/system/testing/gtest_extras/tests/ |
D | OptionsTest.cpp | 59 bool parsed = options.Process(cur_args, &child_args_); in TEST_F() local 61 ASSERT_FALSE(parsed) << "Process did not fail properly."; in TEST_F() 69 bool parsed = options.Process(cur_args, &child_args_); in TEST_F() local 71 ASSERT_FALSE(parsed) << "Process did not fail properly."; in TEST_F() 79 bool parsed = options.Process(cur_args, &child_args_); in TEST_F() local 81 ASSERT_FALSE(parsed) << "Process did not fail properly."; in TEST_F() 116 bool parsed = options.Process(cur_args, &child_args_); in TEST_F() local 118 ASSERT_FALSE(parsed) << "Process did not fail properly."; in TEST_F() 142 bool parsed = options.Process(cur_args, &child_args_); in TEST_F() local 144 ASSERT_FALSE(parsed) << "Process did not fail properly."; in TEST_F() [all …]
|
/system/core/init/ |
D | property_type.cpp | 50 int64_t parsed; in CheckType() local 51 return ParseInt(value, &parsed); in CheckType() 54 uint64_t parsed; in CheckType() local 58 return ParseUint(value, &parsed); in CheckType() 61 double parsed; in CheckType() local 62 return ParseDouble(value.c_str(), &parsed); in CheckType()
|
D | README.md | 102 the file that contains them was parsed (see the Imports section), then 263 will use for this service. Pay close attention to the order in which init.rc files are parsed, 288 It is parsed similarly to the setrlimit command specified below. 682 If _path_ is a directory, each file in the directory is parsed as 684 not be parsed. 688 imports are handled as a file is being parsed and follow the below logic. 709 1. /init.rc is parsed then recursively each of its imports are 710 parsed. 711 2. The contents of /system/etc/init/ are alphabetized and parsed 713 parsed. [all …]
|
/system/core/libprocinfo/ |
D | process_map_test.cpp | 119 bool parsed = in VerifyReadMapFileAsyncSafe() local 126 ASSERT_TRUE(parsed) << "Parsing of data failed:\n" << maps_data; in VerifyReadMapFileAsyncSafe() 209 bool parsed = android::procinfo::ReadMapFileAsyncSafe("/proc/self/maps", nullptr, 10, callback); in TEST() local 215 ASSERT_FALSE(parsed); in TEST() 229 bool parsed = android::procinfo::ReadMapFileAsyncSafe("/proc/self/maps", buffer, 0, callback); in TEST() local 235 ASSERT_FALSE(parsed); in TEST() 249 bool parsed = in TEST() local 256 ASSERT_FALSE(parsed); in TEST() 274 bool parsed = android::procinfo::ReadMapFileAsyncSafe(tf.path, buffer, sizeof(buffer), callback); in TEST() local 280 ASSERT_FALSE(parsed); in TEST()
|
/system/core/fastboot/fuzzy_fastboot/ |
D | extensions.h | 68 bool parsed; // Does the bootloader do parsing on the img? member 74 << " parsed=" << pinfo.parsed << ">";
|
D | extensions.cpp | 112 XMLAssert(XMLYesNo(part, "parsed", &part_info.parsed), part, in ExtractPartitions()
|
D | README.md | 83 | parsed | "yes" or "no" | Does the bootloader parse this partition, such as look for a header,… 89 <part value="boot" slots="yes" test="yes" hashable="yes" parsed="yes"/> 216 <part value="boot" slots="yes" test="yes" hashable="yes" parsed="yes"/>
|
D | main.cpp | 1029 EXPECT_EQ(fb->FlashPartition(part_name, buf), part_info.parsed ? DEVICE_FAIL : SUCCESS) in TEST_P() 1661 if (!it.second.parsed) { in GenerateXmlTests() 1666 if (it.second.parsed) { in GenerateXmlTests()
|
/system/extras/ANRdaemon/ |
D | README | 16 The compressed trace file can be parsed using systrace: 26 file is parsed by systrace.py, the daemon process is shown as running for the
|
/system/tools/hidl/lint/test/interfaces/method_versions/1.0/ |
D | IWrongUnderscore.hal | 22 /* minor version cannot be parsed */
|
D | IWrongMinor.hal | 22 /* minor version cannot be parsed */
|
/system/tools/xsdc/src/com/android/xsdc/ |
D | XsdHandler.java | 93 String[] parsed = str.split(":"); in parseQName() 94 if (parsed.length == 2) { in parseQName() 95 return new QName(namespaces.get(parsed[0]), parsed[1]); in parseQName() 96 } else if (parsed.length == 1) { in parseQName() 105 String[] parsed = str.split("\\s+"); in parseQNames() 106 for (String s : parsed) { in parseQNames()
|
/system/extras/ioshark/ |
D | compile-only.sh | 112 rm -f parsed*
|
D | collect-straces-ftraces.sh | 189 rm -f parsed*
|
/system/bt/ |
D | EventLogTags.logtags | 2 # This is installed on the device, in /system/etc, and parsed by logcat.
|
/system/core/liblog/ |
D | event.logtags | 2 # This is installed on the device, in /system/etc, and parsed by logcat.
|
/system/core/storaged/ |
D | EventLogTags.logtags | 2 # This is installed on the device, in /system/etc, and parsed by logcat.
|
/system/core/logd/ |
D | event.logtags | 2 # This is installed on the device, in /system/etc, and parsed by logcat.
|
/system/memory/lmkd/ |
D | event.logtags | 2 # This is installed on the device, in /system/etc, and parsed by logcat.
|
/system/core/fs_mgr/libsnapshot/update_engine/ |
D | update_metadata.proto | 29 // here can also be parsed by protobuf defined there. However, it is not
|
/system/incremental_delivery/incfs/ |
D | MountRegistry.cpp | 328 const auto parsed = forEachLine(fd, [&](std::string_view line) { in loadFrom() local 364 if (!parsed) { in loadFrom()
|
/system/tools/xsdc/ |
D | README.md | 7 The xml files are only ever parsed by apps on the system partition.
|
/system/core/logcat/ |
D | event.logtags | 2 # This is installed on the device, in /system/etc, and parsed by logcat.
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 102 a full policy.conf file and output them in a more easily parsed format.
|
/system/tools/aidl/ |
D | Android.bp | 183 // Enable this to show additional information about what is being parsed during fuzzing.
|