Home
last modified time | relevance | path

Searched refs:which (Results 1 – 25 of 486) sorted by relevance

12345678910>>...20

/system/core/liblog/
Devent_tag_map.cpp137 for (size_t which = 0; which < NUM_MAPS; ++which) { in ~EventTagMap() local
138 if (mapAddr[which]) { in ~EventTagMap()
139 munmap(mapAddr[which], mapLen[which]); in ~EventTagMap()
140 mapAddr[which] = 0; in ~EventTagMap()
349 static int parseMapLines(EventTagMap* map, size_t which) { in parseMapLines() argument
350 const char* cp = static_cast<char*>(map->mapAddr[which]); in parseMapLines()
351 size_t len = map->mapLen[which]; in parseMapLines()
358 which, len); in parseMapLines()
360 if (which) { // do not propagate errors for other files in parseMapLines()
380 if (!which || (errno != EMLINK)) { in parseMapLines()
[all …]
/system/core/libcutils/
Dfs_config.cpp233 static int fs_config_open(int dir, int which, const char* target_out_path) { in fs_config_open() argument
244 if (asprintf(&name, "%.*s%s", (int)len, target_out_path, conf[which][dir]) != -1) { in fs_config_open()
250 fd = TEMP_FAILURE_RETRY(open(conf[which][dir], O_RDONLY | O_BINARY)); in fs_config_open()
313 size_t which, plen; in fs_config() local
321 for (which = 0; which < (sizeof(conf) / sizeof(conf[0])); ++which) { in fs_config()
324 int fd = fs_config_open(dir, which, target_out_path); in fs_config()
332 ALOGE("%s len is corrupted", conf[which][dir]); in fs_config()
337 ALOGE("%s out of memory", conf[which][dir]); in fs_config()
342 ALOGE("%s prefix is truncated", conf[which][dir]); in fs_config()
348 ALOGE("%s is corrupted", conf[which][dir]); in fs_config()
/system/nvram/messages/tests/
Dnvram_messages_test.cpp44 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); in TEST()
69 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); in TEST()
101 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); in TEST()
126 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); in TEST()
139 EXPECT_EQ(COMMAND_GET_SPACE_INFO, decoded.payload.which()); in TEST()
163 EXPECT_EQ(COMMAND_GET_SPACE_INFO, decoded.payload.which()); in TEST()
189 EXPECT_EQ(COMMAND_DELETE_SPACE, decoded.payload.which()); in TEST()
210 EXPECT_EQ(COMMAND_DELETE_SPACE, decoded.payload.which()); in TEST()
221 EXPECT_EQ(COMMAND_DISABLE_CREATE, decoded.payload.which()); in TEST()
234 EXPECT_EQ(COMMAND_DISABLE_CREATE, decoded.payload.which()); in TEST()
[all …]
/system/bt/build/toolchain/clang/
Dget_clang_suffix.py7 def which(cmd): function
16 clang_path = which("clang++")
36 clang_path = which("clang++-" + clang_version_str)
/system/sepolicy/prebuilts/api/26.0/private/
Ddexoptanalyzer.te5 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
7 # own label, which differs from other labels created by other processes.
25 # Allow testing /data/user/0 which symlinks to /data/data
/system/bt/build/
Dinstall_deps.sh7 clang_path=`which clang`
25 clang_path=`which clang-$clang_version`
51 gn_path=`which gn`
/system/sepolicy/prebuilts/api/27.0/private/
Ddexoptanalyzer.te5 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
7 # own label, which differs from other labels created by other processes.
29 # Allow testing /data/user/0 which symlinks to /data/data
/system/sepolicy/prebuilts/api/28.0/private/
Ddexoptanalyzer.te5 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
7 # own label, which differs from other labels created by other processes.
29 # Allow testing /data/user/0 which symlinks to /data/data
/system/sepolicy/prebuilts/api/29.0/private/
Ddexoptanalyzer.te6 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
7 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
8 # own label, which differs from other labels created by other processes.
31 # Allow testing /data/user/0 which symlinks to /data/data
Dviewcompiler.te6 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
8 # own label, which differs from other labels created by other processes.
/system/timezone/input_tools/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/timezone/testing/data/test1/output_data/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/timezone/input_data/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/timezone/output_data/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/timezone/testing/data/test3/output_data/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/timezone/testing/data/test2/output_data/iana/
DNOTICE3 newstrftime.3, and strftime.c, which contain material derived from BSD
4 and which use the BSD 3-clause license.
/system/sepolicy/prebuilts/api/30.0/private/
Ddexoptanalyzer.te10 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
11 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
12 # own label, which differs from other labels created by other processes.
38 # Allow testing /data/user/0 which symlinks to /data/data
Dviewcompiler.te6 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
8 # own label, which differs from other labels created by other processes.
/system/sepolicy/private/
Ddexoptanalyzer.te10 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
11 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their
12 # own label, which differs from other labels created by other processes.
38 # Allow testing /data/user/0 which symlinks to /data/data
Dviewcompiler.te6 # Reading an APK opens a ZipArchive, which unpack to tmpfs.
7 # Use tmpfs_domain() which will give tmpfs files created by viewcompiler their
8 # own label, which differs from other labels created by other processes.
/system/update_engine/
Dpylintrc51 # optimizer, which will apply various small optimizations. For instance, it can
115 # Python expression which should return a note less than 10 (10 is the highest
116 # note). You have access to the variables errors warning, statement which
148 # List of module names for which member attributes should not be checked
154 # List of classes names for which member attributes should not be checked
159 # List of members which are set dynamically and missed by pylint inference
205 # List of strings which can identify a callback function by name. A callback
265 # Good variable names which should always be accepted, separated by a comma
268 # Bad variable names which should always be refused, separated by a comma
278 # Regular expression which should only match correct function names.
[all …]
/system/sepolicy/public/
Dhwservice.te1 # hwservice types. By default most of the HALs are protected_hwservice, which means
66 # of the client and thus have the same access as the client domain in which
68 # - coredomain_hwservice: are considered safer than ordinary hwservices which
73 # by surfaceflinger Binder service, which apps are permitted to access
75 # Binder service which apps were permitted to access.
100 # It does not make sense to register or lookup something which is not a
Dattributes98 # All /system-defined properties which can't be written outside /system.
118 # All /vendor-defined properties which can't be written outside /vendor.
127 # services which should be available to all but isolated apps
130 # services which should be available to all ephemeral apps
133 # services which export only system_api
136 # services which served by vendor and also using the copy of libbinder on
200 # All vendor domains which violate the requirement of not using Binder
205 # All vendor domains which violate the requirement of not using sockets for
211 # All vendor domains which violate the requirement of not executing
217 # All domains which violate the requirement of not sharing files by path
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Dhwservice.te1 # hwservice types. By default most of the HALs are protected_hwservice, which means
66 # of the client and thus have the same access as the client domain in which
68 # - coredomain_hwservice: are considered safer than ordinary hwservices which
73 # by surfaceflinger Binder service, which apps are permitted to access
75 # Binder service which apps were permitted to access.
100 # It does not make sense to register or lookup something which is not a
/system/media/camera/docs/
Dmetadata-check-dependencies25 if ! which port >& /dev/null
29 elif [[ "$OSTYPE" == "linux-gnu" ]] && which apt-get >& /dev/null

12345678910>>...20