/bionic/tests/ |
D | grp_pwd_file_test.cpp | 29 FileUnmapper(T& file) : file_(file) { in FileUnmapper() argument 39 void FindAndCheckPasswdEntry(PasswdFile* file, const char* name, uid_t uid, gid_t gid, in FindAndCheckPasswdEntry() argument 42 ASSERT_TRUE(file->FindByName(name, &name_passwd_state)) << name; in FindAndCheckPasswdEntry() 54 ASSERT_TRUE(file->FindById(uid, &id_passwd_state)) << uid; in FindAndCheckPasswdEntry() 66 void FindAndCheckGroupEntry(GroupFile* file, const char* name, gid_t gid) { in FindAndCheckGroupEntry() argument 68 ASSERT_TRUE(file->FindByName(name, &name_group_state)) << name; in FindAndCheckGroupEntry() 78 ASSERT_TRUE(file->FindById(gid, &id_group_state)) << gid; in FindAndCheckGroupEntry() 92 TemporaryFile file; in TEST() local 93 ASSERT_NE(-1, file.fd); in TEST() 95 write(file.fd, test_string, sizeof(test_string) - 1); in TEST() [all …]
|
D | Android.mk | 68 $(LOCAL_PATH)/file-check-cxx \ 71 LOCAL_CXX = $(LOCAL_PATH)/file-check-cxx \ 87 $(LOCAL_PATH)/file-check-cxx \ 90 LOCAL_CXX := $(LOCAL_PATH)/file-check-cxx \
|
/bionic/libc/kernel/tools/ |
D | generate_uapi_headers.sh | 72 for file in $(ls -d ${src_dir}/* 2> /dev/null); do 73 if [[ -d "${file}" ]]; then 74 search_dirs+=("${file}") 75 elif [[ -f "${file}" ]] && [[ "${file}" =~ .h$ ]]; then 76 cp ${file} ${tgt_dir} 95 for file in $(ls -d ${src_dir}/* 2> /dev/null); do 96 if [[ -f "${file}" ]] && [[ "${file}" =~ .h$ ]]; then 98 header=$(basename ${file}) 100 cp ${file} ${tgt_dir} 114 for file in $(ls -d ${src_dir}/* 2> /dev/null); do [all …]
|
D | update_all.py | 40 for file in sorted(files): 41 _, ext = os.path.splitext(file) 44 src_file = os.path.normpath(os.path.join(root, file))
|
/bionic/libc/bionic/ |
D | assert.cpp | 35 void __assert(const char* file, int line, const char* failed_expression) { in __assert() argument 36 async_safe_fatal("%s:%d: assertion \"%s\" failed", file, line, failed_expression); in __assert() 39 void __assert2(const char* file, int line, const char* function, const char* failed_expression) { in __assert2() argument 40 async_safe_fatal("%s:%d: %s: assertion \"%s\" failed", file, line, function, failed_expression); in __assert2()
|
D | error.cpp | 76 void error_at_line(int status, int error, const char* file, unsigned int line, const char* fmt, ...… in error_at_line() argument 80 if (last_line == line && last_file != NULL && strcmp(last_file, file) == 0) { in error_at_line() 83 last_file = file; in error_at_line() 88 fprintf(stderr, "%s:%d: ", file, line); in error_at_line()
|
/bionic/libc/dns/resolv/ |
D | res_debug.c | 137 fp_resstat(const res_state statp, FILE *file) { in fp_resstat() argument 140 fprintf(file, ";; res options:"); in fp_resstat() 143 fprintf(file, " %s", p_option(mask)); in fp_resstat() 144 putc('\n', file); in fp_resstat() 151 int pflag, FILE *file) in do_section() argument 168 fprintf(file, ";; memory allocation failure\n"); in do_section() 177 fprintf(file, ";; ns_parserr: %s\n", in do_section() 181 putc('\n', file); in do_section() 185 fprintf(file, ";; %s SECTION:\n", in do_section() 188 fprintf(file, ";;\t%s, type = %s, class = %s\n", in do_section() [all …]
|
D | res_debug.h | 26 # define Aerror(statp, file, string, error, address) /*empty*/ argument 27 # define Perror(statp, file, string, error) /*empty*/ argument
|
D | res_data.c | 156 fp_query(const u_char *msg, FILE *file) { in fp_query() argument 157 fp_nquery(msg, PACKETSZ, file); in fp_query() 161 fp_nquery(const u_char *msg, int len, FILE *file) { in fp_nquery() argument 165 res_pquery(&_nres, msg, len, file); in fp_nquery()
|
/bionic/tools/relocation_packer/src/ |
D | main.cc | 96 const char* file = argv[argc - 1]; in main() local 97 android::base::unique_fd fd(open(file, O_RDWR)); in main() 99 LOG(ERROR) << file << ": " << strerror(errno); in main() 110 LOG(ERROR) << file << ": failed to read elf header:" << strerror(errno); in main() 115 LOG(ERROR) << file << ": lseek to 0 failed:" << strerror(errno); in main() 140 LOG(ERROR) << file << ": unknown ELFCLASS: " << e_ident[EI_CLASS]; in main() 145 LOG(ERROR) << file << ": failed to pack/unpack file"; in main()
|
/bionic/linker/ |
D | linker_namespaces.cpp | 36 bool android_namespace_t::is_accessible(const std::string& file) { in is_accessible() argument 42 if (file_is_in_dir(file, dir)) { in is_accessible() 48 if (file_is_in_dir(file, dir)) { in is_accessible() 54 if (file_is_under_dir(file, dir)) { in is_accessible()
|
D | linker_utils.h | 38 bool file_is_in_dir(const std::string& file, const std::string& dir); 39 bool file_is_under_dir(const std::string& file, const std::string& dir);
|
D | linker_utils.cpp | 119 bool file_is_in_dir(const std::string& file, const std::string& dir) { in file_is_in_dir() argument 121 const char* haystack = file.c_str(); in file_is_in_dir() 129 bool file_is_under_dir(const std::string& file, const std::string& dir) { in file_is_under_dir() argument 131 const char* haystack = file.c_str(); in file_is_under_dir()
|
D | ld.config.format.md | 1 # Linker config file format 3 This document describes format of /system/etc/ld.config.txt file. This file can be used to customize 36 # the version specified in <dirname>/.version file, where <dirname> = dirname(executable_path)
|
/bionic/libc/ |
D | SECCOMP_WHITELIST_GLOBAL.TXT | 1 # This file is used to populate seccomp's global whitelist policy in 8 # format of the entries in this file. 10 # This file is processed by a python script named genseccomp.py.
|
D | SECCOMP_BLACKLIST_COMMON.TXT | 1 # This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT. 5 # Any entry in the blacklist must be in the syscalls file and not be in the whitelist file 29 # This file is processed by a python script named genseccomp.py.
|
D | SECCOMP_WHITELIST_APP.TXT | 1 # This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT. 26 # This file is processed by a python script named genseccomp.py.
|
D | SECCOMP_WHITELIST_SYSTEM.TXT | 1 # This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT. 26 # This file is processed by a python script named genseccomp.py.
|
D | SECCOMP_BLACKLIST_APP.TXT | 1 # This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT. 5 # Any entry in the blacklist must be in the syscalls file and not be in the whitelist file 29 # This file is processed by a python script named genseccomp.py.
|
/bionic/benchmarks/ |
D | README.md | 19 When operated without specifying an xml file, the default is to run all 35 To choose a specific xml file, use the `--bionic_xml=FILE.XML` option. By default, this 36 option searches for the xml file in the `suites/` directory. If it doesn't exist 37 in that directory then the file will be found as relative to the current 38 directory. If the option specifies the full path to an xml file such as 41 If no xml file is specified through the command-line option, the default is to use `suites/full.xml…
|
/bionic/libc/upstream-openbsd/ |
D | README.md | 3 the file.
|
/bionic/libc/upstream-netbsd/ |
D | README.md | 3 the file.
|
/bionic/libc/upstream-freebsd/ |
D | README.md | 3 the file.
|
/bionic/libc/upstream-netbsd/lib/libc/isc/ |
D | ev_streams.c | 79 if (evSelectFD(opaqueCtx, fd, EV_WRITE, writable, new, &new->file) < 0) in evWrite() 113 if (evSelectFD(opaqueCtx, fd, EV_READ, readable, new, &new->file) < 0) in evRead() 202 if (old->file.opaque) in evCancelRW() 203 evDeselectFD(opaqueCtx, old->file); in evCancelRW() 263 evDeselectFD(opaqueCtx, str->file); in done() 264 str->file.opaque = NULL; in done()
|
/bionic/libc/tools/ |
D | gensyscalls.py | 622 for file in os.listdir(os.path.join(bionic_libc_root, rel_path)): 623 if file.endswith(".S"): 624 self.old_stubs.append(os.path.join(rel_path, file)) 666 for file in edits: 667 shutil.copyfile(os.path.join(bionic_temp, file), 668 os.path.join(bionic_libc_root, file)) 669 …commands.getoutput("git add " + " ".join((os.path.join(bionic_libc_root, file)) for file in edits))
|