/system/core/liblog/ |
D | event_tag_map.cpp | 137 for (size_t which = 0; which < NUM_MAPS; ++which) { in ~EventTagMap() local 138 if (mapAddr[which]) { in ~EventTagMap() 139 munmap(mapAddr[which], mapLen[which]); in ~EventTagMap() 140 mapAddr[which] = 0; in ~EventTagMap() 349 static int parseMapLines(EventTagMap* map, size_t which) { in parseMapLines() argument 350 const char* cp = static_cast<char*>(map->mapAddr[which]); in parseMapLines() 351 size_t len = map->mapLen[which]; in parseMapLines() 358 which, len); in parseMapLines() 360 if (which) { // do not propagate errors for other files in parseMapLines() 380 if (!which || (errno != EMLINK)) { in parseMapLines() [all …]
|
/system/core/libcutils/ |
D | fs_config.cpp | 233 static int fs_config_open(int dir, int which, const char* target_out_path) { in fs_config_open() argument 244 if (asprintf(&name, "%.*s%s", (int)len, target_out_path, conf[which][dir]) != -1) { in fs_config_open() 250 fd = TEMP_FAILURE_RETRY(open(conf[which][dir], O_RDONLY | O_BINARY)); in fs_config_open() 313 size_t which, plen; in fs_config() local 321 for (which = 0; which < (sizeof(conf) / sizeof(conf[0])); ++which) { in fs_config() 324 int fd = fs_config_open(dir, which, target_out_path); in fs_config() 332 ALOGE("%s len is corrupted", conf[which][dir]); in fs_config() 337 ALOGE("%s out of memory", conf[which][dir]); in fs_config() 342 ALOGE("%s prefix is truncated", conf[which][dir]); in fs_config() 348 ALOGE("%s is corrupted", conf[which][dir]); in fs_config()
|
/system/nvram/messages/tests/ |
D | nvram_messages_test.cpp | 44 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); in TEST() 69 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); in TEST() 101 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); in TEST() 126 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); in TEST() 139 EXPECT_EQ(COMMAND_GET_SPACE_INFO, decoded.payload.which()); in TEST() 163 EXPECT_EQ(COMMAND_GET_SPACE_INFO, decoded.payload.which()); in TEST() 189 EXPECT_EQ(COMMAND_DELETE_SPACE, decoded.payload.which()); in TEST() 210 EXPECT_EQ(COMMAND_DELETE_SPACE, decoded.payload.which()); in TEST() 221 EXPECT_EQ(COMMAND_DISABLE_CREATE, decoded.payload.which()); in TEST() 234 EXPECT_EQ(COMMAND_DISABLE_CREATE, decoded.payload.which()); in TEST() [all …]
|
/system/bt/build/toolchain/clang/ |
D | get_clang_suffix.py | 7 def which(cmd): function 16 clang_path = which("clang++") 36 clang_path = which("clang++-" + clang_version_str)
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | dexoptanalyzer.te | 5 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 7 # own label, which differs from other labels created by other processes. 25 # Allow testing /data/user/0 which symlinks to /data/data
|
/system/bt/build/ |
D | install_deps.sh | 7 clang_path=`which clang` 25 clang_path=`which clang-$clang_version` 51 gn_path=`which gn`
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | dexoptanalyzer.te | 5 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 7 # own label, which differs from other labels created by other processes. 29 # Allow testing /data/user/0 which symlinks to /data/data
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | dexoptanalyzer.te | 5 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 7 # own label, which differs from other labels created by other processes. 29 # Allow testing /data/user/0 which symlinks to /data/data
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | dexoptanalyzer.te | 6 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 7 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 8 # own label, which differs from other labels created by other processes. 31 # Allow testing /data/user/0 which symlinks to /data/data
|
D | viewcompiler.te | 6 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their 8 # own label, which differs from other labels created by other processes.
|
/system/timezone/input_tools/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/testing/data/test1/output_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/input_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/output_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/testing/data/test3/output_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/testing/data/test2/output_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | dexoptanalyzer.te | 10 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 11 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 12 # own label, which differs from other labels created by other processes. 38 # Allow testing /data/user/0 which symlinks to /data/data
|
D | viewcompiler.te | 6 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their 8 # own label, which differs from other labels created by other processes.
|
/system/sepolicy/private/ |
D | dexoptanalyzer.te | 10 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 11 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 12 # own label, which differs from other labels created by other processes. 38 # Allow testing /data/user/0 which symlinks to /data/data
|
D | viewcompiler.te | 6 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their 8 # own label, which differs from other labels created by other processes.
|
/system/update_engine/ |
D | pylintrc | 51 # optimizer, which will apply various small optimizations. For instance, it can 115 # Python expression which should return a note less than 10 (10 is the highest 116 # note). You have access to the variables errors warning, statement which 148 # List of module names for which member attributes should not be checked 154 # List of classes names for which member attributes should not be checked 159 # List of members which are set dynamically and missed by pylint inference 205 # List of strings which can identify a callback function by name. A callback 265 # Good variable names which should always be accepted, separated by a comma 268 # Bad variable names which should always be refused, separated by a comma 278 # Regular expression which should only match correct function names. [all …]
|
/system/sepolicy/public/ |
D | hwservice.te | 1 # hwservice types. By default most of the HALs are protected_hwservice, which means 66 # of the client and thus have the same access as the client domain in which 68 # - coredomain_hwservice: are considered safer than ordinary hwservices which 73 # by surfaceflinger Binder service, which apps are permitted to access 75 # Binder service which apps were permitted to access. 100 # It does not make sense to register or lookup something which is not a
|
D | attributes | 98 # All /system-defined properties which can't be written outside /system. 118 # All /vendor-defined properties which can't be written outside /vendor. 127 # services which should be available to all but isolated apps 130 # services which should be available to all ephemeral apps 133 # services which export only system_api 136 # services which served by vendor and also using the copy of libbinder on 200 # All vendor domains which violate the requirement of not using Binder 205 # All vendor domains which violate the requirement of not using sockets for 211 # All vendor domains which violate the requirement of not executing 217 # All domains which violate the requirement of not sharing files by path [all …]
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | hwservice.te | 1 # hwservice types. By default most of the HALs are protected_hwservice, which means 66 # of the client and thus have the same access as the client domain in which 68 # - coredomain_hwservice: are considered safer than ordinary hwservices which 73 # by surfaceflinger Binder service, which apps are permitted to access 75 # Binder service which apps were permitted to access. 100 # It does not make sense to register or lookup something which is not a
|
/system/media/camera/docs/ |
D | metadata-check-dependencies | 25 if ! which port >& /dev/null 29 elif [[ "$OSTYPE" == "linux-gnu" ]] && which apt-get >& /dev/null
|