain.te648 # services which can change any time framework/core is updated, breakage is likely.
1100 # that, even assuming only non-buggy and non-malicious code, it is very likely
/system/core/fastboot/
DREADME.md345 provide transfer rates of ~2MB/s. Over WiFi it will likely be significantly