/system/vold/ |
D | vdc.cpp | 74 std::vector<std::string> args(argv + 1, argv + argc); in main() local 76 if (args.size() > 0 && args[0] == "--wait") { in main() 78 args.erase(args.begin()); in main() 81 if (args.size() < 2) { in main() 92 if (args[0] == "cryptfs" && args[1] == "enablefilecrypto") { in main() 93 checkStatus(args, vold->fbeEnable()); in main() 94 } else if (args[0] == "cryptfs" && args[1] == "init_user0") { in main() 95 checkStatus(args, vold->initUser0()); in main() 96 } else if (args[0] == "cryptfs" && args[1] == "enablecrypto") { in main() 99 checkStatus(args, vold->fdeEnable(passwordType, "", encryptionFlags)); in main() [all …]
|
/system/bt/vendor_libs/test_vendor_lib/model/controller/ |
D | dual_mode_controller.h | 63 virtual void Initialize(const std::vector<std::string>& args) override; 110 void Inquiry(CommandPacketView args); 113 void InquiryCancel(CommandPacketView args); 116 void CreateConnection(CommandPacketView args); 119 void Disconnect(CommandPacketView args); 122 void AcceptConnectionRequest(CommandPacketView args); 125 void RejectConnectionRequest(CommandPacketView args); 128 void LinkKeyRequestReply(CommandPacketView args); 131 void LinkKeyRequestNegativeReply(CommandPacketView args); 134 void ChangeConnectionPacketType(CommandPacketView args); [all …]
|
/system/tools/mkbootimg/ |
D | mkbootimg.py | 55 def get_recovery_dtbo_offset(args): argument 58 num_kernel_pages = get_number_of_pages(filesize(args.kernel), args.pagesize) 59 num_ramdisk_pages = get_number_of_pages(filesize(args.ramdisk), args.pagesize) 60 num_second_pages = get_number_of_pages(filesize(args.second), args.pagesize) 61 dtbo_offset = args.pagesize * (num_header_pages + num_kernel_pages + 66 def write_header_v3(args): argument 70 args.output.write(pack('8s', BOOT_MAGIC)) 71 args.output.write(pack( 73 filesize(args.kernel), # kernel size in bytes 74 filesize(args.ramdisk), # ramdisk size in bytes [all …]
|
/system/extras/ext4_utils/ |
D | test_mkuserimg_mke2fs.py | 37 args = mkuserimg_mke2fs.ParseArguments(args_list) 39 self.assertEqual("source_directory", args.src_dir) 40 self.assertEqual("output_file", args.output_file) 41 self.assertEqual("ext4", args.ext_variant) 42 self.assertEqual("data", args.mount_point) 43 self.assertEqual("8192", args.fs_size) 45 self.assertFalse(args.android_sparse) 46 self.assertEqual("10", args.journal_size) 47 self.assertEqual("1230768000.0", args.timestamp) 48 self.assertEqual("fs_config", args.fs_config) [all …]
|
D | mkuserimg_mke2fs.py | 100 args, remainder = parser.parse_known_args(argv) 105 args.file_contexts = remainder[0] 110 return args 113 def ConstructE2fsCommands(args): argument 128 if args.android_sparse: 132 if args.timestamp: 133 e2fsdroid_opts += ["-T", args.timestamp] 134 if args.fs_config: 135 e2fsdroid_opts += ["-C", args.fs_config] 136 if args.product_out: [all …]
|
/system/core/init/ |
D | check_builtins.cpp | 44 for (const auto& arg : args) { \ 53 Result<void> check_chown(const BuiltinArguments& args) { in check_chown() argument 54 if (!args[1].empty()) { in check_chown() 55 auto uid = DecodeUid(args[1]); in check_chown() 57 return Error() << "Unable to decode UID for '" << args[1] << "': " << uid.error(); in check_chown() 62 if (args.size() == 4 && !args[2].empty()) { in check_chown() 63 auto gid = DecodeUid(args[2]); in check_chown() 65 return Error() << "Unable to decode GID for '" << args[2] << "': " << gid.error(); in check_chown() 72 Result<void> check_exec(const BuiltinArguments& args) { in check_exec() argument 75 auto result = Service::MakeTemporaryOneshotService(args.args); in check_exec() [all …]
|
D | service_parser.cpp | 53 Result<void> ServiceParser::ParseCapabilities(std::vector<std::string>&& args) { in ParseCapabilities() argument 66 for (size_t i = 1; i < args.size(); i++) { in ParseCapabilities() 67 const std::string& arg = args[i]; in ParseCapabilities() 81 Result<void> ServiceParser::ParseClass(std::vector<std::string>&& args) { in ParseClass() argument 82 service_->classnames_ = std::set<std::string>(args.begin() + 1, args.end()); in ParseClass() 86 Result<void> ServiceParser::ParseConsole(std::vector<std::string>&& args) { in ParseConsole() argument 91 service_->proc_attr_.console = args.size() > 1 ? "/dev/" + args[1] : ""; in ParseConsole() 95 Result<void> ServiceParser::ParseCritical(std::vector<std::string>&& args) { in ParseCritical() argument 100 Result<void> ServiceParser::ParseDisabled(std::vector<std::string>&& args) { in ParseDisabled() argument 106 Result<void> ServiceParser::ParseEnterNamespace(std::vector<std::string>&& args) { in ParseEnterNamespace() argument [all …]
|
D | check_builtins.h | 25 Result<void> check_chown(const BuiltinArguments& args); 26 Result<void> check_exec(const BuiltinArguments& args); 27 Result<void> check_exec_background(const BuiltinArguments& args); 28 Result<void> check_exec_reboot_on_failure(const BuiltinArguments& args); 29 Result<void> check_interface_restart(const BuiltinArguments& args); 30 Result<void> check_interface_start(const BuiltinArguments& args); 31 Result<void> check_interface_stop(const BuiltinArguments& args); 32 Result<void> check_load_system_props(const BuiltinArguments& args); 33 Result<void> check_loglevel(const BuiltinArguments& args); 34 Result<void> check_mkdir(const BuiltinArguments& args); [all …]
|
D | service_parser.h | 41 Result<void> ParseSection(std::vector<std::string>&& args, const std::string& filename, 43 Result<void> ParseLineSection(std::vector<std::string>&& args, int line) override; 48 using OptionParser = Result<void> (ServiceParser::*)(std::vector<std::string>&& args); 51 Result<void> ParseCapabilities(std::vector<std::string>&& args); 52 Result<void> ParseClass(std::vector<std::string>&& args); 53 Result<void> ParseConsole(std::vector<std::string>&& args); 54 Result<void> ParseCritical(std::vector<std::string>&& args); 55 Result<void> ParseDisabled(std::vector<std::string>&& args); 56 Result<void> ParseEnterNamespace(std::vector<std::string>&& args); 57 Result<void> ParseGroup(std::vector<std::string>&& args); [all …]
|
D | ueventd_parser.cpp | 32 Result<void> ParsePermissionsLine(std::vector<std::string>&& args, in ParsePermissionsLine() argument 36 if (is_sysfs && args.size() != 5) { in ParsePermissionsLine() 40 if (!is_sysfs && args.size() != 4) { in ParsePermissionsLine() 44 auto it = args.begin(); in ParsePermissionsLine() 80 Result<void> ParseFirmwareDirectoriesLine(std::vector<std::string>&& args, in ParseFirmwareDirectoriesLine() argument 82 if (args.size() < 2) { in ParseFirmwareDirectoriesLine() 86 std::move(std::next(args.begin()), args.end(), std::back_inserter(*firmware_directories)); in ParseFirmwareDirectoriesLine() 92 std::vector<std::string>&& args, in ParseExternalFirmwareHandlerLine() argument 94 if (args.size() != 4) { in ParseExternalFirmwareHandlerLine() 99 [&args](const auto& other) { return other.devpath == args[2]; }) != in ParseExternalFirmwareHandlerLine() [all …]
|
D | rlimit_parser.cpp | 31 Result<std::pair<int, rlimit>> ParseRlimit(const std::vector<std::string>& args) { in ParseRlimit() argument 41 if (ParseInt(args[1], &resource)) { in ParseRlimit() 43 return Error() << "Resource '" << args[1] << "' over the maximum resource value '" in ParseRlimit() 46 return Error() << "Resource '" << args[1] << "' below the minimum resource value '0'"; in ParseRlimit() 50 if (StartsWith(args[1], "RLIM_")) { in ParseRlimit() 51 resource_string = args[1].substr(5); in ParseRlimit() 53 resource_string = args[1]; in ParseRlimit() 61 return Error() << "Could not parse resource '" << args[1] << "'"; in ParseRlimit() 68 if (args[2] == "-1" || args[2] == "unlimited") { in ParseRlimit() 70 } else if (!ParseUint(args[2], &limit.rlim_cur)) { in ParseRlimit() [all …]
|
D | builtins.cpp | 160 static Result<void> do_class_start(const BuiltinArguments& args) { in do_class_start() argument 162 if (android::base::GetBoolProperty("persist.init.dont_start_class." + args[1], false)) in do_class_start() 167 if (service->classnames().count(args[1])) { in do_class_start() 170 << "' as part of class '" << args[1] << "': " << result.error(); in do_class_start() 177 static Result<void> do_class_start_post_data(const BuiltinArguments& args) { in do_class_start_post_data() argument 178 if (args.context != kInitContext) { in do_class_start_post_data() 189 if (service->classnames().count(args[1])) { in do_class_start_post_data() 192 << "' as part of class '" << args[1] << "': " << result.error(); in do_class_start_post_data() 199 static Result<void> do_class_stop(const BuiltinArguments& args) { in do_class_stop() argument 200 ForEachServiceInClass(args[1], &Service::Stop); in do_class_stop() [all …]
|
D | service_test.cpp | 77 std::vector<std::string> args; in TEST() local 79 ASSERT_FALSE(Service::MakeTemporaryOneshotService(args).ok()); in TEST() 82 args.push_back("exec"); in TEST() 83 ASSERT_FALSE(Service::MakeTemporaryOneshotService(args).ok()); in TEST() 86 args.push_back("--"); in TEST() 87 ASSERT_FALSE(Service::MakeTemporaryOneshotService(args).ok()); in TEST() 91 std::vector<std::string> args; in TEST() local 92 args.push_back("exec"); in TEST() 93 args.push_back("seclabel"); in TEST() 94 args.push_back("root"); // uid. in TEST() [all …]
|
/system/update_engine/scripts/ |
D | paycheck.py | 43 def CheckApplyPayload(args): argument 53 return args.dst_part_paths is not None 55 def ApplyPayload(args): argument 65 return CheckApplyPayload(args) or args.out_dst_part_paths is not None 147 args = parser.parse_args(argv) 150 args.check = (args.check or args.report or args.assert_type or 151 args.block_size or args.allow_unhashed or 152 args.disabled_tests or args.meta_sig or args.key or 153 args.part_sizes is not None or args.metadata_size) 159 if getattr(args, arg) is None: [all …]
|
/system/keymaster/android_keymaster/ |
D | logger.cpp | 24 int Logger::Log(LogLevel level, const char* fmt, va_list args) { in Log() argument 27 return instance_->log_msg(level, fmt, args); in Log() 32 va_list args; in Log() local 33 va_start(args, fmt); in Log() 34 int result = Log(level, fmt, args); in Log() 35 va_end(args); in Log() 41 va_list args; in Debug() local 42 va_start(args, fmt); in Debug() 43 int result = Log(DEBUG_LVL, fmt, args); in Debug() 44 va_end(args); in Debug() [all …]
|
/system/bt/vendor_libs/test_vendor_lib/model/setup/ |
D | test_command_handler.cc | 89 void TestCommandHandler::HandleCommand(const std::string& name, const vector<std::string>& args) { in HandleCommand() argument 95 active_commands_[name](args); in HandleCommand() 103 void TestCommandHandler::Add(const vector<std::string>& args) { in Add() argument 104 if (args.size() < 1) { in Add() 109 std::shared_ptr<Device> new_dev = DeviceBoutique::Create(args); in Add() 112 response_string_ = "TestCommandHandler 'add' " + args[0] + " failed!"; in Add() 124 void TestCommandHandler::AddRemote(const vector<std::string>& args) { in AddRemote() argument 125 if (args.size() < 3) { in AddRemote() 131 size_t port = std::stoi(args[1]); in AddRemote() 133 if ("LOW_ENERGY" == args[2]) { in AddRemote() [all …]
|
/system/apex/apexer/ |
D | apexer.py | 251 def ValidateArgs(args): argument 254 if args.build_info is not None: 255 if not os.path.exists(args.build_info): 256 print("Build info file '" + args.build_info + "' does not exist") 258 with open(args.build_info) as buildInfoFile: 262 if not os.path.exists(args.manifest): 263 print("Manifest file '" + args.manifest + "' does not exist") 266 if not os.path.isfile(args.manifest): 267 print("Manifest file '" + args.manifest + "' is not a file") 270 if args.android_manifest is not None: [all …]
|
/system/extras/simpleperf/ |
D | profcollect.cpp | 42 std::vector<std::string> args; in Record() local 43 args.push_back("-a"); in Record() 44 args.insert(args.end(), {"-e", "cs-etm:u"}); in Record() 45 args.insert(args.end(), {"--duration", std::to_string(duration.count())}); in Record() 46 args.insert(args.end(), {"-o", output}); in Record() 47 return recordCmd->Run(args); in Record() 54 std::vector<std::string> args; in Inject() local 55 args.insert(args.end(), {"-i", traceInput}); in Inject() 56 args.insert(args.end(), {"-o", output}); in Inject() 57 args.insert(args.end(), {"--output", "branch-list"}); in Inject() [all …]
|
D | command.cpp | 34 bool Command::NextArgumentOrError(const std::vector<std::string>& args, size_t* pi) { in NextArgumentOrError() argument 35 if (*pi + 1 == args.size()) { in NextArgumentOrError() 36 LOG(ERROR) << "No argument following " << args[*pi] << " option. Try `simpleperf help " << name_ in NextArgumentOrError() 44 bool Command::PreprocessOptions(const std::vector<std::string>& args, in PreprocessOptions() argument 51 for (i = 0; i < args.size() && !args[i].empty() && args[i][0] == '-'; i++) { in PreprocessOptions() 52 auto it = option_formats.find(args[i]); in PreprocessOptions() 54 if (args[i] == "--") { in PreprocessOptions() 58 ReportUnknownOption(args, i); in PreprocessOptions() 66 if (i + 1 == args.size()) { in PreprocessOptions() 78 value.str_value = &args[++i]; in PreprocessOptions() [all …]
|
/system/bt/vendor_libs/test_vendor_lib/scripts/ |
D | test_channel.py | 99 def send_command(self, name, args): argument 101 args_size = len(args) 102 self.lint_command(name, args, name_size, args_size) 104 encoded_args = chr(args_size) + ''.join(chr(len(arg)) + arg for arg in args) 125 def lint_command(self, name, args, name_size, args_size): argument 126 assert name_size == len(name) and args_size == len(args) 129 for arg in args: 136 for arg in args: 157 def do_add(self, args): argument 161 self._test_channel.send_command('add', args.split()) [all …]
|
/system/sepolicy/build/ |
D | build_sepolicy.py | 33 def run_host_command(args, **kwargs): argument 36 command_log = args 38 command_log = ' '.join(args) # For args as a sequence. 41 subprocess.check_call(args, **kwargs) 49 def do_build_cil(args): argument 59 input_file_name = os.path.splitext(args.input_policy_conf)[0] 63 checkpolicy_cmd = [args.checkpolicy_env] 64 checkpolicy_cmd += [os.path.join(args.android_host_path, 'checkpolicy'), 65 '-C', '-M', '-c', args.policy_vers, 66 '-o', raw_cil_file, args.input_policy_conf] [all …]
|
/system/extras/simpleperf/scripts/inferno/ |
D | inferno.py | 49 def collect_data(args): argument 52 if args.app: 53 app_profiler_args += ["-p", args.app] 54 elif args.native_program: 55 app_profiler_args += ["-np", args.native_program] 56 elif args.pid != -1: 57 app_profiler_args += ['--pid', str(args.pid)] 58 elif args.system_wide: 62 if args.compile_java_code: 64 if args.disable_adb_root: [all …]
|
/system/sepolicy/tests/ |
D | searchpolicy.py | 25 args = parser.parse_args() variable 27 if not args.tertypes: 30 if not args.policy: 32 if not args.libpath: 35 if not (args.source or args.target or args.tclass or args.perms): 38 pol = policy.Policy(args.policy, None, args.libpath) 40 if args.source: 41 scontext = {args.source} 44 if args.target: 45 tcontext = {args.target} [all …]
|
/system/netd/server/ |
D | WakeupController.cpp | 53 static void extractIpPorts(WakeupController::ReportArgs& args, Slice payload) { in extractIpPorts() argument 54 switch (args.ipNextHeader) { in extractIpPorts() 60 args.srcPort = ntohs(header.th_sport); in extractIpPorts() 61 args.dstPort = ntohs(header.th_dport); in extractIpPorts() 69 args.srcPort = ntohs(header.uh_sport); in extractIpPorts() 70 args.dstPort = ntohs(header.uh_dport); in extractIpPorts() 78 static void extractIpHeader(WakeupController::ReportArgs& args, Slice payload) { in extractIpHeader() argument 79 switch (args.ethertype) { in extractIpHeader() 85 args.ipNextHeader = header.protocol; in extractIpHeader() 88 args.srcIp = addr; in extractIpHeader() [all …]
|
/system/core/fastboot/device/ |
D | variables.h | 24 bool GetVersion(FastbootDevice* device, const std::vector<std::string>& args, std::string* message); 25 bool GetBootloaderVersion(FastbootDevice* device, const std::vector<std::string>& args, 27 bool GetBasebandVersion(FastbootDevice* device, const std::vector<std::string>& args, 29 bool GetOsVersion(FastbootDevice* device, const std::vector<std::string>& args, 31 bool GetVndkVersion(FastbootDevice* device, const std::vector<std::string>& args, 33 bool GetProduct(FastbootDevice* device, const std::vector<std::string>& args, std::string* message); 34 bool GetSerial(FastbootDevice* device, const std::vector<std::string>& args, std::string* message); 35 bool GetSecure(FastbootDevice* device, const std::vector<std::string>& args, std::string* message); 36 bool GetCurrentSlot(FastbootDevice* device, const std::vector<std::string>& args, 38 bool GetSlotCount(FastbootDevice* device, const std::vector<std::string>& args, [all …]
|